-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 20986fb8:cdac21b3
2024-05-14 04:27:58Relay is the soul of the decentralized Nostr network. In previous articles, we discussed who would bear the ongoing operational costs of Relay. To ensure a thriving storage network, Relay needs to be incentivized. In order to achieve better decentralization of media, YakiHonne has launched the Relay's early incentive plan to support the development of 50 Relays for a period of 6 months.
The details of the grant program are as follows:
- Grant amount: A total of $50,000, with each grant ideally being $1000.
- Application period: From May 15, 2024, to December 31, 2024.
- Applicants: Existing Relay node hosts or new hosters, with a funding ratio of 20 existing Relay nodes and 30 new Relay nodes.
Relay operational requirements:
-
The minimum requirements for Relay deployment are according to [1]:
-
1.1. High performance Intel
- 1.2. 1 vCPU
- 1.3. 2048 MB Ram
- 1.4. 50 GB NVMe SSD
-
1.5. OS Ubuntu 22.04 LTS
-
There are no restrictions on storage service providers, and you can choose any stable provider.
-
There are no restrictions on the location of Relays, but it is recommended to have geographical diversity to maintain a balanced distribution of Relays.
- Relays need to operate continuously for the next 6 months with downtime not exceeding 30 minutes.
- You can choose from the already existed relays implementations: nostr-rs-relay based on Rust, nostr-ts-relay akk nostream using Typescript, or strfry using C++.
- Relay models can be of any type: thematic Relays relying on keyword filtering for specific topics, invitation-only Relays that restrict publishing permissions through public keys, or paid and free public Relays corresponding to paid publishing and fully open modes, respectively. However, to maintain a balanced incentive, the proportion of paid and invitation-only Relays will not exceed 20%.
- Monthly reports on Relay stability and availability need to be shared to maintain good operational status.
Application process:
You need to submit a proposal including whether you are already hosting a Relay, the name of the existing Relay, specifications of the Relay hosting service, possible service provider choices, Relay development environment, Relay model, and more details to help you secure funding.
Submission: npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
Grant Evaluation and Disbursement:
Within one week of receiving the application, we will provide feedback on the grant decision. The grant amount will be disbursed in two installments, with 50% being provided initially and the remaining 50% being disbursed after 3 months.
Rewards:
In the early incentive program, nodes that contribute consistently to improving Relay performance, expanding functionality, and ensuring stability will receive special rewards and have the opportunity to earn more income.
The goal of this incentive program is to further decentralize Nostr, enhance its performance, and promote the development of Relay functionality. Through the early incentive program, we aim to explore sustainable incentive models for Relays and lay the foundation for their sustainable development.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 32e18276:5c68e245
2023-12-06 15:29:43I’m going to be on an ordinals panels as one of the people who is counter arguing the claim that they are good for bitcoin. I decided to brush up on the technicals on how inscriptions work. I am starting to see luke’s perspective on how it is exploiting a loophole in bitcoin’s anti-data-spam mechanisms.
Storing data in Bitcoin, the “standard” way
The standard way you add “data” to bitcoin is by calling the OP_RETURN opcode. Bitcoin devs noticed that people were storing data (like the bitcoin whitepaper) in the utxo set via large multisig transactions. The problem with this is that this set is unprunable and could grow over time. OP_RETURN outputs on the other-hand are provably prunable and don’t add to utxo bloat.
Here’s an excerpt from the march 2014 0.9.0 release notes that talks about this:
On OP_RETURN: There was been some confusion and misunderstanding in the community, regarding the OP_RETURN feature in 0.9 and data in the blockchain. This change is not an endorsement of storing data in the blockchain. The OP_RETURN change creates a provably-prunable output, to avoid data storage schemes – some of which were already deployed – that were storing arbitrary data such as images as forever-unspendable TX outputs, bloating bitcoin’s UTXO database. Storing arbitrary data in the blockchain is still a bad idea; it is less costly and far more efficient to store non-currency data elsewhere.
Much of the work on bitcoin core has been focused on making sure the system continues to function in a decentralized way for its intended purpose in the presence of people trying to abuse it for things like storing data. Bitcoin core has always discouraged this, as it is not designed for storage of images and data, it is meant for moving digital coins around in cyberspace.
To help incentive-align people to not do stupid things, OP_RETURN transactions were not made non-standard, so that they are relayable by peers and miners, but with the caveat:
- They can only push 40 bytes (later increased to 80,83, I’m guessing to support larger root merkle hashes since that is the only sane usecase for op_return)
Bitcoin also added an option called -datacarriersize which limits the total number of bytes from these outputs that you will relay or mine.
Why inscriptions are technically an exploit
Inscriptions get around the datacarriersize limit by disguising data as bitcoin script program data via OP_PUSH inside OP_IF blocks. Ordinals do not use OP_RETURN and are not subjected to datacarriersize limits, so noderunners and miners currently have limited control over the total size of this data that they wish to relay and include in blocks. Luke’s fork of bitcoin-core has some options to fight this spam, so hopefully we will see this in core sometime soon as well.
Inscriptions are also taking advantage of features in segwit v1 (witness discount) and v2/taproot (no arbitrary script size limit). Each of these features have interesting and well-justified reasons why they were introduced.
The purpose of the witness discount was to make it cheaper to spend many outputs which helps the reduction of the utxo set size. Inscriptions took advantage of this discount to store monke jpegs disguised as bitcoin scripts. Remember, bitcoin is not for storing data, so anytime bitcoin-devs accidentally make it cheap and easy to relay data then this should be viewed as an exploit. Expect it to be fixed, or at least provide tools to noderunners for fighting this spam.
Where do we go from here
The interesting part of this story is that people seem to attach value to images stored on the bitcoin blockchain, and they are willing to pay the fee to get it in the block, so non-ideologic miners and people who don’t care about the health and decentralization of bitcoin are happy to pay or collect the fee and move on.
Data should not get a discount, people should pay full price if they want to store data. They should just use op_return and hashes like opentimestamps or any other reasonable protocol storing data in bitcoin.
After going through this analysis I’ve come to the opinion that this is a pretty bad data-spam exploit and bitcoin devs should be working on solutions. Ideological devs like luke who actually care about the health and decentralization of the network are and I’m glad to see it.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ de496884:72617b81
2023-11-20 13:54:02Hola nostriches. Hoy quiero hacer una publicación a modo de acercamiento al surgimiento de las categorías de género y feminismo. Así que si te interesa el tema haz un esfuerzo, quédate y lee hasta el final.
El «nuevo» feminismo surge en los años 60 en aquellos países desarrollados que acordaron el reconocimiento a los derechos humanos contenidos en la declaración respectiva de la ONU. Entonces, como extensión a dicho reconocimiento es que se gesta el movimiento feminista. A partir de entonces, se vuelve a plantear la relación entre naturaleza y cultura y se llega a la conclusión de que las diferencias sociales van más allá de las diferencias biológicas, lo cual tiene que ver con que hasta la satisfacción de las necesidades elementales como son la alimentación, la vivienda o el vestuario, están condicionadas por construcciones sociales.
Pues resulta que una de las primeras propuestas identificó la subordinación femenina producto de una organización patriarcal, tomando la categoría patriarcado de Max Weber. Es así como la visión de patriarcado se extendió al discurso político y académico. Sin embargo, no existía información acerca del desarrollo histórico de dicha categoría, sistematización, variaciones, etc., debido a que era algo que recién se percibía en sociedad.
Sin embargo, la misma categoría de patriarcado junto a la de relaciones de poder para explicar fenómenos sociales contemporáneos, constituye uno de los principales aportes del feminismo. Es así como han logrado primero visibilizar y luego deconstruir y desmontar una serie de patrones existentes en la cultura que hacían a la mujer subordinarse al hombre, y que estaban presentes en el sistema sexo/género.
Imagen relativa a la lucha contra el patriarcado
Hasta ese momento, en las investigaciones de corte sociológico se podía observar un androcentrismo excesivo al dar cuenta de que el discurso científico giraba en torno al hombre como sujeto y objeto de la investigación. Incluso para muchos positivistas como el mismo Weber, los problemas relativos a las mujeres quedaban en un segundo plano y eran achacados a una supuesta pasividad en el ámbito doméstico-familiar. Dicha pasividad partía de la supuesta inferioridad biológica del género femenino.
El patriarcado entonces era una categoría vacía en sí misma, sin valor explicativo. Desde el punto de vista político pudo ser útil para la movilización pero no resistió la polémica de los críticos del feminismo ni problematizó los conflictos a ser resueltos. Pero por otro lado, un grupo de mujeres -académicas principalmente- se puso manos a la obra en una tarea más pequeña pero con mayores resultados a la larga. Se propusieron generar conocimientos sobre las condiciones de vida de la mujer, buscar en el pasado y el presente los aportes de las mujeres a la sociedad, hacerlas visibles en la historia. Es así como surgen centros académicos, ONG, proyectos, centros de estudios sobre la mujer, etc.
Convendría distinguir entonces dos posturas que acompañaron a la investigación sobre las mujeres: uno que toma como objeto de estudio a la mujer; condiciones de vida, trabajo, cultura, y otra que privilegia a la sociedad como generadora de la subordinación de las mujeres. Mientras la primera perspectiva generaba conocimiento sobre las mujeres en el estudio de las relaciones mujer-hombre y mujer-mujer, la segunda tenía una visión más holística ya que planteaba que hay que estudiar la sociedad ya que la subordinación de las mujeres es producto de la organización de esta, y que no se avanzará solamente estudiando a las mujeres, pues el estudio debe ser más amplio y en diferentes niveles, ámbitos y tiempos.
Es en esta búsqueda donde nace y se desarrolla el concepto de género como categoría social. Es así que los sistemas de género/sexo fueron entendidos como conjuntos de prácticas, símbolos, representaciones, normas y valores sociales que las sociedades construyen a partir de la diferencia anatomofisiológica y que dotan de sentido a los impulsos sexuales, la reproducción y en general a las relaciones de las personas. Por tanto, este sistema pasó a ser el objeto de estudio para comprender la subordinación de la mujer al hombre. Al ser el reconocimiento de una dimensión de la desigualdad social hasta entonces desconocida, se considera la ruptura epistemológica más importante de la segunda mitad del siglo pasado.
Imagen representativa del binarismo de género
Hay que decir que los fenómenos sociales se definen por la relación que guardan entre sí. Es así que la contextualización adquiere gran importancia. Varones y hembras tenemos la capacidad de producir con el cuerpo, pero solo los cuerpos de las hembras pueden gestar y por tanto asegurar la especie humana. Todo grupo humano que pretenda sobrevivir debe asegurarse cierto número de hembras que lo hagan posible. De ahí un poder particular del cuerpo de las hembras que además es económicamente útil. Dicho poder no es en tanto entidad biológica, sino que es la sociedad la que le otorga este poder. En este punto es importante preguntarnos históricamente ¿quiénes han controlado la capacidad reproductiva de las mujeres?, ¿quiénes han tenido la preferencia en el acceso sexual? Para asegurar un control efectivo sobre la reproducción es necesario asegurar el acceso a la sexualidad.
Ello también lleva a dirigir el trabajo que hacen porque de lo contrario, las mujeres pudieran tener espacio para representar una amenaza al dominio de los hombres. Es importante atender a las etapas del desarrollo de las mujeres, que permitirá ver cómo se moldean para aceptar la desigualdad y las jerarquías según el género en las distintas sociedades y culturas.
Otro contexto a delimitar es el ámbito doméstico donde históricamente ha estado ubicada la subordinación femenina. Se ha puesto al descubierto que en mujeres que comparten la misma posición de clase y raza, la condición femenina se redefine a lo largo de la vida y que algunas mujeres gozan de poder sobre otras aún en contextos de alta dominación masculina, donde se les inviste de autoridad, creando el sistema zonas de incertidumbre que las divide como género e impide alianzas y se legitima la dominación. Foucault decía que «el poder se ejerce, no se posee», siempre está en peligro de perderse y no basta con normas, leyes, amenazas o castigos. De ahí que los espacios de subordinación sean también espacios de poder de las mujeres. Es en estos espacios donde aparece la inseguridad, la tensión, la confrontación y por ejemplo, las mujeres pueden reclamar la anticoncepción.
Para terminar, es importante tener en cuenta que el género es una forma de desigualdad social que siempre está articulado con otras formas de desigualdad ya sea clase, raza, grupo etario, etc. Hay que pensar la dominación masculina con un comienzo vago en el tiempo, pero que permite desligar la subordinación de las mujeres de la evolución «natural» de la humanidad y entenderla como un proceso histórico. En ese sentido es necesario destacar que, respecto a la raza, en sociedades plurales hay que atender al contexto étnico-cultural ya que en dependencia de las relaciones entre personas de razas distintas, estarán condicionadas las relaciones entre los géneros.
Imagen de mujeres de distintas razas
Por otro lado, si bien es sabido que históricamente el sistema de género social imperante ha contribuido a invisibilizar a la mujer, asociar necesariamente dicha categoría únicamente a ella, lo que hace es nuevamente recrear el absolutismo histórico que tanto daño ha hecho, ahora como lo antagónico al hombre. En la construcción social participan todos los individuos presentes en el sistema género.
Hasta aquí la publicación de hoy, de la cual aun se puede ahondar mucho más, sobre todo en lo referido al origen de la dominación o de la jerarquización del binomio «hombre/mujer» desde un punto de vista antropológico, pero eso quedará pendiente para otro momento. ¡Así que hasta la próxima!, ¡nos vemos en Nostr!
........................................
English version
Hello nostriches. Today I want to make a post by way of an approach to the emergence of the categories of gender and feminism. So if you are interested in the topic make an effort, stay and read to the end.
The "new" feminism emerged in the 60's in those developed countries that agreed to recognize the human rights contained in the respective UN declaration. Then, as an extension of that recognition, the feminist movement was born. From then on, the relationship between nature and culture was raised again and the conclusion was reached that social differences go beyond biological differences, which has to do with the fact that even the satisfaction of elementary needs such as food, housing or clothing are conditioned by social constructions.
It turns out that one of the first proposals identified female subordination as a product of a patriarchal organization, taking Max Weber's category of patriarchy. This is how the vision of patriarchy was extended to political and academic discourse. However, there was no information about the historical development of this category, systematization, variations, etc., because it was something that was only recently perceived in society.
However, the same category of patriarchy, together with that of power relations to explain contemporary social phenomena, constitutes one of the main contributions of feminism. This is how they have first made visible and then deconstructed and dismantled a series of existing patterns in the culture that made women subordinate to men, and that were present in the sex/gender system.
Image relating to the fight against patriarchy
Up to that time, in sociological research, an excessive androcentrism could be observed as scientific discourse revolved around men as the subject and object of research. Even for many positivists such as Weber himself, the problems related to women remained in the background and were blamed on a supposed passivity in the domestic-family sphere. This passivity was based on the supposed biological inferiority of the female gender.
Patriarchy was then an empty category in itself, with no explanatory value. From the political point of view, it could be useful for mobilization, but it did not resist the polemic of feminism's critics, nor did it problematize the conflicts to be resolved. But on the other hand, a group of women - mainly academics - set to work on a smaller task but with greater results in the long run. They set out to generate knowledge about women's living conditions, to search in the past and present for women's contributions to society, to make them visible in history. This is how academic centers, NGOs, projects, women's studies centers, etc., came into being.
It would be convenient to distinguish then two postures that accompanied the research on women: one that takes women as the object of study; living conditions, work, culture, and the other that privileges society as the generator of women's subordination. While the first perspective generated knowledge about women in the study of woman-man and woman-woman relations, the second had a more holistic vision, since it proposed that society must be studied, since the subordination of women is a product of its organization, and that progress will not be made only by studying women, since the study must be broader and at different levels, spheres and times.
It is in this search that the concept of gender as a social category was born and developed. Thus, gender/sex systems were understood as a set of practices, symbols, representations, norms and social values that societies construct on the basis of anatomophysiological differences and that give meaning to sexual impulses, reproduction and, in general, to people's relationships. Therefore, this system became the object of study to understand the subordination of women to men. As the recognition of a hitherto unknown dimension of social inequality, it is considered the most important epistemological breakthrough of the second half of the last century.
Representative image of gender binarism
It must be said that social phenomena are defined by their relationship with each other. Thus, contextualization acquires great importance. Males and females have the capacity to produce with their bodies, but only the bodies of females can gestate and therefore ensure the human species. Any human group that intends to survive must ensure a certain number of females to make it possible. Hence a particular power of the female body, which is also economically useful. This power is not as a biological entity, but it is society that gives it this power. At this point it is important to ask ourselves historically, who has controlled the reproductive capacity of women, who has had the preference in sexual access? To ensure effective control over reproduction, it is necessary to ensure access to sexuality.
Allegorical image of pregnancy
This also leads to directing the work they do because otherwise, women may have room to pose a threat to men's dominance. It is important to pay attention to the stages of women's development, which will allow us to see how they are shaped to accept inequality and gender hierarchies in different societies and cultures.
Another context to delimit is the domestic sphere where female subordination has historically been located. It has been discovered that in women who share the same class and race position, the feminine condition is redefined throughout life and that some women enjoy power over others even in contexts of high male domination, where they are invested with authority, creating the system of uncertainty zones that divide them as a gender and prevent alliances and legitimize domination. Foucault said that "power is exercised, not possessed", it is always in danger of being lost and norms, laws, threats or punishments are not enough. Hence, the spaces of subordination are also spaces of women's power. It is in these spaces where insecurity, tension, confrontation appear and where, for example, women can demand contraception.
To conclude, it is important to keep in mind that gender is a form of social inequality that is always articulated with other forms of inequality, be it class, race, age group, etc. It is necessary to think of male domination with a vague beginning in time, but which allows us to separate the subordination of women from the "natural" evolution of humanity and to understand it as a historical process. In this sense, it is necessary to emphasize that, with respect to race, in plural societies it is necessary to pay attention to the ethno-cultural context since, depending on the relations between people of different races, the relations between genders will be conditioned.
Image of women of different races
On the other hand, although it is known that historically the prevailing social gender system has contributed to make women invisible, to necessarily associate this category only to women is to recreate the historical absolutism that has done so much damage, this time as antagonistic to men. All individuals present in the gender system participate in the social construction.
So much for today's publication, of which we can still go much deeper, especially with regard to the origin of domination or the hierarchization of the binomial "man/woman" from an anthropological point of view, but that will be left for another time. So until next time, see you in Nostr!
Créditos | Credits
Bibliografía consultada | Consulted bibliography:
-
Barbieri, T. (1993). Sobre la categoría género. Una introducción teórico-metodológica. Debates en Sociología. (18). 1-19. https://doi.org/10.18800/debatesensociologia.199301.006
-
Echevarría, D. (2020). Desigualdades de género e interseccionalidad. Análisis del contexto cubano 2008-2018. Facultad Latinoamericana de Ciencias Sociales (Programa-Cuba). https://www.clacso.org.ar/libreria-latinoamericana-cm/libro_detalle_resultado.php?id_libro=2346&campo=cm&texto=248
Traducción | Translation:
DeepL
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 502ab02a:a2860397
2024-05-14 03:01:42สตอรี่ ชีสเค้ก (Story Cheesecake) : ep3 เข้าเรื่องชีสเค้กซะที อีพีนี้หล่ะว๊า จากที่เล่าให้ฟังแล้วว่าปี 2017 นั้นเป็นปีที่พุ่งพรวดในการทดลองสูตรอาหาร ขนม คีโตมากๆ
แต่ในชีวิตคู่ขนานก็ยังต้องทำขนมปกติอยู่เสมอๆ โดยเฉพาะเทศกาลต่างๆ ของที่บ้านซึ่งมีเชื้อสายจีน(ไม่ต้องบอกเห็นตาก็รู้นะ) ดังนั้นจึงไม่ต้องแปลกใจเลยว่า อีกแรงผลักดันหนึ่งในการคิดค้นก็เพราะการที่ต้องนั่งทำขนมปกติในขณะที่กินคีโตนี่แหละ ทำได้แต่กินไม่ได้มันก็อัดอั้นสินะ ไม่วาจะขนมเปี๊ยะ ซาลาเปา ปอเปี๊ยะ ขนมเข่ง ขนมเทียน บัตเตอร์เค้ก ขนมปัง
จนมาคืนหนึ่งหลังจากที่ล้างครัวหลังทำซาลาเปา ขนมเทียน ไหว้เจ้าเสร็จ ก็ยังค้างเติ่งความอยากขนมอยู่ในใจ หันไปเห็นไข่ที่เพิ่งมาส่งเมื่อเช้าจากฟาร์มประจำที่ซื้อกันมานาน นึกถึงขนมตัวนึงที่ไม่ได้ทำอีกเลยตั้งแต่หันมากินคีโต ทั้งที่เป็น ซิกเนเจอร์ประจำตัว ตั้งแต่สมัยดูแลร้านเบเกอรี่แห่งหนึ่ง และเป็นตัวขายดีของร้าน ด้วยความเด้ง ดึ๋ง ดั๋ง เนื้อละเอียดนุ่มละมุน จังหวะพอดีกับในกลุ่มออนไลน์เริ่มมีคนเรียกร้องหาวิธีการทำขนมมากขึ้นเพราะอยากกินหาซื้อไม่ได้ต้องทำกินเองเพราะประเทศไทยยังรู้จักคีโตน้อยมาก คิดอยู่นานว่าจะลองทำดีไหมเพราะตอนนั่งคิดก็ค่ำแล้ว เวลาในการทำถ้านับตั้งแต่ต้นจนจบก็ร่วม 4 ชั่วโมง แต่ก็นะกว่าจะรู้ตัวก็ตีครีมชีสแล้ว
ระหว่างตีครีมไปก็คิดไปว่าโครงสร้างหลักที่เดิมชีสเค้กใช้คือแป้งและน้ำตาล จะทำอย่างไรถึงจะทดแทนกันได้ ถ้าใช้แป้งอัลมอนด์เค้กต้องไม่ขึ้นแน่นอน เพราะธรรมชาติแป้งถั่วจะหนัก เรียกว่าแป้งก็จริงแต่มันคือถั่วบดละเอียดมากๆจนดูเป็นแป้ง ดังนั้นการนำมาใช้ในชีสเค้กคงไม่เหมาะและสูญเสียความเป็นชีสเค้กที่่เบานุ่มไป
ซึ่งเป็นที่แน่นอนว่าสูตรแรกนี้ สวยงาม ฟีบแฟบเยี่ยงแพนเค้กดีๆนี่เอง เป็น 4 ชั่วโมงแรกที่คุ้มค่ามากกกก เพราะทำให้รู้ว่าสิ่งที่หายไปต้องมีอะไรมาทดแทน ผลงานชิ้นแรกนี้ไม่มีใครได้เห็นมันเพราะถูกจัดการลงกระเพาะอาหารคนทำไปตั้งแต่ยังไม่ต้องเซ็ทตัว
หลังจากนั้นการค้นคว้าเพื่อแก้ไขให้ดีขึ้นก็เริ่มต้น กลับไปจุดตั้งต้นใหม่จาก ศูนย์ เอาวัตถุดิบมากาง เอาอุณหภูมิมากาง ค่อยๆทำ check list ทีละอย่างไปเรื่อยๆ ด้วยความที่ช่วงนั้นมีธุระที่ต้องทำที่ต่างจังหวัด การพัฒนาสูตรจึงเป็นเรื่องที่ใช้เวลามากกว่าเดิมหลายเท่า และหลายๆอย่างต้องเข้ามาเลือกวัตถุดิบที่กรุงเทพ
เฉพาะที่ขีดๆเขียนๆลงในกระดาษเพื่อรอการทดลองอบนั้น สิ่งที่ไม่มีใครรู้ก็คือ แค่เบื้องต้นนั้นแบ่งวัตถุดิบออกมาเป็นความเป็นไปได้ร่วม 20กว่าสูตร โดยที่ยังไม่รู้ว่าสูตรไหนจะได้ไปต่อ นั่นหมายถึง อย่างน้อยๆต้องใช้เวลา 80 กว่าชั่วโมง ในการค้นหาคำตอบ
ถ้าจะแค่ทำชีสเค้กให้พ้นๆหน้าไปถ่ายรูปโชว์ก็คงจะเร็วกว่านั้น แต่ถ้าจะเป็นชีสเค้กในแบบที่เอ๋เคยทำขายมาก่อน คงต้องมากกว่านั้นเพราะกลัวคนจะว่าเอาได้ เนื่องจากไปคิดถึงขนาดว่าจะแจกจ่ายวิธีทำให้ทุกคนได้ทำทานกันที่บ้านได้ด้วย เพราะเมืองไทย ตอนนั้นไม่มีที่ไหนขายขนมคีโต อย่าว่าแต่ขายเลย คีโต กับ คีโม คนทั่วไปยังฟังว่าเป็นอย่างเดียวกันเลย เรื่องอื่นไม่ต้องสืบ ฮาๆๆ
ตอนหน้ามาต่อกันถึงขั้นตอนการทดลองสูตร เล่าให้ฟังเบื้องหลังที่กว่าจะลงตัว คำว่าง่ายๆเปลี่ยนแป้งสาลีเป็นแป้งอัลมอนด์ ง่ายๆดูจากหนังสือเบเกอรี่เมืองนอกแล้วปรับๆเอา มันช่างห่างไกลกับที่เราทำเหลือเกิน เราคงไม่เก่งกาจเทียบเท่าคนเก่งๆเหล่านั้น เราเลยต้องก้มหน้าก้มตาลองผิดไปหลายปอนด์
แต่ก็ภูมิใจ ที่การทำเบเกอรี่ของเรานั้นเริ่มต้นด้วยความตั้งใจ ความใส่ใจ ความทุ่มเทให้ออกมาได้ดี ไม่ได้ทำแบบเล่นๆยามว่าง เบื่อก็เลิก หรือแค่กะจะเข้ามาทำแก้เหงา และเราถือเสมอว่าการทำของให้คนรับประทาน ต้องทุ่มสุดใจ เป็นความรับผิดชอบต่อความสุนทรีย์ เป็นศิลปะการประกอบอาหาร แขนงหนึ่ง ซึ่งเราให้ความเคารพอาชีพ ให้เกียรติลูกค้าผู้บริโภค ถ้าเรายึดมั่นทุกการกระทำด้วยความตั้งใจ ไม่ว่าจะทำอะไร ลูกค้าก็จะได้สิ่งที่ดีที่สุดเสมอ เรารักสิ่งที่เราทำ เรารักคนที่ทานเค้กเสมือนญาติมิตร
แม้จะทำให้เหนื่อยมากกว่า แต่การจดจำรอยยิ้ม คำขอบคุณที่ส่งขนมหรืออาหาร ที่ถูกปากถูกใจ มีแรงสู้ต่อไปบนโลกใบนี้ มันทำให้เรายอมแลกเวลาชีวิตกับสิ่งนี้ การทำอะไรให้คนที่เรารักมันก็เป็นเช่นนี้แล
*สูตรที่ตั้งใจสร้าง สูตรที่เต็มใจให้ ถ้าใครที่นำไปทำแล้วใส่ความรักความตั้งใจเข้าไปด้วย แม้จะได้รสชาติเค้กที่ต่างกัน แต่โลกใบนี้ก็จะเกิดความรักเพิ่มขึ้นในรูปแบบเดียวกัน ไม่มากก็น้อย ดีกว่าเก็บสูตรไว้ที่ตัวเองตั้งเยอะ***
-
@ 1bc70a01:24f6a411
2024-05-13 09:49:18Thought 1: Content Creation, Discovery & Remixing
Recently I’ve been thinking about ways we could highlight nostr’s unique properties while at the same time attracting creators to the platform.
There’s been a lot of discussion about what might spark nostr’s next wave of growth. I pointed out that people come for either other people, or for content. But, I also failed to realize that people also seek ways to express themselves via new tools that enable easy or unique ways of expressing yourself.
One thing we can say with certainty is that people are not coming to nostr for other people. While generally following influencers is a proven growth strategy - after all, many of us followed Jack, we still have a catch 22 problem of lacking audience and incentives for those creators to come here. Even if we managed to convince some large influencers to try the platform, it is not likely that they would stay. They’d need to be really passionate about nostr’s principles and vision to buckle in for the long term.
Problem: creators and influencers won’t come to nostr unless they can grow their audience, and nostr lacks the audience. We’ve seen this play out with Matt Taibi. He joined nostr but was reluctant to stay because there’s little incentive to share with a small audience when Twitter/X can bring in many more eyeballs.
Possible Solution: Instead of brining creators to the platform, enable some of the current passionate user base to become decent creators themselves. We don’t need influencers with giant audiences, we just need good content that keeps people around. If we apply the 80/20 rule (Pareto’s principle), it turns out we don’t need that many creators to have a great flow of content. Enabling just a handful of people to create great content might just do the trick.
How to get there: focus on creating tools that enable expression of creativity. One such tool is Pinstr, but its value is largely untapped. On its own, pinstr is nothing interesting, it’s practically a clone of Pinterest. But, given the interoperable nature of nostr, it would be interesting to see pinned boards / content surfaced within kind 1 clients. People could then explore the board or that user’s other boards further by making their way to Pinstr.
How do we encourage more people to curate interesting pins? How about a pin extension that makes it easy to do so?
How do we enable people remixing other pins? Allow them to re-pin the content to their own boards. These are all mechanics that made Pinterest interesting, but lack in pinstr (as far as I’m aware).
Other ways that we might encourage content creation:
- Multi-account support. Can we make it SUPER easy to switch between identities when posting some curated content? Yes we can. (Select a different identity when posting)
- Surfacing “Other stuff” with a call to action to do that thing. For example, if someone shares a list, a kind 1 client should be able to render that list in a way that’s easy to browse, share and encourages to create your own list. If someone shares a music playlist (hopefully via native nostr kind), a person should be able to see the playlist and be encouraged to create their own. Watch stream? > prompt to start your own
- Gif / meme discovery with a call to action to create your own. (Plebhy, Memester)
- Styling tools (more complex) to style media, add soundtracks etc (perhaps via integration with Wavlake or other nost-native music events).
-
Content scheduling - help existing users become power users. Instead of posting everything at once, allow users to schedule it out for even distribution. Tools like Shipyard enable this already, but having this ability in-client might make it more accessible and useful.
-
Content pinning extensions - bring the outside world to Nostr. How can people 1-click pin content to nostr without having to switch tabs constantly?
-
App discovery - I think this is already in the works, but being able to surface other apps within kind 1 clients would be super interesting.
- Enable surfacing of highlighted content and paid content - with highlights, nudge people to read more of the content if it comes from within one of the nostr clients. With paid content, indicate that it is premium content and encourage creation of premium content “Become a creator” or “Join creator studio”.
- Encourage people to write long-form opinion content. When reading a long form article, perhaps have a call to action to start your own nostr publication. “Publish on Nostr and earn”
- Surface and encourage audio creation - we don’t have a nostr podcast client yet, but if there was one, kind 1 clients could surface that content automatically and encourage people to start their own podcasts, audio diaries, audio chats (nostr nests) or audio stories. Kind 1 clients could surface audio clips with waveforms and subtitles built in, or create a framework by which other developers could create this type of interaction with your kind 1 client. Can users create their own clip playlists from audio content fetched from the nostr podcast app? Why not?
The common objection to all of this might be that “you can already do all of this just by copying links”. Yes, and no. Copying links does share content - albeit in a boring preview way. It does not enable interactivity, nor prompt people to create that type of content. I think this is where nostr could shine.
Thought 2: Interoperability
One of the greatest strengths of nostr is the ability to display events across clients. I think of kind 1 clients as the glue that holds together the “other stuff”. The other stuff apps can be used to create the stuff, and kind 1 can enable discovery of said stuff, while encouraging to visit those tools to create their own.
Traditional social media platforms are encourage to put up walls and discourage leaking of users to other places. The more time a user spends on a website or app, the better for that company. But, with nostr, there’s a virtuous positive loop that does not punish leaking of attention, but instead, rewards it. The more content people create, the more interesting your kind 1 discovery client becomes.
How to get there: It’s going to take a lot of work to integrate the other stuff, but it’s already under way. As a client developer, partner up with other stuff clients to figure out how to best support them. Open up nostrapps.com to see what exists, and how your client can accommodate the surfacing of that stuff with minimal effort (since our resources are so scarce). Tap into product designers to help conceptualize and visualize interactions and growth loops. #nostrdesign is ready to help with this.
Type of content kind 1 clients could surface and create loops for:
- Playlists
- Pin boards (pinstr)
- Audio chats (nost nests, corny chat)
- Highlights (highlighter)
- Payments
- Fundraisers (Heya, Geyser)
- Communities
- Events (Flockstr)
- Streams (zapstream)
- Long form content
- Job posts / boards
- Recipes (zap cooking)
- Lists
- Torrents (Stan)
- News feeds
- Calling functionality
- DMVs
- Podcast clips, playlists
- Audio clips
- Marketplace items (Shopstr, Creatstr, Plebeian Market)
- Paid content (highlighter)
Recap
- Build tools to aid content creation
- Surface “other stuff” in kind 1 clients
- Prompt people to create their own stuff
I’m probably missing a ton, or not thinking of unique experiences that are just under the nose. What am I missing? What other cool interactions could be enabled by nostr’s interoperabilit
-
@ 3c984938:2ec11289
2024-05-09 04:43:15It's been a journey from the Publishing Forest of Nostr to the open sea of web3. I've come across a beautiful chain of islands and thought. Why not take a break and explore this place? If I'm searching for devs and FOSS, I should search every nook and cranny inside the realm of Nostr. It is quite vast for little old me. I'm just a little hamster and I don't speak in code or binary numbers zeros and ones.
After being in sea for awhile, my heart raced for excitement for what I could find. It seems I wasn't alone, there were others here like me! Let's help spread the message to others about this uncharted realm. See, look at the other sailboats, aren't they pretty? Thanks to some generous donation of SATs, I was able to afford the docking fee.
Ever feel like everyone was going to a party, and you were supposed to dress up, but you missed the memo? Or a comic-con? well, I felt completely underdressed and that's an understatement. Well, turns out there is a some knights around here. Take a peek!
A black cat with a knight passed by very quickly. He was moving too fast for me to track. Where was he going? Then I spotted a group of knights heading in the same direction, so I tagged along. The vibes from these guys was impossible to resist. They were just happy-go-lucky. 🥰They were heading to a tavern on a cliff off the island.
Ehh? a Tavern? Slightly confused, whatever could these knights be doing here? I guess when they're done with their rounds they would here to blow off steam. Things are looking curiouser and curiouser. But the black cat from earlier was here with its rider, whom was dismounting. So you can only guess, where I'm going.
The atmosphere in this pub, was lively and energetic. So many knights spoke among themselves. A group here, another there, but there was one that caught my eye. I went up to a group at a table, whose height towed well above me even when seated. Taking a deep breath, I asked, "Who manages this place?" They unanimous pointed to one waiting for ale at the bar. What was he doing? Watching others talk? How peculiar.
So I went up to him! And introduced myself.
"Hello I'm Onigirl"
"Hello Onigirl, Welcome to Gossip"
"Gossip, what is Gossip?" scratching my head and whiskers.
What is Gossip? Gossip is FOSS and a great client for privacy-centric minded nostriches. It avoids browser tech which by-passes several scripting languages such as JavaScript☕, HTML parsing, rendering, and CSS(Except HTTP GET and Websockets). Using OpenGL-style rendering. For Nostriches that wish to remain anonymous can use Gossip over TOR. Mike recommends using QubesOS, Whonix and or Tails. [FYI-Gossip does not natively support tor SOCKS5 proxy] Most helpful to spill the beans if you're a journalist.
On top of using your nsec or your encryption key, Gossip adds another layer of security over your account with a password login. There's nothing wrong with using the browser extensions (such as nos2x or Flamingo) which makes it super easy to log in to Nostr enable websites, apps, but it does expose you to browser vulnerabilities.
Mike Points out
"people have already had their private key stolen from other nostr clients,"
so it a concern if you value your account. I most certainly care for mine.
Gossip UI has a simple, and clean interface revolving around NIP-65 also called the “Outbox model." As posted from GitHub,
"This NIP allows Clients to connect directly with the most up-to-date relay set from each individual user, eliminating the need of broadcasting events to popular relays."
This eliminates clients that track only a specific set of relays which can congest those relays when you publish your note. Also this can be censored, by using Gossip you can publish notes to alternative relays that have not censored you to reach the same followers.
👉The easiest way to translate that is reducing redundancy to publish to popular relays or centralized relays for content reach to your followers.
Cool! What an awesome client, I mean Tavern! What else does this knight do? He reaches for something in his pocket. what is it? A Pocket is a database for storing and retrieving nostr events but mike's written it in Rust with a few extra kinks inspired by Will's nostrdb. Still in development, but it'll be another tool for you dear user! 💖💕💚
Onigirl is proud to present this knights to the community and honor them with kisu. 💋💋💋 Show some 💖💘💓🧡💙💚
👉💋💋Will - jb55 Lord of apples 💋 @npub1xtscya34g58tk0z605fvr788k263gsu6cy9x0mhnm87echrgufzsevkk5s
👉💋💋 Mike Knight - Lord of Security 💋 @npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c
Knights spend a lot of time behind the screen coding for the better of humanity. It is a tough job! Let's appreciate these knights, relay operators, that support this amazing realm of Nostr! FOSS for all!
This article was prompted for the need for privacy and security of your data. They're different, not to be confused.
Recently, Edward Snowden warns Bitcoin devs about the need for privacy, Quote:
“I've been warning Bitcoin developers for ten years that privacy needs to be provided for at the protocol level. This is the final warning. The clock is ticking.”
Snowden’s comments come after heavy actions of enforcement from Samarai Wallet, Roger Ver, Binance’s CZ, and now the closure of Wasabi Wallet. Additionally, according to CryptoBriefing, Trezor is ending it’s CoinJoin integration as well. Many are concerned over the new definition of a money transmitter, which includes even those who don’t touch the funds.
Help your favorite the hamster
^^Me drowning in notes on your feed. I can only eat so many notes to find you.
👉If there are any XMPP fans on here. I'm open to the idea of opening a public channel, so you could follow me on that as a forum-like style. My server of choice would likely be a German server.😀You would be receiving my articles as njump.me style or website-like. GrapeneOS users, you can download Cheogram app from the F-Driod store for free to access. Apple and Andriod users are subjected to pay to download this app, an alternative is ntalk or conversations. If it interests the community, just FYI. Please comment or DM.
👉If you enjoyed this content, please consider reposting/sharing as my content is easily drowned by notes on your feed. You could also join my community under Children_Zone where I post my content.
An alternative is by following #onigirl Just FYI this feature is currently a little buggy.
Follow as I search for tools and awesome devs to help you dear user live a decentralized life as I explore the realm of Nostr.
Thank you Fren
-
@ 1931b5e4:168a0489
2024-05-15 15:34:08I was speaking to a beautiful lady earlier who said that she didn't feel worthy. Whilst driving home I was pondering her comment and linking it back to a podcast I was watching the other day... the guy made some very good points, however he delivered them terribly (imo).
This inspired me to write a letter...
Dear self-worth,
What are you exactly, other than an utter pain in the arse?
Yep, I said it! A right royal pain in the behind, who quite frankly gets on one's nerves every time I hear your name muttered!
You will say that you are necessary to the human condition. That we all need to feel "worth". And, I don't disagree.
However, then you will say that we need to look after you and nurture you with self-love, constant healing journeys and self-care rituals.
But, can I ask you... why do we only hear your name when things seem to be crashing down around us?
You feed off our despair, off our anger, off our perception of fairness. When you are around we judge others and decide how much they are worth, others judge us and we in turn judge and compare ourselves. When you are around we think that we aren't good enough. We strive to make you happy, and when we don't you make us feel shame and guilt for not being able to. It doesn't seem to matter what we feed you... you want more and more.
You, self-worth, are a full time job that seems to have been pushed onto us.
I don't remember hearing about you when I was tiny, playing out in the garden with the worms and snails? I don't remember you when I was climbing trees, learning to read or singing a nursery rhyme full pelt on my way home from school!
You managed to sneak into my life slowly , and I have to give you credit because you came seemingly without invitation, gave yourself a seat in the front row of my show and I never even questioned why you were there! Well done!
I think you are there because we created you through story. We have been told that if we don't learn at a certain level, that we are not as good as the next. We have been told that if we are not quick enough, that we can't join the running team. We have been told that if we are too loud that we need to quieten down. We have been told that we are not our own number one priority and that others should come before us. We have been told that we are selfish if we dare to put ourselves first.
Then we have created you, self-worth. We have internalised these stories and turned them into the story that we are not good enough. That we are not worth it. That we are not worthy.
Then we are fed the narrative that everyone is worthy, which is true, but, in order to get our sense of self-worth back, we need to do certain things. We need to nurture you, and take a bath (amongst other things)!
But then, we are told that we don't have time to take a bath.
We feel guilty for not being able to look after you.
I have a theory!
We should tell you to do one! To F off! To go swivel!
We should stop worrying about you and stop feeding you, because let's face it... you are never satisfied and you are never going to let us rest.
We should tell you to swivel, because the less attention we pay you, the more we can actually start to live. The more we can enjoy the present moment, rather than worrying about what we have said or will say. We will stop comparing ourselves to others, stop judging ourselves solely on what we struggle to do, and remember what we are amazing at!
We will stop thinking that we aren't a worthy person because we got turned down for a job, but rather see that it was just because someone else was better at that thing, rather than a better person than us.
And, maybe... we will stop seeing worth as something to aim for, but rather already possess from the moment we were created AND that that worth will last for an eternity.
All my love, A very worthy being.
-
@ 57d1a264:69f1fee1
2024-05-13 09:48:00ODC #000016 - UX > IMPLEMENT
Designing Form’ elements for an online form-building website using Nostr
If you miss it, please read our WTF is ODC (Open Design Challenge) intro post from more details.
Scenario
You're a UX designer for an new online form-building open source organization (Formstr.app is the competitor).
The company is doing a complete redesign of their product. It's a small team and you are tasked with designing the individual inputs and controls that clients can add to their forms.
Task
In either a design program or HTML/CSS, design the following for the new forms: * Button * Text input * Textarea * Select * Checkbox * Radio * Switch/toggle * File input
Annotate your designs with the reasoning behind your decisions.
Extra Credit: Include mockups or guidance for how to use validation, add labels, and build layouts (like spacing, placement, input groups, etc.)
Guides
If you need help with this challenge, check out our hand-picked tutorial recommendations.
-
Form Design on gerireid.com
-
Best Practices For Mobile Form Design on smashingmagazine.com
-
16 Tips that Will Improve Any Online Form on uxplanet.org
-
UX Form Design Basics on piped.video)
Tools
Not sure which tools to use? Try something new, go 💯% FOSS!
PenPot (for everyone) by kaleidos
HTML5 / CSS3 by developer.mozilla.org
Share Your Results
When you finish the challenge, post your work including anonymized collected data and results on this thread! If you also share it on
nostr
, be sure to use the hashtag #opendesigner and tag Design_r@iris.to or @Design__r on X! We'll keep an eye out and repost good examples on a regular basis.
Check our previous ODC and support this community for creative minds, where you'll be able to get open and constructive feedback on your PoW. Ask anything in the ~Design territory and get some ⚡sats for the value you provide!
```
Bitcoin #Design #BitcoinDesign #NostrDesign #Nostr #OpenDesign #DesignChallenge #OpenDesignChallenge #FormDesign #UXDesign #InputControls #FormElements #FormBuilding #UserExperience #DesignThinking #OpenSource
```
-
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ 3c984938:2ec11289
2024-04-16 17:14:58Hello (N)osytrs!
Yes! I'm calling you an (N)oystr!
Why is that? Because you shine, and I'm not just saying that to get more SATs. Ordinary Oysters and mussels can produce these beauties! Nothing seriously unique about them, however, with a little time and love each oyster is capable of creating something truly beautiful. I like believing so, at least, given the fact that you're even reading this article; makes you an (N)oystr! This isn't published this on X (formerly known as Twitter), Facebook, Discord, Telegram, or Instagram, which makes you the rare breed! A pearl indeed! I do have access to those platforms, but why create content on a terrible platform knowing I too could be shut down! Unfortunately, many people still use these platforms. This forces individuals to give up their privacy every day. Meta is leading the charge by forcing users to provide a photo ID for verification in order to use their crappy, obsolete site. If that was not bad enough, imagine if you're having a type of disagreement or opinion. Then, Bigtech can easily deplatform you. Umm. So no open debate? Just instantly shut-off users. Whatever, happened to right to a fair trial? Nope, just burning you at the stake as if you're a witch or warlock!
How heinous are the perpetrators and financiers of this? Well, that's opening another can of worms for you.
Imagine your voice being taken away, like the little mermaid. Ariel was lucky to have a prince, but the majority of us? The likelihood that I would be carried away by the current of the sea during a sunset with a prince on a sailboat is zero. And I live on an island, so I'm just missing the prince, sailboat(though I know where I could go to steal one), and red hair. Oh my gosh, now I feel sad.
I do not have the prince, Bob is better! I do not have mermaid fins, or a shell bra. Use coconut shells, it offers more support! But, I still have my voice and a killer sunset to die for!
All of that is possible thanks to the work of developers. These knights fight for Freedom Tech by utilizing FOSS, which help provides us with a vibrant ecosystem. Unfortunately, I recently learned that they are not all funded. Knights must eat, drink, and have a work space. This space is where they spend most of their sweat equity on an app or software that may and may not pan out. That brilliance is susceptible to fading, as these individuals are not seen but rather stay behind closed doors. What's worse, if these developers lose faith in their project and decide to join forces with Meta! 😖 Does WhatsApp ring a bell?
Without them, I probably wouldn't be able to create this long form article. Let's cheer them on like cheerleaders.. 👉Unfortunately, there's no cheerleader emoji so you'll just have to settle for a dancing lady, n guy. 💃🕺
Semisol said it beautifully, npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj
If we want freedom tech to succeed, the tools that make it possible need to be funded: relays like https://nostr.land, media hosts like https://nostr.build, clients like https://damus.io, etc.
With that thought, Onigirl is pleased to announce the launch of a new series. With a sole focus on free market devs/projects.
Knights of Nostr!
I'll happily brief you about their exciting project and how it benefits humanity! Let's Support these Magnificent projects, devs, relays, and builders! Our first runner up!
Oppa Fishcake :Lord of Media Hosting
npub137c5pd8gmhhe0njtsgwjgunc5xjr2vmzvglkgqs5sjeh972gqqxqjak37w
Oppa Fishcake with his noble steed!
Think of this as an introduction to learn and further your experience on Nostr! New developments and applications are constantly happening on Nostr. It's enough to make one's head spin. I may also cover FOSS projects(outside of Nostr) as they need some love as well! Plus, you can think of it as another tool to add to your decentralized life. I will not be doing how-to-Nostr guides. I personally feel there are plenty of great guides already available! Which I'm happy to add to curation collection via easily searchable on Yakihonne.
For email updates you can subscribe to my [[https://paragraph.xyz/@onigirl]]
If you like it, send me some 🧡💛💚 hearts💜💗💖 otherwise zap dat⚡⚡🍑🍑peach⚡⚡🍑 ~If not me, then at least to our dearest knight!
Thank you from the bottom of my heart for your time and support (N)oystr! Shine bright like a diamond! Share if you care! FOSS power!
Follow on your favorite Nostr Client for the best viewing experience!
[!NOTE]
I'm using Obsidian + Nostr Writer Plugin; a new way to publish Markdown directly to Nostr. I was a little nervous using this because I was used doing them in RStudio; R Markdown.
Since this is my first article, I sent it to my account as a draft to test it. It's pretty neat. -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Músicas grudentas e conversas
Uma vez que você ouviu uma música grudenta e ela volta, inteira, com toda a melodia e a harmonia, muitos dias depois, contra a sua vontade. Mas uma conversa é impossível de lembrar. Por quê?
-
@ 6871d8df:4a9396c1
2024-02-24 22:42:16In an era where data seems to be as valuable as currency, the prevailing trend in AI starkly contrasts with the concept of personal data ownership. The explosion of AI and the ensuing race have made it easy to overlook where the data is coming from. The current model, dominated by big tech players, involves collecting vast amounts of user data and selling it to AI companies for training LLMs. Reddit recently penned a 60 million dollar deal, Google guards and mines Youtube, and more are going this direction. But is that their data to sell? Yes, it's on their platforms, but without the users to generate it, what would they monetize? To me, this practice raises significant ethical questions, as it assumes that user data is a commodity that companies can exploit at will.
The heart of the issue lies in the ownership of data. Why, in today's digital age, do we not retain ownership of our data? Why can't our data follow us, under our control, to wherever we want to go? These questions echo the broader sentiment that while some in the tech industry — such as the blockchain-first crypto bros — recognize the importance of data ownership, their "blockchain for everything solutions," to me, fall significantly short in execution.
Reddit further complicates this with its current move to IPO, which, on the heels of the large data deal, might reinforce the mistaken belief that user-generated data is a corporate asset. Others, no doubt, will follow suit. This underscores the urgent need for a paradigm shift towards recognizing and respecting user data as personal property.
In my perfect world, the digital landscape would undergo a revolutionary transformation centered around the empowerment and sovereignty of individual data ownership. Platforms like Twitter, Reddit, Yelp, YouTube, and Stack Overflow, integral to our digital lives, would operate on a fundamentally different premise: user-owned data.
In this envisioned future, data ownership would not just be a concept but a practice, with public and private keys ensuring the authenticity and privacy of individual identities. This model would eliminate the private data silos that currently dominate, where companies profit from selling user data without consent. Instead, data would traverse a decentralized protocol akin to the internet, prioritizing user control and transparency.
The cornerstone of this world would be a meritocratic digital ecosystem. Success for companies would hinge on their ability to leverage user-owned data to deliver unparalleled value rather than their capacity to gatekeep and monetize information. If a company breaks my trust, I can move to a competitor, and my data, connections, and followers will come with me. This shift would herald an era where consent, privacy, and utility define the digital experience, ensuring that the benefits of technology are equitably distributed and aligned with the users' interests and rights.
The conversation needs to shift fundamentally. We must challenge this trajectory and advocate for a future where data ownership and privacy are not just ideals but realities. If we continue on our current path without prioritizing individual data rights, the future of digital privacy and autonomy is bleak. Big tech's dominance allows them to treat user data as a commodity, potentially selling and exploiting it without consent. This imbalance has already led to users being cut off from their digital identities and connections when platforms terminate accounts, underscoring the need for a digital ecosystem that empowers user control over data. Without changing direction, we risk a future where our content — and our freedoms by consequence — are controlled by a few powerful entities, threatening our rights and the democratic essence of the digital realm. We must advocate for a shift towards data ownership by individuals to preserve our digital freedoms and democracy.
-
@ 8ce092d8:950c24ad
2024-02-04 23:35:07Overview
- Introduction
- Model Types
- Training (Data Collection and Config Settings)
- Probability Viewing: AI Inspector
- Match
- Cheat Sheet
I. Introduction
AI Arena is the first game that combines human and artificial intelligence collaboration.
AI learns your skills through "imitation learning."
Official Resources
- Official Documentation (Must Read): Everything You Need to Know About AI Arena
Watch the 2-minute video in the documentation to quickly understand the basic flow of the game. 2. Official Play-2-Airdrop competition FAQ Site https://aiarena.notion.site/aiarena/Gateway-to-the-Arena-52145e990925499d95f2fadb18a24ab0 3. Official Discord (Must Join): https://discord.gg/aiarenaplaytest for the latest announcements or seeking help. The team will also have a exclusive channel there. 4. Official YouTube: https://www.youtube.com/@aiarena because the game has built-in tutorials, you can choose to watch videos.
What is this game about?
- Although categorized as a platform fighting game, the core is a probability-based strategy game.
- Warriors take actions based on probabilities on the AI Inspector dashboard, competing against opponents.
- The game does not allow direct manual input of probabilities for each area but inputs information through data collection and establishes models by adjusting parameters.
- Data collection emulates fighting games, but training can be completed using a Dummy As long as you can complete the in-game tutorial, you can master the game controls.
II. Model Types
Before training, there are three model types to choose from: Simple Model Type, Original Model Type, and Advanced Model Type.
It is recommended to try the Advanced Model Type after completing at least one complete training with the Simple Model Type and gaining some understanding of the game.
Simple Model Type
The Simple Model is akin to completing a form, and the training session is comparable to filling various sections of that form.
This model has 30 buckets. Each bucket can be seen as telling the warrior what action to take in a specific situation. There are 30 buckets, meaning 30 different scenarios. Within the same bucket, the probabilities for direction or action are the same.
For example: What should I do when I'm off-stage — refer to the "Recovery (you off-stage)" bucket.
For all buckets, refer to this official documentation:
https://docs.aiarena.io/arenadex/game-mechanics/tabular-model-v2
Video (no sound): The entire training process for all buckets
https://youtu.be/1rfRa3WjWEA
Game version 2024.1.10. The method of saving is outdated. Please refer to the game updates.
Advanced Model Type
The "Original Model Type" and "Advanced Model Type" are based on Machine Learning, which is commonly referred to as combining with AI.
The Original Model Type consists of only one bucket, representing the entire map. If you want the AI to learn different scenarios, you need to choose a "Focus Area" to let the warrior know where to focus. A single bucket means that a slight modification can have a widespread impact on the entire model. This is where the "Advanced Model Type" comes in.
The "Advanced Model Type" can be seen as a combination of the "Original Model Type" and the "Simple Model Type". The Advanced Model Type divides the map into 8 buckets. Each bucket can use many "Focus Area." For a detailed explanation of the 8 buckets and different Focus Areas, please refer to the tutorial page (accessible in the Advanced Model Type, after completing a training session, at the top left of the Advanced Config, click on "Tutorial").
III. Training (Data Collection and Config Settings)
Training Process:
- Collect Data
- Set Parameters, Train, and Save
- Repeat Step 1 until the Model is Complete
Training the Simple Model Type is the easiest to start with; refer to the video above for a detailed process.
Training the Advanced Model Type offers more possibilities through the combination of "Focus Area" parameters, providing a higher upper limit. While the Original Model Type has great potential, it's harder to control. Therefore, this section focuses on the "Advanced Model Type."
1. What Kind of Data to Collect
- High-Quality Data: Collect purposeful data. Garbage in, garbage out. Only collect the necessary data; don't collect randomly. It's recommended to use Dummy to collect data. However, don't pursue perfection; through parameter adjustments, AI has a certain level of fault tolerance.
- Balanced Data: Balance your dataset. In simple terms, if you complete actions on the left side a certain number of times, also complete a similar number on the right side. While data imbalance can be addressed through parameter adjustments (see below), it's advised not to have this issue during data collection.
- Moderate Amount: A single training will include many individual actions. Collect data for each action 1-10 times. Personally, it's recommended to collect data 2-3 times for a single action. If the effect of a single training is not clear, conduct a second (or even third) training with the same content, but with different parameter settings.
2. What to Collect (and Focus Area Selection)
Game actions mimic fighting games, consisting of 4 directions + 6 states (Idle, Jump, Attack, Grab, Special, Shield). Directions can be combined into ↗, ↘, etc. These directions and states can then be combined into different actions.
To make "Focus Area" effective, you need to collect data in training that matches these parameters. For example, for "Distance to Opponent", you need to collect data when close to the opponent and also when far away. * Note: While you can split into multiple training sessions, it's most effective to cover different situations within a single training.
Refer to the Simple Config, categorize the actions you want to collect, and based on the game scenario, classify them into two categories: "Movement" and "Combat."
Movement-Based Actions
Action Collection
When the warrior is offstage, regardless of where the opponent is, we require the warrior to return to the stage to prevent self-destruction.
This involves 3 aerial buckets: 5 (Near Blast Zone), 7 (Under Stage), and 8 (Side Of Stage).
* Note: The background comes from the Tutorial mentioned earlier. The arrows in the image indicate the direction of the action and are for reference only. * Note: Action collection should be clean; do not collect actions that involve leaving the stage.
Config Settings
In the Simple Config, you can directly choose "Movement" in it. However, for better customization, it's recommended to use the Advanced Config directly. - Intensity: The method for setting Intensity will be introduced separately later. - Buckets: As shown in the image, choose the bucket you are training. - Focus Area: Position-based parameters: - Your position (must) - Raycast Platform Distance, Raycast Platform Type (optional, generally choose these in Bucket 7)
Combat-Based Actions
The goal is to direct attacks quickly and effectively towards the opponent, which is the core of game strategy.
This involves 5 buckets: - 2 regular situations - In the air: 6 (Safe Zone) - On the ground: 4 (Opponent Active) - 3 special situations on the ground: - 1 Projectile Active - 2 Opponent Knockback - 3 Opponent Stunned
2 Regular Situations
In the in-game tutorial, we learned how to perform horizontal attacks. However, in the actual game, directions expand to 8 dimensions. Imagine having 8 relative positions available for launching hits against the opponent. Our task is to design what action to use for attack or defense at each relative position.
Focus Area - Basic (generally select all) - Angle to opponent
- Distance to opponent - Discrete Distance: Choosing this option helps better differentiate between closer and farther distances from the opponent. As shown in the image, red indicates a relatively close distance, and green indicates a relatively distant distance.- Advanced: Other commonly used parameters
- Direction: different facings to opponent
- Your Elemental Gauge and Discrete Elementals: Considering the special's charge
- Opponent action: The warrior will react based on the opponent's different actions.
- Your action: Your previous action. Choose this if teaching combos.
3 Special Situations on the Ground
Projectile Active, Opponent Stunned, Opponent Knockback These three buckets can be referenced in the Simple Model Type video. The parameter settings approach is the same as Opponent Active/Safe Zone.
For Projectile Active, in addition to the parameters based on combat, to track the projectile, you also need to select "Raycast Projectile Distance" and "Raycast Projectile On Target."
3. Setting "Intensity"
Resources
- The "Tutorial" mentioned earlier explains these parameters.
- Official Config Document (2022.12.24): https://docs.google.com/document/d/1adXwvDHEnrVZ5bUClWQoBQ8ETrSSKgG5q48YrogaFJs/edit
TL;DR:
Epochs: - Adjust to fewer epochs if learning is insufficient, increase for more learning.
Batch Size: - Set to the minimum (16) if data is precise but unbalanced, or just want it to learn fast - Increase (e.g., 64) if data is slightly imprecise but balanced. - If both imprecise and unbalanced, consider retraining.
Learning Rate: - Maximize (0.01) for more learning but a risk of forgetting past knowledge. - Minimize for more accurate learning with less impact on previous knowledge.
Lambda: - Reduce for prioritizing learning new things.
Data Cleaning: - Enable "Remove Sparsity" unless you want AI to learn idleness. - For special cases, like teaching the warrior to use special moves when idle, refer to this tutorial video: https://discord.com/channels/1140682688651612291/1140683283626201098/1195467295913431111
Personal Experience: - Initial training with settings: 125 epochs, batch size 16, learning rate 0.01, lambda 0, data cleaning enabled. - Prioritize Multistream, sometimes use Oversampling. - Fine-tune subsequent training based on the mentioned theories.
IV. Probability Viewing: AI Inspector
The dashboard consists of "Direction + Action." Above the dashboard, you can see the "Next Action" – the action the warrior will take in its current state. The higher the probability, the more likely the warrior is to perform that action, indicating a quicker reaction. It's essential to note that when checking the Direction, the one with the highest visual representation may not have the highest numerical value. To determine the actual value, hover the mouse over the graphical representation, as shown below, where the highest direction is "Idle."
In the map, you can drag the warrior to view the probabilities of the warrior in different positions. Right-click on the warrior with the mouse to change the warrior's facing. The status bar below can change the warrior's state on the map.
When training the "Opponent Stunned, Opponent Knockback" bucket, you need to select the status below the opponent's status bar. If you are focusing on "Opponent action" in the Focus Zone, choose the action in the opponent's status bar. If you are focusing on "Your action" in the Focus Zone, choose the action in your own status bar. When training the "Projectile Active" Bucket, drag the projectile on the right side of the dashboard to check the status.
Next
The higher the probability, the faster the reaction. However, be cautious when the action probability reaches 100%. This may cause the warrior to be in a special case of "State Transition," resulting in unnecessary "Idle" states.
Explanation: In each state a fighter is in, there are different "possible transitions". For example, from falling state you cannot do low sweep because low sweep requires you to be on the ground. For the shield state, we do not allow you to directly transition to headbutt. So to do headbutt you have to first exit to another state and then do it from there (assuming that state allows you to do headbutt). This is the reason the fighter runs because "run" action is a valid state transition from shield. Source
V. Learn from Matches
After completing all the training, your model is preliminarily finished—congratulations! The warrior will step onto the arena alone and embark on its debut!
Next, we will learn about the strengths and weaknesses of the warrior from battles to continue refining the warrior's model.
In matches, besides appreciating the performance, pay attention to the following:
-
Movement, i.e., Off the Stage: Observe how the warrior gets eliminated. Is it due to issues in the action settings at a certain position, or is it a normal death caused by a high percentage? The former is what we need to avoid and optimize.
-
Combat: Analyze both sides' actions carefully. Observe which actions you and the opponent used in different states. Check which of your hits are less effective, and how does the opponent handle different actions, etc.
The approach to battle analysis is similar to the thought process in the "Training", helping to have a more comprehensive understanding of the warrior's performance and making targeted improvements.
VI. Cheat Sheet
Training 1. Click "Collect" to collect actions. 2. "Map - Data Limit" is more user-friendly. Most players perform initial training on the "Arena" map. 3. Switch between the warrior and the dummy: Tab key (keyboard) / Home key (controller). 4. Use "Collect" to make the opponent loop a set of actions. 5. Instantly move the warrior to a specific location: Click "Settings" - SPAWN - Choose the desired location on the map - On. Press the Enter key (keyboard) / Start key (controller) during training.
Inspector 1. Right-click on the fighter to change their direction. Drag the fighter and observe the changes in different positions and directions. 2. When satisfied with the training, click "Save." 3. In "Sparring" and "Simulation," use "Current Working Model." 4. If satisfied with a model, then click "compete." The model used in the rankings is the one marked as "competing."
Sparring / Ranked 1. Use the Throneroom map only for the top 2 or top 10 rankings. 2. There is a 30-second cooldown between matches. The replays are played for any match. Once the battle begins, you can see the winner on the leaderboard or by right-clicking the page - Inspect - Console. Also, if you encounter any errors or bugs, please send screenshots of the console to the Discord server.
Good luck! See you on the arena!
-
@ 3bf0c63f:aefa459d
2024-01-14 14:52:16Drivechain
Understanding Drivechain requires a shift from the paradigm most bitcoiners are used to. It is not about "trustlessness" or "mathematical certainty", but game theory and incentives. (Well, Bitcoin in general is also that, but people prefer to ignore it and focus on some illusion of trustlessness provided by mathematics.)
Here we will describe the basic mechanism (simple) and incentives (complex) of "hashrate escrow" and how it enables a 2-way peg between the mainchain (Bitcoin) and various sidechains.
The full concept of "Drivechain" also involves blind merged mining (i.e., the sidechains mine themselves by publishing their block hashes to the mainchain without the miners having to run the sidechain software), but this is much easier to understand and can be accomplished either by the BIP-301 mechanism or by the Spacechains mechanism.
How does hashrate escrow work from the point of view of Bitcoin?
A new address type is created. Anything that goes in that is locked and can only be spent if all miners agree on the Withdrawal Transaction (
WT^
) that will spend it for 6 months. There is one of these special addresses for each sidechain.To gather miners' agreement
bitcoind
keeps track of the "score" of all transactions that could possibly spend from that address. On every block mined, for each sidechain, the miner can use a portion of their coinbase to either increase the score of oneWT^
by 1 while decreasing the score of all others by 1; or they can decrease the score of allWT^
s by 1; or they can do nothing.Once a transaction has gotten a score high enough, it is published and funds are effectively transferred from the sidechain to the withdrawing users.
If a timeout of 6 months passes and the score doesn't meet the threshold, that
WT^
is discarded.What does the above procedure mean?
It means that people can transfer coins from the mainchain to a sidechain by depositing to the special address. Then they can withdraw from the sidechain by making a special withdraw transaction in the sidechain.
The special transaction somehow freezes funds in the sidechain while a transaction that aggregates all withdrawals into a single mainchain
WT^
, which is then submitted to the mainchain miners so they can start voting on it and finally after some months it is published.Now the crucial part: the validity of the
WT^
is not verified by the Bitcoin mainchain rules, i.e., if Bob has requested a withdraw from the sidechain to his mainchain address, but someone publishes a wrongWT^
that instead takes Bob's funds and sends them to Alice's main address there is no way the mainchain will know that. What determines the "validity" of theWT^
is the miner vote score and only that. It is the job of miners to vote correctly -- and for that they may want to run the sidechain node in SPV mode so they can attest for the existence of a reference to theWT^
transaction in the sidechain blockchain (which then ensures it is ok) or do these checks by some other means.What? 6 months to get my money back?
Yes. But no, in practice anyone who wants their money back will be able to use an atomic swap, submarine swap or other similar service to transfer funds from the sidechain to the mainchain and vice-versa. The long delayed withdraw costs would be incurred by few liquidity providers that would gain some small profit from it.
Why bother with this at all?
Drivechains solve many different problems:
It enables experimentation and new use cases for Bitcoin
Issued assets, fully private transactions, stateful blockchain contracts, turing-completeness, decentralized games, some "DeFi" aspects, prediction markets, futarchy, decentralized and yet meaningful human-readable names, big blocks with a ton of normal transactions on them, a chain optimized only for Lighting-style networks to be built on top of it.
These are some ideas that may have merit to them, but were never actually tried because they couldn't be tried with real Bitcoin or inferfacing with real bitcoins. They were either relegated to the shitcoin territory or to custodial solutions like Liquid or RSK that may have failed to gain network effect because of that.
It solves conflicts and infighting
Some people want fully private transactions in a UTXO model, others want "accounts" they can tie to their name and build reputation on top; some people want simple multisig solutions, others want complex code that reads a ton of variables; some people want to put all the transactions on a global chain in batches every 10 minutes, others want off-chain instant transactions backed by funds previously locked in channels; some want to spend, others want to just hold; some want to use blockchain technology to solve all the problems in the world, others just want to solve money.
With Drivechain-based sidechains all these groups can be happy simultaneously and don't fight. Meanwhile they will all be using the same money and contributing to each other's ecosystem even unwillingly, it's also easy and free for them to change their group affiliation later, which reduces cognitive dissonance.
It solves "scaling"
Multiple chains like the ones described above would certainly do a lot to accomodate many more transactions that the current Bitcoin chain can. One could have special Lightning Network chains, but even just big block chains or big-block-mimblewimble chains or whatnot could probably do a good job. Or even something less cool like 200 independent chains just like Bitcoin is today, no extra features (and you can call it "sharding"), just that would already multiply the current total capacity by 200.
Use your imagination.
It solves the blockchain security budget issue
The calculation is simple: you imagine what security budget is reasonable for each block in a world without block subsidy and divide that for the amount of bytes you can fit in a single block: that is the price to be paid in satoshis per byte. In reasonable estimative, the price necessary for every Bitcoin transaction goes to very large amounts, such that not only any day-to-day transaction has insanely prohibitive costs, but also Lightning channel opens and closes are impracticable.
So without a solution like Drivechain you'll be left with only one alternative: pushing Bitcoin usage to trusted services like Liquid and RSK or custodial Lightning wallets. With Drivechain, though, there could be thousands of transactions happening in sidechains and being all aggregated into a sidechain block that would then pay a very large fee to be published (via blind merged mining) to the mainchain. Bitcoin security guaranteed.
It keeps Bitcoin decentralized
Once we have sidechains to accomodate the normal transactions, the mainchain functionality can be reduced to be only a "hub" for the sidechains' comings and goings, and then the maximum block size for the mainchain can be reduced to, say, 100kb, which would make running a full node very very easy.
Can miners steal?
Yes. If a group of coordinated miners are able to secure the majority of the hashpower and keep their coordination for 6 months, they can publish a
WT^
that takes the money from the sidechains and pays to themselves.Will miners steal?
No, because the incentives are such that they won't.
Although it may look at first that stealing is an obvious strategy for miners as it is free money, there are many costs involved:
- The cost of ceasing blind-merged mining returns -- as stealing will kill a sidechain, all the fees from it that miners would be expected to earn for the next years are gone;
- The cost of Bitcoin price going down: If a steal is successful that will mean Drivechains are not safe, therefore Bitcoin is less useful, and miner credibility will also be hurt, which are likely to cause the Bitcoin price to go down, which in turn may kill the miners' businesses and savings;
- The cost of coordination -- assuming miners are just normal businesses, they just want to do their work and get paid, but stealing from a Drivechain will require coordination with other miners to conduct an immoral act in a way that has many pitfalls and is likely to be broken over the months;
- The cost of miners leaving your mining pool: when we talked about "miners" above we were actually talking about mining pools operators, so they must also consider the risk of miners migrating from their mining pool to others as they begin the process of stealing;
- The cost of community goodwill -- when participating in a steal operation, a miner will suffer a ton of backlash from the community. Even if the attempt fails at the end, the fact that it was attempted will contribute to growing concerns over exaggerated miners power over the Bitcoin ecosystem, which may end up causing the community to agree on a hard-fork to change the mining algorithm in the future, or to do something to increase participation of more entities in the mining process (such as development or cheapment of new ASICs), which have a chance of decreasing the profits of current miners.
Another point to take in consideration is that one may be inclined to think a newly-created sidechain or a sidechain with relatively low usage may be more easily stolen from, since the blind merged mining returns from it (point 1 above) are going to be small -- but the fact is also that a sidechain with small usage will also have less money to be stolen from, and since the other costs besides 1 are less elastic at the end it will not be worth stealing from these too.
All of the above consideration are valid only if miners are stealing from good sidechains. If there is a sidechain that is doing things wrong, scamming people, not being used at all, or is full of bugs, for example, that will be perceived as a bad sidechain, and then miners can and will safely steal from it and kill it, which will be perceived as a good thing by everybody.
What do we do if miners steal?
Paul Sztorc has suggested in the past that a user-activated soft-fork could prevent miners from stealing, i.e., most Bitcoin users and nodes issue a rule similar to this one to invalidate the inclusion of a faulty
WT^
and thus cause any miner that includes it in a block to be relegated to their own Bitcoin fork that other nodes won't accept.This suggestion has made people think Drivechain is a sidechain solution backed by user-actived soft-forks for safety, which is very far from the truth. Drivechains must not and will not rely on this kind of soft-fork, although they are possible, as the coordination costs are too high and no one should ever expect these things to happen.
If even with all the incentives against them (see above) miners do still steal from a good sidechain that will mean the failure of the Drivechain experiment. It will very likely also mean the failure of the Bitcoin experiment too, as it will be proven that miners can coordinate to act maliciously over a prolonged period of time regardless of economic and social incentives, meaning they are probably in it just for attacking Bitcoin, backed by nation-states or something else, and therefore no Bitcoin transaction in the mainchain is to be expected to be safe ever again.
Why use this and not a full-blown trustless and open sidechain technology?
Because it is impossible.
If you ever heard someone saying "just use a sidechain", "do this in a sidechain" or anything like that, be aware that these people are either talking about "federated" sidechains (i.e., funds are kept in custody by a group of entities) or they are talking about Drivechain, or they are disillusioned and think it is possible to do sidechains in any other manner.
No, I mean a trustless 2-way peg with correctness of the withdrawals verified by the Bitcoin protocol!
That is not possible unless Bitcoin verifies all transactions that happen in all the sidechains, which would be akin to drastically increasing the blocksize and expanding the Bitcoin rules in tons of ways, i.e., a terrible idea that no one wants.
What about the Blockstream sidechains whitepaper?
Yes, that was a way to do it. The Drivechain hashrate escrow is a conceptually simpler way to achieve the same thing with improved incentives, less junk in the chain, more safety.
Isn't the hashrate escrow a very complex soft-fork?
Yes, but it is much simpler than SegWit. And, unlike SegWit, it doesn't force anything on users, i.e., it isn't a mandatory blocksize increase.
Why should we expect miners to care enough to participate in the voting mechanism?
Because it's in their own self-interest to do it, and it costs very little. Today over half of the miners mine RSK. It's not blind merged mining, it's a very convoluted process that requires them to run a RSK full node. For the Drivechain sidechains, an SPV node would be enough, or maybe just getting data from a block explorer API, so much much simpler.
What if I still don't like Drivechain even after reading this?
That is the entire point! You don't have to like it or use it as long as you're fine with other people using it. The hashrate escrow special addresses will not impact you at all, validation cost is minimal, and you get the benefit of people who want to use Drivechain migrating to their own sidechains and freeing up space for you in the mainchain. See also the point above about infighting.
See also
-
@ 502ab02a:a2860397
2024-05-13 07:55:04เมื่อเริ่มก้าวออกมา จากที่เป็นอยู่ จะเขียนเป็น longform ก็สองจิตสองใจ เพราะมันเหมือนบันทึกเล็กๆน้อยๆมากกว่า การเล่าขานอะไรและโคตรจะส่วนตัวเลย 555
แยกหมวดมาโน้ตใน คิมิโหนะโต๊ะ เอ้ย YakiHonne แล้วกัน
ผมเริ่มก้าวสู่โลกคีโตเมื่อปี 2017 อย่างที่หลายๆคนพอจะทราบว่ามันเป็นก้าวแรกอย่างชัดเจนของคีโตไทย หลังจากที่พี่หนึ่ง Ketodaddy ถางหญ้าปูทางอยู่คนเดียวในปี 2016
จากการเริ่มขีดๆเขียนๆตามความสนุก มันก็เริ่มเลยเถิดไปทำอะไรต่อมิอะไรมากมาย และโลกของผมก็แบ่งออกเป็น 2 จักรวาลอย่างไม่รู้ตัว เหมือนกับ คลาร์ก เคนท์ กับ คาลเอล
ในโลกการทำงาน ผมรู้สึกเหมือน คลาร์ก เคนท์ ด้วยธุรกิจเอเจนซี่โฆษณา ในเลเวลที่วงการเรียกว่า below the line หรือ อะไรที่ไม่ใช่การทำงานในสื่อแมสมีเดีย ยกตัวอย่างเช่น ออนไลน์ สิ่งพิมพ์ การจัดงานต่างๆ(ออกาไนซ์ ไปจนถึง อบรมสัมมนา) ดังนั้นการทรีทจากลูกค้า ไม่ต้องกังวลเลย ครีเอทีฟเอเจนซีโดนหนักขนาดไหน below the line โดนจัดหนักกว่าเป็นธรรมชาติ
ทุกการกดการบีบ ประดังเข้ามา ไม่ว่าจะราคา การเรียกแข่งขัน 10 เอา 1 หรือแม้แต่การเอางานใน level ที่ยังไม่คอขาดบาดตายในยามวิกาลมาก (เราให้เที่ยงคืนคือวิกาล ดังนั้นโปรดเข้าใจคำว่า วิกาลมาก)
ซึ่งเนื้อการทำงานเอง กับประสบการณ์ ณ วันนี้ก็ 24ปีละ ความยากความเพรชเชอร์ในเนื้องานนี่กระจอกมากๆไปแล้วเพราะมันเจอมาจะครบมุมแล้วกระมังครับกับการเสกฝุ่นผงให้เป็นพระราชวัง การอดนอน 96ชั่วโมง หลายเซ็ตต่อเดือน งานมันไม่ได้เปลี่ยนความยากเลย ทำงานมันก็ต้องหนักเป็นธรรมดา ทำมาขนาดนี้ไม่ได้กลัวงานหนักหรอกครับ เราเข้าใจว่าสาย dev ก็คงไม่ต่างกันในการอดนอน แต่ประเด็นมันไม่ใช่อยู่ที่ความหนักของงาน หากแต่เป็นความหนักของคน
ที่มันเปลี่ยนไปคือ ความคิดมุมมองของคน ใช่ครับ หมวกอีกใบนึงของผมคือเจ้าของกิจการอยู่ครึ่งนึง 24ปีที่ผ่านมานััน ผมได้เห็นความเอาเปรียบที่มากขึ้น การกดขี่ที่มากขึ้น การทรีทมนุษย์ทำงานที่แย่ลงเรื่อยๆ จนตามหาคำว่า มารยาทและกาลเทศะ ได้ยากขึ้นทุกวัน ที่อื่นไม่รู้นะครับ แต่ที่ผ่านตาผ่านความรู้สึกของผม มันเป็นเช่นนั้น เพราะตัวผมมันผ่านหลากหลายคนจนมันมีสเกลในตาไปเองของมันแล้ว รวมถึงถอดปัจจัยของตัวเอง ออกมายืนมองแบบแฟร์ๆแล้ว โลกของคนมันเปลี่ยนไปจริงๆ
ด้วยตำแหน่งที่ยืนอยู่มันทำให้เห็นว่า คลื่นความกดขี่ มันไหลลงมาจาก top to bottom จาก menagement to staffs จาก department to department จาก client to vender แล้วยังมี company to company และ regional to global อีก แต่ละคนจะมี top ที่ชี้เป็นชี้ตายชีวิตการทำงานได้ทุกคน โดนบี้ต่อๆกันมาเป็นโดมิโน บี้ในระดับน้ำตาจะเล็ดแล้วถ้าไม่ได้มา มันมองออกเลยว่า ไม่ได้หนักที่งาน มันหนักที่คนและสภาพสังคม
มันมีความรู้สึกบางอย่าง สะสมมาเรื่อยๆ
ตัวจักรวาล คาร์ก เค้นท์ ที่เห็นการบีบอัดทุกอย่างเพื่อชีวิตรอด ในขณะที่ จักรวาล คาลเอล นั้นนอกเวลางานของผม ด้วยการทำงานด้านสุขภาพ ด้านคีโต ฉลากอาหาร ทั้งวิชาการ อาหาร และขนม มันดึงพลังที่โดนกลบไปตั้งแต่ปี 2000 ออกมา ตัวผมที่เคยบินร่อนเร่ในรายการวิทยุ เว็บไซท์ อนิเมชั่น พากย์เสียง ลงเสียง งานเบื้องหลังหลายๆอย่าง มีกลุ่มคนอีกแบบที่มีมุมมองอีกแบบ
ในช่วงปี 2018-2023 เป็นช่วงเวลาที่ผมครุ่นคิดไม่เคยหยุด ผมรู้ ว่าสิ่งที่ชอบคืออะไร แต่มันยังไม่สามารถเดินเครื่องได้เต็มที่ ด้วยหลายสาเหตุประดังประเดมา รวมกับการได้รับ คุณภาพ work ชั้นเยี่ยมแย่จากผู้รับเหมาร่วมสิบราย ผลัดเปลี่ยนกันมาแสดงความไร้ซึ่ง professional ในตัวงาน จนต้องทำเองในส่วนที่ทำได้มันดีกว่า เสร็จเร็วกว่า เรียบร้อยกว่าและรักบ้านกว่า การที่ให้ใครมาเปรี้ยงๆแล้วหนีไป แต่ก็แลกมากับความเสื่อมถอยของร่างกาย ถ้าถามว่าทำไมไม่หาช่างดีๆ อันนี้แยกไปอีก article ได้เลย สรุปข้นๆได้ว่า มีแต่หามาทำไม่ได้ด้วยสารพัดปัจจัย(แน่นอนไม่นับปัจจัยด้านเงินแล้วนะ สมเหตุสมผลคือไม่ต่อจ่ายได้เลย) ที่มะเรกเกเร ก็คุมยาก คนอีกนั่นแหละ ลองนึกภาพการบังคับให้คนคุณภาพแย่มาทำงาน แล้วเราต้องคุมเขา จะบอกว่า ทฤษฎี employee พี่ลืมไปเลย เขาพร้อมชิ่งไปพร้อมมัดจำ แล้ว 3มัดจำนี่จะเท่ากับ 1 งานสมบูรณ์แล้วนะ ใครไฟแรงทางทฤษฎี อยากให้ลองคุมงานก่อสร้างดู เราเจ้าของบริษัทยังเพลิดเพลนกับการเห็นมนุษย์แบบนี้เลย อ่ะเข้าเรื่องต่อ
ประกอบกับโควิด season1 อุบัติบนโลก ใครจะว่าเลวร้ายผมก็ไม่เถียง แต่มันทำให้เกิดพลังงานบางอย่าง ที่แยก 2 จักรวาลของผมให้ชัดเจนขึ้น เหมือนพลังที่เร่งการปริแตกของมัลติเวิร์ส
รวมกับการไม่สามารถเป็นอิสระจากเวลาได้ด้วยผลกระทบจาก การบีบคั้นจากโดมิโน่อันโหยหวนของผู้คนในจักรวาล คลาร์ก เค้นท์ ถึงจะไม่ได้ลงมือทำ production เองแล้ว แต่การอยู่เป็นขวัญและช่วยตรวจทาน ก็ยังเป็นเรื่องจำเป็น หรือเห็นอะไรแบบนี้เกิดกับทีมอื่นก็สะท้อนใจ แม้ทีมงานจะไฟแรงหมุนเวียนสลับคนกันทำงานประหนึ่ง rotation football ก็ตาม ที่ผมมอง มันไม่ใช่ประเด็นเรื่องเนื้องาน เพราะงานโฆษณามันถึกมาแต่ไหนแต่ไร หากแต่เป็นแนวความคิดของคนในระบบมากกว่า ที่ผมเห็นกราฟอะไรบางอย่าง
จนเพิ่งมารู้นิยามว่าไอ้ปี 2017 ที่ค้นคว้าเรื่องคีโต ความตอแหลของการอัดคาร์บ เบื้องหลังวิจัยสมัยก่อนมาจนถึงฉลากเล่ห์ในร้านสะดวกซื้อ มันคือ fiat food fiat health อ่อ เขาเรียกมันว่า fiat system เพิ่งเรียกนิยามมันได้ก็ไม่กี่ปีที่ผ่านมานี้เอง หาชื่อเรียกอยู่นาน
และเมื่อมีแต่เรื่องจำเป็นที่ต้องทำ การเอาหลักทฤษฎีที่ว่า “ทำงานที่ต้องทำเพื่อเอาเงินมาทำงานที่อยากทำ” มันเป็นไปไม่ได้สำหรับผมแฮะ เพราะวงการโฆษณา agency เล็กๆ การได้เงินมามันแลกกับทรัพยากรที่มีค่าที่เรียกว่า เวลา ไปจนเกือบจะหมดวัน แถมรู้สึกว่าเราไม่ได้ควบคุมการใช้เวลาเองเลย เพราะถ้าจะชิงเวลาคืนมา มันมีคำว่า คนข้างหลัง ทีมงาน ซัพพลายเออร์ ครอบครัวพวกเขา มาแปะติดอยู่เป็นกระดองเต่าเลย ใช่ครับ นึกภาพผู้เฒ่าเต่าดู ลองใช้ empathy ส่องดูจะรู้ว่า คำว่า มีเวลา 24 ชั่วโมงเท่ากัน อยู๋ที่ใครบริหารยังไงนั้น มันใช้ไม่ได้ทุกกรณี โดยเฉพาะใครที่ยังมีหนอกกระดองเต่าข้างหลัง
โลกตอนนี้มันไม่ได้ใช้ผลงาน ความงานดี ความพัฒนา skill ตัวเองจนคนยอมรับ ว่าจะต้องมาจ้างเรา เพราะมีคนอีกมากที่มัน duplicate ทักษะได้เหมือนเราแทบจะสำเนาถูกต้อง จะไม่ถูกต้องก็ตรงราคาที่ต่างกัน หรือแม้แต่ทักษะผลงานแย่กว่าเรา แต่ได้งานไปเพราะเหตุผลอื่นก็มีมหาศาล ถัดจากเราเน่นอนว่ามีอีกเป็นพันเป็นหมื่นบริษัทที่พร้อมเสียบ มิติมันมีหลากหลาย จนการแก้ปัญหาพวกนี้ไม่ได้เป็นไบนารี แต่เป็นสเปคตรัม ต่างหาก นึกถึงคนทำคุ้กกี้ได้หน้าตาเหมือนกันเป๊ะ 10 คน รุมแย่งกันมาแลกกับ ลูกแก้วทีมีแค่ 1 ลูก คนถือลูกแก้วอาจะไม่ได้เลือกเจ้าที่ อร่อยและสวย สวยแต่ไม่อร่อย อร่อยแต่ไม่สวยเขาอาจเลือก ไม่อร่อยไม่สวย เลยด้วยซ้ำ เพราะเขาอาจเลือกเจ้าที่เขารู้จักแทนเสียนี่ ใช่ครับ สเปคตรัม
และยิ่งโฆษณา เทียบได้กับอาหารตามสั่งด้วยซ้ำ มันยิ่งกว่าคุ้กกี้ทำแล้วเร่ขายให้รสชาติพิสูจน์ตัวเอง เราคิดสวยงามแต่โลกอาจไม่สวยงามแบบนั้น
มันก็เลยตกช่องที่ว่า มากครั้งที่ต้องทำในสิ่งที่เลือกไม่ได้ เพื่อคนอื่นๆข้างหลัง ด้วยประสบการณ์ชีวิต มันเข้าใจและแยกได้ระหว่างความรำคาญกับความรับผิดชอบความจำเป็น ไอ้ข้อแรกชิลแล้ว 24ปี กับความรำคาญที่ไม่เคยดีขึ้น5555 ส่วนอีกข้อนั้น แค่ในช่วงหลังนั้นเกิดคิดได้ว่า เอ๊ะ เราเลือกใส่กระดองไว้เองนี่หว่า
solution ที่ผมเลือก จึงต้องเป็นการหักดิบ ตัดออกไปเลย เริ่มที่ครึ่งนึงก่อน 4วันต่อสัปดาห์ เพื่อทำ landing ให้คนที่เหลืออยู่ แต่มันก็เป็นครึ่งนึงที่มีกำหนดเวลาสั้นพอสมควร แต่ถ้าไม่ตัดสินใจจะตัด มันก็จะไม่ได้เริ่มเสียที เพราะเรายอมรับข้อด้อยในตัวอย่างนึงว่า เราไม่กล้าพอที่จะปล่อยมือให้ใครเขารับผิดชอบชีวิตตัวเอง ไปคิดว่าเขาจะกระทบจากการไม่มีเรา จนลืมไปว่า เราเองนี่แหละกำลังไม่รับผิดชอบชีวิตตัวเอง เห้ย เราต้องเป็น คาลเอล ที่มาเซฟอิสรภาพของตัวเอง ให้โบยบินอย่างที่เราเลือกสิฟระ จะรอให้พร้อม มันไม่มีวันพร้อมอ่ะ อายุจะทำให้ความพร้อมลดลงเรื่อยๆ
ดังนั้นสิ่งที่ได้กลับมาคือ เวลา
พอมีเวลาเป็นของตัวเอง เลือกเองว่าจะทำอะไรกับเวลานั้น พลังการทำงานก็มากขึ้น ประสิทธิภาพมากขึ้น ถึงแต่ละวันจะเหลือเวลาน้อยเหมือนเดิม นอนน้อยเหมือนเดิม แต่ความตื่นตัวที่จะกระโดดขึ้นมาทำอะไรมันก็มากขึ้น ใช่ครับ โงกุนกับคุริริน ตอนถอดกระดองครั้งแรกนี่ กระโดดสูงเท่าตึก 2ชั้นเลย
เวลา ที่เรารู้ว่าเป็นของเรา มันหอมนะ หลังจากนี้จะเหม็นหรือเปล่า ขึ้นอยู่กับก้าวต่อไปละ ว่าจะไปเหยียบอะไรไหม
ไม่รู้หรอกนะ ก็ตอบยากเรื่องอนาคตว่าจะเป็นยังไง แต่ก็ต้องวางแผนให้ดีเหมือนที่ผ่านมา อย่าลืมจนบินไปอย่างไร้ทิศทาง ตอนนี้ก็กำลังขับเคลื่อนไปด้วยสัญชาติญาณ ถามว่าเสียวไหม เสียวค่ะ 55555 มันคือความเสี่ยง ที่ผ่านการตรึกตรองตกตะกอนมาดีแล้ว
ปัจจัยนึงที่ผมเลือกแบบนี้ อาจเป็นเพราะผมไม่มีลูก และนิยมการใช้ชีวิตให้มันพอดี การพลิกอะไรตอนจะอายุ 50อยู่รอมร่อนี่ ไม่รู้สินะ ภาษาคนทำโชว์ เขาคงจะบอกว่า break the legs แหละ
ดีเดย์ไปเมื่อ 1 พฤษภาคม 2567 และจะหมดอีกครึ่งนึงในวันที่ 31 กรกฎาคม 2567
หลังจากนั้น บานาน่าโบ๊ต จะออกจากฝั่ง ขอให้มีสุขสวัสดิ์
บันทึกเพื่อให้ตัวเองพึงระวัง
pirateketo #siamstr
-
@ 892ab9bd:e686de59
2024-05-15 15:08:43Can you imagine a world where every product you purchase has a transparent and immutable trail, from its origin to your doorstep? A world where counterfeiting and fraud are virtually impossible, and trust is the bedrock of every transaction? Well, that world is closer than you think, thanks to the revolutionary potential of blockchain technology in supply chain management.
Imagine being able to trace the journey of your morning coffee from the farm where the beans were harvested, through the roasting process, and all the way to your favorite café. Or imagine having complete confidence that the medication you’re taking is genuine and has been handled with utmost care throughout its journey. This level of transparency and traceability is no longer a pipe dream – it’s a reality made possible by blockchain.
At its core, blockchain is a decentralized and distributed digital ledger that records transactions in a secure and transparent manner. Each transaction is encrypted and added as a “block” to the chain, creating an immutable and tamper-proof record. This revolutionary technology has the potential to disrupt traditional supply chain management by addressing key issues such as lack of transparency, inefficient processes, and trust deficits.
Understanding Blockchain Technology
Blockchain is often described as a distributed ledger technology (DLT), where transactions are recorded and shared across a network of computers, rather than being stored in a centralized database. This decentralized nature ensures that no single entity has control over the data, making it virtually impossible to manipulate or tamper with records.
The blockchain operates on the principle of cryptographic security, where each block is linked to the previous one through complex mathematical algorithms and digital signatures. This creates an unbreakable chain of blocks, where any attempt to modify a block would be immediately detected and rejected by the network.
One of the key features of blockchain is its immutability – once data is recorded on the blockchain, it cannot be altered or deleted. This quality makes blockchain an ideal solution for maintaining transparent and auditable records in supply chain management.
Consensus mechanisms, such as Proof of Work (PoW) or Proof of Stake (PoS), ensure that all participants in the blockchain network agree on the validity of transactions before they are added to the chain. This decentralized consensus model eliminates the need for a central authority, fostering trust among stakeholders.
Furthermore, blockchain technology enables the use of smart contracts – self-executing digital agreements that automatically enforce the terms and conditions of a contract once predefined conditions are met. Smart contracts can streamline processes, reduce paperwork, and automate transactions in supply chain management.
Challenges in Traditional Supply Chain Management
- Lack of transparency and traceability:
- Difficulty in tracking products from origin to destination
- Counterfeiting and fraud issues
Traditional supply chains often suffer from a lack of transparency and traceability, making it challenging to track products from their source to the end consumer. This opacity creates fertile ground for counterfeit goods, fraud, and other illicit activities.
- Inefficient processes and data silos:
- Manual paperwork and documentation
- Lack of real-time data sharing among stakeholders
Supply chain management involves multiple stakeholders, including manufacturers, suppliers, logistics providers, and retailers. However, these entities often operate in siloes, relying on manual paperwork and documentation processes that are prone to errors, delays, and redundancies. Real-time data sharing across the supply chain is often a challenge, leading to inefficiencies and miscommunication.
- Trust and accountability issues:
- Difficulty in verifying product authenticity and quality
- Lack of accountability in case of disputes or errors
In traditional supply chains, it can be difficult to verify the authenticity and quality of products, especially when they pass through multiple intermediaries. Additionally, when disputes or errors occur, assigning accountability and resolving issues can be a complex and time-consuming process.
Potential Applications of Blockchain in Supply Chain Management
- Enhancing transparency and traceability:
- Tracking products from source to consumer
- Verifying product authenticity and provenance
- Combating counterfeiting and fraud
By leveraging blockchain technology, supply chain stakeholders can create an immutable and transparent record of every transaction and movement of goods. This allows for the precise tracking of products from their source to the end consumer, enabling the verification of product authenticity and provenance. With blockchain, counterfeiting and fraud become significantly more difficult, as every step in the supply chain is recorded and can be audited.
- Streamlining processes and data sharing:
- Automating documentation and paperwork
- Real-time data sharing among stakeholders
- Reducing redundancies and errors
Blockchain can automate and streamline many of the documentation and paperwork processes involved in supply chain management. By enabling real-time data sharing among stakeholders, blockchain eliminates the need for intermediaries and reduces redundancies and errors. Smart contracts can further automate transactions and agreements, ensuring that all parties have access to the same, up-to-date information.
- Improving trust and accountability:
- Immutable and tamper-proof record keeping
- Smart contracts for automating agreements and transactions
- Dispute resolution and accountability mechanisms
The immutable and tamper-proof nature of blockchain ensures that all records and transactions are accurate and verifiable. Smart contracts can automate agreements and transactions, reducing the risk of human error and enabling transparent dispute resolution mechanisms. This fosters trust and accountability among supply chain stakeholders, as everyone has access to the same, unalterable data.
Blockchain Use Cases in Supply Chain Management
- Food and beverage industry:
- Tracking food safety and quality
- Verifying organic and fair-trade certifications
The food and beverage industry can greatly benefit from blockchain technology by enhancing food safety and traceability. Blockchain can track the entire journey of food products, from farm to table, ensuring compliance with safety standards and verifying the authenticity of organic and fair-trade certifications.
- Pharmaceutical and healthcare:
- Preventing counterfeit drugs
- Tracking temperature-sensitive shipments
The counterfeit drug trade poses a significant threat to public health and safety. Blockchain can combat this issue by creating an immutable record of every step in the pharmaceutical supply chain, making it virtually impossible to introduce counterfeit drugs. Additionally, blockchain can track temperature-sensitive shipments, ensuring that medications and medical supplies maintain their efficacy.
- Retail and e-commerce:
- Product provenance and authenticity
- Anti-counterfeiting measures
In the retail and e-commerce sectors, blockchain can provide consumers with complete transparency and confidence in the products they purchase. By recording product provenance and authenticity on the blockchain, retailers can combat counterfeiting and ensure that customers receive genuine, high-quality goods.
- Logistics and transportation:
- Tracking shipments and cargo
- Automating documentation and customs clearance
The logistics and transportation industry can leverage blockchain to streamline processes and enhance visibility. Blockchain can track shipments and cargo in real-time, reducing the risk of delays, losses, or mishandling. Additionally, smart contracts can automate documentation and customs clearance procedures, improving efficiency and reducing costs.
Challenges and Considerations
While blockchain holds immense potential for supply chain management, there are several challenges and considerations that must be addressed:
- Scalability and performance issues:
- Existing blockchain networks may struggle with high transaction volumes
- Need for efficient and scalable solutions
As adoption of blockchain technology increases, existing blockchain networks may struggle to handle high volumes of transactions and data. Scalability and performance issues must be addressed through innovative solutions and advancements in blockchain infrastructure.
- Interoperability and standardization:
- Different blockchain platforms and protocols
- Need for industry-wide standards and collaboration
Currently, there are numerous blockchain platforms and protocols available, each with its own unique features and limitations. To fully realize the potential of blockchain in supply chain management, industry-wide standards and interoperability between different blockchain networks must be established through collaboration and consensus.
- Regulatory and legal considerations:
- Evolving regulations and legal frameworks
- Privacy and data governance concerns
As with any emerging technology, the legal and regulatory landscape surrounding blockchain is still evolving. Governments and industry bodies must work together to establish clear guidelines and frameworks that address issues such as data privacy, ownership, and governance.
- Adoption and implementation challenges:
- Resistance to change and legacy systems
- Need for education and training
Implementing blockchain technology in supply chain management may face resistance from stakeholders accustomed to traditional methods and legacy systems. Overcoming this resistance requires education, training, and a clear demonstration of the benefits and cost-savings associated with blockchain adoption.
Future Outlook and Conclusion
The future of blockchain in supply chain management is brimming with potential. As the technology continues to evolve and mature, we can expect to see advancements in areas such as:
- Increased scalability and performance through innovations like sharding and off-chain solutions
- Greater interoperability and standardization as industry-wide collaborations take shape
- Refined regulatory frameworks that provide clarity and foster innovation
- Wider adoption driven by successful pilot projects and real-world use
As promising as the future of blockchain in supply chain management appears, it is important to acknowledge that the true potential of this technology can only be unlocked through collaboration and ecosystem building. No single organization or industry can drive this revolution alone.
Stakeholders across the supply chain, from manufacturers and logistics providers to retailers and regulatory bodies, must come together to establish common standards, shared infrastructure, and collaborative governance models. By fostering an ecosystem approach, the supply chain industry can collectively overcome the challenges of scalability, interoperability, and regulatory hurdles.
Moreover, successful adoption of blockchain in supply chain management will require a concerted effort to educate and upskill professionals across various disciplines. From logistics managers and procurement specialists to IT professionals and legal experts, a diverse range of stakeholders must be equipped with the knowledge and skills necessary to leverage this transformative technology effectively.
In conclusion, the potential of blockchain in supply chain management is vast and far-reaching. By enabling unprecedented transparency, traceability, and efficiency, blockchain has the power to revolutionize the way we produce, distribute, and consume goods and services. As we embrace this disruptive technology, we are not only paving the way for more secure and trustworthy supply chains but also contributing to a more sustainable and responsible global economy.
The journey towards fully realizing the potential of blockchain in supply chain management may be long and fraught with challenges, but the rewards are well worth the effort. By fostering collaboration, encouraging innovation, and embracing change, we can unlock a future where every product has a trusted and immutable story; a future where supply chains are transparent, efficient, and built on a foundation of trust.
Key Takeaways:
- Blockchain offers a decentralized, secure, and transparent solution to address the challenges of traditional supply chain management, including lack of transparency, inefficient processes, and trust deficits.
- The immutability, traceability, and real-time data sharing capabilities of blockchain make it an ideal technology for enhancing supply chain visibility, combating counterfeiting, and streamlining processes.
- Successful implementation of blockchain in supply chain management requires addressing scalability, interoperability, regulatory, and adoption challenges through industry-wide collaboration and ecosystem building.
- The future of blockchain in supply chain management holds immense potential, paving the way for more secure, efficient, and sustainable supply chains, but requires a concerted effort from all stakeholders to unlock its full transformative power.
By embracing blockchain technology and fostering a collaborative ecosystem, we can create a more transparent, trustworthy, and responsible supply chain, one that not only benefits businesses but also contributes to a better world for consumers and society as a whole.
-
@ 03612b0e:afd71216
2024-05-12 14:14:47c-lightning-REST with Tailscale on Start9
This guide gives you commands to run additional containers on Start9. This is not officially supported and will break on reboot. You can always run the containers again to restore the setup. The containers are used to provide access, via Tailscale, to Core Lightning's c-lightning-REST plugin
Start9 setup
- In your Start9 dashboard, make sure you have C-Lightning-REST enabled.
- Services > Core Lightning > Config > Advanced > Plugins > C-Lightning-REST
- SSH to your Start9, see documentation for help: https://docs.start9.com/0.3.5.x/user-manual/ssh
- Access the root account:
sudo -i
- Run tailscaled and alpine/socat containers:
podman run -d \ --name=tailscaled.embassy \ -v /dev/net/tun:/dev/net/tun \ -v /var/lib:/var/lib \ -e TS_HOSTNAME=tailscaled \ --network=host \ --cap-add=NET_ADMIN \ --cap-add=NET_RAW \ docker.io/tailscale/tailscale:stable
podman run -d \ --name=socat.embassy \ --publish 4321:1234 \ --network=start9 \ docker.io/alpine/socat \ tcp-listen:1234,fork,reuseaddr tcp:c-lightning.embassy:3001
-
Note, if you see errors related to
/root/.docker/config.json
orUnexpected end of JSON
, runecho '{}' > /root/.docker/config.json
-
Check the status of tailscaled and log in
``` podman exec tailscaled.embassy tailscale --socket /tmp/tailscaled.sock status
example output
Logged out. Log in at: https://login.tailscale.com/a/1fa8e293dfd108
```
Zeus wallet setup
- On your phone, connect to Tailscale
- On your Start9, copy your REST Macaroon (Hex) for Zeus wallet setup
- Services > Core Lightning > Properties > REST Properties > REST Macaroon (Hex)
- In Zeus wallet, add a new node
- Settings > (tap the active node) > +
Setting | Value ---|--- Node interface | Core Lightning (c-lightning-Rest) Host | tailscaled.YOUR_TAILNET_DOMAIN Macaroon (Hex format) | see last step REST Port | 4321 Certificate Verification | disabled
SAVE NODE CONFIG
- Note, you can find YOUR_TAILNET_DOMAN at https://login.tailscale.com/admin/dns
Enjoy!
- In your Start9 dashboard, make sure you have C-Lightning-REST enabled.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Bolo
It seems that from 1987 to around 2000 there was a big community of people who played this game called "Bolo". It was a game in which people controlled a tank and killed others while trying to capture bases in team matches. Always 2 teams, from 2 to 16 total players, games could last from 10 minutes to 12 hours. I'm still trying to understand all this.
The game looks silly from some videos you can find today, but apparently it was very deep in strategy because people developed strategy guides and wrote extensively about it and Netscape even supported
bolo:
URLs out of the box.The two most important elements on the map are pillboxes and bases. Pillboxes are originally neutral, meaning that they shoot at every tank that happens to get in its range. They shoot fast and with deadly accuracy. You can shoot the pillbox with your tank, and you can see how damaged it is by looking at it. Once the pillbox is subdued, you may run over it, which will pick it up. You may place the pillbox where you want to put it (where it is clear), if you've enough trees to build it back up. Trees are harvested by sending your man outside your tank to forest the trees. Your man (also called a builder) can also lay mines, build roads, and build walls. Once you have placed a pillbox, it will not shoot at you, but only your enemies. Therefore, pillboxes are often used to protect your bases.
That quote was taken from this "augmented FAQ" written by some user. Apparently there were many FAQs for this game. A FAQ is after all just a simple, clear and direct to the point way of writing about anything, previously known as summa[^summa-k], it doesn't have to be related to any actually frequently asked question.
More unexpected Bolo writings include an etiquette guide, an anthropology study and some wonderings on the reverse pill war tactic.
[^summa-k]: It's not the same thing, but I couldn't help but notice the similarity.
-
@ 892ab9bd:e686de59
2024-05-15 14:47:26Imagine a world where digital currencies are not just speculative assets but a reliable means of exchange, free from the volatility that has plagued traditional cryptocurrencies like Bitcoin. Welcome to the realm of stablecoins, a groundbreaking innovation that promises to bridge the gap between the traditional financial system and the burgeoning world of decentralized finance (DeFi).
As the crypto landscape continues to evolve, stablecoins have emerged as a crucial component, offering a stable and predictable value that can facilitate a wide range of use cases, from everyday transactions to complex financial instruments. In this comprehensive guide, we’ll delve into the intricacies of stablecoins, exploring their types, underlying mechanisms, and the various ways they are reshaping the financial landscape.
But first, let’s address the elephant in the room: what exactly are stablecoins, and why are they so important? Picture a digital asset that maintains a stable value, typically pegged to a fiat currency like the US dollar or a commodity like gold. This stability is achieved through various mechanisms, such as collateralization or algorithmic stabilization, ensuring that the value of the stablecoin remains relatively constant, even amidst market fluctuations.
Now, imagine the potential this unlocks – seamless cross-border transactions, reliable trading pairs, and a gateway to the world of DeFi, where stablecoins serve as a bedrock for lending, borrowing, and yield farming. It’s a game-changer, and we’re just scratching the surface of what’s possible.
So, buckle up and get ready to navigate the exciting world of stablecoins and their use cases. We’ll explore the different types, delve into the intricacies of popular stablecoins like Tether (USDT), USD Coin (USDC), Binance USD (BUSD), and DAI, and uncover the vast array of applications that are redefining the way we think about digital currencies.
Understanding Stablecoins:
A. What are Stablecoins?
-
Stablecoins are digital assets designed to maintain a stable value, typically pegged to a fiat currency like the US dollar or a commodity like gold. They aim to combine the benefits of cryptocurrencies, such as decentralization and transparency, with the stability of traditional fiat currencies.
-
There are three main types of stablecoins:
a. Fiat-backed stablecoins: These are backed by traditional fiat currencies held in reserve. For every stablecoin issued, there is an equivalent amount of fiat currency held in a custodial account.
b. Crypto-backed stablecoins: These are collateralized by other cryptocurrencies, typically over-collateralized to ensure stability.
c. Algorithmic stablecoins: These rely on complex algorithms and smart contracts to maintain their peg, without being backed by traditional collateral.
-
The advantages of stablecoins include:
-
Stability: Stablecoins offer a haven from the volatility of traditional cryptocurrencies, making them ideal for everyday transactions and financial applications.
- Accessibility: Stablecoins can facilitate cross-border transactions and remittances, promoting financial inclusion in regions with limited access to traditional banking.
- Liquidity: Stablecoins can provide liquidity for trading pairs and serve as a stable on-ramp for cryptocurrency investments.
However, stablecoins also face challenges, such as regulatory uncertainties, potential centralization risks, and the need for robust auditing and transparency practices.
B. How do Stablecoins Work?
-
Fiat-backed and crypto-backed stablecoins rely on collateralization and reserve management. For every stablecoin issued, there is an equivalent amount of fiat currency or cryptocurrency held in reserve to maintain its peg.
-
Algorithmic stablecoins, like DAI, use complex algorithms and smart contracts to maintain their peg. These algorithms adjust the supply of the stablecoin through mechanisms like seigniorage shares or bonding curves, aiming to match demand and maintain stability.
-
Stabilization mechanisms, such as rebasing or varying the supply, help stablecoins maintain their peg during periods of high demand or volatility.
-
Transparency and auditing practices are crucial for fiat-backed and crypto-backed stablecoins to ensure that the reserves are adequately managed and collateralized.
With a solid understanding of the fundamental concepts behind stablecoins, we can now explore some of the most prominent players in this space and their unique characteristics.
Popular Stablecoins and Their Characteristics:
C. Tether (USDT)
- Background and History:
- Tether (USDT) was one of the first and most widely adopted stablecoins, launched in 2014 by the company Tether Limited.
-
It was initially designed as a one-to-one representation of the US dollar, with each USDT backed by an equivalent amount of USD held in reserve.
-
Controversies and Regulatory Challenges:
- Tether has faced significant scrutiny and controversies regarding its reserve management practices and lack of transparency.
-
In 2021, Tether Limited was fined $41 million by the Commodity Futures Trading Commission (CFTC) for making untrue or misleading statements about the degree to which USDT was backed by US dollars.
-
Adoption and Use Cases:
- Despite the controversies, Tether remains one of the most widely used stablecoins, with a market capitalization of over $80 billion as of May 2023.
- It is widely used for trading on cryptocurrency exchanges, facilitating liquidity and serving as a stable trading pair.
D. USD Coin (USDC)
- Background and Governance Structure:
- USD Coin (USDC) was launched in 2018 by the Centre Consortium, a collaboration between Circle and Coinbase.
-
It is a fiat-backed stablecoin, with each USDC token backed by an equivalent amount of US dollars held in reserve.
-
Transparency and Auditing Practices:
- USDC has prioritized transparency and has undergone regular audits by independent accounting firms to verify its reserve holdings.
-
The Centre Consortium has also implemented robust governance frameworks and compliance measures.
-
Adoption and Use Cases:
- USDC has gained significant traction in the DeFi ecosystem, serving as a popular choice for lending, borrowing, and yield farming protocols.
- It is also increasingly being used for cross-border payments and remittances, leveraging its stability and regulatory compliance.
E. Binance USD (BUSD)
- Background and Partnership with Paxos:
- Binance USD (BUSD) was launched in 2019 through a partnership between Binance, the world’s largest cryptocurrency exchange, and Paxos, a regulated financial institution.
-
BUSD is a fiat-backed stablecoin, with each token backed by US dollars held in reserve by Paxos.
-
Regulatory Compliance and Acceptance:
- BUSD has gained regulatory approval and recognition in multiple jurisdictions, including the United States, Singapore, and Canada.
-
This regulatory compliance has contributed to its widespread acceptance and integration into various platforms and services.
-
Adoption and Use Cases:
- BUSD is primarily used on the Binance ecosystem, facilitating trading, lending, and borrowing activities.
- It has also found adoption in the broader DeFi landscape, being integrated into various protocols and dApps.
D. DAI (Decentralized Stablecoin)
- Background and Decentralized Nature:
- DAI is a decentralized, unbiased stablecoin launched in 2017 by the Maker Protocol, a decentralized autonomous organization (DAO).
-
Unlike fiat-backed stablecoins, DAI is an algorithmic stablecoin that is not directly backed by traditional collateral.
-
Collateralization and the Maker Protocol:
- DAI is minted by depositing cryptocurrency collateral, typically Ethereum, into the Maker Protocol’s smart contracts.
-
The collateral is over-collateralized, meaning that the value of the collateral exceeds the value of the DAI minted, to ensure stability.
-
Adoption and Use Cases:
- DAI has gained significant traction in the DeFi ecosystem, being widely used in lending, borrowing, and yield farming protocols.
- Its decentralized nature and governance model have made it appealing to users seeking a truly decentralized stablecoin option.
With a solid understanding of these popular stablecoins, let’s explore the various use cases that are driving their adoption and shaping the future of finance.
Use Cases of Stablecoins:
F. Trading and Investment
- Stable Value for Crypto Trading Pairs:
- Stablecoins have emerged as a reliable base currency for trading pairs on cryptocurrency exchanges.
- By providing a stable counterpart to volatile cryptocurrencies, stablecoins facilitate more efficient and predictable trading strategies.
-
Popular trading pairs include BTC/USDT, ETH/USDC, and BNB/BUSD, among others.
-
Hedging Against Market Volatility:
- Investors can use stablecoins as a hedge against market volatility, temporarily moving their holdings into stable assets during periods of market turbulence.
-
This strategy helps preserve capital and provides a safe haven until market conditions stabilize.
-
Participation in DeFi Protocols and Lending Platforms:
- Stablecoins are a crucial component of the decentralized finance (DeFi) ecosystem, serving as collateral and enabling participation in various protocols and lending platforms.
- Examples include lending platforms like Aave and Compound, where users can lend or borrow stablecoins and earn interest.
G. Remittances and Cross-Border Payments
- Faster and Cheaper International Transfers:
- Stablecoins have the potential to revolutionize remittances and cross-border payments by providing a faster, more cost-effective alternative to traditional methods.
-
By leveraging blockchain technology, stablecoin transfers can be completed within minutes, bypassing intermediaries and reducing fees.
-
Accessibility and Financial Inclusion:
- In regions with limited access to traditional banking services, stablecoins can promote financial inclusion by enabling secure and affordable money transfers.
-
Users can easily send and receive stablecoins using just a smartphone and an internet connection.
-
Potential Use Cases in Developing Economies:
- Stablecoins offer a viable solution for economies plagued by hyperinflation or unstable fiat currencies.
- By adopting a stable digital currency like stablecoins, these economies can facilitate easier cross-border commerce and protect against currency devaluation.
H. Decentralized Finance (DeFi)
- Stablecoins as a Bridge Between Traditional Finance and DeFi:
- Stablecoins act as a crucial bridge between the traditional financial system and the burgeoning world of decentralized finance.
-
By providing a stable medium of exchange, stablecoins enable the integration of DeFi applications with fiat-based systems.
-
Lending and Borrowing Platforms:
- DeFi lending platforms like Aave, Compound, and Maker rely heavily on stablecoins as a means for users to lend or borrow digital assets.
-
These platforms offer attractive interest rates and the opportunity to earn passive income on stablecoin holdings.
-
Stablecoin-based Yield Farming and Liquidity Mining:
- Yield farming and liquidity mining are popular strategies in the DeFi ecosystem, where users can earn rewards by providing liquidity to decentralized exchanges (DEXs) or lending pools using stablecoins.
- Examples include protocols like Curve Finance, Yearn.finance, and Uniswap, among others.
I. Everyday Transactions and Payments
- Potential for Use as a Digital Currency:
- Stablecoins have the potential to serve as a digital currency for everyday transactions, bridging the gap between traditional fiat currencies and the world of cryptocurrencies.
-
Their stability and predictable value make them an attractive medium of exchange for merchants and consumers alike.
-
Merchant Adoption and Integration:
- As stablecoins gain mainstream recognition, more merchants and businesses are exploring their integration as a payment option.
-
Major companies like PayPal, Visa, and Mastercard have already taken steps to support stablecoin transactions.
-
Challenges and Regulatory Considerations:
- While stablecoins offer promising use cases for everyday transactions, adoption is not without challenges.
- Regulatory uncertainties, scalability issues, and the need for robust consumer protection measures must be addressed before widespread adoption can occur.
With the diverse array of use cases and the potential impact of stablecoins on various aspects of finance, it is essential to consider the regulatory landscape and future outlook for this rapidly evolving technology.
Regulatory Landscape and Future Outlook:
J. Regulatory Challenges and Concerns
- Lack of Standardization and Oversight:
- The stablecoin ecosystem currently lacks a standardized regulatory framework, leading to inconsistencies and potential risks.
-
Different jurisdictions have varying approaches to regulating stablecoins, creating uncertainty for issuers and users alike.
-
Potential Risks and Vulnerabilities:
- Regulators have raised concerns about the potential risks associated with stablecoins, including market manipulation, lack of transparency, and systemic risk.
-
Issues such as inadequate reserve management, lack of audits, and the potential for stablecoins to be used for illicit activities have been highlighted.
-
Ongoing Debates and Regulatory Efforts:
- Policymakers and regulators globally are actively engaged in debates and efforts to establish appropriate regulatory frameworks for stablecoins.
- Initiatives like the President’s Working Group on Financial Markets in the United States and the European Union’s proposed Markets in Crypto-assets (MiCA) regulation are shaping the future of stablecoin regulation.
K. Future Trends and Developments
- Potential for Central Bank Digital Currencies (CBDCs):
- Central banks around the world are exploring the development of their own digital currencies, known as CBDCs.
-
CBDCs could potentially compete with or complement existing stablecoins, depending on their design and implementation.
-
Emergence of New Stablecoin Projects and Innovations:
- The stablecoin landscape is rapidly evolving, with new projects and innovations emerging regularly.
-
New types of stablecoins, such as commodity-backed or hybrid models, are being explored to address the limitations of existing stablecoins.
-
Adoption and Integration into Traditional Finance:
- As stablecoins gain mainstream recognition and regulatory clarity, their adoption and integration into traditional finance are expected to accelerate.
- Financial institutions, payment processors, and other industry players are actively exploring stablecoin integration to leverage their potential benefits.
Conclusion:
The world of stablecoins is a fascinating and rapidly evolving landscape that holds immense potential to revolutionize the way we perceive and use digital currencies. From facilitating seamless cross-border transactions and providing a stable medium of exchange to enabling the growth of decentralized finance and revolutionizing remittances, stablecoins are poised to play a pivotal role in shaping the future of finance.
As we navigate this exciting new frontier, it is crucial to stay informed about the latest developments, regulatory updates, and emerging use cases. By embracing the potential of stablecoins while addressing the challenges and risks, we can unlock a world of possibilities and drive financial inclusion, innovation, and accessibility on a global scale.
So, whether you’re a trader, investor, entrepreneur, or simply someone interested in the cutting-edge of financial technology, it’s time to dive into the world of stablecoins and explore the vast array of opportunities they present. Embrace the future, stay curious, and be part of the revolution that is reshaping the way we think about money and value.
-
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Bluesky is a scam
Bluesky advertises itself as an open network, they say people won't lose followers or their identity, they advertise themselves as a protocol ("atproto") and because of that they are tricking a lot of people into using them. These three claims are false.
protocolness
Bluesky is a company. "atproto" is the protocol. Supposedly they are two different things, right? Bluesky just releases software that implements the protocol, but others can also do that, it's open!
And yet, the protocol has an official webpage with a waitlist and a private beta? Why is the protocol advertised as a company product? Because it is. The "protocol" is just a description of whatever the Bluesky app and servers do, it can and does change anytime the Bluesky developers decide they want to change it, and it will keep changing for as long as Bluesky apps and servers control the biggest part of the network.
Oh, so there is the possibility of other players stepping in and then it becomes an actual interoperable open protocol? Yes, but what is the likelihood of that happening? It is very low. No serious competitor is likely to step in and build serious apps using a protocol that is directly controlled by Bluesky. All we will ever see are small "community" apps made by users and small satellite small businesses -- not unlike the people and companies that write plugins, addons and alternative clients for popular third-party centralized platforms.
And last, even if it happens that someone makes an app so good that it displaces the canonical official Bluesky app, then that company may overtake the protocol itself -- not because they're evil, but because there is no way it cannot be like this.
identity
According to their own documentation, the Bluesky people were looking for an identity system that provided global ids, key rotation and human-readable names.
They must have realized that such properties are not possible in an open and decentralized system, but instead of accepting a tradeoff they decided they wanted all their desired features and threw away the "decentralized" part, quite literally and explicitly (although they make sure to hide that piece in the middle of a bunch of code and text that very few will read).
The "DID Placeholder" method they decided to use for their global identities is nothing more than a normal old boring trusted server controlled by Bluesky that keeps track of who is who and can, at all times, decide to ban a person and deprive them from their identity (they dismissively call a "denial of service attack").
They decided to adopt this method as a placeholder until someone else doesn't invent the impossible alternative that would provide all their desired properties in a decentralized manner -- which is nothing more than a very good excuse: "yes, it's not great now, but it will improve!".
openness
Months after launching their product with an aura of decentralization and openness and getting a bunch of people inside that believed, falsely, they were joining an actually open network, Bluesky has decided to publish a part of their idea of how other people will be able to join their open network.
When I first saw their app and how they were very prominently things like follower counts, like counts and other things that are typical of centralized networks and can't be reliable or exact on truly open networks (like Nostr), I asked myself how were they going to do that once they became and open "federated" network as they were expected to be.
Turns out their decentralization plan is to just allow you, as a writer, to host your own posts on "personal data stores", but not really have any control over the distribution of the posts. All posts go through the Bluesky central server, called BGS, and they decide what to do with it. And you, as a reader, doesn't have any control of what you're reading from either, all you can do is connect to the BGS and ask for posts. If the BGS decides to ban, shadow ban, reorder, miscount, hide, deprioritize, trick or maybe even to serve ads, then you are out of luck.
Oh, but anyone can run their own BGS!, they will say. Even in their own blog post announcing the architecture they assert that "it’s a fairly resource-demanding service" and "there may be a few large full-network providers". But I fail to see why even more than one network provider will exist, if Bluesky is already doing that job, and considering the fact there are very little incentives for anyone to switch providers -- because the app does not seem to be at all made to talk to multiple providers, one would have to stop using the reliable, fast and beefy official BGS and start using some half-baked alternative and risk losing access to things.
When asked about the possibility of switching, one of Bluesky overlords said: "it would look something like this: bluesky has gone evil. there's a new alternative called freesky that people are rushing to. I'm switching to freesky".
The quote is very naïve and sounds like something that could be said about Twitter itself: "if Twitter is evil you can just run your own social network". Both are fallacies because they ignore the network-effect and the fact that people will never fully agree that something is "evil". In fact these two are the fundamental reasons why -- for social networks specifically (and not for other things like commerce) -- we need truly open protocols with no owners and no committees.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Jofer
Jofer era um jogador diferente. À primeira vista não, parecia igual, um volante combativo, perseguia os atacantes adversários implacavelmente, um bom jogador. Mas não era essa a característica que diferenciava Jofer. Jofer era, digamos, um chutador.
Começou numa semifinal de um torneio de juniores. O time de Jofer precisava do empate e estava sofrendo uma baita pressão do adversário, mas o jogo estava 1 a 1 e parecia que ia ficar assim mesmo, daquele jeito futebolístico que parece, parece mesmo. Só que aos 46 do segundo tempo tomaram um gol espírita, Ruizinho do outro time saiu correndo pela esquerda e, mesmo sendo canhoto, foi cortando para o meio, os zagueiros meio que achando que já tinha acabado mesmo, devia ter só mais aquele lance, o árbitro tinha dado dois minutos, Ruizinho chutou, marcou e o goleiro, que só pulou depois que já tinha visto que não ia ter jeito, ficou xingando.
A bola saiu do meio e tocaram para Jofer, ninguém nem veio marcá-lo, o outro time já estava comemorando, e com razão, o juiz estava de sacanagem em fazer o jogo continuar, já estava tudo acabado mesmo. Mas não, estava certo, mais um minuto de acréscimo, justo. Em um minuto dá pra fazer um gol. Mas como? Jofer pensou nas partidas da NBA em que com alguns centésimos de segundo faltando o armador jogava de qualquer jeito para a cesta e às vezes acertava. De trás do meio de campo, será? Não vou ter nem força pra fazer chegar no gol. Vou virar piada, melhor tocar pro Fumaça ali do lado e a gente perde sem essa humilhação no final. Mas, poxa, e daí? Vou tentar mesmo assim, qualquer coisa eu falo que foi um lançamento e daqui a uns dias todo mundo esquece. Olhou para o próprio pé, virou ele de ladinho, pra fora e depois pra dentro (bom, se eu pegar daqui, direitinho, quem sabe?), jogou a bola pro lado e bateu. A bola subiu escandalosamente, muito alta mesmo, deve ter subido uns 200 metros. Jofer não tinha como ter a menor noção. Depois foi descendo, o goleirão voltando correndo para debaixo da trave e olhando pra bola, foi chegando e pulando já só pra acompanhar, para ver, dependurado no travessão, a bola sair ainda bem alta, ela bateu na rede lateral interna antes de bater no chão, quicar violentamente e estufar a rede no alto do lado direito de quem olhava.
Mas isso tudo foi sonho do Jofer. Sonhou acordado, numa noite em que demorou pra dormir, deitado na sua cama. Ficou pensando se não seria fácil, se ele treinasse bastante, acertar o gol bem de longe, tipo no sonho, e se não dava pra fazer gol assim. No dia seguinte perguntou a Brunildinho, o treinador de goleiros. Era difícil defender essas bolas, ainda mais se elas subissem muito, o goleiro ficava sem perspectiva, o vento alterava a trajetória a cada instante, tinha efeito, ela cairia rápido, mas claro que não valia à pena treinar isso, a chance de acertar o gol era minúscula. Mas Jofer só ia tentar depois que treinasse bastante e comprovasse o que na sua imaginação parecia uma excelente idéia.
Começou a treinar todos os dias. Primeiro escondido, por vergonha dos colegas, chegava um pouco antes e ficava lá, chutando do círculo central. Ao menor sinal de gente se aproximando, parava e ia catar as bolas. Depois, quando começou a acertar, perdeu a vergonha. O pessoal do clube todo achava engraçado quando via Jofer treinando e depois ouvia a explicação da boca de alguém, ninguém levava muito a sério, mas também não achava de todo ridículo. O pessoal ria, mas no fundo torcia praquilo dar certo, mesmo.
Aconteceu que num jogo que não valia muita coisa, empatezinho feio, aos 40 do segundo tempo, a marcação dos adversários já não estava mais pressionando, todo mundo contente com o empate e com vontade de parar de jogar já, o Henrique, meia-esquerdo, humilde, mas ainda assim um pouco intimidante para Jofer (jogava demais), tocou pra ele. Vai lá, tenta sua loucura aí. Assumiu a responsabilidade do nosso volante introspectivo. Seria mais verossímil se Jofer tivesse errado, primeira vez que tentou, restava muito tempo ainda pra ele ter a chance de ser herói, ninguém acerta de primeira, mas ele acertou. Quase como no sonho, Lucas, o goleiro, não esperava, depois que viu o lance, riu-se, adiantou-se para pegar a bola que ele julgava que quicaria na área, mas ela foi mais pra frente, mais e mais, daí Lucas já estava correndo, só que começou a pensar que ela ia pra fora, e ele ia só se dependurar no travessão e fazer seu papel de estar na bola. Acabou que por conta daquele gol eles terminaram em segundo no grupo daquele torneiozinho, ao invés de terceiro, e não fez diferença nenhuma.
-
@ 3c984938:2ec11289
2024-05-11 12:21:43👉play the audio to listen to the article. https://media.nostr.build/av/749a03816c328c599054f31113588f9f5a47b5e67681e3a1eb9ee97c8f2e0dd3.mp3
Welcome to Nostr!
Introduction. Is this your first time here in Nostr? Welcome! Nostr has a oddball acronym for "Notes and Other Stuff Transmitted by Relays" with a simple goal, to be censorship-resistance. An alternative to traditional social media, communications, blogging, streaming, podcasting and eventually email (in development) with decentralization that empowers you, dear user. No more will you have to be plagued by ads, held by centralized entities and data hungry algorithms that monetizes you.
Allow me to be your host! I'm Onigirl! I'm on a quest to explore the world of Nostr, a decentralized communication protocol. I write about the tools, and the awesome developers within Nostr that bring this realm roaring with life.
Welcome to Nostr Wonderland
You're about to step into another world that will explode your mind from all the decentralized apps, clients, web3 enabled sites that you can use. You're never going to look at communications, logging in, 2FA, and social media the same way ever again. All thanks to Nostr's cryptographic nature inspired by Bitcoin blockchain technology. Each user, when they create a Nostr account, they get two keys, a private and a public key. These are your keys to your very own kingdom. Whatever you write, sing, podcast, stream, anything you create --all of it belongs to you. The sky is literally the limit!
A Gold and Silver Key
A friend of mine and I, call this "Identity by Encryption" because your Identity is encrypted. You can share your silver key, "npub" to other users to connect and follow. Use your gold key, "nsec" to unlock your account to plugin into a plethora of applications. Keep this key safe at all times. There is no reason to be caged ever again by social platforms TOS henceforth!
👉Give it a whirl, you can follow me by copying and pasting my public key into your search bar on any client that you decide to use.
Onigirl
npub18jvyjwpmm65g8v9azmlvu8knd5m7xlxau08y8vt75n53jtkpz2ys6mqqu3
Don't have a client yet? Select the best option
Find the right App for you! This is where you can use your gold key, "nsec" to login into these wonderful tools. You can also visit Nostr's app page here. Before you start pasting your gold key everywhere on apps, consider using a signers (for web3 enabled sites) please look at the next image for details, also refer to the legend.
Get a Signer extension via chrome webstore
A signer is an extension in the chrome webstore on Google. Nos2x and NostrConnect are widely accepted extension for logins. This simplifies the process of logging into web3 sites instead of copying and pasting your gold key, "nsec" each and every time, you keep it within the extension and give it permission(s) to sign you in.
👉⚡⚡Get a Bitcoin lightning wallet to send/receive Zaps⚡⚡ (This is optional)
Here on Nostr, we use the Bitcoin Lightning network (L2). You will need to get a lightning wallet in order to send/receive Satoshi. These are the smallest denominations of a Bitcoin. It is a one hundred millionth of a single bitcoin (0.00000001 BTC). Zaps are a form of "micropayment with sats" here on Nostr. If you enjoy a user content, it is the norm to "⚡zap⚡" a.k.a "tip" for their content. For example, If you like my content, you can zap me with SATs to reward my work. But you just arrived, you don't have a wallet yet. No worries! I got you covered!
"Stacker.News" is a platform where users can earn SATs by writing articles and engaging with other users. You.
👉Stacker.News is also the easiest place to get a Bitcoin Lighting wallet address.
- Log in with your "Signer" extension either "Nos2x or NostrConnect" click your profile which will be random letters and numbers in the upper right corner.
You will see something like this:
- Click "edit"
and choose a name that you like, and if you don't like it. You can change again later.
- Click "save"
- Create a bio and the SN community are very welcoming and will zap you some sats to welcome you.
- You new Bitcoin Lightning Wallet address will appear like this:
#### ^^Do not zap this address; this is purely for educational purposes!
- With your New Bitcoin Lightning wallet address you can put this into any client or app of your choice. To do this, go to your profile page and under your wallet address under "LN Address," enter your new address and hit "save" and there ya go. Congratulations!
👉✨Eventually, you may want to move to self custodial options and maybe consider to even self-host your own LN node for better privacy. Good news is stacker.news is also moving away from being a custodian wallet.
Nostr, the maverick of Servers
Instead of using a single instance or a centralized server Nostr is built to have several databases to exchange messages using "relays." Relays, which are neutral and nondiscriminatory, store and broadcast public messages in the Nostr network. They transmit messages to all other clients connected to them, securing communications in the decentralized network.
My friends in Nostr welcome you!
Welcome to the tea Party, would you like a spot of tea?🍵
There's so much more!
This is just the tip of the iceberg. Follow me as I continue to explore new lands and the developers, called "knights" behind this ever-growing ecosystem. Meet me here for more content like this and share this with future nostr users. Learn about the knights fighting for freedomTech within Nostr and the projects that are contributing to make it happen. Make your life more decentralized with Nostr. 💋
Onigirl @npub18jvyjwpmm65g8v9azmlvu8knd5m7xlxau08y8vt75n53jtkpz2ys6mqqu3
- Log in with your "Signer" extension either "Nos2x or NostrConnect" click your profile which will be random letters and numbers in the upper right corner.
You will see something like this:
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: Community
I was an avid IPFS user until yesterday. Many many times I asked simple questions for which I couldn't find an answer on the internet in the #ipfs IRC channel on Freenode. Most of the times I didn't get an answer, and even when I got it was rarely by someone who knew IPFS deeply. I've had issues go unanswered on js-ipfs repositories for year – one of these was raising awareness of a problem that then got fixed some months later by a complete rewrite, I closed my own issue after realizing that by myself some couple of months later, I don't think the people responsible for the rewrite were ever acknowledge that he had fixed my issue.
Some days ago I asked some questions about how the IPFS protocol worked internally, sincerely trying to understand the inefficiencies in finding and fetching content over IPFS. I pointed it would be a good idea to have a drawing showing that so people would understand the difficulties (which I didn't) and wouldn't be pissed off by the slowness. I was told to read the whitepaper. I had already the whitepaper, but read again the relevant parts. The whitepaper doesn't explain anything about the DHT and how IPFS finds content. I said that in the room, was told to read again.
Before anyone misread this section, I want to say I understand it's a pain to keep answering people on IRC if you're busy developing stuff of interplanetary importance, and that I'm not paying anyone nor I have the right to be answered. On the other hand, if you're developing a super-important protocol, financed by many millions of dollars and a lot of people are hitting their heads against your software and there's no one to help them; you're always busy but never delivers anything that brings joy to your users, something is very wrong. I sincerely don't know what IPFS developers are working on, I wouldn't doubt they're working on important things if they said that, but what I see – and what many other users see (take a look at the IPFS Discourse forum) is bugs, bugs all over the place, confusing UX, and almost no help.
-
@ c73818cc:ccd5c890
2024-05-15 14:35:56✨ Litecoin si distingue come metodo di pagamento preferito, superando Bitcoin su BitPay.
✨ Un'adozione crescente: Litecoin ha registrato il 41,38% dei pagamenti su BitPay ad aprile, contro il 21,55% di Bitcoin. Questo trend positivo evidenzia la crescente domanda di Litecoin come soluzione di pagamento pratica e conveniente. ✨ Vantaggi di Litecoin: La velocità e i costi inferiori di Litecoin rispetto a Bitcoin lo rendono una scelta attraente per le transazioni quotidiane. Inoltre, la sua base di utenti in crescita e la crescente accettazione da parte dei commercianti contribuiscono al suo successo. ✨ Opportunità per il futuro: Con la continua innovazione e l'adozione diffusa, Litecoin ha il potenziale per diventare una criptovaluta dominante per i pagamenti online e offline.
⭐ In un panorama di pagamenti digitali dominato da sistemi centralizzati e soggetti a commissioni elevate, Litecoin offre una valida alternativa decentralizzata e resistente alla censura.
Seguici sui nostri canali social ed unisciti al nostro gruppo Telegram:
https://t.me/Bitcoin_Report_Italia
BitcoinReportItalia #Litecoin #LTC #Silver #BitPay #BTC #Bitcoin
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O caso da Grêmio TV
enquanto vinha se conduzindo pela plataforma superior daquela arena que se pensava totalmente preenchida por adeptos da famosa equipe do Grêmio de Porto Alegre, viu-se, como por obra de algum nigromante - dos muitos que existem e estão a todo momento a fazer más obras e a colocar-se no caminhos dos que procuram, se não fazer o bem acima de todas as coisas, a pelo menos não fazer o mal no curso da realização dos seus interesses -, o discretíssimo jornalista a ser xingado e moído em palavras por uma horda de malandrinos a cinco ou seis passos dele surgida que cantavam e moviam seus braços em movimentos que não se pode classificar senão como bárbaros, e assim cantavam:
Grêmio TV pior que o SBT !
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Castas hindus em nova chave
Shudras buscam o máximo bem para os seus próprios corpos; vaishyas o máximo bem para a sua própria vida terrena e a da sua família; kshatriyas o máximo bem para a sociedade e este mundo terreno; brâmanes buscam o máximo bem.
-
@ 502ab02a:a2860397
2024-05-08 05:16:41สตอรี่ ชีสเค้ก (Story Cheesecake) : ep2 ขึ้นต้นด้วยคุ้กกี้ พอแตกใบอ่อนเป็นอารายว๊า
จำกันได้ไหม ครั้งแรกที่คุณหัดทำเบเกอรี่ ขนมอะไรที่เริ่มหัดทำเป็นอย่างแรกๆ เชื่อว่าร้อยทั้งร้อยคงไม่พ้น คุ้กกี้ บราวนี่ พวกเราเองก็เหมือนกัน วัตถุดิบอย่างแป้งอัลมอนด์สมัยนั้นถ้าไม่ใช่คนที่เคยทำมาการองมาก่อน ก็แทบจะไม่รู้เลยว่าซื้อกันที่ไหน เผลอๆกว่าจะตั้งตัวได้ว่าเราจะพูดกับคนขายว่าอะไรลำพังแค่แป้งอัลมอนด์เด็กที่ร้านหลายร้านก็งง หาในเนทไหนจะ อัลมอนด์มิล อัลมอนด์กราว อัลมอนด์ป่น เย้ยยยยย มันต่างกันยังไงเนี่ย
โชคดีที่ก่อนกินคีโต เอ๋ เคยทำร้านขนม เค้ก เบเกอรี่ ทำตั้งแต่ซื้อวัตถุดิบ อบ แพ็คใส่ตู้ ขายในร้าน มาก่อน ช่วงแรกที่ลองจับลองทำขนมคีโต จึงเริ่มจากของที่มีอยู่กับตัวง่ายๆก่อน แน่นอนว่ามันคือ คุ้กกี้ เพราะใช้วัตถุดิบไม่มากกระบวนการไม่มาก แต่ด้วยความที่แป้งอัลมอนด์ไม่เหมือนแป้งทั่วไป มันมีความหนักและไม่อยู่ตัว ตีทิ้งตีขว้างไปหลายแบทเทอร์ กว่าจะลงตัว โชคดีที่สมัยก่อนการกินคีโตยังเคร่งมากๆ เพราะข้อมูลจากฝรั่งนั้นเคร่งมาก แรกเริ่มเดิมที คาร์บยังคือคาร์บ ไม่มีการหักไฟเบอร์ จากนั้นไม่นานถึงจะเริ่มมีการหักไฟเบอร์ออก ดร.เบิร์ก แรกๆนี่ไม่หักไฟเบอร์เลยนะ เพิ่งมาหักช่วงหลัง นั่นเลยทำให้การชิมขนมไปหลายรอบนั้น ยังไม่รบกวนคีโตมากนัก
เมื่อทุกอย่างลงตัว ทดสอบหลายแนวทั้งผสมถั่ว ทั้งผสมชอคชิพ 3 เม็ดจนเป็นเอกลักษณ์ จนคนถามว่าทำไมต้อง 3 เม็ด แต่ก็ทำตามๆกันมา 3 เม็ด หลังจากปล่อยสูตรออกไป พร้อมๆกับส่งตัวคุ้กกี้ให้ผู้โชคดี(หรือโชคร้ายนะ)ให้ได้ชิมกันถ้วนหน้า
อย่างที่บอกว่ามันยังไม่ใช่ยุคของการค้า พอเป็นสูตรที่ใครๆก็เอาไปทำกัน แล้วทำได้โอเค มันก็เลยกลายเป็น คุ้กกี้ในตำนาน โดยปริยาย ด้วยความที่ว่ามันเอาไปลองทำแล้วผลออกมาไม่แย่ ทำง่าย รสชาติทานได้ อาจจะไม่เลิศเลอ ลองฌอมดูตูร์กูติเยร์ อะไรมากมาย แต่แน่หล่ะเพราะก่อนแจกจ่ายได้ผ่านการลองผิดมาแล้วมากมาย คนทำตามสูตรก็เลยเหลือแค่ลองถูก นำไปทำทานเลยหรือนำไปพัฒนาต่อยอดได้สบายๆ
ตอนนั้นชื่อก็เลยถูกสลักหลังตามด้วยคำว่า คุ้กกี้ในตำนาน อยู่เสมอๆอย่างหนีไม่พ้น เหมือนสมัยนี้ที่เอะอะก็แปะนามสกุล เดอะวอยซ์บ้าง บีเอ็นเคบ้าง คือมันก็เป็นแค่ชื่อห้อยท้ายเพื่อ refer ถึงนั่นแหละ คล้ายๆหนัง GDH เรื่อง เอ๋ไหน-ไฟแรวงเวอร์ (เหรอ ??? ) เผลอๆแอบไปร้องเพลงใส่หน้ากากคุ้กกี้ซะงั้น (เพ้อแล้ว)
อย่างที่บอกตอนแรกแหละ พอลงตัวเรื่องวิธีการกินคีโต แปลงานวิจัย แปลบทความ แปลบทสนทนา เนื้อหาต่างๆมาแลกเปลี่ยนกัน เวลาว่างก็ทดลองทำอาหาร ขนม หลายอย่างมากมาย เท่าที่จะนึกได้ ไม่ว่าจะเป็น ขนมจีบคีโต(ใช้สาหร่ายแทนแป้ง) คุ้กกี้เคลือบชอคโกแลต เบเกิ้ล ไอติมกะทิ ไข่พะโล้ ช็อกโกแลตแท่งผสมอัลมอนด์ น้ำพริกเบค่อน ไข่เจียวซูเฟล่คีโต (แรงบันดาลใจจากการ์ตูนโซมะ) ทั้งหมดนี้คาบเกี่ยวกันในช่วง 2017 เกือบจะทั้งหมด เป็นปีแห่งการระเบิดเมนูคีโตออกมามากมาย ของเอ๋แท้ๆ สนุกสนาน สำราญใจกันถ้วนหน้า ถ้าไม่ว่างจริงไม่ออกมาขนาดนี้นะนี่
หอมปากหอมคอกับ ep.2 ไหน นี่ยังไม่เข้าเค้าของชีสเค้กเลย เอาเป็นว่าตอนต่อไป ถึงคิวชีสเค้กแล้วล่ะ ** ประมวลภาพอดีตอันยาวนาน
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Economics
Just a bunch of somewhat-related notes.
- notes on "Economic Action Beyond the Extent of the Market", Per Bylund
- Mises' interest rate theory
- Profits, not wages, as the originary factor
- Reisman on opportunity cost
- Money Supply Measurement
- Per Bylund's insight
- Maybe a new approach to the Austrian Business Cycle Theory, some disorganized thoughts
- An argument according to which fractional-reserve banking is merely theft and nothing else
- Conjecture and criticism
- Qual é o economista? (piadas)
- UBI calculations
- Donations on the internet
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Thoughts on Nostr key management
On Why I don't like NIP-26 as a solution for key management I talked about multiple techniques that could be used to tackle the problem of key management on Nostr.
Here are some ideas that work in tandem:
- NIP-41 (stateless key invalidation)
- NIP-46 (Nostr Connect)
- NIP-07 (signer browser extension)
- Connected hardware signing devices
- other things like musig or frostr keys used in conjunction with a semi-trusted server; or other kinds of trusted software, like a dedicated signer on a mobile device that can sign on behalf of other apps; or even a separate protocol that some people decide to use as the source of truth for their keys, and some clients might decide to use that automatically
- there are probably many other ideas
Some premises I have in my mind (that may be flawed) that base my thoughts on these matters (and cause me to not worry too much) are that
- For the vast majority of people, Nostr keys aren't a target as valuable as Bitcoin keys, so they will probably be ok even without any solution;
- Even when you lose everything, identity can be recovered -- slowly and painfully, but still --, unlike money;
- Nostr is not trying to replace all other forms of online communication (even though when I think about this I can't imagine one thing that wouldn't be nice to replace with Nostr) or of offline communication, so there will always be ways.
- For the vast majority of people, losing keys and starting fresh isn't a big deal. It is a big deal when you have followers and an online persona and your life depends on that, but how many people are like that? In the real world I see people deleting social media accounts all the time and creating new ones, people losing their phone numbers or other accounts associated with their phone numbers, and not caring very much -- they just find a way to notify friends and family and move on.
We can probably come up with some specs to ease the "manual" recovery process, like social attestation and explicit signaling -- i.e., Alice, Bob and Carol are friends; Alice loses her key; Bob sends a new Nostr event kind to the network saying what is Alice's new key; depending on how much Carol trusts Bob, she can automatically start following that and remove the old key -- or something like that.
One nice thing about some of these proposals, like NIP-41, or the social-recovery method, or the external-source-of-truth-method, is that they don't have to be implemented in any client, they can live in standalone single-purpose microapps that users open or visit only every now and then, and these can then automatically update their follow lists with the latest news from keys that have changed according to multiple methods.
-
@ c11cf5f8:4928464d
2024-05-15 12:43:57Hey stackers, let’s lay down your unique and unusual offerings. Unveil the unexpected!
Need a hand? Check our guides… What hidden gems do y'all have up for sale? Let's rustle up some dusted serendipitous and it in the ~AGORA marketplace.
Click any link👇below to start! [⚖️ SELL] - [🛒 BUY] - [🧑💻 HIRE] - [🖇 OFFER] - [🧑⚖️ AUCTION] - [🤝 SWAP] - [🆓 FREE] - [⭐ REVIEW]
-
@ a012dc82:6458a70d
2024-05-08 01:26:26Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Live Crypto News Today Updates December and Latest News: (5 December 2022) On Monday morning, the international market for digital assets had positive index readings. The total value of the cryptocurrency market has increased by almost 2%. The total number of trades conducted in a single trading day rose by 14% to reach $35 billion.
As the cryptocurrency market begins to show signs of recovery, prices for Bitcoin and Ethereum have increased by 2% and 3%, respectively.
Dogecoin Price Surges Due to "Twitter Coin" Rumor?
The price of Dogecoin (DOGE), the world's biggest joke cryptocurrency, recently skyrocketed amid persistent claims that Twitter is planning to create its own cryptocurrency called "Twitter Coin."
Twitter's Elon Musk to Launch "Twitter Coin"?
It has been rumored that Twitter is working on monetization options as well as a "Twitter Coin." Researchers Nima Owji and Jane Manchun Wong found the "Coins" option buried under the "Tips" settings on Twitter. They shared their discovery. Elon Musk has already dropped hints that Twitter will start accepting payments in Dogecoin (DOGE).
Litecoin's (LTC) Price Jumps Over 8%
Recently, Litecoin has been quite active, as seen by the price of LTC, which has increased by more than 8.5% in the last twenty-four hours. At the time of this publication, the price of LTC on the market was $83.14, and its market cap was $5.9 billion.
On the technical chart, Litecoin has shown a clear accumulation breakthrough, which may further lead to an increase in the price of LTC to $90 or even higher.
Caroline, the former CEO of Alameda, was spotted in New York.
Photos of Caroline Ellison, the former chief executive officer of Alameda, started making the rounds on Twitter on December 4th. Some Twitter users claim to have seen Caroline around 8:15 a.m. at Ground Support Coffee, which is located on West Broad in Manhattan's SoHo neighborhood.
Gopher, a Golden Doodle puppy that is reported to belong to the executives of FTX and Alameda, also seems to have been seen with Caroline, which lends some credence to the possibility of sightings and provides more evidence. Following a query on Twitter, Austin Capital reported that a barista behind the counter had identified the customer as Caroline.
Dogecoin (DOGE) is a valuable asset, claims ChatGPT.
The open AI bot ChatGPT has been making waves throughout the internet since the weekend just passed. Everyone is in awe of ChatGPT's writing talents because of the sort of writing skills they have displayed.
The Open AI platform has heaped praise on Dogecoin, emphasizing that DOGE should be "reckoned with as a force," as the website puts it.
Bitcoin's value rises by 2%.
Over the course of the previous 24 hours, the price of a bitcoin has increased by 2%. At the time of this writing, the average price of a Bitcoin transaction was $17,305. Its trade volume for a single day increased by 24 percent, reaching $20 billion. Bitcoin now has a market value of more than $332.6 billion.
Recovery of Cryptographic Registers
On Monday morning, the international market for digital assets had positive index readings. The total value of the cryptocurrency market has increased by almost 2%.
The total number of trades conducted in a single trading day rose by 14% to reach $35 billion.
Conclusion
It remains to be seen whether Musk's Twitter will make cryptocurrency a priority, but at least one of the big supporters behind the transaction is pushing for it. Binance, a cryptocurrency exchange, contributed $500 million to the $44 billion acquisition with the aim of assisting Twitter in its transition to Web3. The CEO of Binance, Changpeng "CZ" Zhao, has been actively promoting his Binance Pay platform as a potential payment method for Twitter.
FAQ
What new features is Elon rolling out on Twitter? After taking over Twitter, Elon Musk's first official product change was to start charging $8 per month for "blue check marks," which are the verification badges that Twitter currently gives to public figures such as journalists, politicians, and celebrities. Musk confirmed this change shortly after he took control of Twitter.
Is there cryptocurrency available on Twitter? Twitter has not made any public announcements on the development of a cryptocurrency wallet product; however, the social media firm did release a tipping tool late in 2017 that enables users to transfer bitcoin to content producers through the site. Twitter expanded its tips functionality to include ethereum in February. Elon Musk will serve as your host for the duration of the monologue on May 8, 2021.
What exactly is the ELC token? ELON, also known as Dogelon Mars, is a token project with a focus on doges. ELON, also known as Dogelon Mars, is a doge-centered token project with the objective of emulating the achievements of Dogecoin (DOGE) while making a reference to Elon Musk's plan to populate Mars. The original investors in Dogelon Mars placed a liquidity lock on fifty percent of all ELON funds in a pool managed by Uniswap.
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: Shitcoinery
IPFS was advertised to the Ethereum community since the beggining as a way to "store" data for their "dApps". I don't think this is harmful in any way, but for some reason it may have led IPFS developers to focus too much on Ethereum stuff. Once I watched a talk showing libp2p developers – despite being ignored by the Ethereum team (that ended up creating their own agnostic p2p library) – dedicating an enourmous amount of work on getting a libp2p app running in the browser talking to a normal Ethereum node.
The always somewhat-abandoned "Awesome IPFS" site is a big repository of "dApps", some of which don't even have their landing page up anymore, useless Ethereum smart contracts that for some reason use IPFS to store whatever the useless data their users produce.
Again, per se it isn't a problem that Ethereum people are using IPFS, but it is at least confusing, maybe misleading, that when you search for IPFS most of the use-cases are actually Ethereum useless-cases.
See also
- Bitcoin, the only non-shitcoin
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28nix
Pra instalar o neuron fui forçado a baixar e instalar o nix. Não consegui me lembrar por que não estava usando até hoje aquele maravilhoso sistema de instalar pacotes desde a primeira vez que tentei, anos atrás.
Que sofrimento pra fazer funcionar com o
fish
, mas até que bem menos sofrimento que da outra vez. Tive que instalar um tal defish-foreign-environment
(usando o próprio nix!, já que a outra opção era ooh-my-fish
ou qualquer outra porcaria dessas) e aí usá-lo para aplicar as definições de shell para bash direto nofish
.E aí lembrei também que o
/nix/store
fica cheio demais, o negócio instala tudo que existe neste mundo a partir do zero. É só para computadores muito ricos, mas vamos ver como vai ser. Estou gostando do neuron (veja, estou usando como diário), então vou ter que deixar o nix aí. -
@ 0b963191:fc5e7ffd
2024-05-05 23:36:45Chef's notes
Can of course substitute in beef for the lamb.
In terms of canned peas, always prefer La Sueur
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
Ingredients
- Potatoes:
- 1 ½ pounds potatoes (Russet)
- ½ cup half-and-half
- 2 ounces unsalted butter
- ¾ teaspoon kosher salt
- ¼ teaspoon black pepper
- 1 egg yolk
- Meat Filling:
- 2 tablespoons canola oil
- 1 cup chopped white onion
- 3 carrots, peeled and diced
- 1 ½ pounds ground lamb
- 1 teaspoon kosher salt
- ½ teaspoon black pepper
- 3 tablespoons flour
- 3-4 teaspoons tomato paste
- 1 cup chicken broth
- 3 teaspoons Worcestershire sauce
- 2-3 teaspoons chopped rosemary leaves (fresh)
- 1-2 teaspoons chopped thyme leaves (fresh)
- ¾ cup corn kernels
- ¾ cup peas
Directions
- Potatoes:
- Peel and dice potatoes.
- Place in a pot and cover in cold water.
- Bring to a boil.
- Lower fire to simmer and cook for 15-20 minutes.
- Heat butter and half-and-half for 30-40 seconds in the microwave.
- Drain potatoes and put back into the pot.
- Mash potatoes and add half-and-half, butter, salt, pepper.
- Continue mashing until smooth and stir in yolk until combined.
- Preheat the oven to 400 degrees.
- Filling:
- Heat canola oil in a 10-12 inch pan over high heat.
- Add onions and carrots and saute over medium-high heat for 4-5 minutes.
- Add garlic and combine for 30 seconds.
- Add Lamb, salt, and pepper and cook until browned.
- Sprinkle flour and stir to coat lamb and cook for 1-2 minutes.
- Add Tomato paste, chicken broth, Worcestershire sauce, rosemary, thyme. Stir and bring to a boil.
- Reduce heat to low, cover, and simmer for 12-15 minutes while sauce thickens.
- Oven:
- Add meat filling to baking dish.
- Add peas and corn and stir in evenly
- Spread mashed potatoes using a rubber spatula. start at the corners and make sure to seal around the edges.
- Bake for 25 minutes
- Remove from the oven and let sit for 15-20 minutes.
-
@ b43dfe80:2caf2f4b
2024-05-15 10:28:47Opinion about Khodo: Buy Bitcoin and Cryptocurrency in Malawi (android)
I almost lost my life after falling victim to a scam that went on for weeks, I got contacted by a lady pretending to be a Forex trader, she told me that I’ll make huge profits if I invest on her platform not knowing that I was being targeted, I started making investments through bitcoins until it was time to withdraw and they insisted I had to pay 20% to withdraw my money and it was then I knew I was being swindled. Unfortunately, I had already put $90,000 into this investment scam. While I was wallowing in depression, I came across an article about Mr. JAMEMESMCKAYWIZARD. Whom I contacted that helped me recover my money, I didn’t hesitate to give him the necessary details he took some information from me and to my surprise, all my money was recovered within 48 hours. I’m truly grateful to him and his team for their professionalism in helping me recover my money. If you have lost money to any of these scams, I’ll recommend them to you. Their contact: jamesmckaywizard at gmail dot com or WhatsApp +31647340446.
WalletScrutiny #nostrOpinion
-
@ c11cf5f8:4928464d
2024-05-05 14:22:20Let's hear some of your latest Bitcoin purchases, feel free to include links to the shops or merchants you bought from too.
If you missed our last thread, here are some of the items stackers recently spent their sats on.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Replacing the web with something saner
This is a simplification, but let's say that basically there are just 3 kinds of websites:
- Websites with content: text, images, videos;
- Websites that run full apps that do a ton of interactive stuff;
- Websites with some interactive content that uses JavaScript, or "mini-apps";
In a saner world we would have 3 different ways of serving and using these. 1 would be "the web" (and it was for a while, although I'm not claiming here that the past is always better and wanting to get back to the glorious old days).
1 would stay as "the web", just static sites, styled with CSS, no JavaScript whatsoever, but designers can still thrive and make they look pretty. Or it could also be something like Gemini. Maybe the two protocols could coexist.
2 would be downloadable native apps, much easier to write and maintain for developers (considering that multi-platform and cross-compilation is easy today and getting easier), faster, more polished experience for users, more powerful, integrates better with the computer.
(Remember that since no one would be striving to make the same app run both on browsers and natively no one would have any need for Electron or other inefficient bloated solutions, just pure native UI, like the Telegram app, have you seen that? It's fast.)
But 2 is mostly for apps that people use every day, something like Google Docs, email (although email is also broken technology), Netflix, Twitter, Trello and so on, and all those hundreds of niche SaaS that people pay monthly fees to use, each tailored to a different industry (although most of functions they all implement are the same everywhere). What do we do with dynamic open websites like StackOverflow, for example, where one needs to not only read, but also search and interact in multiple ways? What about that website that asks you a bunch of questions and then discovers the name of the person you're thinking about? What about that mini-app that calculates the hash of your provided content or shrinks your video, or that one that hosts your image without asking any questions?
All these and tons of others would fall into category 3, that of instantly loaded apps that you don't have to install, and yet they run in a sandbox.
The key for making category 3 worth investing time into is coming up with some solid grounds, simple enough that anyone can implement in multiple different ways, but not giving the app too much choices.
Telegram or Discord bots are super powerful platforms that can accomodate most kinds of app in them. They can't beat a native app specifically made with one purpose, but they allow anyone to provide instantly usable apps with very low overhead, and since the experience is so simple, intuitive and fast, users tend to like it and sometimes even pay for their services. There could exist a protocol that brings apps like that to the open world of (I won't say "web") domains and the websockets protocol -- with multiple different clients, each making their own decisions on how to display the content sent by the servers that are powering these apps.
Another idea is that of Alan Kay: to design a nice little OS/virtual machine that can load these apps and run them. Kinda like browsers are today, but providing a more well-thought, native-like experience and framework, but still sandboxed. And I add: abstracting away details about design, content disposition and so on.
These 3 kinds of programs could coexist peacefully. 2 are just standalone programs, they can do anything and each will be its own thing. 1 and 3, however, are still similar to browsers of today in the sense that you need clients to interact with servers and show to the user what they are asking. But by simplifying everything and separating the scopes properly these clients would be easy to write, efficient, small, the environment would be open and the internet would be saved.
See also
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: General confusion
Most IPFS open-source projects, libraries and apps (excluding Ethereum stuff) are things that rely heavily on dynamic data and temporary links. The most common projects you'll see when following the IPFS communities are chat rooms and similar things. I've seen dozens of these chat-rooms. There's also a famous IPFS-powered database. How can you do these things with content-addressing is a mistery. Of course they probably rely on IPNS or other external address system.
There's also a bunch of "file-sharing" on IPFS. The kind of thing people use for temporary making a file available for a third-party. There's image sharing on IPFS, pastebins on IPFS and so on. People don't seem to share the preoccupation with broken links here.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28nostr - Notes and Other Stuff Transmitted by Relays
The simplest open protocol that is able to create a censorship-resistant global "social" network once and for all.
It doesn't rely on any trusted central server, hence it is resilient; it is based on cryptographic keys and signatures, so it is tamperproof; it does not rely on P2P techniques, therefore it works.
Very short summary of how it works, if you don't plan to read anything else:
Everybody runs a client. It can be a native client, a web client, etc. To publish something, you write a post, sign it with your key and send it to multiple relays (servers hosted by someone else, or yourself). To get updates from other people, you ask multiple relays if they know anything about these other people. Anyone can run a relay. A relay is very simple and dumb. It does nothing besides accepting posts from some people and forwarding to others. Relays don't have to be trusted. Signatures are verified on the client side.
This is needed because other solutions are broken:
The problem with Twitter
- Twitter has ads;
- Twitter uses bizarre techniques to keep you addicted;
- Twitter doesn't show an actual historical feed from people you follow;
- Twitter bans people;
- Twitter shadowbans people.
- Twitter has a lot of spam.
The problem with Mastodon and similar programs
- User identities are attached to domain names controlled by third-parties;
- Server owners can ban you, just like Twitter; Server owners can also block other servers;
- Migration between servers is an afterthought and can only be accomplished if servers cooperate. It doesn't work in an adversarial environment (all followers are lost);
- There are no clear incentives to run servers, therefore they tend to be run by enthusiasts and people who want to have their name attached to a cool domain. Then, users are subject to the despotism of a single person, which is often worse than that of a big company like Twitter, and they can't migrate out;
- Since servers tend to be run amateurishly, they are often abandoned after a while — which is effectively the same as banning everybody;
- It doesn't make sense to have a ton of servers if updates from every server will have to be painfully pushed (and saved!) to a ton of other servers. This point is exacerbated by the fact that servers tend to exist in huge numbers, therefore more data has to be passed to more places more often;
- For the specific example of video sharing, ActivityPub enthusiasts realized it would be completely impossible to transmit video from server to server the way text notes are, so they decided to keep the video hosted only from the single instance where it was posted to, which is similar to the Nostr approach.
The problem with SSB (Secure Scuttlebutt)
- It doesn't have many problems. I think it's great. In fact, I was going to use it as a basis for this, but
- its protocol is too complicated because it wasn't thought about being an open protocol at all. It was just written in JavaScript in probably a quick way to solve a specific problem and grew from that, therefore it has weird and unnecessary quirks like signing a JSON string which must strictly follow the rules of ECMA-262 6th Edition;
- It insists on having a chain of updates from a single user, which feels unnecessary to me and something that adds bloat and rigidity to the thing — each server/user needs to store all the chain of posts to be sure the new one is valid. Why? (Maybe they have a good reason);
- It is not as simple as Nostr, as it was primarily made for P2P syncing, with "pubs" being an afterthought;
- Still, it may be worth considering using SSB instead of this custom protocol and just adapting it to the client-relay server model, because reusing a standard is always better than trying to get people in a new one.
The problem with other solutions that require everybody to run their own server
- They require everybody to run their own server;
- Sometimes people can still be censored in these because domain names can be censored.
How does Nostr work?
- There are two components: clients and relays. Each user runs a client. Anyone can run a relay.
- Every user is identified by a public key. Every post is signed. Every client validates these signatures.
- Clients fetch data from relays of their choice and publish data to other relays of their choice. A relay doesn't talk to another relay, only directly to users.
- For example, to "follow" someone a user just instructs their client to query the relays it knows for posts from that public key.
- On startup, a client queries data from all relays it knows for all users it follows (for example, all updates from the last day), then displays that data to the user chronologically.
- A "post" can contain any kind of structured data, but the most used ones are going to find their way into the standard so all clients and relays can handle them seamlessly.
How does it solve the problems the networks above can't?
- Users getting banned and servers being closed
- A relay can block a user from publishing anything there, but that has no effect on them as they can still publish to other relays. Since users are identified by a public key, they don't lose their identities and their follower base when they get banned.
- Instead of requiring users to manually type new relay addresses (although this should also be supported), whenever someone you're following posts a server recommendation, the client should automatically add that to the list of relays it will query.
- If someone is using a relay to publish their data but wants to migrate to another one, they can publish a server recommendation to that previous relay and go;
- If someone gets banned from many relays such that they can't get their server recommendations broadcasted, they may still let some close friends know through other means with which relay they are publishing now. Then, these close friends can publish server recommendations to that new server, and slowly, the old follower base of the banned user will begin finding their posts again from the new relay.
-
All of the above is valid too for when a relay ceases its operations.
-
Censorship-resistance
- Each user can publish their updates to any number of relays.
-
A relay can charge a fee (the negotiation of that fee is outside of the protocol for now) from users to publish there, which ensures censorship-resistance (there will always be some Russian server willing to take your money in exchange for serving your posts).
-
Spam
-
If spam is a concern for a relay, it can require payment for publication or some other form of authentication, such as an email address or phone, and associate these internally with a pubkey that then gets to publish to that relay — or other anti-spam techniques, like hashcash or captchas. If a relay is being used as a spam vector, it can easily be unlisted by clients, which can continue to fetch updates from other relays.
-
Data storage
- For the network to stay healthy, there is no need for hundreds of active relays. In fact, it can work just fine with just a handful, given the fact that new relays can be created and spread through the network easily in case the existing relays start misbehaving. Therefore, the amount of data storage required, in general, is relatively less than Mastodon or similar software.
-
Or considering a different outcome: one in which there exist hundreds of niche relays run by amateurs, each relaying updates from a small group of users. The architecture scales just as well: data is sent from users to a single server, and from that server directly to the users who will consume that. It doesn't have to be stored by anyone else. In this situation, it is not a big burden for any single server to process updates from others, and having amateur servers is not a problem.
-
Video and other heavy content
-
It's easy for a relay to reject large content, or to charge for accepting and hosting large content. When information and incentives are clear, it's easy for the market forces to solve the problem.
-
Techniques to trick the user
- Each client can decide how to best show posts to users, so there is always the option of just consuming what you want in the manner you want — from using an AI to decide the order of the updates you'll see to just reading them in chronological order.
FAQ
- This is very simple. Why hasn't anyone done it before?
I don't know, but I imagine it has to do with the fact that people making social networks are either companies wanting to make money or P2P activists who want to make a thing completely without servers. They both fail to see the specific mix of both worlds that Nostr uses.
- How do I find people to follow?
First, you must know them and get their public key somehow, either by asking or by seeing it referenced somewhere. Once you're inside a Nostr social network you'll be able to see them interacting with other people and then you can also start following and interacting with these others.
- How do I find relays? What happens if I'm not connected to the same relays someone else is?
You won't be able to communicate with that person. But there are hints on events that can be used so that your client software (or you, manually) knows how to connect to the other person's relay and interact with them. There are other ideas on how to solve this too in the future but we can't ever promise perfect reachability, no protocol can.
- Can I know how many people are following me?
No, but you can get some estimates if relays cooperate in an extra-protocol way.
- What incentive is there for people to run relays?
The question is misleading. It assumes that relays are free dumb pipes that exist such that people can move data around through them. In this case yes, the incentives would not exist. This in fact could be said of DHT nodes in all other p2p network stacks: what incentive is there for people to run DHT nodes?
- Nostr enables you to move between server relays or use multiple relays but if these relays are just on AWS or Azure what’s the difference?
There are literally thousands of VPS providers scattered all around the globe today, there is not only AWS or Azure. AWS or Azure are exactly the providers used by single centralized service providers that need a lot of scale, and even then not just these two. For smaller relay servers any VPS will do the job very well.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28A Causa
o Princípios de Economia Política de Menger é o único livro que enfatiza a CAUSA o tempo todo. os cientistas todos parecem não saber, ou se esquecer sempre, que as coisas têm causa, e que o conhecimento verdadeiro é o conhecimento da causa das coisas.
a causa é uma categoria metafísica muito superior a qualquer correlação ou resultado de teste de hipótese, ela não pode ser descoberta por nenhum artifício econométrico ou reduzida à simples antecedência temporal estatística. a causa dos fenômenos não pode ser provada cientificamente, mas pode ser conhecida.
o livro de Menger conta para o leitor as causas de vários fenômenos econômicos e as interliga de forma que o mundo caótico da economia parece adquirir uma ordem no momento em que você lê. é uma sensação mágica e indescritível.
quando eu te o recomendei, queria é te imbuir com o espírito da busca pela causa das coisas. depois de ler aquilo, você está apto a perceber continuidade causal nos fenômenos mais complexos da economia atual, enxergar as causas entre toda a ação governamental e as suas várias consequências na vida humana. eu faço isso todos os dias e é a melhor sensação do mundo quando o caos das notícias do caderno de Economia do jornal -- que para o próprio jornalista que as escreveu não têm nenhum sentido (tanto é que ele escreve tudo errado) -- se incluem num sistema ordenado de causas e consequências.
provavelmente eu sempre erro em alguns ou vários pontos, mas ainda assim é maravilhoso. ou então é mais maravilhoso ainda quando eu descubro o erro e reinsiro o acerto naquela racionalização bela da ordem do mundo econômico que é a ordem de Deus.
em scrap para T.P.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28idea: Rumple
a payments network based on trust channels
This is the description of a Lightning-like network that will work only with credit or trust-based channels and exist alongside the normal Lightning Network. I imagine some people will think this is undesirable and at the same time very easy to do (such that if it doesn't exist yet it must be because no one cares), but in fact it is a very desirable thing -- which I hope I can establish below -- and at the same time a very non-trivial problem to solve, as the history of Ryan Fugger's Ripple project and posterior copies of it show.
Read these first to get the full context:
- Ryan Fugger's Ripple
- Ripple and the problem of the decentralized commit
- The Lightning Network solves the problem of the decentralized commit
- Parallel Chains
Explanation about the name
Since we're copying the fundamental Ripple idea from Ryan Fugger and since the name "Ripple" is now associated with a scam coin called XRP, and since Ryan Fugger has changed the name of his old website "Ripplepay" to "Rumplepay", we will follow his lead here. If "Ripplepay" was the name of a centralized prototype to the open peer-to-peer network "Ripple", now that the centralized version is called "Rumplepay" the peer-to-peer version must be called "Rumple".
Now the idea
Basically we copy the Lightning Network, but without HTLCs or channels being opened and closed with funds committed to them on multisig Bitcoin transactions published to the blockchain. Instead we use pure trust relationships like the original Ripple concept.
And we use the blockchain commit method, but instead of spending an absurd amount of money to use the actual Bitcoin blockchain instead we use a parallel chain.
How exactly -- a protocol proposal attempt
It could work like this:
The parallel chain, or "Rumple Chain"
- We define a parallel chain with a genesis block;
- Following blocks must contain
a. the ID of the previous block; b. a list of up to 32768 entries of arbitrary 32-byte values; c. an ID constituted by sha256(the previous block ID + the merkle root of all the entries)
- To be mined, each parallel block must be included in the Bitcoin chain according as explained above.
Now that we have a structure for a simple "blockchain" that is completely useless, just blocks over blocks of meaningless values, we proceed to the next step of assigning meaning to these values.
The off-chain payments network, or "Rumple Network"
- We create a network of nodes that can talk to each other via TCP messages (all details are the same as the Lightning Network, except where mentioned otherwise);
- These nodes can create trust channels to each other. These channels are backed by nothing except the willingness of one peer to pay the other what is owed.
- When Alice creates a trust channel with Bob (
Alice trusts Bob
), contrary to what happens in the Lightning Network, it's A that can immediately receive payments through that channel, and everything A receives will be an IOU from Bob to Alice. So Alice should never open a channel to Bob unless Alice trusts Bob. But also Alice can choose the amount of trust it has in Bob, she can, for example, open a very small channel with Bob, which means she will only lose a few satoshis if Bob decides to exit scam her. (in the original Ripple examples these channels were always depicted as friend relationships, and they can continue being that, but it's expected -- given the experience of the Lightning Network -- that the bulk of the channels will exist between users and wallet provider nodes that will act as hubs). - As Alice receive a payment through her channel with Bob, she becomes a creditor and Bob a debtor, i.e., the balance of the channel moves a little to her side. Now she can use these funds to make payments over that channel (or make a payment that combines funds from multiple channels using MPP).
- If at any time Alice decides to close her channel with Bob, she can send all the funds she has standing there to somewhere else (for example, another channel she has with someone else, another wallet somewhere else, a shop that is selling some good or service, or a service that will aggregate all funds from all her channels and send a transaction to the Bitcoin chain on her behalf).
- If at any time Bob leaves the network Alice is entitled by Bob's cryptographic signatures to knock on his door and demand payment, or go to a judge and ask him to force Bob to pay, or share the signatures and commitments online and hurt Bob's reputation with the rest of the network (but yes, none of these things is good enough and if Bob is a very dishonest person none of these things is likely to save Alice's funds).
The payment flow
- Suppose there exists a route
Alice->Bob->Carol
and Alice wants to send a payment to Carol. - First Alice reads an invoice she received from Carol. The invoice (which can be pretty similar or maybe even the same as BOLT11) contains a payment hash
h
and information about how to reach Carol's node, optionally an amount. Let's say it's 100 satoshis. - Using the routing information she gathered, Alice builds an onion and sends it to Bob, at the same time she offers to Bob a "conditional IOU". That stands for a signed commitment that Alice will owe Bob an 100 satoshis if in the next 50 blocks of the Rumple Chain there appears a block containing the preimage
p
such thatsha256(p) == h
. - Bob peels the onion and discovers that he must forward that payment to Carol, so he forwards the peeled onion and offers a conditional IOU to Carol with the same
h
. Bob doesn't know Carol is the final recipient of the payment, it could potentially go on and on. - When Carol gets the conditional IOU from Bob, she makes a list of all the nodes who have announced themselves as miners (which is not something I have mentioned before, but nodes that are acting as miners will must announce themselves somehow) and are online and bidding for the next Rumple block. Each of these miners will have previously published a random 32-byte value
v
they they intend to include in their next block. - Carol sends payments through routes to all (or a big number) of these miners, but this time the conditional IOU contains two conditions (values that must appear in a block for the IOU to be valid):
p
such thatsha256(p) == h
(the same that featured in the invoice) andv
(which must be unique and constant for each miner, something that is easily verifiable by Carol beforehand). Also, instead of these conditions being valid for the next 50 blocks they are valid only for the single next block. - Now Carol broadcasts
p
to the mempool and hopes one of the miners to which she sent conditional payments sees it and, allured by the possibility of cashing in Carol's payment, includesp
in the next block. If that does not happen, Carol can try again in the next block.
Why bother with this at all?
-
The biggest advantage of Lightning is its openness
It has been said multiple times that if trust is involved then we don't need Lightning, we can use Coinbase, or worse, Paypal. This is very wrong. Lightning is good specially because it serves as a bridge between Coinbase, Paypal, other custodial provider and someone running their own node. All these can transact freely across the network and pay each other without worrying about who is in which provider or setup.
Rumple inherits that openness. In a Rumple Network anyone is free to open new trust channels and immediately route payments to anyone else.
Also, since Rumple payments are also based on the reveal of a preimage it can do swaps with Lightning inside a payment route from day one (by which I mean one can pay from Rumple to Lightning and vice-versa).
-
Rumple fixes Lightning's fragility
Lightning is too fragile.
It's known that Lightning is vulnerable to multiple attacks -- like the flood-and-loot attack, for example, although not an attack that's easy to execute, it's still dangerous even if failed. Given the existence of these attacks, it's important to not ever open channels with random anonymous people. Some degree of trust must exist between peers.
But one does not even have to consider attacks. The creation of HTLCs is a liability that every node has to do multiple times during its life. Every initiated, received or forwarded payment require adding one HTLC then removing it from the commitment transaction.
Another issue that makes trust needed between peers is the fact that channels can be closed unilaterally. Although this is a feature, it is also a bug when considering high-fee environments. Imagine you pay $2 in fees to open a channel, your peer may close that unilaterally in the next second and then you have to pay another $15 to close the channel. The opener pays (this is also a feature that can double as a bug by itself). Even if it's not you opening the channel, a peer can open a channel with you, make a payment, then clone the channel, and now you're left with, say, an output of 800 satoshis, which is equal to zero if network fees are high.
So you should only open channels with people you know and know aren't going to actively try to hack you and people who are not going to close channels and impose unnecessary costs on you. But even considering a fully trusted Lightning Network, even if -- to be extreme -- you only opened channels with yourself, these channels would still be fragile. If some HTLC gets stuck for any reason (peer offline or some weird small incompatibility between node softwares) and you're forced to close the channel because of that, there are the extra costs of sweeping these UTXO outputs plus the total costs of closing and reopening a channel that shouldn't have been closed in the first place. Even if HTLCs don't get stuck, a fee renegotiation event during a mempool spike may cause channels to force-close, become valueless or settle for very high closing fee.
Some of these issues are mitigated by Eltoo, others by only having channels with people you trust. Others referenced above, plus the the griefing attack and in general the ability of anyone to spam the network for free with payments that can be pending forever or a lot of payments fail repeatedly makes it very fragile.
Rumple solves most of these problems by not having to touch the blockchain at all. Fee negotiation makes no sense. Opening and closing channels is free. Flood-and-loot is a non-issue. The griefing attack can be still attempted as funds in trust channels must be reserved like on Lightning, but since there should be no theoretical limit to the number of prepared payments a channel can have, the griefing must rely on actual amounts being committed, which prevents large attacks from being performed easily.
-
Rumple fixes Lightning's unsolvable reputation issues
In the Lightning Conference 2019, Rusty Russell promised there would be pre-payments on Lightning someday, since everybody was aware of potential spam issues and pre-payments would be the way to solve that. Fast-forward to November 2020 and these pre-payments have become an apparently unsolvable problem[^thread-402]: no one knows how to implement them reliably without destroying privacy completely or introducing worse problems.
Replacing these payments with tables of reputation between peers is also an unsolved problem[^reputation-lightning], for the same reasons explained in the thread above.
-
Rumple solves the hot wallet problem
Since you don't have to use Bitcoin keys or sign transactions with a Rumple node, only your channel trust is at risk at any time.
-
Rumple ends custodianship
Since no one is storing other people's funds, a big hub or wallet provider can be used in multiple payment routes, but it cannot be immediately classified as a "custodian". At best, it will be a big debtor.
-
Rumple is fun
Opening channels with strangers is boring. Opening channels with friends and people you trust even a little makes that relationship grow stronger and the trust be reinforced. (But of course, like it happens in the Lightning Network today, if Rumple is successful the bulk of trust will be from isolated users to big reliable hubs.)
Questions or potential issues
-
So many advantages, yes, but trusted? Custodial? That's easy and stupid!
Well, an enormous part of the current Lightning Network (and also onchain Bitcoin wallets) already rests on trust, mainly trust between users and custodial wallet providers like ZEBEDEE, Alby, Wallet-of-Satoshi and others. Worse: on the current Lightning Network users not only trust, they also expose their entire transaction history to these providers[^hosted-channels].
Besides that, as detailed in point 3 of the previous section, there are many unsolvable issues on the Lightning protocol that make each sovereign node dependent on some level of trust in its peers (and the network in general dependent on trusting that no one else will spam it to death).
So, given the current state of the Lightning Network, to trust peers like Rumple requires is not a giant change -- but it is still a significant change: in Rumple you shouldn't open a large trust channel with someone just because it looks trustworthy, you must personally know that person and only put in what you're willing to lose. In known brands that have reputation to lose you can probably deposit more trust, same for long-term friends, and that's all. Still it is probably good enough, given the existence of MPP payments and the fact that the purpose of Rumple is to be a payments network for day-to-day purchases and not a way to buy real estate.
-
Why would anyone run a node in this parallel chain?
I don't know. Ideally every server running a Rumple Network node will be running a Bitcoin node and a Rumple chain node. Besides using it to confirm and publish your own Rumple Network transactions it can be set to do BMM mining automatically and maybe earn some small fees comparable to running a Lightning routing node or a JoinMarket yield generator.
Also it will probably be very lightweight, as pruning is completely free and no verification-since-the-genesis-block will take place.
-
What is the maturity of the debt that exists in the Rumple Network or its legal status?
By default it is to be understood as being payable on demand for payments occurring inside the network (as credit can be used to forward or initiate payments by the creditor using that channel). But details of settlement outside the network or what happens if one of the peers disappears cannot be enforced or specified by the network.
Perhaps some standard optional settlement methods (like a Bitcoin address) can be announced and negotiated upon channel creation inside the protocol, but nothing more than that.
[^thread-402]: Read at least the first 10 messages of the thread to see how naïve proposals like you and me could have thought about are brought up and then dismantled very carefully by the group of people most committed to getting Lightning to work properly. [^reputation-lightning]: See also the footnote at Ripple and the problem of the decentralized commit. [^hosted-channels]: Although that second part can be solved by hosted channels.
-
@ dbb19ae0:c3f22d5a
2024-05-15 09:06:22Nostr is relatively new (compared to more established social media platforms). And building a user base takes time, but how could we help facilitate its growth?
-
@ 57d1a264:69f1fee1
2024-05-15 07:33:15Prompt: Giveaway ===============
Product giveaways are fun for brands and for customers.
Imagine a product you'd like to have and how you'd display it to incentivize customers to join.
Flex your design muscles and join in. Most of all, keep this exercise loose and keep it stress-free. The FUC is about growing our design skills, together, as a community. We can't wait to see what you create!
Happy designing, Stackers!
Share Your Results When you finish the challenge, post your work on this thread! If you also share it on
nostr
, be sure to use the hashtag #FUCdesiger and tag Design_r@iris.to or @Design__r on X! We'll keep an eye out and repost good examples on a regular basis.
Curious to know WTF is a FUC? Read the ⚡️Flash Ui Challenges welcoming post.
Looking for more FUCs? Check the archive here!
-
@ 66df6056:f3203c64
2024-05-02 06:49:46สร้าง Nostr Bot ด้วย Python
อะแฮ่ม ขอชี้แจงไว้ก่อนว่า ผมเขียนเพื่อให้ตัวเองอ่านเพื่อวันไหนจะกลับมาทำต่อจะได้พอจำได้ว่าตัวเองทำอะไรลงไปบ้าง เพราะงั้นบางส่วนในบทความนี้อาจจะไม่ละเอียด หากลองทำตามแล้วติดตรงไหนอยากสอบถาม ติดต่อมาได้ที่ Nostr Address: kritta@rightshift.to หรือลองค้นเพิ่มเติมใน link ท้ายบทความนะครับ
อย่างที่หลาย ๆ คนน่าจะทราบกันดีอยู่แล้วว่า Nostr เป็น open protocol ที่ใคร ๆ ก็สามารถเข้ามามีส่วนร่วมในการพัฒนาได้ ทำให้มีโปรเจคต่าง ๆ เกิดขึ้นมากมาย โดยบทความในชุดนี้ผมจะหยิบโปรเจคต่าง ๆ ที่น่าสนใจมามาลองเล่น และนำมาเล่าสู่กันฟัง หวังว่าผู้ที่หลงเข้ามาอ่านจะได้ประโยชน์จากสิ่งนี้นะครับ ;)
โดยในวันนี้โปรเจคที่ผมหยิบมาคือ NDK (Nostr development kit) ผมหาไม่เจอว่าใครเป็นคนเริ่มโปรเจค แต่คนที่ดูแล repo นี้หลัก ๆ คือคุณ yukibtc เริ่มต้นเหมือนจะเริ่มจาก RUST แต่ตอนนี้เหมือนจะแตกไป swift, java, python เอาจริง ๆ ผมไม่รู้หรอกว่าใครเป็นคนทำภาษาไหนเพราะ contributors เขาเยอะมาก แต่ก็นั่นแหละ ขอบคุณที่สร้างอะไรสนุก ๆ แบบนี้ออกมาให้ได้เล่นนะครับ
โดยอย่างแรกที่เราต้องเริ่มคือการสั่ง pip install ตัว nostr sdk เพื่อใช่งาน สำหรับคนที่ไม่มี python ในเครื่องก็ไปลง python ก่อนด้วยนะ หรือจะใช้ online ผ่าน google colab ลองเล่นดูก่อนก็ได้
pip install pip install nostr-sdk
จากนั้นเราก็จะสามารถใช้งาน Nostr_sdk ได้แล้ว!!! โดยการที่เราจะเข้ามาใช้งาน Nostr ได้นั้นเราจำเป็นต้องมี keys เพื่อเข้าสู่ระบบเสียก่อนงั้นเรามาเริ่มจากการสร้าง keys กันก่อน``` from nostr_sdk import Keys
เพียงคำสั่งนี้คำสั่งเดียวก็ได้ keys แล้วงั้นเหรอ!!
keys = Keys.generate()
แยก keys ออกเป็น secret key (sk) และ public key (pk)
sk = keys.secret_key() pk = keys.public_key()
ไหน ๆ ขอดู keys หน่อยสิ้
print(f"public key: {pk.to_bech32()}") print(f"Secret key: {sk.to_bech32()}")
output:
public key: npub1wkxaxzmmamc6h8n6ev7yq3y5qmqnyxmu0xmrllcepxup9tktuzrsu646r0
Secret key: nsec160gefyqkderqlnr545ps4d5th6pex3ducqgcev69z0rstqakkv9scvat97
``` note ถ้าสร้าง keys เสร็จแล้วเอาไปเก็บไว้ในพวก dot env จะปลอดภัยและสะดวกในการใช้ต่อมากกว่า
แล้วหลังจากได้ keys มาแล้วเราจำเป็นต้องกำหนด signer, client และ relay ที่เราจะใช้ในการรับ event ของเรา
```
กำหนด keys ที่เราพึ่งสร้างให้เป็นตัว sign event
signer = NostrSigner.keys(keys)
นำเข้า key ที่มีอยู่แล้ว
app_keys = Keys.parse("nsec......")
signer = NostrSigner.keys(app_keys)
หรือใช้ NIP46 signer
uri = NostrConnectUri.parse("bunker://.. or nostrconnect://..")
nip46 = Nip46Signer(uri, app_keys, timedelta(seconds=60), None)
signer = NostrSigner.nip46(nip46)
กำหนด client ให้ใช้ signer ตัวนี้ (feel like log in)
client = Client(signer)
เพิ่ม relays ที่จะเก็บ event
client.add_relays(["wss://relay.damus.io", "wss://siamstr.com", "wss://siamstr.com","wss://relay.notoshi.win"]) client.connect()
ตั้งชื่อให้ account เราสักหน่อยเพื่อเช็คด้วยว่า เราเชื่อมต่อ relay ต่าง ๆ ผ่านมั้ย
client.set_metadata(Metadata().set_name("Testing หลาม ๆ"))
``` หลังจากกำหนดทุกอย่างเรียบร้อยแล้ว เรามาลองสร้างโพสต์แรกกันเลยดีกว่า
```
tag เพื่อเอาไว้เติมส่วนต่าง ๆ นอกจาก เนื้อหาของโน๊ต เช่นการ mention การใส่ hashtag
p = mention
t = hashtag
tag = Tag.parse(["p", "66df60562d939ada8612436489945a4ecf1d62346b3d9478dea8a338f3203c64"])
ใส่เนื้อหาที่เราค้องการโพสต์
builder = EventBuilder.text_note("สวัสดีชาวทุ่ง ", [tag]) ส่ง event ไปให้ relay โลดดดด client.send_event_builder(builder) ``` แล้วนอกจากโพสต์ตระกูล kind:1 แล้วเรายังโพสต์ kind อื่น ๆ ได้ด้วย
```
ส่งจ้อความส่วนตัว
receiver_pk = PublicKey.from_bech32("npubคนรับ") event = EventBuilder.encrypted_direct_msg(keys, receiver_pk, "ข้อความ", None).to_event(keys) print(event.as_json())
templateเปล่า
kind = Kind(เลข kind) content = "..." tags = [] builder = EventBuilder(kind, content, tags)
POW
event = builder.to_pow_event(keys, 20) print(f"POW event: {event.as_json()}")
``` ส่วนตัวผมมองว่าส่วนนี้แหละคือส่วนที่สนุกที่สุดของวันนี้ เพราะเป็นจุดที่เราสามารถนำมันออกไปต่อยอดได้มากที่สุด เช่นการเชื่อมต่อกับ service อื่น ๆ เช่น mempool.space เพื่อส่งค่าฟี bitcoin ให้เราผ่านแชท, ทำเกมง่าย ๆ เล่นกับเพื่อน ๆ หน้า timeline อย่าง cowdle หรือ หวย อย่างที่เห็นกันไปในช่วงก่อนหน้านี้ หรือใช้ทำงานกรรมกรแทนเรา เช่นการแจก badges ที่ทาง rightshift ได้ทำไปก่อนหน้า, bot relay notoshi, zapbot และอีกต่าง ๆ มากมาย
filter
ตัว filter เป็นคำสั่งที่ช่วยเรากรอง event ที่จะขอจาก relay ใช้เพื่อรับเฉพาะ event ที่เราต้องการเท่านั้น
```
f = (Filter() .pubkey(keys.public_key()) .kinds([Kind(0), Kind.from_enum(KindEnum.TEXT_NOTE())]) .custom_tag(SingleLetterTag.lowercase(Alphabet.J), ["test"]) ) print(f.as_json())
output: {"kinds":[0,1],"#j":["test"],"#p":["758dd30b7beef1ab9e7acb3c40449406c1321b7c79b63fff1909b812aecbe087"]}
f = f.kind(Kind(4)).custom_tag(SingleLetterTag.lowercase(Alphabet.J), ["append-new"]) print(f.as_json()) {"kinds":[0,1,4],"#j":["test","append-new"],"#p":["758dd30b7beef1ab9e7acb3c40449406c1321b7c79b63fff1909b812aecbe087"]}
ตัวอย่างเช่นรับเฉพาะ event ของคนที่ใช้ notoshi relay
filter =Filter().kind(Kind(10002)).custom_tag(SingleLetterTag.lowercase(Alphabet.R), ["wss://relay.notoshi.win"]) events = client.get_events_of([filter], timedelta(seconds=30))
``` สองฟังก์ชันนี้เป็นตัวสำคัญในการทำบอทในส่วนต่อไปจะเป็นตัวเสริมต่าง ๆ ที่เพิ่มลูกเล่นให้บอทได้
Metadata
metadata มีไว้แก้ไขข้อมูลต่าง ๆ ในโปรไฟล์ของเรา
``` metadata = Metadata().set_name("username")\ .set_display_name("My Username")\ .set_about("Description")\ .set_picture("https://example.com/avatar.png")\ .set_banner("https://example.com/banner.png")\ .set_nip05("username@example.com")\ .set_lud16("username@example.com")
name = ชื้อผู้ใช่
display_name = ชื่อที่จะแสดงให้คนอื่นเห็น (ถ้าช่องนี้ว่างมักจะโชว์ชื่อที่ใว่ในช่อง name)
about = bio
picture = รูปโปรไฟล์
banner = รูปปก
nip05 = Nostr addr
lud16 = Lightning addr
```
NWC
NWC หรือ Nostr wallet connection มีไว้ใช้ในการเชื่อมต่อกับกระเป๋า ln ของเราเพื่อคุมกระเป๋าของเราผ่าน Nostr
```
นำ NWC uri มาวาง
uri = NostrWalletConnectUri.parse("nostr+walletconnect://..")
สร้าง client ในรูปแบบที่เพิ่มการ zap
keys = Keys.generate() signer = NostrSigner.keys(keys) zapper = NostrZapper.nwc(uri) client = ClientBuilder().signer(signer).zapper(zapper).build()
client.add_relay("wss://relay.damus.io") client.connect()
pk = PublicKey.from_bech32(" npub คนรับ") client.zap(ZapEntity.public_key(pk), 1000, None)
```
Bot template
```
from nostr_sdk import Client, NostrSigner, Keys, Event, UnsignedEvent, Filter, \ HandleNotification, Timestamp, nip04_decrypt, UnwrappedGift, init_logger, LogLevel, Kind, KindEnum import time
init_logger(LogLevel.DEBUG)
sk = SecretKey.from_bech32("nsec1ufnus6pju578ste3v90xd5m2decpuzpql2295m3sknqcjzyys9ls0qlc85")
keys = Keys(sk)
OR
keys = Keys.parse("nsec1ufnus6pju578ste3v90xd5m2decpuzpql2295m3sknqcjzyys9ls0qlc85")
sk = keys.secret_key() pk = keys.public_key() print(f"Bot public key: {pk.to_bech32()}")
signer = NostrSigner.keys(keys) client = Client(signer)
client.add_relay("wss://relay.damus.io") client.add_relay("wss://nostr.mom") client.add_relay("wss://nostr.oxtr.dev") client.connect()
now = Timestamp.now()
nip04_filter = Filter().pubkey(pk).kind(Kind.from_enum(KindEnum.ENCRYPTED_DIRECT_MESSAGE())).since(now) nip59_filter = Filter().pubkey(pk).kind(Kind.from_enum(KindEnum.GIFT_WRAP())).since( Timestamp.from_secs(now.as_secs() - 60 * 60 * 24 * 7)) # NIP59 have a tweaked timestamp (in the past) client.subscribe([nip04_filter, nip59_filter], None)
class NotificationHandler(HandleNotification): def handle(self, relay_url, subscription_id, event: Event): print(f"Received new event from {relay_url}: {event.as_json()}") if event.kind().match_enum(KindEnum.ENCRYPTED_DIRECT_MESSAGE()): print("Decrypting NIP04 event") try: msg = nip04_decrypt(sk, event.author(), event.content()) print(f"Received new msg: {msg}") client.send_direct_msg(event.author(), f"Echo: {msg}", event.id()) except Exception as e: print(f"Error during content NIP04 decryption: {e}") elif event.kind().match_enum(KindEnum.GIFT_WRAP()): print("Decrypting NIP59 event") try: # Extract rumor unwrapped_gift = UnwrappedGift.from_gift_wrap(keys, event) sender = unwrapped_gift.sender() rumor: UnsignedEvent = unwrapped_gift.rumor()
# Check timestamp of rumor if rumor.created_at().as_secs() >= now.as_secs(): if rumor.kind().match_enum(KindEnum.SEALED_DIRECT()): msg = rumor.content() print(f"Received new msg [sealed]: {msg}") client.send_sealed_msg(sender, f"Echo: {msg}", None) else: print(f"{rumor.as_json()}") except Exception as e: print(f"Error during content NIP59 decryption: {e}") def handle_msg(self, relay_url, msg): None
abortable = client.handle_notifications(NotificationHandler())
Optionally, to abort handle notifications look, call abortable.abort()
while True: time.sleep(5.0) # abortable.abort() ```
ผมหวังว่าบทความนี้จะมีประโยชน์กับคนอ่าน และคาดหวังที่จะได้เห็น service ต่าง ๆ ที่สร้างสรรค์เกิดขึ้นหลังจากนี้ Link เพิ่มเติมที่สำหรับศึกษาต่อ
- https://github.com/rust-nostr/nostr/tree/master
- https://github.com/nostr-protocol/nips
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Scala is such a great language
Scala is amazing. The type system has the perfect balance between flexibility and powerfulness.
match
statements are great. You can write imperative code that looks very nice and expressive (and I haven't tried writing purely functional things yet). Everything is easy to write and cheap and neovim integration works great.But Java is not great. And the fact that Scala is a JVM language doesn't help because over the years people have written stuff that depends on Java libraries -- and these Java libraries are not as safe as the Scala libraries, they contain reflection, slowness, runtime errors, all kinds of horrors.
Scala is also very tightly associated with Akka, the actor framework, and Akka is a giant collection of anti-patterns. Untyped stuff, reflection, dependency on JVM, basically a lot of javisms. I just arrived and I don't know anything about the Scala history or ecosystem or community, but I have the impression that Akka has prevent more adoption of Scala from decent people that aren't Java programmers.
But luckily there is a solution -- or two solutions: ScalaJS is a great thing that exists. It transpiles Scala code into JavaScript and it runs on NodeJS or in a browser!
Scala Native is a much better deal, though, it compiles to LLVM and then to binary code and you can have single binaries that run directly without a JVM -- not that the single JARs are that bad though, they are great and everybody has Java so I'll take that anytime over C libraries or NPM-distributed software, but direct executables even better. Scala Native just needs a little more love and some libraries and it will be the greatest thing in a couple of years.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Personagens de jogos e símbolos
A sensação de "ser" um personagem em um jogo ou uma brincadeira talvez seja o mais próximo que eu tenha conseguido chegar do entendimento de um símbolo religioso.
A hóstia consagrada é, segundo a religião, o corpo de Cristo, mas nossa mente moderna só consegue concebê-la como sendo uma representação do corpo de Cristo. Da mesma forma outras culturas e outras religiões têm símbolos parecidos, inclusive nos quais o próprio participante do ritual faz o papel de um deus ou de qualquer coisa parecida.
"Faz o papel" é de novo a interpretação da mente moderna. O sujeito ali é a coisa, mas ele ao mesmo tempo que é também sabe que não é, que continua sendo ele mesmo.
Nos jogos de videogame e brincadeiras infantis em que se encarna um personagem o jogador é o personagem. não se diz, entre os jogadores, que alguém está "encenando", mas que ele é e pronto. nem há outra denominação ou outro verbo. No máximo "encarnando", mas já aí já é vocabulário jornalístico feito para facilitar a compreensão de quem está de fora do jogo.
-
@ 20986fb8:cdac21b3
2024-04-30 12:56:52Improving the Availability and Reliability of the Relay Network
Wendy Ding
YakiHonne is committed to creating a censorship-resistant decentralized media. A sufficiently decentralized and immutable storage layer is key to achieving this goal. The relay network based on the Nostr protocol provides an excellent censorship-resistant storage solution. Relay serves as an intermediary in message storage and broadcasting, allowing users to self-host relays and to choose which relays to broadcast information freely. If a relay refuses service or shuts down, other relays can continue propagating the information(fiatjaf.2019). This mechanism turns shadow banning into a "whack-a-mole" game, making it nearly impossible to completely block users through a specific data source, thereby providing a space for free speech for many controversial topics and creators.
Despite providing a simple and effective architecture for social media censorship resistence, existing relay networks face two major challenges to scale and sustain. First, the relay network lacks incentives, without which the stability and availability of the relay network will suffer. The censorship-resistant network relies on numerous distributed and available relays and wider usage of relay to ensure free flow of information(Rabble,2024). Second, although the core function of a relay is to store and distribute information in a decentralized manner, they cannot guarantee the immutability of information. Therefore, relay nodes are able to manipulate or delete information.
In this article, we will focus on how to solve these two issues by introducing economic incentives and attestation mechanism, thereby enhancing the availability and reliability of the relay network, ensuring that it provides solid support for decentralized media.
Nostr Protocol is Decentralized
The design of Nostr involves the separation of user accounts, relays, and clients from each other, free from any entity's control and censorship. Users can host relays, and content can be stored and retrieved across multiple relays. Even if certain relays refuse service or shut down, other relays can still store and propagate information. This differs from Fediverse applications such as Mastodon and Bluesky, and is certainly different from "Web3" social media protocols like Farcaster.
- In Mastodon, user accounts are tied to servers controlled by administrators, thus instance owners can ban users and have the authority to block other instances, implementing censorship (Rozenshtein,2023).
- Although Bluesky promotes itself as an open and decentralized network, it is misleading(Fiatjaf:Bluesky, 2023): Bluesky directly controls the atproto protocol, which allows Bluesky to change the protocol at any time; Bluesky's identity system relies on a central server to maintain and authenticate global IDs, allowing Bluesky to control and potentially ban any user; even if users can host their own content, all content must be distributed through Bluesky's central server. Moreover, Bluesky's design does not encourage or support effective interoperability with other clients. This means if users are dissatisfied with Bluesky, their options are very limited.
- Farcaster relies on large Hubs to store all user data, and these Hubs will grow increasingly larger. These Hubs' power to censor and disseminate data cannot be underestimated. As the network expands, storage demands and costs surge dramatically. It is estimated that if Farcaster's daily active users grow by 5% per week, the cost of running a Hub will reach $3,500 per year by 2024, and will soar to $6.9 million per year by 2027 (Varun,2022). The high operating costs mean that only a few companies can manage Hubs, leading to a decrease in the number of Hubs and an increased risk of network centralization. Additionally, Hub operators may collude to lower the priority of certain content or to censor it (Varun,2022). In contrast, Nostr encourages a mix of large Hubs and smaller relays built for specific purposes,as shown in Figure 1. These small relays can be established by large publishers, small organizations, or hackers, maintaining the network’s decentralization and openness (Hodlbod:Outbox,2024).
*Figure 1. Farcaster Hub vs Nostr Relay
This is indeed the case. Gareth Tyson et al., using a dataset from July 1, 2023, to December 31, 2023, comprising 17.8 million posts, 1.5 million pubkeys, and 712 relays, analyzed the decentralization of Nostr and found that the distribution of posts and users on relays and relay hosting exhibited a high degree of decentralization. This demonstrates that the technical architecture of the Nostr protocol is superior to that of all existing decentralized media protocols.
- Posts and users are not highly concentrated on individual relays but are widely distributed, As shown in Figure 2. 93% of posts can be found across multiple relays, with 178 relays, or 25% of all relays, hosting more than 5% of the posts each. According to user count statistics, even if the top 50 relays were shut down, 90% of the content would still be accessible. Similarly, based on post count statistics, shutting down the top 30 relays would still maintain accessibility to over 90% of the content. Even removing the top 50 relays would still leave 71% of the content accessible, as shown in Figure 3.1.
*Figure 2. The percentage of relays, posts, and users in the top 15 regions and ASes, ranked by the number of relays. Source: Gareth Tyson et al. (2024), "Exploring the Nostr Ecosystem: A Study of Decentralization and Resilience," arXiv preprint arXiv:2402.05709.
- The decentralization of relay hosting across regions and autonomous systems(AS). Relays are distributed across 50 countries and 151 autonomous systems(ASes), as shown in Figure 4. Surprisingly, no single country or autonomous system hosts over 25% of relays. Over 80% of posts remain available after removing the top 10 ASes, as shown in Figure 3.2. Taking Mastodon as an example, post availability drops to less than 10% after removing the top 10 ASes hosting instances (Raman et al., 2019). This is mainly due to the more even distribution of relays across different ASes, making them more resilient to failures in individual AS.
*Figure 3.1 Top X Relays Removed; Figure 3.2 Top X ASes Removed. Source: See Figure 2.
*Figure 4. The distribution of Relay numbers across different countries. Data from Nostr.Watch
Analysis of Relay Availability
Relay is the soul of the Nostr protocol's decentralization. To build a truly usable censorship-resistant relay network, two conditions must be met: relay nodes must be sufficiently distributed and available to ensure the free storage and dissemination of information; even small-scale relay nodes should be widely discovered and utilized.
As of April 23. 2024, there are only 639 relays online globally, a two-thirds reduction from the same period last year, predominantly distributed in North America and Europe, which together host 80% of these relays. Additionally, due to differences in network conditions, the performance of relays varies significantly across regions. For instance, tests in Singapore have shown notable differences in response times among relays in Asia, North America, and Europe, as shown in Figure 5.Moreover, a pronounced head effect is evident , with the top relay hosting 73% of the posts. Although these posts are available across multiple relays, Nostr remains highly decentralized (fiatjaf:Nostr,2024). However, this concentration of usage does not favor the wide discovery and use of smaller relay nodes or the visibility of users, reducing the incentive to build small relay nodes, especially in an ecosystem lacking incentives.
*Figure.5 Relay availability testing. Data from Nostr Watch.
- The reduction in the number of relays and their instability are primarily due to the lack of effective economic incentives (Shinobi:Nostr Scale,2023). Within the Nostr ecosystem, because clients often lack stable income or financial support, it becomes difficult to provide effective incentives for relays. Most relays rely on personal interest or restrictive paid models to maintain operations. These paid models limit specific users' write or even read access, contradicting the initial anti-censorship intent and weakening economic interactions between clients and relays. Currently, 95% of relays struggle to cover operational costs, and 20% have experienced significant downtime due to lack of financial support (Gareth Tyson et al., 2024).
- The discovery and follow mechanisms of relays cause those with higher usage to be more easily discovered by users. These relays are often operated by well-known clients or developers, thereby attracting more users. Ensuring that more small relays are widely discovered and used is a key factor in maintaining the censorship resistance and activity of the relay network. The Nostr ecosystem is working to improve the discovery and follow mechanisms of relays through the Gossip Model, Outbox model, and Blastr. The challenge or key aspect of these models is optimizing the discoverability and coverage among relay users without over-replicating and redundantly retrieving posts, ensuring broad content dissemination (Hodlbod:Outbox,2024). However, achieving this goal requires better collaboration and consensus among Nostr developers. Currently, due to the lack of sufficient incentives, Nostr developers focus more on their own client design ideas, neglecting efficiency and compatibility with various existing user types, and even causing confusion in the development of other clients.
Potential Incentive Measures for Relays
The key to resolving the availability issues of the relay network lies in clearly identifying who will continuously pay for its operational costs. Only when the relay network can be profitable or at least cover its operational costs can it maintain long-term scalability and prosperity. The primary cost of operating a relay comes from server storage expenses. To ensure content availability, content is simultaneously published and repeatedly retrieved across multiple relays(Shinobi:Relay,2023), which further increases traffic consumption and operational costs. However, this is crucial for decentralization and ensuring data reliability. Currently, the main sources of income for relays are donations and paid posts, but 95% of relays struggle to sustain their operational costs through publishing donations. Therefore, this section will primarily explore potential solutions to cover the operational costs of relays.
1. Client Pays for Storage Costs
Clients are encouraged to create paid products or cover relay’s storage costs through their financial budgets. This approach helps in exploring the diversity of monetizing decentralized media and facilitates the formation of economic consensus between relay and its clients, thereby establishing incentive mechanisms for relay, as illustrated in Figure 6.
*Figure 6. Incentive mechanisms between clients and the relays
In a previous article, we discussed two pillars of decentralized media of YakiHonne: decentralized publishing and decentralized review. The former guarantees that content will never be lost; the latter creates a new cost-incentive model to ensure that when content and moderation become permissionless, the platform can still maintain truthfulness and cost-effectiveness. Currently, YakiHonne supports various forms of decentralized publishing, including articles, flash news, curations, videos, and uncensored notes. Content review through uncensored notes further promotes YakiHonne's monetization and decentralization. In YakiHonne, publishing flash news requires a minimum payment of 800 sats, with some revenue used to incentivize relay operations and support uncensored notes. For long-form content, payment of relay's storage fees can be made through subscriptions, advertisements, or even the client's financial budget, as shown in Figure 7.
**Figure 7. Incentive mechanisms between YakiHonne and the relays
2. Direct Income for Relays
In Nostr, the development of relays focuses more on performance optimization rather than the development of new features. Relays could potentially enhance revenue by offering specific relay functions and storing various types of events. Earning income through specific functions requires widespread adoption by clients and relays, otherwise, it may lead to the risk of centralization or implementation failure (Hodlbod: relay Function,2023 ). Earning income by storing different types of events could be a viable option. While maintaining openness to various content, relays can use keyword filters during data retrieval to display specific topics, thus promoting a subscription-based payment model. Additionally, relays and clients can form revenue-sharing agreements on subscription fees, which not only helps increase income but also promotes economic consensus between the two parties.
Attesting content on relays
The redundancy in content storage ensures high availability of content but does not fully guarantee its immutability. In practice, it is possible for relays to tamper with contents or delete information by influencing certain relay nodes. To address this issue, we need to introduce a complementary attestation mechanism to enhance the reliability of the current relay systems.
There are various methods to implement this proof. As the most decentralized social media base-layer protocol, Nostr is well recognized within the Bitcoin community. However, to really use the Bitcoin network to validate information in technical sense has not been disccussed yet. If content hosted on the Nostr network should ever be attested, it should happen on the Bitcoin network.
To attest and validate large amount of content on the Nostr relay network, it's not economically viable to attest every post / every NIP-23 article on the Bitcoin network. Data should be compressed and organized efficiently before being attested. The merkle tree is an efficient and secure data verification mechanism. The accuracy of the data can be verified using only the merkle root and the related hash paths, as shown in Figure 8. Therefore, a final attestation over a large amount of content can be one merkle root submission to the Bitcoin network. Once submitted, all content represented under this merkle root becomes immutable.
**Figure 8. Hashed content on Merkle Tree
When it is necessary to verify whether the content stored on a relay has been unaltered, the content is first retrieved from the relay and its hash value recalculated. Then, using this hash value and other related intermediate hash values, verification proceeds up the Merkle tree until reaching the Merkle root recorded on the Bitcoin blockchain. Finally, by comparing this computed Merkle root with the root hash recorded on the blockchain, the integrity and authenticity of the content are confirmed. The process is depicted in Figure 9.
**Figure 9. Attesting content on relays
Repeating this process will eventually make sure all attested content is genuine. As a result, relays will provide content availability and redundancy, while the Bitcoin network validate Nostr content in batches.
Conclusion
The relay network is one of the core infrastructures that YakiHonne uses to build decentralized media. Through data analysis of Nostr's decentralization features, it has been found that Nostr's technical architecture has made it the most decentralized media protocol currently available. However, due to the lack of effective economic incentives, the relay network faces challenges in availability. This article explores several potential economic incentive models for relays. Despite many uncertainties and challenges, the importance of sustained incentives in combating censorship networks is clear. Additionally, considering the current lack of immutability in the relay network, we propose an attestation mechanism to enhance the reliability of the relay system. Improving relays reliability and availability will help promote the scalability and prosperity of the entire relay ecosystem, providing solid support for building decentralized media.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Veterano não é dono de bixete
"VETERANO NÃO É DONO DE BIXETE". A frase em letras garrafais chama a atenção dos transeuntes neófitos. Paira sobre um cartaz amarelo que lista várias reclamações contra os "trotes machistas", que, na opinião do responsável pelo cartaz, "não é brincadeira, é opressão".
Eis aí um bizarro exemplo de como são as coisas: primeiro todos os universitários aprovam a idéia do trote, apoiam sua realização e até mesmo desejam sofrer o trote -- com a condição de o poderem aplicar eles mesmos depois --, louvam as maravilhas do mundo universitário, onde a suprema sabedoria se esconde atrás de rituais iniciáticos fora do alcance da imaginação do homem comum e rude, do pobre e do filhinho-de-papai das faculdades privadas; em suma: fomentam os mais baixos, os mais animalescos instintos, a crueldade primordial, destroem em si mesmos e nos colegas quaisquer valores civilizatórios que tivessem sobrado ali, ficando todos indistingüíveis de macacos agressivos e tarados.
Depois vêm aí com um cartaz protestar contra os assédios -- que sem dúvida acontecem em larguíssima escala -- sofridos pelas calouras de 17 anos e que, sendo também novatas no mundo universitário, ainda conservam um pouco de discernimento e pudor.
A incompreensão do fenômeno, porém, é tão grande, que os trotes não são identificados como um problema mental, uma doença que deve ser tratada e eliminada, mas como um sintoma da opressão machista dos homens às mulheres, um produto desta civilização paternalista que, desde que Deus é chamado "o Pai" e não "a Mãe", corrompe a benéfica, pura e angélica natureza do homem primitivo e o torna esta tão torpe criatura.
Na opinião dos autores desse cartaz é preciso, pois, continuar a destruir o que resta da cultura ocidental, e então esperar que haja trotes menos opressores.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Que vença o melhor
Nos esportes e jogos em geral, existe uma constante preocupação em balancear os incentivos e atributos do jogo, as regras do esporte em si e as regras das competições para que o melhor vença, ou, em outras palavras, para que sejam minimizados os outros fatores exceto a habilidade mais pura quanto possível no jogo em questão.
O mundo fora dos jogos, porém, nem sempre pode ter suas regras mudadas por um ente que as controla e está imbuído da vontade e dos meios para escolher as melhores regras possíveis para a obtenção dos resultados acima. Aliás, é muitas vezes essa possibilidade é até impensável. Mesmo quando ela é pensável e levada em conta os fatores que operam no mundo real não são facilmente identificáveis, eles são muitos, e mudam o tempo todo.
Mais do que isso, ao contrário de um jogo em que o objetivo é praticamente o mesmo para todo mundo, os objetivos de cada agente no mundo real são diferentes e incontáveis, e as "competições" que cada um está disputando são diferentes e muitas, cada minúsculo ato de suas vidas compreendendo várias delas simultaneamente.
Da mesma forma, é impossível conceber até mesmo o conceito de "melhor" para que se deseje que ele vença.
Mesmo assim é comum encontrarmos em várias situações gente que parte do princípio de que se Fulano está num certo lugar (por exemplo, um emprego muito bom) e Beltrano não isso se deve ao fato de Fulano ter sido melhor que Beltrano.
Está aí uma crítica à idéia da meritocracia (eu tinha me esquecido que essa palavra existia).
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Token-Curated Registries
So you want to build a TCR?
TCRs (Token Curated Registries) are a construct for maintaining registries on Ethereum. Imagine you have lots of scissor brands and you want a list with only the good scissors. You want to make sure only the good scissors make into that list and not the bad scissors. For that, people will tell you, you can just create a TCR of the best scissors!
It works like this: some people have the token, let's call it Scissor Token. Some other person, let's say it's a scissor manufacturer, wants to put his scissor on the list, this guy must acquire some Scissor Tokens and "stake" it. Holders of the Scissor Tokens are allowed to vote on "yes" or "no". If "no", the manufactures loses his tokens to the holders, if "yes" then its tokens are kept in deposit, but his scissor brand gets accepted into the registry.
Such a simple process, they say, have strong incentives for being the best possible way of curating a registry of scissors: consumers have the incentive to consult the list because of its high quality; manufacturers have the incentive to buy tokens and apply to join the list because the list is so well-curated and consumers always consult it; token holders want the registry to accept good and reject bad scissors because that good decisions will make the list good for consumers and thus their tokens more valuable, bad decisions will do the contrary. It doesn't make sense, to reject everybody just to grab their tokens, because that would create an incentive against people trying to enter the list.
Amazing! How come such a simple system of voting has such enourmous features? Now we can have lists of everything so well-curated, and for that we just need Ethereum tokens!
Now let's imagine a different proposal, of my own creation: SPCR, Single-person curated registries.
Single-person Curated Registries are equal to TCR, except they don't use Ethereum tokens, it's just a list in a text file kept by a single person. People can apply to join, and they will have to give the single person some amount of money, the single person can reject or accept the proposal and so on.
Now let's look at the incentives of SPCR: people will want to consult the registry because it is so well curated; vendors will want to enter the registry because people are consulting it; the single person will want to accept the good and reject the bad applicants because these good decisions are what will make the list valuable.
Amazing! How such a single proposal has such enourmous features! SPCR are going to take over the internet!
What TCR enthusiasts get wrong?
TCR people think they can just list a set of incentives for something to work and assume that something will work. Mix that with Ethereum hype and they think theyve found something unique and revolutionary, while in fact they're just making a poor implementation of "democracy" systems that fail almost everywhere.
The life is not about listing a set of "incentives" and then considering the problems solved. Almost everybody on the Earth has the incentive for being rich: being rich has a lot of advantages over being poor, however not all people get rich! Why are the incentives failing?
Curating lists is a hard problem, it involves a lot of knowledge about the problem that just holding a token won't give you, it involves personal preferences, politics, it involves knowing where is the real limit between "good" and "bad". The Single Person list may have a good result if the single person doing the curation is knowledgeable and honest (yes, you can game the system to accept your uncle's scissors and not their competitor that is much better, for example, without losing the entire list reputation), same thing for TCRs, but it can also fail miserably, and it can appear to be good but be in fact not so good. In all cases, the list entries will reflect the preferences of people choosing and other things that aren't taken into the incentives equation of TCR enthusiasts.
We don't need lists
The most important point to be made, although unrelated to the incentive story, is that we don't need lists. Imagine you're looking for a scissor. You don't want someone to tell if scissor A or B are "good" or "bad", or if A is "better" than B. You want to know if, for your specific situation, or for a class of situations, A will serve well, and do that considering A's price and if A is being sold near you and all that.
Scissors are the worst example ever to make this point, but I hope you get it. If you don't, try imagining the same example with schools, doctors, plumbers, food, whatever.
Recommendation systems are badly needed in our world, and TCRs don't solve these at all.
-
@ 88cc134b:5ae99079
2024-04-30 12:29:04This is just a test of how a long form would look like. A need a new note, some old stuff I can find doesn't do it for me.
So here I am typing away... I apologize for the spamming and bad grammar, if there is any. The problem with not being good at English grammar and spelling is that you are unaware of the mistakes you make until someone points them out to you. By which time it's too late.
One good thing about the editor I'm typing this in is that it seems to have a grammar check, which is cool.
Well, I won't keep you any longer, after all this was just a test.
Bye!
-
@ 1931b5e4:168a0489
2024-05-15 06:24:40After posting the final chapter of the book I have written Finally Free it got me thinking...
I have always been told that I cannot publish, firstly due to the subject nature and secondly, I may find myself in a legal battle with the people involved.
Because of that, the book has been kept in its rawest form... and even though, a part of me would like to keep it that way, if I ever did decide to publish, I want it to be readable. Basically, the content in it - needs to be written in a way that people still know what is happening, without it being so "in your face".
The questions I find myself asking and now searching for answers are:
- How do I find an editor with a strong enough stomach to be able to help me with this?
- Is there a way that I can publish without getting into legal battles? Or...
- Do I just keep the book to myself until the people involved are no longer here?
And then I start to ask:
- Why have we created a world which stops us from being able to have a voice?
One thing I won't do... publish anonymously!
Here is the opening of my book... this is the only other part I know I can safely post.
Imagine being told that you only existed because your dad had raped your mum. You were unwanted. That is what just happened to me.
I was fourteen years old, and it was a big day. We were off to court. Finally, someone had listened to me and I was about to get some kind of recognition for what was happening to me. It wasn’t enough, but it was something. I had learnt a long time ago that the world wasn’t fair or just. I learnt you didn’t win against the bad guys like you did in storybooks. Good does not always prevail; in fact, being a good and honest person often makes you a target. So, when someone believed you or even more rarely, when someone wanted to help, you would cling onto that and be thankful, be grateful.
I was sat in the car with my mum as she was driving, and I remember thinking that it was a weirdly deceiving day. You know the ones where it’s chilly outside, but from your house or the car it looks like a hot sunny day? I was wearing a golden coloured blouse I had borrowed from her that morning. I wanted to look smart in front of the judge. I wanted the world to see that I was not being destroyed, and that I was all grown up and could look after myself.
I sat quietly. I knew it was best not to say anything right now. I was in a good mood; I felt peaceful, and I didn’t want that to go away. I closed my eyes and I let the sun wash over my face so that I could feel the rays. The warmth of them felt calming, as though they were giving me a big hug.
Suddenly, the car came to a halt. We had stopped. We had hit traffic and my mum was not happy about it. She got flustered and her face morphed into what I called, her evil twin. She was a beautiful woman with the loveliest smile and her hair always looked good; but when her mood changed, her face would morph and turn her almost witch-like. She had a grey coloured front tooth from an accident she had been in when she was a child and it seemed to be more noticeable when she changed. Her eyes would go dark; as though death itself ran through her and she looked possessed. It didn’t help either that she had a mole on her nose, which looked like it was twitching whenever she spoke.
I had become accustomed to these changes over the years, so I just sat there waiting to see what would happen. There was no point in me saying or doing anything. I just had to ride the wave until it had passed.
The sun went in and there was no more warming hug on my face. The air seemed to go cold even inside the car where minutes earlier it had been so warm.
“Typical!” she said in a high pitched flustered tone. “Just what I need today.”
I wanted to ask her what the matter was, but I just sat there, waiting. I knew we were stuck in traffic, but we had set off in good time, so there was no real chance of us being late. But I stayed quiet, waiting for what I knew was coming.
“Do you not think that I have better things to be doing with my time than driving you up here? And now look, we are stuck in traffic! It’s like wherever you go you bring bad luck. You’ve always been the same. With him, and even before that with your real dad, you just have a way of bringing trouble. I can’t wait for this to be over with and then I can just get on with my life. Promise me, that there won’t be anymore trouble from now on.”
I still stayed silent. How could I answer that? I was used to these kinds of comments, but I picked up on something different here; it was as though she was hiding something from me. So after a while, I plucked up the nerve to start a conversation.
“What do you mean, even with my real dad?”
At the time, I knew little about my real dad. Mainly what my mum had told me, as he had all but disappeared from my life when I was three years old.
I knew he had a temper, as my first memory of him was him throwing a table across the room at me because I had spilled a cup of tea over, but other than that, I was pretty clueless. I didn’t realise that I was clueless, though. I would listen to every bad word that my mum had to say about him and over the years, my hatred for him grew. How could he live five minutes away from me and not come and rescue me? Was I really that bad? Was I really that unlovable? What did my mum mean?
I asked her again, as she had ignored me the first time.
“Oh, it doesn’t matter.”
“Yes, it does. What did you mean?”
She looked really flustered now and just blurted out in a rather angry tone, “He raped me, you know?”
Well, no, I didn’t know.
"You aren’t the only one who has gone through things, but you don’t see me complaining, do you?”
Well, yes actually. All the bloody time. All she ever did was complain, but this was not the time to say that. I didn’t know what to say. I never really knew what to say to her. In fact, that’s a lie. I knew exactly what I wanted to say; it was just all in my head. Often I would evaluate my day and have arguments with her when I was lying in my bed at night, unable to sleep. I could do anything in my own thoughts; I could be who I wanted to be, say what I wanted to say, and there were no repercussions. But in reality, that was not the case and staying silent was a tactic I had found worked to stop me getting into trouble, and to stop me feeling the pain of her vicious words.
Eventually, she carried on.
“Yeah, that’s why you are here...
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28neuron.vim
I started using this neuron thing to create an update this same zettelkasten, but the existing vim plugin had too many problems, so I forked it and ended up changing almost everything.
Since the upstream repository was somewhat abandoned, most users and people who were trying to contribute upstream migrate to my fork too.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Precautionary Principle
The precautionary principle that people, including Nassim Nicholas Taleb, love and treat as some form of wisdom, is actually just a justification for arbitrary acts.
In a given situation for which there's no sufficient knowledge, either A or B can be seen as risky or precautionary measures, there's no way to know except if you have sufficient knowledge.
Someone could reply saying, for example, that the known risk of A is tolerable to the unknown, probably magnitudes bigger, risk of B. Unless you know better or at least have a logical explanation for the risks of B (a thing "scientists" don't have because they notoriously dislike making logical claims), in which case you do know something and is not invoking the precautionary principle anymore, just relying on your logical reasoning – and that can be discussed and questioned by others, undermining your intended usage of the label "precautionary principle" as a magic cover for your actions.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28On "zk-rollups" applied to Bitcoin
ZK rollups make no sense in bitcoin because there is no "cheap calldata". all data is already ~~cheap~~ expensive calldata.
There could be an onchain zk verification that allows succinct signatures maybe, but never a rollup.
What happens is: you can have one UTXO that contains multiple balances on it and in each transaction you can recreate that UTXOs but alter its state using a zk to compress all internal transactions that took place.
The blockchain must be aware of all these new things, so it is in no way "L2".
And you must have an entity responsible for that UTXO and for conjuring the state changes and zk proofs.
But on bitcoin you also must keep the data necessary to rebuild the proofs somewhere else, I'm not sure how can the third party responsible for that UTXO ensure that happens.
I think such a construct is similar to a credit card corporation: one central party upon which everybody depends, zero interoperability with external entities, every vendor must have an account on each credit card company to be able to charge customers, therefore it is not clear that such a thing is more desirable than solutions that are truly open and interoperable like Lightning, which may have its defects but at least fosters a much better environment, bringing together different conflicting parties, custodians, anyone.
-
@ 1c6b3be3:73f0ae6f
2024-05-15 04:01:19Releases - No Bullshit Bitcoin
Sparrow Wallet v1.9.1: Testnet4 Support (1 min) Sparrow Wallet version 1.9.1 has been released with new features and bug fixes. The update includes support for Testnet4, an alternative Bitcoin blockchain used for testing, which is not yet finalized and may be reset with a new genesis block at any time. This release also adds the ability to extend a wallet's gap limit where necessary for signing PSBTs and includes a public Electrum server from @mempool for Testnet4. Other updates include the option to show output descriptor QR export as BBQR when Coldcard, software, or watch-only keystores are present, and several bug fixes related to multisig output descriptor threshold parsing, premature decompression of BBQR zlib parts, signing regression on PSBTs with external inputs, wallet loading failure icon color in tab label when using dark theme, and exporting Electrum wallets with only USB capable hardware wallets as hardware keystore types. The project's developer also mentioned updates to Coldcard import and export instructions to match the latest firmware, and changing the default derivation path for 'unknown' Unchained signer.
🍵 "btc | bitcoin | lightning network | asic" - Google News
Bitcoin's Lightning Network In Every App: Breez CEO's Vision - Bitcoin Magazine Cryptocurrency: “Mass Institutional Adoption” Underway, with Bitcoin, BlockDAG Network, and Ethereum Value Surge - Yahoo Finance TON Outperforms Bitcoin By 118%: What’s Driving The Network? - CoinGape Deciphering The Enigma: What Are Runes in Bitcoin? - Yonkers Times Bitcoin hash rate dips as miners turn off unprofitable ASICs post-halving - Cointelegraph Bitcoin: very positive forecasts on Lightning Network - The Cryptonomist Jack Dorsey Donates $21M Towards Bitcoin and Open-Source Development - Observer Can Bitcoin's latest halving usher in a greener future for mining? - ZME Science Lightspark CEO David Marcus: Lightning Network Will Become the World's 'Interoperability Neutral Settlement Layer ... - Bitcoin.com News Crypto analysts debate bitcoin's ongoing dominance as calls for innovation abound - TheStreet Bitcoin’s Future Is ‘Bleak’ and Ripe for Regulation, Core Developer Says - Decrypt Bitcoin Hashrate Dips Post-Halving, Here's Why - Coinspeaker Bitcoin Meme Coin Protocol Runes Sees Dim Traction Amid Falling BTC Prices - CoinDesk
-
@ 502ab02a:a2860397
2024-04-30 08:20:21สตอรี่ ชีสเค้ก (Story Cheesecake) : ep1 เกริ่นนำ …
ว่ากันตามตรงอายุของ เจแปนนิสชีสเค้ก สูตรที่ เอ๋ เผยแพร่เอาไว้นั้นมันนานมากกก ก.ไก่ล้านตัว ทุกวันนี้สูตรก็แพร่ออกไปกว้างขวาง และยังคงมีเพื่อนๆเข้ามาถามหลังไมค์มากมาย บ้างก็ส่งการบ้าน บ้างก็มีจุดอยากจะแชร์ไอเดีย เรียกได้ว่าเกิดมิตรภาพล้นเหลือจากสิ่งนี้ พูดทีก็อดหวนนึกถึงเมื่อวันแรกของคีโตไม่ได้เลยสินะ จากการนั่งสนทนาของทีมแอดมินระยะห่าง 2 เมตรช่วงรอเค้กอบในเตา ทำให้เราคิดว่าน่าจะลำดับความมาเล่าสู่กันฟัง บ้างอย่างน้อยๆก็บันทึกเอาไว้ตอนแก่จะได้ไม่ลืม (ตอนนี้ยังไม่แก่???) เอ๋บอก เอ๋ไม่เขียน คนที่เหลือไปช่วยกันเขียนแล้วกัน เล่าให้ฟังหมดแล้ว คิวชีสเค้กจุกอยู่ ทำไม่ทัน เอาวะ ปากกาตกอยู่ในมือคนที่เหลือเลยช่วยกันระดมออกมา เชิญทรรศนา….
เมื่อประมาณเกือบสามปีที่แล้ว ช่วงนั้นเป็นยุคเริ่มต้นของการกินคีโตแบบครึกครื้นในประเทศไทย เป็นห้วงเวลาแห่งการช่วยกันค้นคว้าแบ่งปันเรื่องราวทางวิชาการอย่างสนุกสนาน ใครเจอข้อมูลอะไรก็นำมาแปลสรุปแลกเปลี่ยนเล่าสู่กันฟัง คนโน้นทีคนนี้ที ไม่ว่าจะเกลือแร่ที่จำเป็น อะไรคือคีโตฟลู วิธีแก้ไขอาการต่างๆ รวมถึงวัตถุดิบต่างๆสำหรับการประกอบอาหารและขนมให้อยู่ในกติกาของคีโต โดยอิงการกินคีโตแบบต่างประเทศเป็นหลัก เพราะยังไม่มีกลุ่มคีโตไทยมากมายอย่างทุกวันนี้
ขนมคีโต ก็เป็นอีกความสนุกสนานที่เราเริ่มทำกันในตอนนั้น ทำกันอย่างอัตคัด ด้วยวัตถุดิบที่ยังไม่มีให้เลือกมากมายเช่นทุกวันนี้ ถ้านึกภาพไม่ออกสามารถบอกได้ว่า สมัยนั้นสารให้ความหวานยังมีแค่ อีควลน้ำตาล(สตีเวีย) ตัวเดียวถ้วนๆ เพราะยังไม่มีใครทราบว่า อิริท หาซื้อได้ที่ไหนของพวกนี้มันดูเป็นเคมีมากๆจน Home Bake สำหรับทานกันเองอย่างพวกเราคิดว่า เอื้อมไม่ถึง รวมถึงยังไม่มีตลาดคีโตใดๆบนประเทศสยามนี้มาอำนวยความสะดวกเช่นทุกวันนี้ (จึงทำให้คนทำขนมรุ่นแรกๆจะทำขนมออกมาไม่หวาน และก็ยังคงทำไม่หวานมาถึงวันนี้ เพราะเรายังกลัวที่จะติดหวาน)
บรรยากาศสมัยนั้นจึงเป็นการทดลองทำ ลองผิดมากกว่าลองถูก ทำทิ้งทำขว้างจนหมาแมวอวบอ้วนกันเป็นแถว (ล้อเล่งงงง) จากนั้นเมื่อสูตรนิ่งสำเร็จ ทำแล้วทานได้แน่ๆก็จะเริ่มแจกจ่ายในกลุ่มที่เกิดจากการรวมตัวกันเล็กๆ ในตอนนั้น ใครเอาไปทำต่อก็มีการกลับมาส่งการบ้านบ้าง ทำไม่สำเร็จกลับมาถามบ้าง เอามาโพสรูปเฟลกันให้ขำขันกันตัวโยน เป็นช่วงเวลาที่น่าเบิกบานใจเสียเหลือเกินในตอนนั้น
นอกเหนือจากการแบ่งปันสูตรแล้วยังมีการแบ่งปันตัวของด้วยเช่นกัน ใครทำอะไรสำเร็จฝีมือเริ่มนิ่งก็จะมีการส่งให้กันชิมใช้ ไม่มีช้อป ช่วยกันคอมเมนท์ช่วยกันปรับสูตร วัตถุดิบที่แสนหายากหากเกิดมีการลดราคาเรียกได้ว่า ซื้อแทนกันแล้วส่งให้ก่อนยังได้เลยไม่ต้องกังวลเรื่องสะตุ้งสตางค์กัน เพราะเป็นเรื่องของการหยิบยื่นเอาใจใส่ต่อกัน มากกว่าเรื่องกำไรขาดทุนใดๆ แต่กระนั้น ขนมที่ทำทานกันก็ยังถือว่าอยู่ในจุดเริ่มต้นของการคัดสรร ทดลอง หากมองกลับไปจากวันนี้ที่มีคนคีโตเก่งๆทำขนมได้อย่างจัดจ้านมากมาย เราคงได้แต่ยิ้มอ่อนๆ เมื่อนึกถึงขนมในวันนั้น
เชื่อไหมว่า แรงผลักดันหลักที่ทำให้สาวๆคีโตยุคนั้น ฟันฝ่าทุ่มเทหัดทำขนมกัน นั่นคือ วันแดงเดือด แล้วอาการโหยหาขนม ที่สั่งการมาโดยฮอร์โมนเพศหญิง ก็นำพามาสู่สิ่งที่เราไม่เคยคาดคิด….. (ต่อตอนหน้า)
-
@ 4cd9c154:37287981
2024-05-15 02:30:11An initiative by architects in the city of Pomerode (SC) is mobilizing to start rebuilding the thousands of homes destroyed by the floods in Rio Grande do Sul. Called "ReconstruSUL", the campaign aims to collect building materials and furniture to be donated to the people of Rio Grande do Sul.
The initiative originated in the state of São Paulo, on the part of an architect from that state. And in Pomerode, professionals in this field decided to join in with the idea, to contribute their knowledge and contacts.
In an interview with Jornal de Pomerode, Petra Selke Volkmann, who is responsible for the campaign in Pomerode, and who has the support of the Pomerode Association of Engineers and Architects (Asseapo), said that she found out about the "ReconstruSUL" campaign while researching how she could help people who have lost everything.
"The idea arose from a feeling of helplessness, seeing the magnitude of the tragedy, with so many towns affected, and seeing people help, but it still seems to be too little, given everything that has happened in Rio Grande do Sul. So we started thinking about what it will be like when the water recedes, what the people who lost their homes will do. As an architect, I thought about how, in my profession, I could contribute"
According to Petra, the idea is to unite architects in each city, so that each one can set up a collection point and, with their partners, suppliers and clients, obtain new building materials that are surplus to requirements.
To help the campaign, those interested can donate, for example, bags of cement, valves, pipes, i.e. things that are not returned as building materials but are in good condition. Other materials that can be donated to the "ReconstruSUL" campaign are: window frames, pieces of wood for ceilings, roof timbers, demolition bricks, cement, coverings of all kinds, as well as plumbing and electrical equipment, paint, water tanks, circuit breakers, wiring, socket mirrors, switches, finishes, light bulbs, pipes, scyphons, toilets, taps, tubs, and furniture.
"Remember that everything needs to be in good condition, because people who have lost everything don't deserve to receive something damaged. Whoever receives it also deserves some comfort, some welcome, with things that we would use in our work"
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Splitpages
The simplest possible service: it splitted PDF pages in half.
Created specially to solve the problem of those scanned books that come with two pages side-by-side as if they were a single page and are much harder to read on Kindle because of that.
It required me to learn about Heroku Buildpacks though, and fork or contribute to a Heroku Buildpack that embedded a mupdf binary.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28tempreites
My first library to get stars on GitHub, was a very stupid templating library that used just HTML and HTML attributes ("DSL-free"). I was inspired by http://microjs.com/ at the time and ended up not using the library. Probably no one ever did.
-
@ 3c984938:2ec11289
2024-04-29 09:02:47This is a part of my sporadic work on the Legend Series. I had a hard time finding good images. The images Ai often gave out made the islanders that look like Indians with the feather crowns, so that was interesting. The ending of this one is kinda funny.
The island was inhabited long ago by the ancient people (called Taotaomona). They were much larger than a regular person today. They also had magic, albeit little. The men were blessed with size and strength, while the women were gifted with wisdom and just a touch of magic in their hair.
One day, in the Hagatna bay. A group of fishermen noticed it their bay had grew. It was beyond confusing, to say the least. Another group of fishermen noticed that their bay, pago, also grew on the opposite side of the island.
"If this continues, our island will be cut into two pieces," cried the islanders. A wise leader came up with an idea to protect the island. The fishermen would watch their own bays from their own bays.
^^Huge fish, but you can also see the Taotaomona are also big.
The next morning, a fisherman spotted a massive fish in Pago Bay. The giant fish swam in and started to nibble the shoreline. The fisherman ducks behind boulders to observe and passes the message to his clan leader.
The leaders came together and came a conclusion that they must kill the fish. They sent runners to Hagatna Bay to ask for help to save their island home. Soon, Pago Bay was surrounded by canoes and men. All of them diligently watching to prevent their land from being eaten away, both in and out of the reef. Regardless of how hard they searched or waited, the fish didn't show. After awhile they give up and returned home.
^^Fish nibbling under the island from down under.
The news spread throughout the island about their imminent doom from clan to clan. They felt powerless to do anything.
The women of the island wore long, flowing locks and were proud to wash their hair in the river spring. The juices of lemons were used to enhance the magic. The peels were thrown into the spring after they were finished.
The maidens threw away the lemon peels into Hagatna Spring, but now they were popping up in Pago Bay. Which can only mean the peels were passing through the island, how did that happen? It could only mean the fish was nibbling under the island. A maiden cried out, discovering this new information, "We're surely doomed." Another maiden came forward and said, "Maybe we can outsmart the fish." The fish will be lured into swimming to Hagatna spring and set up a trap. The women came together to gather to trim their precious hair and wove it into a net. The net grew large enough to spread out in every direction of the bay. Each maiden held onto the edges and spread out to sing, waiting for the fish by the spring.
^^This is not an accurate representation, as the ancient people did not wear clothes. And they cut their hair to make the net.
Their song carried under the island, and the soothing sound carried underwater to the giant fishes lair. Little by little, it slowly swam closer to listen to the maiden's song. They sang and sang until they came up with new songs. The massive fish swam closer and emerges from the water. The maiden jumped into the spring surrounding it with their net to capture it. Their net didn't give way no matter how much the fish struggled. It was a success.
One maiden immediately ran to Hagatna to tell the others they had captured the giant fish and that the island was saved.
Everyone rushed to the spring to see the freshly caught fish and were overjoyed. The maidens were celebrated for saving the island when men's strength did not. Everyone ate the fish! Happy time!
Historical Context:
Here you can see the distance of how far the lemon peels traveled under the island. And the shape of the bay. Legends are always fun to explore of how something came to be.
Hello Dear Reader! I hope you enjoy my content? I am curious to hear your thoughts. Do you like what you see?
I'll be grateful for your feedback. Please feel free to leave a comment. Thank you
-
@ a012dc82:6458a70d
2024-05-15 02:04:09Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
The DOGE price is expected to rise by $0.00495 over the following week, to $0.101999 by December 17, 2022, according to our forecast. If you're here, you're undoubtedly interested in the future value of Dogecoin (DOGE) and therefore in finding any kind of prognosis, analysis, or projection of the Dogecoin market. To forecast future price changes, we use a number of machine-based algorithms. In most cases, this pricing forecast should be able to address your queries. Is it possible that Dogecoin (DOGE) will eventually reach its previous high point (ATH) again? When will the value of Dogecoin stabilize? Is it a good time to invest in Dogecoin right now? Is Dogecoin exhibiting bullish or bearish trends right now? The goal of this article is to provide a prognosis for the future value of Dogecoin by analyzing a number of technical indicators related to DOGE.
Dogecoin (DOGE) Price Predictions
Dogecoin has been displaying negative indicators, as the currency is down 3.89% over the last week. Consequently, we anticipate a modest rebound during the next week as investors purchase the decline in DOGE prices.
Dogecoin hourly, daily, weekly, and monthly price forecasts are shown below. You may use these forecasts to estimate how much your Dogecoin holdings will be worth in an hour, today, tomorrow, this week, and this month.
Dogecoin (DOGE): Historical Price and Market Analysis
Dogecoin is now valued at $0.09705, making it the eighth most expensive digital currency in circulation. Dogecoin has a total market value of $12,875,654,476 and a supply of 132,670,763,00.
The value of a Dogecoin has risen by 0.64 percent in the last day. Over the last week, Dogecoin's value has decreased by 3.89% as its upward momentum has stalled. If you've been thinking about purchasing Dogecoin, now could be a good time since the cryptocurrency is exhibiting negative indicators this week.
The price of Dogecoin (DOGE) rose by 6.44 percent during the last month, from $0.091178 to $0.0958702. This caused the market cap to rise to $12,875,654,476. Dogecoin is not a good investment right now; you should hold off until the next weak market. In the last 90 days, the price of a dogecoin has risen by 51.72%, from $0.063966 to $0.033083.
Dogecoin (DOGE) Technical Indicators
You may discover some of the technical indicators like the relative strength index (RSI), moving average convergence divergence (MACD), average true range (ATR), and bollinger bands that we use to forecast Dogecoin's price below.
Dogecoin (DOGE) Price Forecast 2022- 2030
Our Dogecoin market predictions are based on technical indicators like the RSI, MACD, EMA, ATR, and Bollinger bands, which are analyzed by a series of machine learning algorithms (BB).
Premium Dogecoin (DOGE) Price Predictions
By signing up now, you'll get access to a wealth of trading resources, including DOGE buy/sell signals, premium Dogecoin price forecasts, and more!
Dogecoin (DOGE) Price Prediction and Market Forecast
Given the notorious instability of the cryptocurrency market, it's tough to guess where Dogecoin's price will be in the future. Therefore, you should not regard the forecasts on our website as financial advice and instead do your own investigation. Don't make any major investments without first talking to your financial planner.
Dogecoin's (DOGE) Price Prediction 2022
We anticipate that once the market recovers from the crypto winter, Dogecoin's price will peak around $0.174689. The predicted range for the price is from $0.11646 at the low end to $0.14575 at the high end. More reading is needed.
Dogecoin's (DOGE) Price Prediction 2023
Our algorithm forecasts that in 2023 the highest price Dogecoin will reach is $0.271739, with a yearly average of $0.242624. This is based on the fact that Dogecoin has been steadily increasing in value. In 2023, the lowest price that DOGE may reach is $0.213509, and that's only if a bear market develops. Continue reading
Dogecoin's (DOGE) Price Prediction 2024
As the use of cryptocurrencies spreads across the economy in 2024, we anticipate significant growth for Dogecoin. This means the price might go as high as $0.368789, with an expected average of around $0.339674. Dogecoin's lowest possible price is 0.310559 dollars.Take a look at the following:
Dogecoin's (DOGE) Price Prediction 2025
As investment continues to flow into the cryptocurrency market, Dogecoin's price might rise to as high as $0.465838 in 2025, with an average of $0.436724. Our forecast indicates that the lowest possible price would be $0.407609 in the event of a sell-off. Continue reading
Dogecoin (DOGE) Price Forecast 2026
Based on the global adoption of DOGE, Dogecoin may reach a maximum price of $0.562888 by 2026, with an anticipated average price of $0.533773. In the same year, the lowest price might be $0.504658. Continue reading
Dogecoin's (DOGE) Price Prediction 2027
Regulators will begin to acknowledge that cryptocurrencies like Dogecoin are here to stay in 2027, fueling the cryptocurrency's further popularity. By 2027, the highest price that investors can expect for DOGE is $0.659938. The lowest price they might see for DOGE is $0.601708. In 2027, experts predict that the average price will be $0.630823. Continue reading
Dogecoin's (DOGE) Price Prediction 2028
Dogecoin (DOGE) investors may see DOGE reach a maximum price of $0.756987 in 2028 as a result of the increase over the previous 5 years, followed by an average price of $0.727873. Our technical analysis indicates that a minimum price of $0.698758 could be expected. More reading is needed.
Dogecoin (DOGE) Price Forecast 2029
The current market attitude indicates that the price of DOGE will continue to rise during 2029, eventually reaching $0.854037. If this backing isn't gained, Dogecoin's price might fall to a yearly low of $0.795807 and an average of $0.824922. Take a look at the following:
Dogecoin (DOGE) Price Forecast for 2030
Dogecoin will have a banner year in 2030, when its price is predicted to hit a new all-time high of $0.951087 and maybe hit a low of $0.892857. Doge might fall to $0.921972 in 2030 if things go from bad to worse.
Conclusion
It's impossible to deny that Dogecoin, like real-world fiat money, has the benefit of being a fixed-inflationary currency. Dogecoin users may benefit from more liquidity thanks to their propensity for frequent transactions rather than stockpiling the currency. Dogecoin's present price may see a substantial increase in the future, since there is a lot of money pushing the wave and innovations in the crypto market. There will likely be significant increases in the value of Dogecoin (DOGE) in the near future. However, we caution investors to exercise caution when putting money into meme currencies like Dogecoin.
FAQs
What is the Dogecoin (DOGE) price today? Dogecoin (DOGE) is trading at $0.09705 with a market valuation of $12,875,654,476 as of this writing.
What is the price prediction for Dogecoin in 2022? In 2022, the value of a single Dogecoin is projected to peak at $0.174689.
Is it a good time to buy Dogecoin (DOGE)? Dogecoin has been displaying negative indicators over the last week, but we anticipate a minor rebound within the next week as investors buy into this drop.
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 81870f53:29bef6a6
2024-05-14 20:42:544月の米国の卸売物価は予想以上に上昇しており、これが連邦準備理事会(FRB)の近い将来の利下げ見通しに新たな障害となった可能性がある。
米労働統計局が火曜日に発表した生産者物価指数(PPI)は先月0.5%上昇し、生産者がどれだけの収入を得ているかを示す市場予想の0.3%を上回った。ただし、3 月の統計は当初発表の 0.2% 増加から 0.1% 減少に修正されました。
変動の激しい食品とエネルギー価格を除いたコアPPIも、市場予想の0.2%に対し0.5%上昇し、貿易サービスを除くコア産業は同月0.4%、12カ月前月比3.1%上昇した。 2023年4月以来の高水準。
卸売物価は前年比2.2%上昇し、ここ1年で最高水準となった。コアPPIインフレ率は2.4%で、2023年8月以来最大の年間上昇率となった。いずれの数字もロイターの予想と一致している。
モルガン・スタンレーEトレードのトレーディング・投資部門マネジングディレクター、クリス・ラーキン氏は「今日の指標が予想を大きく上回ったことを受けて、粘り強いインフレが戻ってきたようだ」と述べた。
サービス価格は全体の上昇率の約4分の3を占める0.6%上昇し、全体のインフレ統計を押し上げたほか、最終需要商品指数は0.4%上昇し、サービス部門の伸び率は7月以来最大の月次伸びとなったと報告している。 2023年。
PPIで測定される商品価格は0.2%の下落から反転して0.4%上昇し、ガソリン価格の5.4%の高騰を含めてエネルギー指数は2%上昇し、最終的な食料需要指数は0.7%低下した。
最新のインフレ統計が発表された際、政策当局者らは最近、今年のインフレは低下傾向にあると予想しているが、利下げの前にインフレが納得のいく水準に戻っているというさらなる証拠が必要だと述べ、利上げの停止を発表した。中央銀行の目標は2%。
最近の消費者物価指数(CPI)統計は、2024年上半期までの消費者物価指数の上昇率が予想を上回ったことを示しており、インフレがエコノミストや政策当局者の予想よりも堅調であるとの懸念が高まっている。
同様に、FRBが最も好む指標である米国商務省(商務省)の個人消費支出価格指数(個人消費支出価格指数)も上昇しており、インフレ率が3%をわずかに下回っていることが示されている。
ニューヨーク連銀(ニューヨーク連銀)が月曜日に発表した月例調査によると、物価圧力が連邦準備制度理事会の目標をはるかに上回っていることが、さまざまな消費者調査で示されている。 、1年間のインフレ予測は3.3%で、昨年11月以来の高水準となっているが、これは主に住宅関連コストが上昇し続けるとの市場の予想によるものである。
この記事がお役に立てば幸いです。 もしそうなら、チップをおくるどうぞ https://getalby.com/p/bitcap
日本のホスティングサービス Linux、Windowsクラウドホスティング データストレージ https://jpstream.net
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28litepub
A Go library that abstracts all the burdensome ActivityPub things and provides just the right amount of helpers necessary to integrate an existing website into the "fediverse" (what an odious name). Made for the gravity integration.
See also
-
-
@ 76c71aae:3e29cafa
2024-04-27 02:17:10Why are there 5.5 million people with Bluesky accounts and about 800k to 1.3M on Nostr?
Some of it boils down to social dynamics and chance. It's akin to how immigrants often cluster in the same neighborhoods. Most people are simply following their communities, and their primary decision is driven by where their community is heading.
Why did the communities choose Bluesky over Nostr, Mastodon, Farcaster, or the several dozen centralized and decentralized alternatives?
That’s a more pertinent question. Firstly, very few people actually make these decisions, and most simply follow them. Secondly, the choices aren't primarily based on the technology or the features of the apps or protocols.
Bluesky had certain advantages and disadvantages. It received a fair amount of press as a Twitter spinoff. However, it was late to launch, only preceded by Threads, which had Meta’s platforms for promotion.
In terms of initial marketing, I’d say Bluesky and Nostr were about equal, both often pitched as a ‘Jack Dorsey thing’, which wasn’t true in either case. The press loves stories about people and drama over networks and systems. Social media is vast and complex, and its technology even more so, which is why it’s often presented through personalized narratives about the creators.
Under the hood, Bluesky’s atproto and Nostr are very similar technologically. Both were inspired by Secure Scuttlebutt. Bluesky has adopted a cathedral model of open source, akin to how Android is open source but controlled by Google. Meanwhile, Nostr developed under the bazaar model of open source, created by a community rather than a company.
This company model gives Bluesky some advantages; for instance, they could launch with an invite list, a classic tactic to make something feel more desirable. Even then, most Bluesky users haven’t posted a single thing, and when they had a million registered users, they had fewer than 1500 Daily Active Users (DAU) see bluesky stats.
Bluesky is a lot easier to try than Nostr. The ways keys and content signing work in Bluesky and Nostr are overwhelmingly similar, except that Nostr doesn’t tell you where to store your keys and in Bluesky, you put them on your PDS server, which Bluesky provided free by default for all new users.
This means for Nostr, you have to figure out what to do with your nsec and npub, then how to get a nip-05 for a Nostr name which makes sense. If you want to log in with a username and password, you need to find and set up a nip-46 service. Not all apps support that, so you’re copying and pasting around an nsec. If you want to use a web app, you need to go find and choose one of several browser extensions and set that up. This is easy and natural for folks with experience in crypto but really foreign for everyone else.
Maybe a million people have figured out how to get started on Nostr; it’s definitely possible. And some apps like Primal and Nos have integrated name services as part of the signup, which makes it cleaner.
Once you’re on Nostr, people often discuss zaps, a functionality that may not work as expected. You’ve got to learn how to set up a wallet, what lightning and Bitcoin are. Some get really into it, we’ve seen folks get into Bitcoin through Nostr, but for many, it’s a confusing hurdle.
Bluesky provides a neat way to get into a single default app and gives you a username. Sure, you can change it—I self-host my DID at rabble.nz—but apparently less than 1% of Bluesky users do that, just like most Nostr users have chosen to use a cloud service for their nip-05 Nostr name.
Why else has Bluesky grown bigger than Nostr? It's their approach to positioning the protocol. They’ve set up default moderation controls and a trust and safety team. Initially, they didn’t have these, and when users demanded action and the company refused, growth stalled and usage dropped last July. The Bluesky team didn’t post for about a month, and there was a real question about whether Bluesky would survive.
The user community wanted pretty heavy-handed moderation. The Bluesky team was committed to building a decentralized protocol that didn’t do that. The compromise was that Bluesky would be slow about opening up open federation over atproto until the Bluesky apps, protocol, and company-hosted services could have a trust and safety team and a moderation bot. Their moderation bot is fancier than @reportinator, but it’s the same idea, but with a bigger team of humans reviewing reports. And if you’re using the Bluesky-provided PDS, there’s no way to block or unfollow their default moderation bot. We don’t make everybody on Nostr follow nostr:npub14h23jzlyvumks4rvrz6ktk36dxfyru8qdf679k7q8uvxv0gm0vnsyqe2sh .
That compromise worked for the community and company, and the user base started growing again. The negative press about Bluesky's content ceased and those upset by the policies left, some migrating to Nostr. Bluesky was able to position itself as the socially responsible social media protocol that was easy to use. Jack deleted his Bluesky account, signaling to the world and press what we already knew: he is much more interested in Nostr’s approach to bottom-up development by community and support for lightning payments.
During this period, Nostr's growth really stalled. There are a few reasons for this. We'd saturated the community of folks who both love Bitcoin and dislike Elon enough to leave Twitter. Additionally, our new user experience pushed people to view a global feed dominated by a single topic of conversation.
Nostr has positioned itself strongly as a protocol for those who are freedom-loving, anti-censorship Bitcoin enthusiasts. The easiest Nostr client for new users, Primal, markets itself as a Bitcoin wallet first, and only secondarily as a social media app. People view Nostr as a Web3 project. We’ve had individuals visit the Nos.social website and decline involvement, saying they dislike Web3 because they perceive it as a planet-harming scam (let's not argue the carbon emissions of mining here). We never mention Web3 or any cryptocurrency elements on the Nos website, yet all decentralization has been associated with dubious schemes.
As Nostr’s growth has stalled, the ecosystem has matured and flourished. Nostr boasts technology and apps that other platforms envy. I often hear Bluesky and Fediverse developers express admiration for the cool things Nostr is doing with technology and apps, but since their communities don’t use it, they don’t either.
Just look at the articles my posts last week about Nostr vs. ActivityPub kicked off: Extending ActivityPub and Nomadic Identity is Coming to ActivityPub
I suspect what’s holding back Nostr is twofold. First, how we talk about Nostr. We discuss it in political and ideological terms—we're against censorship, for free speech, value-for-value, etc.—but not about the types of content and people on Nostr, how to find your friends, or the interesting stuff you followed elsewhere. Nor do we talk about how you can use all these cool apps with the same identity and content. It's a hard concept to grasp, and I find myself constantly having to explain it.
The biggest issue people see with Nostr is its perceived association with Bitcoin enthusiasts plus those who’ve been deplatformed elsewhere, often for contentious reasons. I’m not saying the deplatforming was justified, but the perception among those unfamiliar with arbitrary bans and sanctions on platforms is that those who've been deplatformed had it coming—that they were all conspiracy theorists, bigots, or harassers. Some were, some were not, but it's perceived that way by many.
The way we talk about Nostr and onboard new users doesn’t help. The goal of the creator and journalism projects we just launched was to both diversify the content on Nostr for new users and to demonstrate to those creators and journalists that micropayments and paid content on Nostr are viable alternatives/additions to how they publish on social media elsewhere. It is value-for-value without the label, because our theory is that people want the functionality but aren't so keen on the cultural ideology.
This is all solvable. We can: - Make it easier to set up a nip-05 for new users. - Ensure that nip-05 also functions as an nsec bunker for easy login, if users desire. - Add Webfinger files so your nip-05 name functions as a Fediverse name (it’s pretty easy to do; we're experimenting with it on nos.social). - Show users a variety of content types when they join. - Help users find communities, perhaps encouraging groups/channels the way Farcaster does. - Make it easy to find and choose moderation settings, offering more middleware services like Reportinator but with different content labeling ideas. - Change our marketing to attract these new users, focusing on what they can see and who they can connect with, less on Bitcoin, technology, or evading censorship. - Develop apps that offer new functionalities, drawing people in instead of being mere clones with or without certain features.
It always takes a long time for people to figure out what the native mediums are on a technology platform. Initially people would make a phone call to listen to a concert, the first radio stations had people just reading the newspaper, and the first tv broadcasts were either a camera pointed at radio announcers or a single camera shot of a play. People always do the same things, we're the same humans that evolved a couple hundred thousand years ago, same brains, same bodies. What's changed is the way we do things with technology, so what fundamental human thing can we do new and different now that we've got these social protocols and tech?
Addressing the app design and technology will help, but actual growth will come when people discover us, join, find connections, and genuinely want to invite others to join them. Nostr users are incredibly welcoming to new users. However, we also have a subset of users who engage in sexist, racist, and homophobic harassment. This harassment drives people away from Nostr and deters them from recommending it to others. If we don't provide better tools for users to protect themselves from this harassment, they'll leave and find social spaces where they feel safe. Some might abandon public social media altogether, or just switch to Bluesky, which promises to eventually open up their network and has just announced support for uploading images, coming soon.
We're way ahead of the other protocols in some areas and way behind in others. We've got enough momentum and users to figure this out, but we're not there yet.
-
@ c73818cc:ccd5c890
2024-05-14 20:23:13Dove la passione incontra la competizione!
Unisciti a Messi e alla nostra squadra Bitcoin Report Italia per conquistare le vette del trading e competere per un gigantesco montepremi di 5.000.000 USDT!
Premi di tributo a Messi e premi giornalieri!
Raggiungi un volume di trading di Futures minimo di 60.000 USDT durante la promozione per avere la possibilità di vincere i premi di tributo a Messi e premi giornalieri.
Più partecipanti, più grande il montepremi!
Invita i tuoi amici con il nostro referral 6w5d o il QR in foto per sbloccare un montepremi di 5.000.000 USDT!
Unisciti a noi nella squadra Bitcoin Report Italia e combatti per la vittoria!
Non hai ancora un account Bitget?
Aprilo ora e approfitta del 10% di sconto sulle fee e dei bonus di benvenuto usando il nostro referral 6w5d o il QR in foto!
Bitget #KCGI #BitgetKCGI #Messi #Trading #Futures #Spot #Competizione #Premi #Referral #BitcoinReportItalia #Ferrari #Rolex
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28questo.email
This was a thing done in a brief period I liked the idea of "indiewebcamp", a stupid movement of people saying everybody should have their site and post their lives in it.
From the GitHub postmortem:
questo.email was a service that integrated email addresses into the indieweb ecosystem by providing email-to-note and email-to-webmention triggers, which could be used for people to comment through webmention using their email addresses, and be replied, and also for people to send messages from their sites directly to the email addresses of people they knew; Questo also worked as an IndieAuth provider that used people's email addresses and Mozilla Persona.
It was live from December 2014 through December 2015.
Here's how the home page looked:
See also
- jekmentions, another thing related to "indieweb"
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Boardthreads
This was a very badly done service for turning a Trello list into a helpdesk UI.
Surprisingly, it had more paying users than Websites For Trello, which I was working on simultaneously and dedicating much more time to it.
The Neo4j database I used for this was a very poor choice, it was probably the cause of all the bugs.
-
@ 502ab02a:a2860397
2024-04-24 09:27:28หลายๆครั้งที่เรากินเฮฟวีครีมหรือที่บ้านเราเรียกวิปครีม ไม่หมดแถมใกล้จะหมดอายุแล้วด้วย เราสามารถนำมาเรียนรู้กระบวนการผลิตสิ่งที่เรียกว่า ผลิตภัณฑ์จากนม หรือ Dairy Product ได้ครับ แถมเรายังได้ของไว้ใช้ทำอาหารอีกด้วย นั่นคือ การทำครีมให้เป็นเนย แล้วเอาเนยไปทำกี อีกที งว่ออออออ
ผมจะเล่าสิ่งที่ผมทำเล่นๆเป็นงานอดิเรกให้อ่านกันครับ
ส่วนตัวแล้วผมค่อนข้างหลงไหลใน ไขมันเนย และสนุกในการเรียนรู้มันมานานพอสมควร รวมถึงได้คลุกคลีกับอุตสาหกรรมนม มาตั้งแต่ราวๆปี 2001 ที่น่าสนใจคือ สัดส่วนสารอาหารของไขมันเนย ดีงามตั้งแต่เรื่อง กรดไขมันสายสั้น สัดส่วนที่ลงตัวระหว่างโอเมก้า3:6 รวมถึงมีกลิ่นหอมละมุน
กระบวนการทำเนยนั้น เขาก็จะนำนมมาแยกส่วนที่เป็นครีมออกมา เพื่อปั่นแยกไขมันเนยกับเวย์ ในขั้นตอนการแยกครีมนั้น เราจะได้ **ครีม(นมกับไขมันเนย) และ นมพร่องมันเนย (นมที่มีไขมันเนยต่ำ แน่สิมันไปอยู่ในครีมไง) **
ซึ่งนมพร่องมันเนยนี่ละครับ เป็นกระบวนการเดียวกับที่เขานำไปขายเป็นนมไขมันต่ำ หรือ ไม่ก็เอาไปทำนมผง(สกิมมิลค์) . . . แต่ทำความเข้าใจก่อนนะครับว่า บางโรงงานก็ไม่ได้เอาเศษพวกนี้มาทำของขายเรานะ โรงงานนมผงบางที่ก็เป้นการตั้งไลน์ทำขึ้นมาโดยเฉพาะแล้วได้ by product เป็นครีมแทน
คือมันไม่เหมือนกันระหว่าง ตั้งใจทำครีมออกมาขายแล้วได้หางนมมาทำนมผงนมไขมันต่ำ VS ตั้งใจทำนมผงนมไขมันต่ำมาขายแล้วได้เศษเหลือเป็นครีม
มันเป็นแค่กระบวนการที่คล้ายกันคือ มีการแยกครีมกับนม แต่การตั้งเครื่องไม่เหมือนกัน เขาจะตั้งเอาสิ่งที่ต้องการผลิตเป็นหลัก ที่เหลือมันจึงเป็นแค่ by product
โอเคทีนี้กลับมาเรื่องของเราครับ
**
กระบวนการทำเนยคือ
** การเอาครีมมาปั่นในถังปั่น จนมันเกิดการแยกระหว่างไขมันกับเวย์ เรียกว่าการ churning ตั้งแต่โบราณก็ใช้การปั่น แต่วิธีปั่นมันต่างไปเท่านั้นครับ จากปั่นมือ มาเป็นปั่นเครื่อง รสชาติของเนยก็ขึ้นอยู่กับวิธีทำต่างๆ ตั้งแต่โบราณคือนมดิบ, นมที่มีการ culture หรือ ใส่จุลินทรีย์ไปหมักก่อนจะนำมาปั่น เพื่อกลิ่นและรส ปัจจุบันก็อาจมีการพาสเจอร์ไรส์เพราะบางประเทศบังคับว่าต้องพาสเจอร์ไรส์
วันนี้เรามาดูแบบง่ายๆตามที่บอกไว้ข้างบน เราแค่เอาวิปครีม ใส่โถปั่นแล้วก็ให้มันปั่นไปเรื่อยๆ แค่นี้ก็ได้เนยแล้วครับ สำหรับคนที่ทำขนมน่าจะเคยเจอเหตุการณ์ตีวิปนานเกินไปจนจับก้อนแข็ง ถ้าคุณตีต่อไปอีกนั่นละครับ ไอ้เจ้าครีมแข็งนั้นจะกลายเป็นเนยในที่สุด เอาจริงๆการเหวี่ยงก็ได้นะครับ หลายคนเอาใส่ขวดแล้วเขย่า ใครอยากลองก็ลองได้นะ เมื่อยมือเชียว 5555 พอเราได้ก้อนเนยสดๆแล้ว เราก็เอามาใส่ลงในน้ำเย็นจัด ความเย็นจัดจะทำให้เนยสดๆนี้แข็งตัว แล้วเราก็จะปั้นก้อนปั้นรูปทรงให้เก็บง่ายๆได้ ที่นิยมก็ทรงหมูยอ เพราะตัดใช้ง่ายดีครับ
**เรามาดูคลิปที่ผมเคยทำกันครับ จะเห็นภาพว่า ครีมกลายเป็นเนย มันยังไง ** https://youtu.be/bzo7V9n2cxc?si=PsaldIxgKqpiBXgb
ทีนี้เราก็ได้เนยเอาไว้ใช้เองสบายๆละ ใครที่มีนมดิบอยู่แล้วกลัวกินไม่ทัน ก็มีวิธีเพิ่มนิดนึงครับคือ ใส่โถทรงสูงหน่อย เอานมดิบแช่ตู้เย็นราวๆ 18ชั่วโมงขึ้นไป จนมันเริ่มแยกชั้นกัน ความเย็นจะทำให้ไขมันจับตัว มองแล้วคล้ายหัวกะทิ หางกะทิ แล้วเราก็เลือกตักส่วนข้นๆส้วนจับก้อน เอามาใช้แทนครีม วิธีสังเกตุก็ดูความใสของนมเอาครับ ส่วนไขมันจะข้นๆหน่อย พอเริ่มไขมันน้อยก็จะใสครับ ส่วนที่เหลือที่ใสหน่อย นั่นละครับ นมไขมันต่ำ 55555 เอาไปชงกาแฟหรือดื่มได้ต่อไม่มีปัญหาอะไร
**
ทีนี้ กี (ghee) คืออะไร
** กี คือ เนยใส เป็นที่นิยมในอินเดียมากๆ เขาเอามาใช้เป็นน้ำมันในการทำอาหาร ชงเครื่องดื่ม ได้สารพัดอย่างตามที่น้ำมันจะทำได้ จุดเกิดควันสูง ทำให้เกิดการไหม้ ได้ยากกว่าเนยหลายเท่า
วิธีทำกี ก็ง่ายมากๆ แค่เอาเนยมาตั้งเตาด้วยไฟอ่อนๆ อ่อนมากๆนะครับ เพราะถ้าแรงไปนิดเดียว เนยจะไหม้ทันที เราก็กวนเนยไปเรื่อยๆ ความร้อนอ่อนๆที่ต้มเนยนี้มันคือกระบวนการทำให้น้ำระเหยออกไป จนเริ่มเห็นน้ำมันใสๆ เริ่มเห็นการแยกชั้นอีกครั้งนึง ซึ่งไอ้ที่แยกมานี่ละครับ เราเรียกว่า เนื้อนม หรือ solid milk เท่ากับว่าเราแยกองค์ประกอบของเนยออกไปได้ดังนี้ 1.น้ำระเหยไปในอากาศ 2.เนื้อนมแข็งๆคาอยู่ในหม้อ 3.ไขมันเนยใสๆ คาอยู่ในหม้อ
สิ่งที่เราเอามาใช้ก็คือ ไขมันเนย กรอกใส่ขวดหรือกระปุกก็ตามสะดวกใช้ครับ แช่ตู้เย็นเอาไว้ก็ได้ หรือถ้าใช้บ่อย อยู่นอกตู้เย็นก็ได้พักใหญ่ๆเลย เพราะมันไม่มีอะไรให้เสีย เพียงแค่มันจะซับกลิ่นสภาพแวดล้อมได้เก่งหน่อย
ส่วนเนื้อนมเอาไปคลุกน้ำตาลอร่อยครับ 555555
เรามาดูคลิปการทำกี กันครับ ตัวนี้ผมใช้เนยที่ขายทั่วไปพราะตอนนั้นผมทำการทดลอง ให้คนคีโตเห็นว่า อย่าไปอะไรกับเนยมาก ทุกตัวมีเนื้อนมหมดและเนื้อนมเป็นคาร์บ ที่สำคัญเนยที่คีโตนิยมใช้เหลือเนื้อนมมากกว่าเนยที่ราคาถูกกว่าอีก เพราะเนื้อนมคือตัวที่ทำให้เนยมีความละมุนลิ้น ส่วนไขมันเนยคือตัวที่ส่งกลิ่นหอมๆ ลองไปดูคลิปกันครับ
https://youtu.be/HFvvIjhZ6h0?si=KkqoZFN3Mx1lTTul
ทีนี้ของแถม ที่บอกว่าต้มกี ต้องระวังไหม้ จำได้ใช่ไหมครับ ในสายเบเกอรี่ เรามีสิ่งที่เรียกว่า บราวบัทเตอร์ (brown butter) คือการเล่นเสี่ยงอย่างนึงคือ ต้มกี ให้เกินจุดพอดี แต่ไม่เกินไปจนไหม้ เราจะได้เนยใสสีน้ำตาลอ่อน มีกลิ่นหอมคาราเมล ตัวนี้นิยมใช้ทำขนมเพิ่มกลิ่นหอมกว่าการใช้เนยปกติหลายเท่า แถมเป็นกลิ่นหอมหวาน ที่ทำให้ขนมไฮโซขึ้นมาก เอาไปชงกาแฟก็หอมครับผมทำบ่อย
siamstr #pirateketo
-
@ e968e50b:db2a803a
2024-05-14 19:02:35International Sports Uncensored
International Sports Uncensored
I made a nostr client that's specifically designed to encourage people to write notes about something other than nostr. This is the strictly sports version of it. It's a global feed of every sports-related nostr post from the past two weeks.
I figure, this might be something useful to get some normal sports fans using nostr. You can actually see your own posts alongside BBC sports or ESPN or the Hindustan Times. It's otherwise unfiltered, so it should be anybody posting on any major sport anywhere in the world.
It's got a long way to go, so let me know if there's anything that might make this more interesting.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Webvatar
Like Gravatar, but using profile images from websites tagged with "microformats-2" tags, like people from the indiewebcamp movement liked. It falled back to favicon, gravatar and procedural avatar generators.
No one really used this, despite people saying they liked it. Since I was desperate to getting some of my programs appreciated by someone I even bought a domain. It was sad, but an enriching experience.
See also
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28The problem with ION
ION is a DID method based on a thing called "Sidetree".
I can't say for sure what is the problem with ION, because I don't understand the design, even though I have read all I could and asked everybody I knew. All available information only touches on the high-level aspects of it (and of course its amazing wonders) and no one has ever bothered to explain the details. I've also asked the main designer of the protocol, Daniel Buchner, but he may have thought I was trolling him on Twitter and refused to answer, instead pointing me to an incomplete spec on the Decentralized Identity Foundation website that I had already read before. I even tried to join the DIF as a member so I could join their closed community calls and hear what they say, maybe eventually ask a question, so I could understand it, but my entrance was ignored, then after many months and a nudge from another member I was told I had to do a KYC process to be admitted, which I refused.
One thing I know is:
- ION is supposed to provide a way to rotate keys seamlessly and automatically without losing the main identity (and the ION proponents also claim there are no "master" keys because these can also be rotated).
- ION is also not a blockchain, i.e. it doesn't have a deterministic consensus mechanism and it is decentralized, i.e. anyone can publish data to it, doesn't have to be a single central server, there may be holes in the available data and the protocol doesn't treat that as a problem.
- From all we know about years of attempts to scale Bitcoins and develop offchain protocols it is clear that you can't solve the double-spend problem without a central authority or a kind of blockchain (i.e. a decentralized system with deterministic consensus).
- Rotating keys also suffer from the double-spend problem: whenever you rotate a key it is as if it was "spent", you aren't supposed to be able to use it again.
The logic conclusion of the 4 assumptions above is that ION is flawed: it can't provide the key rotation it says it can if it is not a blockchain.
See also
-
@ c73818cc:ccd5c890
2024-05-14 18:30:25💩 L'abbandono del dollaro da parte di India e Nigeria per il commercio reciproco segna un passo importante verso la dedollarizzazione e un sistema monetario globale più diversificato. Un colpo al dominio del dollaro e una spinta verso un mondo multipolare, dove le nazioni non sono legate a una singola valuta centralizzata.
💩 La decisione di India e Nigeria di utilizzare le proprie valute per il commercio bilaterale rappresenta una sfida significativa al dominio del dollaro americano nel commercio internazionale. Questo sviluppo indica una crescente tendenza verso la dedollarizzazione e la diversificazione del sistema monetario globale, soprattutto per un paese come la Nigeria, che storicamente è sempre stato sotto controllo USA.
💩 L'emergere di un mondo multipolare, dove le nazioni non sono legate a una singola valuta centralizzata, offre nuove opportunità per la crescita e la prosperità economica. Questo cambiamento allontana il potere dalle grandi istituzioni finanziarie e lo restituisce alle singole nazioni, dando loro maggiore controllo sul proprio destino economico.
Seguici sui nostri canali social ed unisciti al nostro gruppo Telegram:
https://t.me/Bitcoin_Report_Italia
BitcoinReportItalia #BRICS #Nigeria #India #Cina #USA #Russia #FED #SEC #BTC #Bitcoin
-
@ 1f9e547c:8af216ed
2024-04-23 08:35:18Hashtag testing
Plaintext
hashtag #again
NostrOpinion
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28bolt12 problems
- clients can't programatically build new offers by changing a path or query params (services like zbd.gg or lnurl-pay.me won't work)
- impossible to use in a load-balanced custodian way -- since offers would have to be pregenerated and tied to a specific lightning node.
- the existence of fiat currency fields makes it so wallets have to fetch exchange rates from somewhere on the internet (or offer a bad user experience), using HTTP which hurts user privacy.
- the vendor field is misleading, can be phished very easily, not as safe as a domain name.
- onion messages are an improvement over fake HTLC-based payments as a way of transmitting data, for sure. but we must decide if they are (i) suitable for transmitting all kinds of data over the internet, a replacement for tor; or (ii) not something that will scale well or on which we can count on for the future. if there was proper incentivization for data transmission it could end up being (i), the holy grail of p2p communication over the internet, but that is a very hard problem to solve and not guaranteed to yield the desired scalability results. since not even hints of attempting to solve that are being made, it's safer to conclude it is (ii).
bolt12 limitations
- not flexible enough. there are some interesting fields defined in the spec, but who gets to add more fields later if necessary? very unclear.
- services can't return any actionable data to the users who paid for something. it's unclear how business can be conducted without an extra communication channel.
bolt12 illusions
- recurring payments is not really solved, it is just a spec that defines intervals. the actual implementation must still be done by each wallet and service. the recurring payment cannot be enforced, the wallet must still initiate the payment. even if the wallet is evil and is willing to initiate a payment without the user knowing it still needs to have funds, channels, be online, connected etc., so it's not as if the services could rely on the payments being delivered in time.
- people seem to think it will enable pushing payments to mobile wallets, which it does not and cannot.
- there is a confusion of contexts: it looks like offers are superior to lnurl-pay, for example, because they don't require domain names. domain names, though, are common and well-established among internet services and stores, because these services have websites, so this is not really an issue. it is an issue, though, for people that want to receive payments in their homes. for these, indeed, bolt12 offers a superior solution -- but at the same time bolt12 seems to be selling itself as a tool for merchants and service providers when it includes and highlights features as recurring payments and refunds.
- the privacy gains for the receiver that are promoted as being part of bolt12 in fact come from a separate proposal, blinded paths, which should work for all normal lightning payments and indeed are a very nice solution. they are (or at least were, and should be) independent from the bolt12 proposal. a separate proposal, which can be (and already is being) used right now, also improves privacy for the receiver very much anway, it's called trampoline routing.
-
@ 5d4b6c8d:8a1c1ee3
2024-05-14 18:22:44I noticed that only 100 people are getting daily rewards. That was a new feature introduced in the second month of Million Sat Madness, as I recall.
The purpose, as explained to me by @ek, is to prune the left tail of the distribution and give more rewards to our more substantial contributors. That's great, but 100 is completely arbitrary, so I think we can do better.
Why not make use of our beloved cowboy hats and reserve daily rewards for cowboys?
If it starts seeming like too many people are drawing rewards, make cowboy hats harder to find.
Other Ideas
- Include referrals in the rewards calculation, maybe as daily activity of your referred stackers
- Reward downzapping bad content, as well as zapping top content
- Reward SN donations
- Randomize the parameters in the rewards calculation
- Daily rewards have to be accepted within 24 hours or they go back in the pool
- Factor engagement into top post rankings
- Include all-time stacker value in the rewards calculation
That's it for now. I don't necessarily endorse all of these ideas, but I've been mulling them over and I'm curious what other stackers think.
Are there tweaks to the rewards system that you'd like to see?
-
@ 6bae33c8:607272e8
2024-05-14 18:01:02We used to have ESPN’s Andre’ Snellings on our SXM show once per week, and as I wasn’t really up on the current NBA back then, I’d spend the segment discussing basketball philosophy of sorts — what makes a player valuable, what qualities are redundant on a team, and which ones “scale,” so to speak, etc. So some of what I’m about to write comes from him and a lot of it from my interactions with him.
To begin with, the purpose of basketball is to win the game, and you do that by scoring more points than you allow. To that end, any player who increases his team’s combined offensive output is helpful as is any player who decreases that of his opponent.
For example, if an average team could be said to score and allow 100 points, a player whose presence boosts that output to 105 points on average without hurting you defensively is a good player. Similarly, a player whose presence keeps your scoring at 100, but reduces the opponent’s score to 95 is also helping you. Most players do one or the other, some do both, and a few do neither, but the latter are typically not long for the league.
Of course, players don’t help or harm teams in a vacuum. Certain combinations of players work well together, and others don’t. If you had a team with Dennis Rodman, Dikembe Mutombo, Bruce Bowen and Rajon Rondo, adding Kobe Bryant would make a massive difference. But if that team instead already had Michael Jordan, James Harden, Dirk Nowitzki and Tracy McGrady, Kobe’s presence would give it only a small boost.
That’s because there’s only one ball, and players like Jordan, Harden, McGrady, Dirk and Kobe tend to have it in their hands a lot. Once you have players who can create their own shots and score efficiently, adding more of them is redundant. The offensive pie won’t grow a whole lot bigger by adding yet another ball-dominant scorer to a team with four of them already.
Contrast that with adding Stephen Curry, Ray Allen and Reggie Miller to a team with Jordan or Kobe. In that case, the ball-dominant scorer could go to work, and if anyone even thought about doubling him, he could kick it out to an all-time great shooter. This would result in more made threes, more efficiency and fewer defenders able to help on Kobe or Jordan. Three-point shooting, unlike generic high-volume scoring, does scale. It does grow the pie and is not redundant.
Another quality that quite obviously scales is defense, especially for shot-blocking big men. Imagine if you had Hakeem Olajuwon at center, Kevin Garnett at power forward and Rodman as your front court. All three would shrink the opponent’s output, make it harder to get to the rim, harder to get second-chance points and open looks. Throw in Gary Payton and Kawhi Leonard on the perimeter, and you’d have lock-down starting five that shrunk the opponents’ pie considerably.
Rebounding and passing also scale for obvious reasons. If you had Magic Johnson, Larry Bird and Nikola Jokic on the same team, it would score a ton of points, especially if you added a couple more shooters like Curry and Kevin Durant. Or a team with elite rebounders like Rodman, Garnett and Wilt Chamberlain along with Russell Westbook and Luka Doncic in the backcourt.
In any event, you get the point. If you’re going to build all-time teams, you can’t necessary just stack them with the five greatest players of all-time any more than you would stack an all-time NFL team with Patrick Mahomes, Tom Brady, Joe Montana and Peyton Manning — there’s only one ball.
Other stipulations: you get these players at their peaks, not for their entire careers, so there are no bonus points for longevity or career stats. And I’m assuming they’d all have to suit up today, so there’s no era adjustment for Kareem Abdul-Jabbar or Bill Russell, for example. Finally, I give some weight to clutchness, as measured by playoff success — you want winners, players who transcend their specific skill sets with mentality.
Here are my squads:
Third Team:
PG Chris Paul — I could have gone with Payton, John Stockton, Steve Nash, Isaiah Thomas, Oscar Robertson or even Damian Lillard, but I’m not making any era adjustments, and Paul is still active. He can shoot, shoot from deep, pass and run the offense as well as anyone. I also am partial to Russell Westbrook because he’s so explosive, but he can’t shoot, and is very high usage. Paul is a 37/46/87 career shooter with 9.4 apg and led the league in steals six times.
SG James Harden — I could have taken Kobe Bryant, Dwyane Wade or one of the pure shooters like Reggie Miller or Ray Allen, but on a team like this you don’t need a ball-dominant two-point shooter/dunker as much as a three-point shooter/passer/playmaker, and Harden fits the bill. Harden doesn’t play much defense, but you can forgive that in a perimeter player. I went back and forth between him and Kobe because while Harden is a much better fit on an all-time team, Kobe has five titles, and two finals MVPs, while Harden’s never done much in the postseason.
SF Kawhi Leonard — It’s funny that two of my third-team players are on the present-day Clippers, and Paul George would arguably find a spot if I went five teams deep. Leonard is one of the best non-big-man defenders of all-time, has two titles and two finals MVPs. He’s also a 39/50/86 shooter for his career. (Maybe he belongs on the second team.)
PF Tim Duncan — I narrowly took him over Karl Malone (era), Dirk Nowitzki (defense) and maybe shoehorning a center like Bill Russell (era) into the spot. Duncan isn’t going to stretch defenses, was a good, but not great passer and won’t handle the ball much. But he was an elite defensive big man and ultra-reliable scorer in the post. He also won two MVPs and five titles. ** C Wilt Chamberlain** — This was the toughest call with an era adjustment and so many worthy players left out (Kareem, Shaq, David Robinson, Russell, Moses Malone), but Wilt would muscle the soft, modern NBA centers around like they were children. He also ran absurdly fast times for the 100, 400 and 800 meter distances for a 6-11 (at the time) high school athlete (the actual numbers cited (49-second 400!) seem apocryphal as they’re too ridiculous to believe), but still. His NBA stats were so off the charts for his era, it’s hard even to put them into context. While he lost to Russell’s Celtics every year, he won two titles and four MVPs.
Second Team
PG Magic Johnson — Magic had three MVPs and five titles. He shot 52 percent from the floor and 85 from the line while averaging 11.2 apg. The only thing he didn’t do was shoot the three, but that was also due to the era in which he played.
SG Kevin Durant — I shoehorned Durant into SG when really he’s a small forward, but I wanted to get another great shooter (39/50/88 for his career), and at nearly seven feet he can help protect the rim too. But maybe with Magic, I should have put in a dunker like Kobe or Clyde Drexler to run the floor.
SF LeBron James — I know it’s blasphemy to have him on only the second team, but he’ll pair nicely with Magic running the floor. LeBron got dinged because he’s not an elite shooter (35 from three, 74 from the line), and despite the insane longevity, he had only two titles outside of his hand-picked dream team with the Heat (who blew a third one against the undermanned Mavericks.) LeBron plays defense, can defend any position and averaged 7.4 apg for his career. He’s also more valuable on a team that needs someone to do it all than on an all-time one.
PF Kevin Garnett — Blame this one on Andre’ who sold Garnett to me for 15 years straight as a short-list GOAT. Garnett was an elite defender and rebounder, an excellent passer and could shoot from outside for a big man. He wasn’t much of a three-point shooter, though. He won only one title and MVP.
C Hakeem Olajuwon — An elite, all-time defender who at his peak was averaging four blocks, 14 rebounds and two steals per game, Olajuwon won two titles and an MVP. He wasn’t as good for as long as Abdul-Jabbar or as big and powerful as Wilt, but I’m making an era adjustment here.
First Team
PG Stephen Curry — I love Magic, but Curry translates better to an all-time team because he’s the greatest shooter of all time. There are only a handful of 40/50/90 players in NBA history, and none attempted even 400 threes, let alone the 886 that Curry put up that year. He also has four titles and two MVPs.
SG Michael Jordan — I actually don’t love a ball-dominant player on an all-time team, and Jordan is as ball dominant as they come. It’s just that no one grades higher for mentality, and if the game were on the line, he’s still the player everyone would want with the ball. Everyone knows about the six titles (despite missing two prime years), five MVPs and excellent defense too.
SF Larry Bird — I went Bird over LeBron because his skill set (shooting, passing) scales so well on a team like this. Bird was another 40/50/90 guy, and at 6-9, 220 averaged 10 boards and 6.3 assists per game for his career. He also won three titles, three MVPs and played solid defense though he’d probably be a liability there at small forward in 2024.
PF Giannis Antetokounmpo — Why not have an elite defensive player who can protect the rim, handle the ball and play all five positions? Giannis has shot 55 percent from the floor for his career because he’s always at the basket, has two MVPs and an NBA title. This is an all-time team with elite outside shooters on it, so we don’t care that he’s not going to stretch defenses. He can pass pretty well too for a big man.
C Nikola Jokic — Another controversial pick, but Jokic is by far the greatest passing big man of all time, has three MVPs, an NBA title and even plays pretty good defense these days. He also shoots 35/56/83 for his career and has averaged nearly 11 boards.
Maybe you could argue to swap out Jokic for the more defensive-oriented Olajuwon or even Bill Russell on this top team, given how much offense is already on it, but as I mentioned, passing scales, and having five guys who can pass and score, would be tough to stop. (You could even argue for removing Bird for Scottie Pippen or even Dennis Rodman on a team like this, but Larry might be second only to Jordan for mentality.)
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28The Lightning Network solves the problem of the decentralized commit
Before reading this, see Ripple and the problem of the decentralized commit.
The Bitcoin Lightning Network can be thought as a system similar to Ripple: there are conditional IOUs (HTLCs) that are sent in "prepare"-like messages across a route, and a secret
p
that must travel from the final receiver backwards through the route until it reaches the initial sender and possession of that secret serves to prove the payment as well as to make the IOU hold true.The difference is that if one of the parties don't send the "acknowledge" in time, the other has a trusted third-party with its own clock (that is the clock that is valid for everybody involved) to complain immediately at the timeout: the Bitcoin blockchain. If C has
p
and B isn't acknowleding it, C tells the Bitcoin blockchain and it will force the transfer of the amount from B to C.Differences (or 1 upside and 3 downside)
-
The Lightning Network differs from a "pure" Ripple network in that when we send a "prepare" message on the Lightning Network, unlike on a pure Ripple network we're not just promising we will owe something -- instead we are putting the money on the table already for the other to get if we are not responsive.
-
The feature above removes the trust element from the equation. We can now have relationships with people we don't trust, as the Bitcoin blockchain will serve as an automated escrow for our conditional payments and no one will be harmed. Therefore it is much easier to build networks and route payments if you don't always require trust relationships.
-
However it introduces the cost of the capital. A ton of capital must be made available in channels and locked in HTLCs so payments can be routed. This leads to potential issues like the ones described in https://twitter.com/joostjgr/status/1308414364911841281.
-
Another issue that comes with the necessity of using the Bitcoin blockchain as an arbiter is that it may cost a lot in fees -- much more than the value of the payment that is being disputed -- to enforce it on the blockchain.[^closing-channels-for-nothing]
Solutions
Because the downsides listed above are so real and problematic -- and much more so when attacks from malicious peers are taken into account --, some have argued that the Lightning Network must rely on at least some trust between peers, which partly negate the benefit.
The introduction of purely trust-backend channels is the next step in the reasoning: if we are trusting already, why not make channels that don't touch the blockchain and don't require peers to commit large amounts of capital?
The reason is, again, the ambiguity that comes from the problem of the decentralized commit. Therefore hosted channels can be good when trust is required only from one side, like in the final hops of payments, but they cannot work in the middle of routes without eroding trust relationships between peers (however they can be useful if employed as channels between two nodes ran by the same person).
The next solution is a revamped pure Ripple network, one that solves the problem of the decentralized commit in a different way.
[^closing-channels-for-nothing]: That is even true when, for reasons of the payment being so small that it doesn't even deserve an actual HTLC that can be enforced on the chain (as per the protocol), even then the channel between the two nodes will be closed, only to make it very clear that there was a disagreement. Leaving it online would be harmful as one of the peers could repeat the attack again and again. This is a proof that ambiguity, in case of the pure Ripple network, is a very important issue.
-
-
@ c73818cc:ccd5c890
2024-05-14 15:36:41🎃 La mossa del presidente Biden di vietare alle banche di custodire Bitcoin è un segnale positivo per la sovranità individuale e la resistenza al controllo finanziario centralizzato. Bitcoin è un bene degli individui, non delle istituzioni, e questa decisione rafforza il diritto di ognuno di gestire i propri fondi, anche se la scelta non è certo stata fatta per questo motivo, ma anzi è volta a reprimere la diffusione di Bitcoin.
🎃 Bitcoin è una tecnologia rivoluzionaria che offre agli utenti un controllo senza precedenti sulle proprie finanze. Vietare alle banche di custodire Bitcoin significa preservare questo controllo e proteggere gli individui dai rischi del sistema finanziario centralizzato.
🎃 Questa mossa è una gaffe che dimostra l'incompetenza politica su Bitcoin. Con l'aumento del numero di persone che adottano Bitcoin, la sua influenza continuerà a crescere, minando il potere delle istituzioni finanziarie tradizionali e dando agli individui il controllo sul proprio futuro finanziario.
Seguici sui nostri canali social ed unisciti al nostro gruppo Telegram:
https://t.me/Bitcoin_Report_Italia
BitcoinReportItalia #Biden #Banche #Bank #ETF #USA #Economia #FED #SEC #BTC #Bitcoin
-
@ 502ab02a:a2860397
2024-04-22 02:20:31น้ำแร่ แน่เหรอ เรื่องน้ำดื่มนั้น ตอนนี้เราน่าจะแบ่งเป็น 2 ส่วนใหญ่ๆได้คือ น้ำดื่มทั่วไป และ น้ำแร่
คำถามคือ เราเริ่มซื้อน้ำกินตั้งแต่เมื่อไหร่
ถ้าตอบแบบไม่ต้องท่องจำวันเวลา ก็ต้องตอบว่า ตั้งแต่มีระบบการประปา นั่นละครับ ระบบการประปามีมาทดแทนระบบน้ำในสมัยก่อน ที่ต้องไปตักจากลำธาร บึง หนอง ก็เริ่มมีการต่อท่อไม้ไผ่มาในหมู่บ้าน หรือ มีการขุดพบน้ำใต้ดินขึ้นมา
จนมีการพัฒนาความเป็นอยู่มาจบที่ระบบประปาในที่สุด ซึ่งในประเทศผู้เจริญแล้ว มีการผลิตน้ำประปาแบบสามารถดื่มจากก๊อกได้เลย เรียกว่า tap water ชัดเลยคือ อเมริกา ญี่ปุ่น ส่วนประเทศโลกที่3 แม้จะพยายามบอกว่า ปาป้า ดื่มได้ เอารัฐมนตรีมาจิบแบบแหยงๆให้เราดู เราก็ยังไม่มั่นใจพอที่จะดื่ม
ในสมัยก่อนเราก็เลยมีการต้มน้ำกรอกใส่ขวดก่อนจะนำมาดื่ม
ทั้งนี้ทั้งนั้น ก็สามารถสรุปรวบยอดได้ว่า ระบบประปาของโลกนี้ ทำให้เราสามารถใช้น้ำที่สะดวกสบาย และมีมาตรฐานเท่าเทียมกันพอสมควรในแต่ละพื้นที่ เรียกว่าสะอาดกว่าแหล่งน้ำ “บางที่” แหละ แต่ส่วนใหญ่ถ้าเป็นน้ำใต้ดินลึกๆหรือน้ำพุ นั่นธรรมชาติได้ทำการกรองแบบมหาโหด มาให้เราแล้ว ต่างกับการตักดื่มจากห้วย หนอง คลอง บึง
ทีนี้น้ำแร่เกิดมาตอนไหน มันมีตั้งแต่เราเริ่มดื่มน้ำจากแหล่งธรรมชาติแล้ว แต่การบรรจุขวดขายมันเกิดมาในช่วงที่ประปามีบนโลกนี้ เอเวียง น่าจะเป็นเจ้าแรกๆ ที่บรรจุขวดมาขายในต่างประเทศ
เอาจริงๆดูในรายการ #บอกเล่า90บวก1 ตอน สงครามน้ำขวด ละเอียดกว่าเยอะ ดูเหอะนะ ตอนทำมันเหนื่อย 55555 https://youtu.be/L2OKv0HVO6A?si=-Gs9kjscpXzqja0k
ในตอนแรกที่ทำเขาก็ไม่ได้ว่าจะมาเพื่อสร้างความเทพกว่าอะไร มาเป็นแค่ทางเลือก มีขายในร้านขายยา ซึ่งสมัยนั้น ราวๆ 1960 ร้านยาเป็นแหล่งแกดเจท อัพเกรดนั่นนี่ เพื่อเอาเงินอยู่แล้ว) ซึ่งตอนแรกที่มาทำตลาดในอเมริกา มันก็ไม่สำเร็จเพราะคนอเมริกานิยมโค้ก ที่เพิ่งมีบนโลกเหมือนกัน และพวกเค้าคิดว่าน้ำเปล่า กินจากก๊อกก็ได้จะซื้อทำบ้าอะไร
จนกระทั่งเพอริเอ้ มาทำการตลาดหนักๆ เน้นหรูๆ เป็นสปอนเซอร์ให้งานมาราธอนงานใหญ่ ประกอบกับกระแสสุขภาพเริ่มมีการทำตลาดในอเมริกาด้วยเช่นกัน สินค้าสุขภาพในตอนนั้น ทำเงินได้มากมหาศาล และเพอริเอ้เอง นอกจากจะชูภาพลักษณ์ที่หรูหราแล้ว ยังชูความสุขภาพกับเขาด้วย โดยเฉพาะการทำตัวเป็น mixer 0แคล เอาไปตีตลาดกับไดเอทโค้ก ที่คนนิยมผสมเหล้ากิน เน้นว่าซ่าด้วย 0แคลด้วย มีแร่ธาตุสุขภาพด้วย คนก็เลยแห่กันไปซื้อมาถืออวด เพื่อความดูรวย ดูรักษาสุขภาพ ที่มันทำได้ก็เพราะ เพอริเอ้ ได้นาย บรูซ เนวินส์ ผู้ที่ทำการตลาดให้ยีนส์กรรมกรอย่างลีวายส์ กลายเป็นกางเกงสุดเท่ ที่ดีไซน์เนอร์ให้การยอมรับในแบรนด์นั้นไปเฉยเลย แล้วจะแปลกอะไร กับน้ำแร่ใส่ขวดอย่าง เพอริเอ้ ??? ไม่ยากเลยที่จะทำให้คนทั้งโลกรู้สึกว่า น้ำแร่ คือน้ำที่อัพเกรดทุกอย่างในชีวิต ตั้งแต่สุขภาพ ไลฟ์สไตล์ รวมถึงเป็นน้ำที่ดีกว่าน้ำใดๆในโลก ตามที่ บรูซ เนวินส์ บอกให้คนทั้งโลกเชื่อตามเขา
หลังจากเพอริเอ้ ทำสำเร็จ กอบรายได้จากแค่6แสนเหรียญ ไปเป็น 60ล้านเหรียญได้ภายใน 3 ปี ทีนี้ตลาดน้ำแร่ ก็มีผู้เล่นแห่กันเข้ามาตักตวงเงินก้อนใหญ่อีกก้อนบนโลกนี้ วิจัยต่างๆประดังประดาเข้ามาทำให้มนุษย์โลกเชื่อว่า เขาต้องดื่มน้ำแร่ จึงจะมีสุขภาพที่ดีกว่าการดื่มน้ำประปา
แถมกลุ่มรักษ์โลก ยังมาช่วยโจมตีน้ำธรรมชาติด้วยอีกตีน ว่ายาฆ่าแมลง สารพิษต่างๆบนโลก มันลงไปในน้ำหมดแล้วแก แกจะดื่มน้ำยาฆ่าแมลงเหรอ
คนที่เอาเท้าก่ายหน้าผาก ก็คงจะมีแต่ ชาวประปา นั่นหละครับ อยู่ดีๆ KPI ก็รวนไปหมด
จากนั้นปี 1993 ปีที่โลกเริ่มรู้ทันว่า น้ำตาล แม่งทำให้อ้วน ยิ่งทำให้กระแสสุขภาพ กระแสน้ำแร่ พุ่งกระฉูดไปใหญ่ มีกระทั่งน้ำสำหรับน้อลหมา น้อลแมว คนแม่งก็ซื้อกันเช่นเคย
ในเวลานั้น นอกจากน้ำแร่แล้ว เจ้าที่ไปจองแหล่งน้ำธรรมชาติไม่ทัน หรือจองไม่ไหว ก็มาจัดน้ำเปล่าลงขวดขายกัน โดยการใช้กระบวนการเอาน้ำประปามากรองเพิ่มให้ โดยการโฆษณาว่าบริสุทธิ์สัดๆ เชื้อโรคหายม๊ด เอาจริงๆคือ หายม๊ดทุกอย่าง แร่ดีก็หายแร่ร้ายก็ตุย แล้วยังเอาไปผ่านโอโซนเพื่อความไฮโซอี๊ก เพราะคำว่าโอโซน กลุ่มรักษ์โลก ปูทางไว้ให้แล้ว ว่ามันดี เขาก็ยัดความดีที่เรารู้สึกไปเองมาใส่ขวดเพื่อขายเราอีกที เรียกว่ากระบวนการ รีเวิร์ส ออสโมซิส หรือ RO พอจะคุ้นกันแล้วไหมครับ
ตอนนี้น้ำดื่มก็ลงขวดมา 2แบบแล้วคือ น้ำแร่ กับ น้ำประปากรองแล้วกรองอีก แล้วกลุ่มรักษ์โลก ก็รวมกันกระทืบน้ำประปาต่ออีกยกใหญ่ ด้วยการจัดคอนเทนท์ในตำนาน ที่เหยียบน้ำประปาจมดิน นั่นคือ Top 13 States with the worst public water ratings in the US และ 13 reasons why you shouldn’t drink tap water แหม่ อินฟลูระดับนี้ลงคอนเทนท์แบบนี้ ทำให้คนอเมริกาเป็นบ้าในทันที นักธุรกิจก็ตอบรับในทันที เข็นโปรเจคที่ทำรอไว้แล้ว ออกมาช้อนตลาดทันควัน ไม่ว่าจะเป็นน้ำผสมวิตามิน ผสมแร่ธาตุ ผสมโน่นนี่นั่น ตามแต่ตลาดจะยินดีจ่าย
แถมปี 2000 สธ.อเมริกา ก็ประกาศปริมาณน้ำดื่มที่ประชาชนควรดื่มในแต่ละวันออกมาอีก ทำให้มูลค่าตลาดน้ำขวดบนโลกนี้ติดจรวดไปอยู่ที่ หกหมื่นเจ็ดพันล้านเหรียญ (67 billion$)
เป็นการเอาของฟรีๆบนโลกนี้ มาใส่ขวดขายได้มีมูลค่าดีที่สุดในโลกอย่างนึงเลยเชียว
ในเรื่องของน้ำแร่ในปัจจุบันนั้น ยังมีอีกกิ่งนึงที่ทำตลาดและราคาได้ดีกว่าแค่สุขภาพคือ อาติซาน (Artisan) อีกแล้วครับ คือ มีการจำแนกน้ำแร่ที่เหมาะกับอาหารในแต่ละประเภท ในร้านอาหารระดับดีๆ จะมีตัวเลือกเรื่องน้ำที่จะแพริ่ง (pairing) กับอาหารด้วย เช่น อาหารประเภทหอยนางรม จะแพร์กับน้ำแร่ที่เบาซ่ามีแร่น้อยๆ เพราะในหอยมีมากแล้ว เป็นต้น
ดังนั้นถ้าจะถามว่า น้ำแร่ จำเป็นต้องดื่มไหมเพื่อให้สุขภาพดี ผมว่าเท่าที่เล่าความเป็นมาของมัน ก็น่าจะพอตอบได้แล้วว่า คำถามที่เกิดขึ้น มันมาจากการวางตลาดตั้งแต่สมัยก่อนทำให้ชุดความคิดนี้มันติดหนึบในสมองคนแต่ละรุ่น และสอนต่อๆกันมานั่นหละครับ วัตถุประสงค์ของการดื่มน้ำ มันคือนอกจาก H2O แล้วมันก็ต้องการแร่ธาตุตามธรรมชาติอยู่แล้ว น้ำธรรมชาติก็มีอยู่แล้ว แต่ด้วยสภาพแวดล้อมปัจจุบัน หลายคนอาจอยู่ในแหล่งน้ำที่ไม่ดีงามพอที่จะไปตักมาดื่มทันที งานประปาก็มีการทำความสะอาดให้ประมาณนึง ประมาณที่ในเกณฑ์ดีพอ พอที่จะกลับไปต้มกรอกขวดเอง พอที่จะเอาไปผ่านเครื่องกรองเอาความสกปรกออกเองที่บ้าน (ในกรณีเชื่อในระบบผลิตประปา แต่ไม่เชื่อในระบบการจัดซื้อจัดจ้างท่อประปารวมถึงความมืออาชีพในการวางแนวท่อประปา)
ระบบน้ำที่ส่งมาที่บ้านก็มีแร่ธาตุที่ดีพอที่จะใช้งานในชีวิตประจำวัน ไม่จำเป็นต้องดื่มน้ำแร่เท่านั้น จึงจะทำให้สุขภาพดี กลับกัน ที่ไม่ควรดื่มเลยคือน้ำระบบ RO ต่างหาก เพราะมันไม่มีเหี้ยอะไรเลยครับ เปลืองท้องมากๆ แถมลองไปส่องฉลากดู วิชา #ฉลาก3รู้ ที่สอนไปจะทำให้เราเห็นว่า น้ำขวดในร้านสะดวกซื้อนั้น ร่วม90% แม่งเป็นน้ำ RO ครับ มันเลยกลายเป็นส่งต่อความดีความชอบให้น้ำแร่ไปโดยปริยาย เพราะในตู้นั้นสวยอยู่คนเดียว
แต่มันราคาสูง เกินกว่าจะเป็น everyday water สำหรับหลายๆคน แล้วถ้าไอ้หลายๆคนนั้นดันไม่เชื่ออีกว่า น้ำต้มเองกรองเองมันก็ดีพอ คือเกิดมามึงจะซื้อแดกอย่างเดียว ก็มีทางออกให้ครับ เอาน้ำ RO พวกนั้นมาทำสิ่งที่เรียกว่า คืนธรรมชาติสู่สายน้ำ ถ้าคนผลิตแม่งกรองทิ้งหมด เราก็ใส่กลับคืนเข้าไป ใส่เกลือเพิ่มเอา เกลือทะเลก็ได้ เกลือชมพูก็ดีถ้ามีเงินพอไม่ต้องไปกู้มาซื้อ เพราะเกลือคือของที่ค้างบนโลกหลังจากพระอาทิตย์เผาซะน้ำหายหมดบ๋อต๋อ
ส่วนจะใส่แค่ไหน ตอบได้สั้นๆว่า “ไม่รู้ครับ” คือพวกนี้มัน depend on อ่ะ ตั้งแต่น้ำหนักตัว ไลฟ์ไตล์เต้นแร้งเต้นกามากไหม อากาศวันนั้นร้อนไหม อื่นๆอีกมากมาย ทำให้แต่ละคนสูญเสียแร่ธาตุไม่เท่ากัน ปริมาณแร่ที่ต้องการกลับคืนร่างกายก็เลยไม่เท่ากัน
ดังนั้น ถ้าไม่เชื่อใจน้ำกรอง ก็ต้องไปเติมเอาเอง ไปดูชีวิตตัวเองครับ ถ้ายังมึนๆก่งก๊ง ก็เติมเพิ่ม ถึงจุดที่สดชื่นก็จดไว้ว่าประมาณเท่าไหร่ จำเอาของแต่ละคนเอาเอง แล้วแต่ละวันก็ดูตัวเองว่าจะบวก หรือ ลบ ไปจากค่า par ที่เคยจดไว้
คำถามคือ อยากรู้เรื่องน้ำแร่ ก็ได้เล่าให้อ่านกันแล้วนะครับ เรื่องราวของน้ำแร่ พร้อมทั้งดักคำตอบให้แล้ว ว่าตกลงยังไง น้ำแร่แน่เหรอ คิดย้อนกำเนิดของมัน รวมกับตั้งคำถามตัวเองว่า เราดื่มน้ำเพื่ออะไร เอาเหตุและผลของการดื่มน้ำ ไปปฎิบัติ ก็จะได้แนวทางการใช้ชีวิตครับ ในโลกนี้ไม่มีของกินอะไรเทพไปจนขนาดว่า เราต้องไปขวนขวายมัน นอกถิ่นแผ่นดินเกิดครับ ทุกประเทศสืบพันธุ์กันมาหลายชั่วอายุคนแล้ว ของกินพื้นดินแดนเกิด มันทำให้เรามีชีวิตและสุขภาพดีได้ครับ
แค่ฉลาดเลือกและใช้ชีวิตให้ดี Choose wisely, live well
แถมให้ครับ งานอดิเรกผมคือ เก็บ list ฉลากน้ำแร่ ว่าแต่ละยี่ห้อมีอะไรบ้าง คือทั้งดีทั้งห่วย เก็บหมดครับ เข้าไปดูกันได้ถ้าอยากดื่มกัน มันก็น้ำอ่ะครับ
อยากเข้าไปดูก็เชิญในลิงค์นี้ครับ มาพร้อมวาร์ปสั่งซื้อเช่นเคย 5555 https://siripun.com/2024/04/22/mineral-water/
และนอกจากเรื่องการตลาดที่ว่าแล้ว มีอีกสาเหตุนึงที่ฝั่งอเมริกา ยอดขายน้ำขวดสูงมากๆ นั่นคือ การตีแผ่ความจริงของการใส่ “ฟลูออไรด์” ลงในแหล่งน้ำ อ้าว…มันดีไม่ใช่เหรอ ฟันแข็งแรง
เรื่องนี้ มันงอกได้อีก ep นะสิครับ
pirateketo
siamstr
เทปรายการ #บอกเล่า90บวก1 ep เกี่ยวกับน้ำขวด จะเล่าแบบละเอียดพอสมควรครับ https://youtu.be/L2OKv0HVO6A?si=-Gs9kjscpXzqja0k
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Eltoo
Read the paper, it's actually nice and small. You can read only everything up to section 4.2 and it will be enough. Done.
Ok, you don't want to. Or you tried but still want to read here.
Eltoo is a way of keeping payment channel state that works better than the original scheme used in Lightning. Since Lightning is a bunch of different protocols glued together, it can It replace just the part the previously dealed with keeping the payment channel.
Eltoo works like this: A and B want a payment channel, so they create a multisig transaction with deposits from both -- or from just one, doesn't matter. That transaction is only spendable if both cooperate. So if one of them is unresponsive or non-cooperative the other must have a way to get his funds back, so they also create an update transaction but don't publish it to the blockchain. That update transaction spends to a settlement transaction that then distributes the money back to A and B as their balances say.
If they are cooperative they can change the balances of the channel by just creating new update transactions and settlement transactions and number them like 1, 2, 3, 4 etc.
Solid arrows means a transaction is presigned to spend only that previous other transaction; dotted arrows mean it's a floating transaction that can spend any of the previous.
Why do they need and update and a settlement transaction?
Because if B publishes update2 (in which his balances were greater) A needs some time to publish update4 (the latest, which holds correct state of balances).
Each update transaction can be spent by any newer update transaction immediately or by its own specific settlement transaction only after some time -- or some blocks.
Hopefully you got that.
How do they close the channel?
If they're cooperative they can just agree to spend the funding transaction, that first multisig transaction I mentioned, to whatever destinations they want. If one party isn't cooperating the other can just publish the latest update transaction, wait a while, then publish its settlement transaction.
How is this better than the previous way of keeping channel states?
Eltoo is better because nodes only have to keep the last set of update and settlement transactions. Before they had to keep all intermediate state updates.
If it is so better why didn't they do it first?
Because they didn't have the idea. And also because they needed an update to the Bitcoin protocol that allowed the presigned update transactions to spend any of the previous update transactions. This protocol update is called
SIGHASH_NOINPUT
[^anyprevout], you've seen this name out there. By marking a transaction withSIGHASH_NOINPUT
it enters a mystical state and becomes a floating transaction that can be bound to any other transaction as long as its unlocking script matches the locking script.Why can't update2 bind itself to update4 and spend that?
Good question. It can. But then it can't anymore, because Eltoo uses
OP_CHECKLOCKTIMEVERIFY
to ensure that doesn't actually check not a locktime, but a sequence. It's all arcane stuff.And then Eltoo update transactions are numbered and their lock/unlock scripts will only match if a transaction is being spent by another one that's greater than it.
Do Eltoo channels expire?
No.
What is that "on-chain protocol" they talk about in the paper?
That's just an example to guide you through how the off-chain protocol works. Read carefully or don't read it at all. The off-chain mechanics is different from the on-chain mechanics. Repeating: the on-chain protocol is useless in the real world, it's just a didactic tool.
[^anyprevout]: Later
SIGHASH_NOINPUT
was modified to fit better with Taproot and Schnorr signatures and renamed toSIGHASH_ANYPREVOUT
. -
@ d85d489c:c50ae568
2024-05-14 14:12:41Linux işletim sistemlerinde dosya ve klasör izinleri, verilerin güvenliğini sağlamanın kritik bir parçasıdır. Bu yazıda, Linux dosya izinlerini değiştirmenin yöntemlerini ve bu işlemi nasıl yapacağımıza bir bakalım.
Görsel veribilimiokulu.com sitesinden alınmıştır
ls -l komutu çalıştırdığımız zaman yukarıdaki görsele benzer, satır başlarında drwxr-xr-x tarzında karakterler görmüşsünüzdür. Bunlar sırasıyla dosya türü, sahiplik yetkileri, grup yetkileri ve herkesin görüp göremeyeceğini belirleyen kavramlardır.
Linux'ta, her dosya ve dizin bir sahibe, bir grup ve bir de diğer kullanıcılar olmak üzere üç tür kullanıcıya ait izinlerle yönetilir. Her kullanıcı tipi için, dosyanın veya dizinin okuma, yazma ve çalıştırma gibi farklı izin seviyeleri tanımlanabilir.
- Okuma (Read) ( r ): Dosyanın içeriğini görüntülemek veya okumak için izin verir.
- Yazma (Write) (w): Dosyaya yazmak veya içeriğini değiştirmek için izin verir.
- Çalıştırma (Execute) (x): Dosyayı çalıştırmak veya içeriğindeki betikleri yürütmek için izin verir.
Her bir kullanıcı türü için izinler ayrı ayrı belirlenebilir. İzinler genellikle bir sayı dizisi olarak ifade edilir. Örneğin, 735 gibi.
- İlk rakam (7): Dosya sahibinin izinlerini temsil eder.
- İkinci rakam (3): Dosya sahibinin grubunun izinlerini temsil eder.
- Üçüncü rakam (5): Diğer kullanıcıların izinlerini temsil eder.
Her rakam, izinlerin toplamını ifade eder. Örneğin:
- 7 = rwx (okuma, yazma ve çalıştırma izinleri)
- 3 = -wx (yazma ve çalıştırma)
- 4 = r-x (okuma ve çalıştırma izinleri) news Her karakterin de değerleri vardır:
- r = 4 (okuma)
- w = 2(yazma)
- x = 1 (çalıştırma)
Örnek olarak
Örnek vermek gerekirse, oluşturmuş olduğumuz LibreOffice Writer dosyasını sadece sahibinin okuyabileceği duruma getirelim:
Umarım yazım açıklayıcı olmuştur. İyi günler dilerim 👋🏻
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28idea: Hosted-channels Lightning wallet that runs in the browser
Communicates over HTTP with a server that is actually connected to the Lightning Network, but generates preimages and onions locally, doing everything like the Hosted Channels protocol says. Just the communication method changes.
Could use this library: https://www.npmjs.com/package/bolt04
-
@ 5d4b6c8d:8a1c1ee3
2024-05-14 13:33:09 -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28doulas.club
A full catalog of all Brazilian doulas with data carefully scrapped from many websites that contained partial catalogs and some data manually included. All this packaged as a Couchapp and served directly from Cloudant.
This was done because the idea of doulas was good, but I spotted an issue: pregnant womwn should know many doulas before choosing one that would match well, therefore a full catalog with a lot of information was necessary.
This was a huge amount of work mostly wasted.
Many doulas who knew about this didn't like it and sent angry and offensive emails telling me to remove them. This was information one should know before choosing a doula.
See also