-
@ 169292c6:e7064967
2024-06-13 00:17:23Details
- ⏲️ Prep time: 10 min
- 🍳 Cook time: 0
Ingredients
- 8 oz of Imitation Crab Meat
- 1 small onion
- 2 celery sticks
- 1/2 cup of Mayonnaise
- 1 teaspoon of Garlic Powder
- 3 tablespoons of lemon Juice
- Salted Butter
- 1 teaspoon Onion Powder
- 1 teaspoon Parsley
- king Hawaiian Sweet Rolls
Directions
- Dice onion and celery and package of crab. Dice as fine as you'd like. In medium bowl, add mayo, lemon, parsley, garlic and onion powder. Mix. Next add in chopped veggies and crab. Mix together well with spoon. In the meantime, butter the rolls and sprinkle with garlic powder. Toast in the oven until slightly toasted. Remove from toaster oven slice the rolls and place crab mix inside the rolls.
-
@ 0403c86a:66d3a378
2024-06-12 22:46:54Top 10 prospects
-
Martin Baturina 🇭🇷 (Croatia) - The 'Next Modric' with Juventus and Arsenal on his tail.
-
Warren Zaire-Emery 🇫🇷 (France) - The 'Robot' PSG prodigy, youngest goalscorer in over a century!
-
Benjamin Sesko 🇸🇮 (Slovenia) - The 'Iceman' striker, linked with a £50m-plus move to Arsenal.
-
Brian Brobbey 🇳🇱 (Netherlands) - The 'Brobbeast' with 22 goals for Ajax in a breakout season.
-
Florian Wirtz 🇩🇪 (Germany) - The 'new Kai Havertz', dazzling for Bayer Leverkusen.
-
Giorgi Mamardashvili 🇬🇪 (Georgia) - The highly-rated goalkeeper linked to Bayern Munich.
-
Johan Bakayoko 🇧🇪 (Belgium) - The 16-goal, 14-assist PSV winger with Bayern, Arsenal, and Liverpool interested.
-
Georgiy Sudakov 🇺🇦 (Ukraine) - The in-demand attacking midfielder shining for Shakhtar Donetsk.
-
Jamal Musiala 🇩🇪 (Germany) - The 'Bambi' midfielder, already a star for Bayern Munich and Germany.
-
Joao Neves 🇵🇹 (Portugal) - The Benfica midfielder, tipped as an Enzo Fernandez replacement for £80m or more.
Global Sports Central 🌐 #GSC360
-
-
@ 5248bc11:f3b26997
2024-06-12 23:39:06Chef's notes
Natural Mental Health Solutions
This Zesty Chickpea Veggie Salad for Blood Sugar Control not only stabilizes blood sugar but also aids in mood regulation through serotonin synthesis. Chickpeas, a salad staple, are abundant in vitamin B6, crucial for serotonin production. Serotonin, known as the "feel-good" neurotransmitter, regulates mood, sleep, and appetite.
Vitamin B6 acts as a cofactor in converting tryptophan, found in chickpeas, into serotonin in the brain. By providing sufficient vitamin B6, this salad promotes serotonin synthesis, fostering emotional balance and well-being. Additionally, chickpeas' fiber and protein content stabilize blood sugar levels, averting mood-altering fluctuations.
Furthermore, tomatoes and red onions in this salad contain anthocyanins, flavonoids renowned for their antioxidant and anti-inflammatory properties. Anthocyanins in these ingredients combat inflammation and oxidative stress, implicated in depression development. They may also boost serotonin production, enhancing mood regulation.
Incorporating tomatoes and red onions into your diet, as in this salad, offers a delicious way to harness the potential benefits of anthocyanins for mental health. By nourishing your body with these nutrient-rich ingredients, you support physical and emotional well-being, promoting a happier, healthier lifestyle.
Details
- ⏲️ Prep time: 5
- 🍳 Cook time: 0
Ingredients
- 1 can (15 oz) chickpeas, drained and rinsed
- 1 cup cherry tomatoes, halved
- 1/2 cucumber, diced
- 1/4 red onion, finely chopped
- 1/4 cup fresh parsley, chopped
- Juice of 1 lemon
- 2 tablespoons olive oil
Directions
- In a large bowl, combine the chickpeas, cherry tomatoes, cucumber, red onion, and parsley.
- In a small bowl, whisk together the lemon juice, olive oil, salt, and pepper.
- Pour the dressing over the chickpea mixture and toss until well combined.
-
@ e9c9cad5:d20c1735
2024-06-10 19:46:38Chef's notes
This recipe is versatile and can be served with a variety of side dishes like roasted vegetables, salad, or rice.
Details
- ⏲️ Prep time: 10 min
- 🍳 Cook time: 20 min
- 🍽️ Servings: 4
Ingredients
- 4 boneless, skinless chicken breasts
- 1/4 cup olive oil
- Juice of 2 lemons
- 3 cloves garlic, minced
- 1 tablespoon chopped fresh rosemary
- 1 tablespoon chopped fresh thyme
- Salt and pepper to taste
Directions
- In a bowl, mix olive oil, lemon juice, garlic, rosemary, thyme, salt, and pepper.
- Add the chicken breasts to the marinade, ensuring they are well-coated. Marinate for at least 30 minutes, preferably 2 hours.
- Preheat the grill to medium-high heat.
- Grill the chicken for 6-8 minutes on each side, or until fully cooked.
-
@ 02d1e8e1:485a24e1
2024-06-10 05:27:13Details
- ⏲️ Prep time: 30min
- 🍳 Cook time: 55min
Ingredients
- 4 chicken breast skinless
- 1 1/2 cups of breadcrumbs or panko
- 2 eggs
- Fresh basil about a handfull
- 2 cloves of garlic
- 1 cup of grated parmesan
- 1 cup of flour
- Salt and pepper to taste
- 2 cups of sour Cream
- Zest and juice of one lime
- A pinch of two of rosemary
Directions
- Chop up the basil and garlic and mix it with the breadcrumbs and parmesan.
- Place the eggs in a bowl or deep platter and in another container place the flour, then take the breadcrumbs/parm mix in a third platter. Season the chicken with salt and pepper and dip it into the flour, then in the eggs and last place it in the breadcrumb mix, coat it well and lay them to the side.
- Take your sour Cream and place it in a bowl and take the zest of a line and the juice, season it with salt,pepper and two Pinches of rosemary. (For a nice yellow color you can add some tumeric) mix it well and put it in the refrigerator
- Heat butter and a bit of oil in a frying pan and fry the breaded chicken on low to medium heat until fully cooked
- Serve with rice, fries or oven baked potatoes. Enjoy and hopefully you like this recipe as much as me nd my loved ones 🫶😋
-
@ f63316ca:22ba92a9
2024-06-09 22:29:52Chef's notes
Juicing pineapple, mangoes, grapefruit, and coconut water is a simple yet powerful way to nourish your body and unlock the secrets to vibrant health. Embrace the tropical flavors, reap the countless benefits, to become a healthier, more energized you.
*If you don't have a juicer use a blender
Details
- ⏲️ Prep time: 30 minutes
- 🍽️ Servings: 2
Ingredients
- 2 ripe organic red mangoes
- 1 fresh organic pineapple
- 1 fresh large organic grapefruit
- 2, 12 oz coconut water (make sure the ONLY ingredient is coconut water, nothing else added) or use the water from 2 fresh green coconuts
Directions
- Start by cutting your grapefruit in half, you will only use half for the juice and save the other half for juicing later.
- Cut the top, bottom, and skin from the pineapple, cut the pineapple into 8 long vertical pieces, you will only need 4 for this juice save the rest to juice later.
- Next remove the skin from the mangoes and cut the mango into small pieces and set aside.
- Add all fruits to juicer and juice, add the 2 coconut waters to the juice, stir and enjoy!
- *Refrigerate any left over fruits to juice at a later time.
-
@ 6871d8df:4a9396c1
2024-06-12 22:10:51Embracing AI: A Case for AI Accelerationism
In an era where artificial intelligence (AI) development is at the forefront of technological innovation, a counter-narrative championed by a group I refer to as the 'AI Decels'—those advocating for the deceleration of AI advancements— seems to be gaining significant traction. After tuning into a recent episode of the Joe Rogan Podcast, I realized that the prevailing narrative around AI was heading in a dangerous direction. Rogan had Aza Raskin and Tristan Harris, technology safety advocates, who released a talk called 'The AI Dilemma,' on for a discussion. You may know them from the popular documentary 'The Social Dilemma' on the dangers of social media. It became increasingly clear that the cautionary stance dominating this discourse might be tipping the scales too far, veering towards an over-regulated future that stifles innovation rather than fostering it.
Are we moving too fast?
While acknowledging AI's benefits, Aza and Tristan fear it could be dangerous if not guided by ethical standards and safeguards. They believe AI development is moving too quickly and that the right incentives for its growth are not in place. They are concerned about the possibility of "civilizational overwhelm," where advanced AI technology far outpaces 21st-century governance. They fear a scenario where society and its institutions cannot manage or adapt to the rapid changes and challenges introduced by AI.
They argue for regulating and slowing down AI development due to rapid, uncontrolled advancement driven by competition among companies like Google, OpenAI, and Microsoft. They claim this race can lead to unsafe releases of new technologies, with AI systems exhibiting unpredictable, emergent behaviors, posing significant societal risks. For instance, AI can inadvertently learn tasks like sentiment analysis or human emotion understanding, creating potential for misuse in areas like biological weapons or cybersecurity vulnerabilities.
Moreover, AI companies' profit-driven incentives often conflict with the public good, prioritizing market dominance over safety and ethics. This misalignment can lead to technologies that maximize engagement or profits at societal expense, similar to the negative impacts seen with social media. To address these issues, they suggest government regulation to realign AI companies' incentives with safety, ethical considerations, and public welfare. Implementing responsible development frameworks focused on long-term societal impacts is essential for mitigating potential harm.
This isn't new
Though the premise of their concerns seems reasonable, it's dangerous and an all too common occurrence with the emergence of new technologies. For example, in their example in the podcast, they refer to the technological breakthrough of oil. Oil as energy was a technological marvel and changed the course of human civilization. The embrace of oil — now the cornerstone of industry in our age — revolutionized how societies operated, fueled economies, and connected the world in unprecedented ways. Yet recently, as ideas of its environmental and geopolitical ramifications propagated, the narrative around oil has shifted.
Tristan and Aza detail this shift and claim that though the period was great for humanity, we didn't have another technology to go to once the technological consequences became apparent. The problem with that argument is that we did innovate to a better alternative: nuclear. However, at its technological breakthrough, it was met with severe suspicions, from safety concerns to ethical debates over its use. This overregulation due to these concerns caused a decades-long stagnation in nuclear innovation, where even today, we are still stuck with heavy reliance on coal and oil. The scare tactics and fear-mongering had consequences, and, interestingly, they don't see the parallels with their current deceleration stance on AI.
These examples underscore a critical insight: the initial anxiety surrounding new technologies is a natural response to the unknowns they introduce. Yet, history shows that too much anxiety can stifle the innovation needed to address the problems posed by current technologies. The cycle of discovery, fear, adaptation, and eventual acceptance reveals an essential truth—progress requires not just the courage to innovate but also the resilience to navigate the uncertainties these innovations bring.
Moreover, believing we can predict and plan for all AI-related unknowns reflects overconfidence in our understanding and foresight. History shows that technological progress, marked by unexpected outcomes and discoveries, defies such predictions. The evolution from the printing press to the internet underscores progress's unpredictability. Hence, facing AI's future requires caution, curiosity, and humility. Acknowledging our limitations and embracing continuous learning and adaptation will allow us to harness AI's potential responsibly, illustrating that embracing our uncertainties, rather than pretending to foresee them, is vital to innovation.
The journey of technological advancement is fraught with both promise and trepidation. Historically, each significant leap forward, from the dawn of the industrial age to the digital revolution, has been met with a mix of enthusiasm and apprehension. Aza Raskin and Tristan Harris's thesis in the 'AI Dilemma' embodies the latter.
Who defines "safe?"
When slowing down technologies for safety or ethical reasons, the issue arises of who gets to define what "safe" or “ethical” mean? This inquiry is not merely technical but deeply ideological, touching the very core of societal values and power dynamics. For example, the push for Diversity, Equity, and Inclusion (DEI) initiatives shows how specific ideological underpinnings can shape definitions of safety and decency.
Take the case of the initial release of Google's AI chatbot, Gemini, which chose the ideology of its creators over truth. Luckily, the answers were so ridiculous that the pushback was sudden and immediate. My worry, however, is if, in correcting this, they become experts in making the ideological capture much more subtle. Large bureaucratic institutions' top-down safety enforcement creates a fertile ground for ideological capture of safety standards.
I claim that the issue is not the technology itself but the lens through which we view and regulate it. Suppose the gatekeepers of 'safety' are aligned with a singular ideology. In that case, AI development would skew to serve specific ends, sidelining diverse perspectives and potentially stifling innovative thought and progress.
In the podcast, Tristan and Aza suggest such manipulation as a solution. They propose using AI for consensus-building and creating "shared realities" to address societal challenges. In practice, this means that when individuals' viewpoints seem to be far apart, we can leverage AI to "bridge the gap." How they bridge the gap and what we would bridge it toward is left to the imagination, but to me, it is clear. Regulators will inevitably influence it from the top down, which, in my opinion, would be the opposite of progress.
In navigating this terrain, we must advocate for a pluralistic approach to defining safety, encompassing various perspectives and values achieved through market forces rather than a governing entity choosing winners. The more players that can play the game, the more wide-ranging perspectives will catalyze innovation to flourish.
Ownership & Identity
Just because we should accelerate AI forward does not mean I do not have my concerns. When I think about what could be the most devastating for society, I don't believe we have to worry about a Matrix-level dystopia; I worry about freedom. As I explored in "Whose data is it anyway?," my concern gravitates toward the issues of data ownership and the implications of relinquishing control over our digital identities. This relinquishment threatens our privacy and the integrity of the content we generate, leaving it susceptible to the inclinations and profit of a few dominant tech entities.
To counteract these concerns, a paradigm shift towards decentralized models of data ownership is imperative. Such standards would empower individuals with control over their digital footprints, ensuring that we develop AI systems with diverse, honest, and truthful perspectives rather than the massaged, narrow viewpoints of their creators. This shift safeguards individual privacy and promotes an ethical framework for AI development that upholds the principles of fairness and impartiality.
As we stand at the crossroads of technological innovation and ethical consideration, it is crucial to advocate for systems that place data ownership firmly in the hands of users. By doing so, we can ensure that the future of AI remains truthful, non-ideological, and aligned with the broader interests of society.
But what about the Matrix?
I know I am in the minority on this, but I feel that the concerns of AGI (Artificial General Intelligence) are generally overblown. I am not scared of reaching the point of AGI, and I think the idea that AI will become so intelligent that we will lose control of it is unfounded and silly. Reaching AGI is not reaching consciousness; being worried about it spontaneously gaining consciousness is a misplaced fear. It is a tool created by humans for humans to enhance productivity and achieve specific outcomes.
At a technical level, large language models (LLMs) are trained on extensive datasets and learning patterns from language and data through a technique called "unsupervised learning" (meaning the data is untagged). They predict the next word in sentences, refining their predictions through feedback to improve coherence and relevance. When queried, LLMs generate responses based on learned patterns, simulating an understanding of language to provide contextually appropriate answers. They will only answer based on the datasets that were inputted and scanned.
AI will never be "alive," meaning that AI lacks inherent agency, consciousness, and the characteristics of life, not capable of independent thought or action. AI cannot act independently of human control. Concerns about AI gaining autonomy and posing a threat to humanity are based on a misunderstanding of the nature of AI and the fundamental differences between living beings and machines. AI spontaneously developing a will or consciousness is more similar to thinking a hammer will start walking than us being able to create consciousness through programming. Right now, there is only one way to create consciousness, and I'm skeptical that is ever something we will be able to harness and create as humans. Irrespective of its complexity — and yes, our tools will continue to become evermore complex — machines, specifically AI, cannot transcend their nature as non-living, inanimate objects programmed and controlled by humans.
The advancement of AI should be seen as enhancing human capabilities, not as a path toward creating autonomous entities with their own wills. So, while AI will continue to evolve, improve, and become more powerful, I believe it will remain under human direction and control without the existential threats often sensationalized in discussions about AI's future.
With this framing, we should not view the race toward AGI as something to avoid. This will only make the tools we use more powerful, making us more productive. With all this being said, AGI is still much farther away than many believe.
Today's AI excels in specific, narrow tasks, known as narrow or weak AI. These systems operate within tightly defined parameters, achieving remarkable efficiency and accuracy that can sometimes surpass human performance in those specific tasks. Yet, this is far from the versatile and adaptable functionality that AGI represents.
Moreover, the exponential growth of computational power observed in the past decades does not directly translate to an equivalent acceleration in achieving AGI. AI's impressive feats are often the result of massive data inputs and computing resources tailored to specific tasks. These successes do not inherently bring us closer to understanding or replicating the general problem-solving capabilities of the human mind, which again would only make the tools more potent in our hands.
While AI will undeniably introduce challenges and change the aspects of conflict and power dynamics, these challenges will primarily stem from humans wielding this powerful tool rather than the technology itself. AI is a mirror reflecting our own biases, values, and intentions. The crux of future AI-related issues lies not in the technology's inherent capabilities but in how it is used by those wielding it. This reality is at odds with the idea that we should slow down development as our biggest threat will come from those who are not friendly to us.
AI Beget's AI
While the unknowns of AI development and its pitfalls indeed stir apprehension, it's essential to recognize the power of market forces and human ingenuity in leveraging AI to address these challenges. History is replete with examples of new technologies raising concerns, only for those very technologies to provide solutions to the problems they initially seemed to exacerbate. It looks silly and unfair to think of fighting a war with a country that never embraced oil and was still primarily getting its energy from burning wood.
The evolution of AI is no exception to this pattern. As we venture into uncharted territories, the potential issues that arise with AI—be it ethical concerns, use by malicious actors, biases in decision-making, or privacy intrusions—are not merely obstacles but opportunities for innovation. It is within the realm of possibility, and indeed, probability, that AI will play a crucial role in solving the problems it creates. The idea that there would be no incentive to address and solve these problems is to underestimate the fundamental drivers of technological progress.
Market forces, fueled by the demand for better, safer, and more efficient solutions, are powerful catalysts for positive change. When a problem is worth fixing, it invariably attracts the attention of innovators, researchers, and entrepreneurs eager to solve it. This dynamic has driven progress throughout history, and AI is poised to benefit from this problem-solving cycle.
Thus, rather than viewing AI's unknowns as sources of fear, we should see them as sparks of opportunity. By tackling the challenges posed by AI, we will harness its full potential to benefit humanity. By fostering an ecosystem that encourages exploration, innovation, and problem-solving, we can ensure that AI serves as a force for good, solving problems as profound as those it might create. This is the optimism we must hold onto—a belief in our collective ability to shape AI into a tool that addresses its own challenges and elevates our capacity to solve some of society's most pressing issues.
An AI Future
The reality is that it isn't whether AI will lead to unforeseen challenges—it undoubtedly will, as has every major technological leap in history. The real issue is whether we let fear dictate our path and confine us to a standstill or embrace AI's potential to address current and future challenges.
The approach to solving potential AI-related problems with stringent regulations and a slowdown in innovation is akin to cutting off the nose to spite the face. It's a strategy that risks stagnating the U.S. in a global race where other nations will undoubtedly continue their AI advancements. This perspective dangerously ignores that AI, much like the printing press of the past, has the power to democratize information, empower individuals, and dismantle outdated power structures.
The way forward is not less AI but more of it, more innovation, optimism, and curiosity for the remarkable technological breakthroughs that will come. We must recognize that the solution to AI-induced challenges lies not in retreating but in advancing our capabilities to innovate and adapt.
AI represents a frontier of limitless possibilities. If wielded with foresight and responsibility, it's a tool that can help solve some of the most pressing issues we face today. There are certainly challenges ahead, but I trust that with problems come solutions. Let's keep the AI Decels from steering us away from this path with their doomsday predictions. Instead, let's embrace AI with the cautious optimism it deserves, forging a future where technology and humanity advance to heights we can't imagine.
-
@ 8d34bd24:414be32b
2024-06-12 16:26:29Also found at https://trustjesus.substack.com/p/psalm-19
1The heavens are telling of the glory of God; And their expanse is declaring the work of His hands. 2Day to day pours forth speech, And night to night reveals knowledge. 3There is no speech, nor are there words; Their voice is not heard. 4Their line has gone out through all the earth, And their utterances to the end of the world. In them He has placed a tent for the sun, 5Which is as a bridegroom coming out of his chamber; It rejoices as a strong man to run his course. 6Its rising is from one end of the heavens, And its circuit to the other end of them; And there is nothing hidden from its heat.
7The law of the Lord is perfect, restoring the soul; The testimony of the Lord is sure, making wise the simple. 8The precepts of the Lord are right, rejoicing the heart; The commandment of the Lord is pure, enlightening the eyes. 9The fear of the Lord is clean, enduring forever; The judgments of the Lord are true; they are righteous altogether. 10They are more desirable than gold, yes, than much fine gold; Sweeter also than honey and the drippings of the honeycomb. 11Moreover, by them Your servant is warned; In keeping them there is great reward. 12Who can discern his errors? Acquit me of hidden faults. 13Also keep back Your servant from presumptuous sins; Let them not rule over me; Then I will be blameless, And I shall be acquitted of great transgression. 14Let the words of my mouth and the meditation of my heart Be acceptable in Your sight, O Lord, my rock and my Redeemer. (Psalm 19)
The first 6 verses of Psalm 19 speak of general revelation. This is what every person to ever live has seen. God’s creation speaks to the existence of a creator God and tells a little about this God, but it doesn’t tell people everything about God. It doesn’t tell what God expects of His creation.
For the wrath of God is revealed from heaven against all ungodliness and unrighteousness of men who suppress the truth in unrighteousness, because that which is known about God is evident within them; for God made it evident to them. For since the creation of the world His invisible attributes, His eternal power and divine nature, have been clearly seen, being understood through what has been made, so that they are without excuse. (Romans 1:18-20) {emphasis mine}
Through His creation, God has revealed enough about Himself that we are all guilty of not believing in Him and not submitting to Him as we should. The good news is that He has revealed Himself to us more fully and we can know, trust, and obey Him, although no one has ever done so perfectly, except Jesus Himself.
In verses 7-14, His special revelation is praised and how it is useful to us is elucidated.
The law of the Lord is perfect, restoring the soul; The testimony of the Lord is sure, making wise the simple. The precepts of the Lord are right, rejoicing the heart; The commandment of the Lord is pure, enlightening the eyes. The fear of the Lord is clean, enduring forever; The judgments of the Lord are true; they are righteous altogether. (Psalm 19:7-9) {emphasis mine}
Multiple words are used to describe the truth, God’s word, and the Bible: law, testimony, precepts, commandments, fear, & judgments. God’s law, testimony, precepts, and commandments are explicitly spelled out in His written word, the Bible. The fear of the Lord is our right response to that written word and the judgments of the Lord are God’s righteous reaction to our response to His written word.
You’ll notice that His word is described as perfect, sure, right, pure, clean, and true. Everything about God’s word is exactly as it should be. We should long for God’s word. Psalm 42:1 describes how we should feel about God’s word, “As the deer pants for the water brooks, So my soul pants for You, O God.” Instead of wanting to do anything other than read God’s word, we should long to be filled with God’s word. We should seek to live according to God’s word. We should crave the word of God and His righteousness as strongly as we crave food. “Jesus said to them, “My food is to do the will of Him who sent Me and to accomplish His work.” (John 4:34)
Most of us, most of our lives don’t seek God or His word as we should, but some of us do and sometimes we do. David doesn’t just long for God’s word, he takes it a step further. The first 5 references to God’s word are praised with a word and a praise, but his praise is much deeper for “The judgments of the Lord”.
The judgments of the Lord are true; they are righteous altogether. They are more desirable than gold, yes, than much fine gold; Sweeter also than honey and the drippings of the honeycomb. Moreover, by them Your servant is warned; In keeping them there is great reward. (Psalm 19:9b-11)
How often do we praise God for His judgments? We may think they are “true,” at least with our heads, if not with our hearts, but do we really think “they are righteous altogether” or do we question God’s commands or actions? How many think God’s judgment is “more desirable than gold, yes, than much fine gold” or “Sweeter also than honey and the drippings of the honeycomb?” Most of us will do just about anything to avoid the judgment of God. We will hide from God to avoid His judgment.
When I was a relatively new Christian, I attended a large church in my home town when I wasn’t away at college. The leader of our college and career small group had what I would consider the greatest gift of exhortation that I have ever experience. Whenever exhortation is mentioned, I think of him. When it came to discussions of right and wrong and how we should live our lives, he never boldly gave a command. He would ask a question. He gently led us to the truth. I knew he was leading me to the truth, but it was very uncomfortable. In the beginning, I’d try to be as hidden as possible. I didn’t want to be asked a question because I knew I was not going to like the answer that I knew was right. I avoided him like the plague. Eventually, I realized how much being around him grew me in faith and righteousness. I learned to love and seek out those piercing questions that were so uncomfortable because they helped me grow.
In the same way, we should all seek out God’s judgment (or at least discipline).
You have not yet resisted to the point of shedding blood in your striving against sin; and you have forgotten the exhortation which is addressed to you as sons,
“My son, do not regard lightly the discipline of the Lord, Nor faint when you are reproved by Him; For those whom the Lord loves He disciplines, And He scourges every son whom He receives.”
It is for discipline that you endure; God deals with you as with sons; for what son is there whom his father does not discipline? But if you are without discipline, of which all have become partakers, then you are illegitimate children and not sons. Furthermore, we had earthly fathers to discipline us, and we respected them; shall we not much rather be subject to the Father of spirits, and live? For they disciplined us for a short time as seemed best to them, but He disciplines us for our good, so that we may share His holiness. All discipline for the moment seems not to be joyful, but sorrowful; yet to those who have been trained by it, afterwards it yields the peaceful fruit of righteousness. (Hebrews 12:4-11) {emphasis mine}
We should diligently read God’s word. We should faithfully submit to God’s discipline. We should humbly submit to God’s will.
Who can discern his errors? Acquit me of hidden faults. Also keep back Your servant from presumptuous sins; Let them not rule over me; Then I will be blameless, And I shall be acquitted of great transgression. (Psalm 19:12-13)
Knowing God’s character and His will can aid us in submitting to Him so we do not transgress against Him. Of course, as Christians, we have the benefit of the Helper, the Holy Spirit, to help us to know, understand, submit, and obey. David didn’t have that benefit, but He knew that submitting to God was in his best interest and He sought God and God called him “a man after my own heart.” That is my heart’s cry. I want to be called “a woman after God’s own heart.”
Let the words of my mouth and the meditation of my heart Be acceptable in Your sight, O Lord, my rock and my Redeemer. (Psalm 19:14)
Through learning God’s word, submitting to His will, being guided by His Spirit, and being covered by His Son, my prayer is “Let the words of my mouth and the meditation of my heart be acceptable in Your sight, O Lord, my rock and my Redeemer.”
I hope this is your prayer as well.
Trust Jesus.
To find more like this or to subscribe so you never miss a post, go to https://trustjesus.substack.com/
-
@ 5d4b6c8d:8a1c1ee3
2024-06-12 16:04:21Welcome to the 3rd installment of this experiment in unearthing relics from Stacker News' past.
Catch yesterday's issue here: https://stacker.news/items/570204/r/Undisciplined
Thanks to @0xbitcoiner for making some formatting suggestions.
I have to make an executive decision about who to forward sats to, since only 5 are allowed and there are 9 potential recipients. Until I think of a reason to do something else, I'm going to reward the top stackers from each year.
June 12th, 2023 📅
📝
TOP POST
Ark AMA
Hi all, this is Burak. Feel free to ask me anything about Ark. Ark is a new privacy-preserving Bitcoin layer-two idea for those unfamiliar. I would love to address all of your questions or concerns you might have. Stupid questions are welcome :)
by @brqgoo 30.7k sats \ 112 comments
💬
TOP COMMENT
https://stacker.news/items/191561
Excerpt:
Bitcoin is not salvation, a deity, the most moral cause in the world, etc.
by @scottathan 4276 sats/ 19 replies
That's right, two days in a row.
🏆
TOP STACKER
2nd place is @ek (1st place, presumed to be @siggy47, is in hiding) 10.2k stacked \ 8830 spent \ 4 posts \ 48 comments \ 0 referrals
That's right, two days in a row.
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 12th, 2022 📅
📝
TOP POST
Is a question worth a streaming revenue share? Yes.
Link to https://medium.com/@jeffrey.mclarty/is-a-question-worth-a-streaming-revenue-share-yes-fad085581457
by @MerryOscar 520 sats \ 3 comments
💬
TOP COMMENT
https://stacker.news/items/35921/r/Undisciplined?commentId=35932
Excerpt
WoS is a custodial wallet, so you are correct to wonder if your funds there are safe. The answer is, ... no, your funds are not safe on a custodial wallet. Because YOU HAVE NO FUNDS on a custodial wallet. You have only an IOU from the operator of said custodial wallet.
by @cryptocoin 282 sats/ 1 reply
🏆
TOP STACKER
@nout 334 stacked \ 1120 spent \ 0 posts \ 7 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 12th, 2021 📅
📝
TOP POST
El Salvador Makes Bitcoin Legal Tender
The inaugural SN post! (Yes, it was the top post for two days in a row.)
by @k00b 6453 sats \ 4 boost \ 20 comments
💬
TOP COMMENT
https://stacker.news/items/2/r/Undisciplined?commentId=23
Some kind of markdown in comments
by @sha256 1000 sats
🏆
TOP STACKER
@k00b 0 stacked \ 37 spent \ 3 posts \ 18 comments \ 0 referrals
-
@ f63316ca:22ba92a9
2024-06-08 20:08:39Chef's notes
I purchased all ingredients from my local Sprouts Market
The benefits of this Organic Apple Granola Probiotic Bowl go far beyond its delicious taste. The organic ingredients used in our granola are free from harmful pesticides and chemicals, ensuring that you're nourishing your body with the purest, most nutrient-dense foods available. Additionally, the probiotic yogurt in this bowl helps to support a healthy gut microbiome, which has been linked to a wide range of health benefits, from improved digestion to a stronger immune system.
CONTAINS CLEAN SIMPLE INGREDIENTS
NON-GMO
USDA ORGANIC
GLUTEN-FREE
DAIRY-FREE
SOY-FREE
7G SUGAR (14%)
PLANT-BASED
VEGAN
NO ARTIFICIAL OR “NATURAL FLAVORS”
Details
- ⏲️ Prep time: 10 minutes
- 🍽️ Servings: 1
Ingredients
- 2 handfuls of Purely Elizabeth Chocolate Sea Salt Ancient Grain Granola
- 1 medium sized apple, diced
- 3 tbsp Cocojune Organic Dairy-Free Vanilla Unsweetened Coconut Yogurt
Directions
- Start by placing the diced apples in a bowl
- Add the Cocojune Organic Dairy-Free Vanilla Unsweetened Coconut Yogurt
- Then top it with Purely Elizabeth Chocolate Sea Salt Ancient Grain Granola
- Mix generously and enjoy!
-
@ ddf03aca:5cb3bbbe
2024-06-12 14:51:37Disclaimer: Beware, there be dragons... Deploying your own version of npubcash-server is highly experimental. Do not use this in production yet. If you do deploy it, please make sure to leave your feedback with me.
Prerequisites
Before we dive in, you'll need a few things:
- Blink API Key: npubcash-server uses Blink API for payment callbacks. If you don’t have a Blink account yet, sign up here.
- Postgres: npubcash-server utilizes a Postgres database for storage.
- fly.io Account and flyctl: While you can deploy npubcash-server anywhere, this guide focuses on fly.io and its CLI tool, flyctl.
Setup
Step 1: Clone the Repository
First, clone the npubcash-server repository, specifically the
migrations
branch, as it contains the necessary deployment scripts. Don’t forget to clone all submodules recursively.zsh git clone -b migrations --recurse-submodules https://github.com/cashubtc/npubcash-server.git cd npubcash-server
Step 2: Create fly.toml Configuration
Next, create your
fly.toml
file to configure your deployment.zsh nvim fly.toml
Here's a sample configuration. Adjust the environment variables to match your setup:
```toml app = "npubcash-server" primary_region = "ams"
[build]
[http_service] internal_port = 8000 force_https = true auto_stop_machines = true auto_start_machines = true min_machines_running = 0 processes = ["app"]
[[vm]] memory = "512mb" cpu_kind = "shared" cpus = 1
[env] NODE_ENV = "production" PGUSER = "
" PGPASSWORD = " " PGHOST = " " PGDATABASE = " " PGPORT = " " MINTURL = " " BLINK_API_KEY = " Note: fly.io offers additional security for sensitive environment variables through
secrets
, which are encrypted and never exposed directly. Consider usingsecrets
for sensitive data like your Blink or Nostr key. Learn more here.Deploying
With your configuration ready, it’s time to deploy!
zsh fly launch
When prompted, choose to use the existing
fly.toml
file by inputtingy
. Fly.io might suggest deploying a Postgres instance, but since we're using an external Postgres instance, adjust the settings as needed through their web interface. Watch the build logs in your terminal, and once completed, your instance of npubcash-server is live. Congrats!Setting Up a Custom Domain
To fully utilize npubcash-server as an LNURL server, you’ll need a custom domain. Here’s how to set it up:
- Get the IP Address: Use flyctl to list your IP addresses.
zsh fly ips list
Copy the IPv4 and IPv6 addresses.
-
Create DNS Records: Set up an A record with your domain provider using the IPv4 address and a AAAA record using the IPv6 address.
-
Request an SSL Certificate: For encrypted traffic, request a Let’s Encrypt certificate.
zsh fly certs add <your domain name>
Note: DNS propagation can take some time. Ensure your machine is running and try connecting to the domain once the DNS records are updated. Fly.io will verify the DNS setup when traffic starts coming in.
Wrapping up
That is it... Hopefully by now your very own instance of npubcash-server is running and reachable on your own domain. If you got this far, please reach out to me and let me know. Now please go ahead and try to break it. If you do, please open an issue so that I can fix it :)
-
@ b22fef18:1bba6e1f
2024-06-08 18:01:55Chef's notes
Simple chipotle chicken done in the air fryer. Great for easy meal prep.
Details
- ⏲️ Prep time: 1 hour
- 🍳 Cook time: 12 min
Ingredients
- 600 grams chicken breast
- 6 grams salt (1% of chicken weight)
- 10 grams Kewpie Mayo
- 20 grams chipotle chili in adobo
Directions
- Cut chicken breast into chunks.
- Mix all ingredients together.
- Let marinate for 1 hour or longer.
- Preheat air fryer.
- Cook at 380F in air fryer for 11-13 minutes.
-
@ 7308f407:94057dcf
2024-06-06 18:04:37Chef's notes
There are so many variations to make salsas. I don’t make them exactly the same every single time. It all depends on who I am making them for. This salsa was requested by my mother-in-law to bring to her work party. I was more than happy that she asked me. I made sure to get the best-looking produce at the grocery store and make this with all my attention and love. To me and my spiciness tolerance, this will not be a really spicy salsa because of the ratio of tomatoes to chiles. For a spicier salsa, I would suggest adding more jalapenos or Chiles de Arbol.
Details
- ⏲️ Prep time: Approximately 15 minutes
- 🍳 Cook time: Approximately 10 minutes
- 🍽️ Servings: 6-8 cups
Ingredients
- 10 Roma tomatoes
- 3 Jalapenos
- 1 Guajillo Chile (optional)
- 1/4 white onion
- 3 Garlic cloves
- 2 teaspoons Chicken Bouillon
- 1 teaspoon pepper
- Salt to taste (I added 1.5 teaspoons)
Directions
- Add a pot filled about 75% full with water to the stove and begin to bring it to a boil.
- After prepping your produce (washing and cutting ends off tomatoes and jalapenos and removing seeds from Guajillo Chile), add the vegetables to the water.
- Cook in hot water for approximately 8-10 minutes. You will see the color of the jalapenos change and the outer layer of tomatoes begin to peel off.
- Add all vegetables to the blender cup, along with spices. Blend until smooth.
- Check for your preference of salt level.
-
@ a853296a:209e695f
2024-06-12 14:49:57What's up stackers! Today I'd like to announce CHADBot - an AI assistant that can monitor YouTube feeds and give you alerts, summary rundowns, and even blog post content directly to your Nostr DMs!
The What and Why Behind CHADBot
The last couple sprints I have been focused on the content creators demographic. As a member of @PlebLab, I have the privilege of access to numerous content creators like @ThrillerX_ that do bitcoin podcasts, and @bitcoinplebdev who does educational content among others. That access has helped me keep a tight feedback loop and discover new ways to create value.
A couple weeks ago I introduced the CASCDR YouTube Agent - a tool that can take a youtube link and automatically summarize the content (full write up here). This tool can be a game changer for productivity for people like Car that are creating multiple podcasts/livestreams per week. There's a serious strain for bandwidth & time the tool can fill the gap in a simple and straightforward way.
CHADBot takes that utility to a new level: it can monitor any YouTube Channel of your choice and send you DMs directly to your inbox. This takes one more step out of the workflow and makes it even easier to stay on top of the content production hustle.
The current demo is live and free for a limited time so check it out! I plan to expand the tool in the near future and allow subscriptions to RSS feeds and to enable other delivery media such as email soon.
Serendipity & Other Use Cases: TLDR -> TLDW
When I first set out to make this tool, I was focused on creators. But the feedback I got as it got out there is: it's a great tool for consumers as well. We all know about TLDR but how about Too Long Didn't Watch?
CHADBot helps you curate your information diet and be intentional in the face of the Age of the Digital Deluge.
How many times have you started watching a video to realize it's repeating things you already know or don't care about? Time and focus wasted.
How about the opposite case? You see some content that doesn't seem appealing on the surface but you get into it and realize you're learning from a hidden gem. CHADBot can help you efficiently scan an hour+ long video and find the diamond in the rough.
I was amused by the fact that even on a very early run @ThrillerX_ reposted a podcast he discovered thanks to CHADBot:
Reason Behind the Name
Ok. Yea. I wanted to find a way to incorporate the name Chad into this project. Sue me. CHAD stands for the CASCDR Hub for Acquisition of Data. And as I mentioned previously, CHAD doesn't stop here. He keeps going until he hoovers up all the useful data and gives it to you on a silver platter.
Limitations
I am forcing myself to ship weekly so there are some limitations to what the YouTube Agent & consequently CHADBot can do: - Videos over 90 minutes do not run reliably -> I have a fix I will put out in the coming weeks - Live videos do not work -> due to the mechanics of services used under the hood I am unable to extract transcriptions for live videos. I have planned a workaround for that. - CHADBot does not currently allow for custom prompts -> future releases will allow you to tweak that to get the style and outcome you're looking for in your personalized newsletter!
I will keep building and improving. Low time preference!
If you made it this far thank you for reading! Drop any feedback in the comments or hit us up on nostr.
Cheers!
-
@ 7308f407:94057dcf
2024-06-04 22:47:27Chef's notes
Telera bread, a beloved staple in Mexican cuisine, serves as the perfect foundation for sandwiches. I recently prepared this homemade Telera bread recipe for our local Nostr meetup group, Nostr Phx, where I crafted delicious ham sandwiches filled with a medley of flavors—Havarti cheese, seared Panela cheese, Butter Lettuce, Campari Tomatoes, Avocados, and a zesty Chipotle Mayonnaise. To add an extra kick, I also made Pickled Jalapenos as an optional topping for the Tortas. It was a joy to share these treats while immersing ourselves in discussions about Nostr, Bitcoin, and Nostr Product Marketing.
Details
- ⏲️ Prep time: 1 hour and 30 minutes to 2 hours
- 🍳 Cook time: 20 to 25 minutes
- 🍽️ Servings: 8 buns
Ingredients
- 1.5 cups water (about 115°F)
- 1 tablespoon sugar
- 1 tablespoon active dry yeast
- 3.5 cups all-purpose flour
- 1.5 teaspoons salt
Directions
- In a cup, add warm. (I place water without ingredients in the microwave for about 20-30 seconds to warm it, then I verify with a thermometer to be around 115 degrees Fahrenheit).
- Mix the water, sugar, and yeast then place them in a warm place to activate the yeast for about 10 minutes. The yeast will feed off the sugar, and the warm water environment will help the yeast expand to activate.
- In a bowl, mix to combine all dry ingredients: all-purpose flour, salt, and butter.
- After the activation time for the yeast liquid, start adding it to the dry ingredients in smaller splashes to combine. You will want the dough to be moist but not wet.
- Begin kneading the dough in the bowl, then transfer it to a countertop. Fold the dough in half towards you. Push the heel of your hand firmly into the dough, then fold it back over itself. Turn the dough 90 degrees and repeat steps 2 and 3. Continue kneading for 5-10 minutes, or until the dough is smooth and elastic.
- Place the smooth dough back into a lightly oiled bowl and cover it with a kitchen towel. Allow it to rise for about 40 minutes in a warm place. (I add a plastic wrap over the bowl then place the kitchen towel inside of the oven with the light on).
- After the resting time, remove the dough from the bowl onto the countertop to divide it into 8 parts.
- Round the 8 parts of dough into a ball shape. As you’re shaping each one, cover them with a kitchen towel to prevent them from drying out.
- Let the dough rest for about 5 minutes.
- Grab one of your pieces of dough and add flour to both sides, then lightly flatten it and place it on your countertop. Use your index finger to make two line indentations.
- After you shape your ball, place it back under your kitchen towel.
- Once all of them are shaped, bake at 380 degrees Fahrenheit for 21-25 minutes or until the bread is lightly golden brown. Optionally, add 2 cups of water in a separate oven-safe bowl to create steam.
- Remove from the oven, then place on a wire rack covered with a kitchen towel for a couple of minutes.
- Enjoy on its own, with butter, or make a delicious Torta.
-
@ fdb2a0b5:8f6d373e
2024-06-01 20:06:25Details
- ⏲️ Prep time: 10 min
- 🍳 Cook time: 30 min high pressure
- 🍽️ Servings: 6
Ingredients
- 1 lb ground beef
- 1 kielbasa sausage, cut into bite-size pieces
- 14 of can diced tomatoes with liquid
- 1 can chili beans
- 1 packet chili seasoning (Williams)
- 1/2 to 1 Cup beef broth
Directions
- Brown the beef and pour off extra fat.
- Add beef to pressure cooker along with other ingredients. Use as much broth as you like to reach desired consistency.
- Cook on high pressure for 30 minutes.
- Release pressure and let cool slightly to thicken.
- Serve with chopped white onion, cheddar cheese, and yellow mustard.
-
@ c69b71dc:426ba763
2024-06-01 16:42:10Chef's notes
All you need are the following ingredients, a bowl, and a knife.
Details
- ⏲️ Prep time: 5 min.
- 🍳 Cook time: 0
- 🍽️ Servings: 1
Ingredients
- 2 Banana
- 2 tbsp Almond butter or Cashew butter
- 1 tbsp Maple syrup (optional)
- 1-2 tbsp Cacao nibs (optional)
- 2 tbsp Pine nuts (optional chopped pecans, pistachios or other nuts)
Directions
- Peel and cut the bananas into slices. Place in a bowl. Top with almond- or cashew butter
-
@ c8ab3c20:4bb40a9d
2024-06-12 14:41:38Introduction
Cet article fait écho à mon article sur les flux RSS, qui est la méthode à utiliser pour s'abonner à mon blog, mais qui permet bien plus. Ici, je vais vous présenter différents agrégateurs RSS, les logiciels, applications ou extensions qui vous permettent de regrouper vos différents flux et de les organiser comme bon vous semble.
Je me limite à des solutions open source car elles sont, à mon avis, suffisamment qualitatives pour être privilégiées à des offres propriétaires dans un large panel d'usage. Je vais essayer de couvrir un large éventail de plateformes afin que vous trouviez un agrégateur qui puisse répondre à vos besoins.
Mobile (Android, iOS et iPadOS)
Twine
Twine est un lecteur RSS (et Atom) très récent au design soigné. Disponible pour mobile, il est publié en open source sous licence Apache 2.0 sur le Play Store, l'App Store ou GitHub (Android uniquement). Il permet de détecter automatiquement si un site a un flux RSS et de l'importer sans avoir à chercher le lien du flux en question, mais uniquement avec l'URL du site. Malheureusement, il n'est pas disponible en français pour le moment, mais vous ne devriez pas avoir trop de mal à l'utiliser. Il ne possède pas non plus de thème clair. C'est une option déjà riche en fonctionnalités, comme la recherche, l'épinglage ou l'import/export via OPML.
Fluent Reader Lite
Fluent Reader est un agrégateur open source et multi-plateforme. La version Lite est destinée aux appareils mobiles iOS ou Android et est publiée sous licence BSD 3-Clause. Vous pouvez l'acheter à petit prix sur l'App Store ou le Play Store, ou gratuitement depuis TestFlight ou GitHub. L'application mobile n'est pas autant complète que la version pour ordinateur et nécessite un service RSS en cloud (des solutions plus bas).
Android uniquement
Feeder
Feeder est un lecteur de flux (RSS, Atom, JSONFeed) open source sous licence GPLv3, disponible uniquement sur Android depuis une décennie déjà. Encore mis à jour régulièrement à l'heure où j'écris ces lignes, vous pouvez vous procurer l'application sur le Play Store, F-Droid ou GitHub. Feeder possède un thème sombre ou clair selon vos préférences, il supporte la langue française ainsi que les notifications et les imports/exports via OPML. Le design suit les lignes de MaterialYou (MD3) de Google et fait donc moderne, épuré et cohérent avec un Android 12 ou plus récent. Il s'agit de ma solution principale actuelle.
ReadYou
ReadYou est un lecteur de flux RSS open source sous licence GPLv3, disponible uniquement sur Android depuis deux ans maintenant. L'application est disponible en français et sur F-Droid, GitHub ou Telegram. Son design est très épuré et aligné à MaterialYou (MD3). Un peu moins complet, c'est un super agrégateur plutôt minimaliste.
Thud
Thud est un lecteur RSS minimaliste open source sous licence AGPLv3, inspiré par Pulse News qui fut racheté par LinkedIn et ruiné (étonnant). Disponible sur Android via le Play Store, F-Droid et GitHub, mais avec la possibilité de compiler une version iOS. Il possède un thème sombre et clair selon vos préférences et les fonctionnalités de base que l'on attend d'un agrégateur RSS.
Apple : iOS,iPadOS et macOS uniquement
NetNewsWire
NetNewsWire est l'agrégateur (RSS, Atom, JSONFeed et RSS-in-JSON) de référence pour les appareils d'Apple depuis plusieurs années. C'est une application open source publiée sous licence MIT. Elle est écrite en Swift et est donc native aux appareils de la marque à la pomme et disponible sur l'App Store ou, pour la version macOS, sur leur site web. Elle est très complète et a toutes les fonctionnalités dont vous avez besoin.
Desktop
Fluent Reader
Fluent Reader est un agrégateur open source et multi-plateforme. Cette version est pour ordinateur (Windows, macOS ou GNU/Linux) mais possède un client mobile nommé Fluent Reader Lite présenté plus haut. Comme la version mobile, cette variante est publiée en open source sous licence BSD 3-Clause. Elle est complète et suit les règles de design du Fluent Design (d'où son nom) de Microsoft introduit avec Windows 11 et s'intègre donc très bien avec ce dernier. Vous pouvez la télécharger sur le Microsoft Store, le Mac App Store ou GitHub
News Flash (GNU/Linux uniquement)
News Flash est une application complète au design moderne (GNOME Circle) se voulant comme le successeur spirituel de FeedReader, mais attention, il ne s'agit pas d'un fork. Vous pouvez la télécharger depuis FlatHub. Les paquets Alpin, Arch, Nix ou Snap ne sont plus supportés et donc pas à jour !
Extension Firefox
Brief
Brief est une extension open source lecteur RSS (et Atom) pour Firefox, distribuée sous licence MPL 2.0. Assez simple et intuitive à utiliser, elle a toutes les fonctionnalités de base que vous attendez d'un agrégateur de flux. Vous pouvez la télécharger sur le catalogue Firefox Browser Add-ons de Mozilla.
Cloud
Certaines personnes apprécient avoir leurs flux qui se synchronisent entre plusieurs appareils, et pour cela, le plus efficace reste une solution en ligne. La majorité sont propriétaires et freemium, mais vous pouvez très souvent les utiliser avec des agrégateurs open source comme ceux cités plus haut. Ceux-ci sont open source :
NewsBlur
NewsBlur est la référence de gestionnaire de flux RSS open source en cloud, leur code est publié sous licence MIT. Le service existe depuis plus d'une décennie et est supporté par beaucoup de clients présentés plus haut. Ils ont leur propre client web, Android et iOS que vous pouvez aussi installer. Vous pouvez utiliser gratuitement NewsBlur jusqu'à 64 sites ; au-delà, un abonnement annuel est nécessaire.
Feedbin
Feedbin est une autre solution en cloud plus récente et avec une interface plus moderne, mais compatible avec moins de clients. Vous trouverez des agrégateurs compatibles sur leur site. Le service coûte 5 $ par mois avec 30 jours d'essai offert afin de vous forger votre avis. Mais étant open source et sous licence MIT, vous pouvez héberger vous-même Feedbin ; malheureusement, pour des raisons techniques, il est plutôt conseillé de ne pas le faire pour le moment. Prenez plutôt une des solutions présentées juste après.
Auto-hébergé (selfhosted)
FreshRSS
FreshRSS est la référence, étant rapide, léger et puissant (fonctionnalités très complètes). Il est open source depuis une décennie déjà sous licence AGPLv3 bref la solution a privilégier si vous souhaitez héberger ce service chez vous ou sur votre VPS !
Fusion
Fusion est un agrégateur léger sous licence MIT à héberger soit même. Il est complet et son interface web est super moderne, cependant c'est une solution très récente et donc avec un avenir incertain mais vous pourriez être tenté de l'essayer ou même d'y contribuer.
Conclusion
Il existe de nombreux agrégateurs ou lecteurs RSS open source ; je n'ai présenté que ceux que je trouvais suffisamment qualitatifs pour remplacer des solutions propriétaires. Mais je suis curieux de savoir lesquels vous utilisez et quels sont les fonctionnalités que vous utilisez le plus. Que ce soit des solutions propriétaires ou open source, l'utilisation d'un agrégateur de flux permet de mieux se recentrer sur les informations qui nous intéressent de façon personnalisée et d'éviter d'être submergé par des dizaines de canaux différents. N'oubliez pas d'ajouter le flux RSS de mon blog dans votre client !
-
@ c8ab3c20:4bb40a9d
2024-06-12 14:32:33Introduction
Aujourd'hui, j'ai décidé de commencer en douceur ; nous ne parlerons pas encore de vie privée ou de sécurité en soi. Mais si vous ne connaissez pas les flux RSS, je vous invite à lire mon article avec intérêt afin de comprendre en quoi ils peuvent vous aider à rester informé en ayant une bonne hygiène numérique. En évitant d'installer de multiples applications propriétaires ou de vous rendre sur différents sites web ayant des pisteurs tiers (coucou Google) et du JavaScript. J'ai choisi ce sujet pour avoir très rapidement sur mon blog une explication de la méthode d'abonnement native à ma plateforme.
Qu'est ce que le RSS ?
Vous avez peut-être déjà vu son logo si vous naviguiez le web dans les années 2000-2010, ce carré orange avec des ondes blanches pouvant rappeler celles du Wi-Fi. RSS est l'acronyme anglais de Really Simple Syndication que l'on peut traduire en français par Syndication Vraiment Simple. Il s'agit d'un format de fichier ouvert qui permet de diffuser des mises à jour de contenu sur le web. Il est basé sur XML (eXtensible Markup Language), un langage de balisage très utilisé en informatique car il permet de structurer des données de manière efficace pour l'humain ou la machine, permettant notamment l'échange de données entre systèmes ou applications.\ Le format RSS est un standard web très utilisé pour publier et mettre à jour des données. Les sites web qui proposent des flux RSS permettent ainsi à leurs utilisateurs de récupérer automatiquement les dernières actualités, articles ou mises à jour en temps réel sans avoir à visiter les différents sites régulièrement.
Mon rapport personnel aux flux RSS.
J'ai commencé très jeune à naviguer sur internet et je me suis retrouvé de nombreuses fois sur des sites qui, à côté du "J'aime" de Facebook et du bouton Twitter, se trouvait le logo orange de RSS. J'étais familier avec l'identité visuelle, mais absolument pas avec l'utilité ou sa technique. Si je cliquais dessus, ça m'ouvrait généralement une page web avec des balises XML, autant vous dire que je pensais que c'était cassé.\ Lors de ma formation professionnelle, mon professeur du cours "Programmation Multimédia" (nom trompeur car on a surtout appris le HTML et le CSS qui ne sont pas des langages de programmation) nous montrait comment il s'informait des nouveautés des technologies web, et là, le nom RSS revenait. Je faisais directement le lien avec le logo orange du truc bizarre et cassé de mon enfance. Mais ce n'est pas vraiment là où je me suis mis à utiliser les flux RSS de manière presque quotidienne.\ Lorsque je me suis aventuré dans le terrier de la confidentialité en ligne, mon intérêt pour utiliser du logiciel libre et open source (FOSS) a grandi au point où je cherchais à remplacer le plus d'applications et services propriétaires possible.\ J'écrirai un article sur le sujet, bonne raison de vous abonner à mon flux RSS !\ Et une des façons de consommer de l'information avec du logiciel libre en évitant des technologies de pistage est justement le flux RSS. J'ai donc testé différents agrégateurs RSS qui sont des logiciels permettant de s'abonner à ces flux et de vous les présenter sous forme de HTML simple. Aujourd'hui, je consomme majoritairement du RSS sur mon smartphone, mais il y a des agrégateurs pour ordinateurs, tablettes ou navigateurs web. Je suis abonné à des journaux locaux, des médias, des blogs, des mises à jour de dépôts, etc.
Comment et pourquoi utiliser le RSS ?
Pourquoi le RSS ?
Le format RSS est populaire car, comme beaucoup de technologies web, il est ouvert. Par sa nature, il est indépendant de votre plateforme ou du langage de programmation, ce qui participe à sa facilité d'intégration. Même si la dernière version de RSS date de 2009, il reste populaire, principalement utilisé dans les milieux un peu plus techniques pour être informé en direct, par exemple, des dernières vulnérabilités permettant de réagir rapidement, ou alors pour de l'automation, comme avec le téléchargement en pair à pair via BitTorrent mais pas que. Dans cet article je n'irai pas plus loin sur cette utilisation mais vous trouverez sur internet pleins d'exemples inventifs et intéressants.
Bien que cela soit des utilisations un peu niches, vous trouverez beaucoup de vos sites d'informations grand public (ou plus spécialisés) avoir un flux RSS que vous pourrez alors intégrer à votre agrégateur. Grâce à ce logiciel, vous pourrez regrouper de nombreuses sources en un seul endroit, les organiser de différentes manières et définir des notifications pour certains flux très important. Vous pouvez sauvegarder des articles pour plus tard et les lire quand vous aurez le temps, sans distractions ni publicités ou pistage abusif.
Installer un agrégateur RSS.
Il vous faut donc choisir un agrégateur pour les plateformes qui vous conviennent. Vous pouvez vous référer à mes recommandations. Ou chercher vous-même des logiciels qui vous conviennent, propriétaires ou libres. Les plus connu étant Feedly, Inoreader et NewsBlur qui sont des solutions cloud. Pour mon usage une solution locale me suffit mais il y a de nombreuses raison d'avoir besoin d'une solution hébergé en ligne.
Ajouter des flux RSS.
Généralement, l'expérience est assez similaire d'un agrégateur à un autre : vous avez un bouton pour ajouter un flux (Add feed en anglais) et lorsque vous cliquez dessus, l'application vous demandera une URL à entrer. Et c'est justement l'adresse de ce fichier XML que je voyais petit en pensant avoir cassé le site. Par exemple, pour recevoir mes nouveaux articles parmi vos flux, entrez cette URL : https://lunar.bearblog.dev/feed/?type=rss
Suivant les agrégateurs, après, vous avez des paramètres comme les notifications. Et voilà, vous avez votre premier flux RSS. Ajoutez ceux des sources d'informations que vous utilisez afin de compléter votre agrégateur et de supprimer leurs applications propriétaires pleines de pisteurs de chez Google, Microsoft ou Adobe.\ Vous pouvez aussi parfois importer de multiples flux en un seul fichier OPML.
Convertir des flux non RSS.
Certaines sources ne possèdent pas nativement de flux RSS, mais cela ne signifie pas que vous ne pouvez pas les intégrer à votre agrégateur. Il existe des services qui vous permettent de convertir certains flux d'information, comme par exemple des comptes Instagram, Telegram ou autres. Parmi eux, il y a rss.app, qui propose également d'autres services. Si vous avez le matériel et/ou les compétences vous pouvez utiliser RSSHub pour RSSibiliser à peu près tout ce que vous voulez depuis votre homelab ou VPS.
Conclusion
Les flux RSS sont une façon un peu vieillotte de se tenir informé, mais elle n'est pas pour autant périmée ou inintéressante. Au contraire, sa simplicité, sa légèreté et son absence de scripts, de publicités ou d'éléments de distractions en font un outil puissant pour rester informé de manière efficace et personnalisée. C'est la façon la plus simple pour s'abonner à mon blog et ne rater aucun article tout en ayant la possibilité de passer les articles qui ne vous intéressent pas.
N'hésitez pas à partager vos flux indispensables ainsi que vos clients agrégateurs ou services liés à ce format !
-
@ 7308f407:94057dcf
2024-05-30 01:54:46Chef's notes
Hey there! Ever wanted to whip up some homemade flour tortillas? Well, here's your chance! I'm from Sonora, in North Mexico, where homemade tortillas are practically a way of life. I've been making them for a good few years now and picked up a few neat tricks along the way. Trust me, the effort is totally worth it!
These tortillas? They're not just any old tortillas. They're the real deal—soft, fluffy, and bursting with flavor. Sure, making them takes a bit of time and effort, but once you taste them, you'll never look back.
Most tortilla recipes stick to the basics, but I've added my own twist. Opting for butter instead of lard or vegetable shortening lends a richer flavor that I just can't resist. Plus, a little extra baking powder gives these tortillas an extra fluffy texture that's downright irresistible.
Tools needed: -Bowl -Measuring Cups/ Spoons -Griddle -Rolling pin -Kitchen towels
Details
- ⏲️ Prep time: 20-25 minutes
- 🍳 Cook time: 20-25 minutes
- 🍽️ Servings: yield about 10-14 medium-sized tortillas
Ingredients
- 2 1/2 cups All-Purpose Flour
- About 1/2 cup AP Flour for rolling tortillas
- 1/3 cup Unsalted Butter (Room Temperature)
- Plus a little extra (if using 1 stick of butter, which measures to 1/2 cup, use the remaining 1/4 of that)
- About 1 cup Warm Water
- 1 teaspoon Baking Powder
- 1 teaspoon Salt
Directions
- In a bowl, add dry ingredients which are flour, salt, and baking powder then mix to combine.
- Then add room temperature butter. Begin by breaking the butter apart into the flour until the butter is mostly dissolved. The flour will form into small clumps with the butter.
- Use warm water; you can microwave for 15-20 seconds or have the water be a little over room temperature.
- Start adding water a splash at a time.
- The temperature of the water helps melt the butter into the flour without being too hot, which can burn the flour. It also assists in keeping the dough well moisturized throughout the process.
- Using your hand, squish all the dough in different sections to combine.
- Continue to add water then mix again until the dough starts to hold together. You will want the dough to be moist but not too wet.
- Use the round surface of the bowl to help mold the dough.
- Once you have a big roundish ball, you can transfer it to a countertop.
- Knead the dough for about 5-7 minutes until smooth. The kneading method that works for me is to push half of the dough up, fold it onto itself, then rotate. I continue this motion repeatedly.
- Lightly push with your finger, and if you see a small bounce back from the dough, it’s ready to rest.
- Cover the dough with plastic wrap or a kitchen towel, then place it back into the bowl used to mix. Allow the dough to rest for about 30 minutes in a warm place. I usually turn my oven light on and add the covered bowl in the oven.
- After the resting period, remove the dough from the bowl. You will notice the dough is a little shiny and softer.
- This is also a good time to turn on your griddle or pan, set it to medium-high.
- On a countertop, place the round dough, using your thumb and index finger, make a smaller ball. I make medium-sized balls, so it can range from 10-14 tortillas.
- Grab one small dough ball, pull the outside edges into itself to reshape the ball.
- Use a little bit of butter on your hands to help keep the dough moistened.
- Place your ball on your less dominant hand, using the opposite hand over the ball shape, add a little bit of pressure and turn the ball in a circular motion. The ball will turn into an oval shape.
- Continue to do this with all the dough until they are all shaped into smaller pieces.
- Cover them with a kitchen towel as you work through the dough.
- Using the extra flour, keep it in a round container or put it into a pile near your tortillas.
- Grab your Rolling Pin to form the tortillas on a lightly floured surface. If you add too much flour to the surface, your tortillas will be dry.
- Dust the ball into your pile of flour on both sides, flatten the ball then lightly pinch the outer edges.
- Place it on your surface, using the rolling pin, flatten with a roll, then flip.
- Turn the tortilla 45 degrees (like a half-turn) and from the middle of the dough, press forward, return to the middle, and then roll towards you. Flip the tortilla and repeat the same process until you have a thin disk of about 10 inches or when you can somewhat see through the tortilla to the surface underneath.
- You can start cooking them or place them on your surface to finish with the rest. If you are new to rolling tortillas, be patient; it takes a little practice.
- Place the flat dough on your griddle. If the griddle is hot enough, within the first 10-15 seconds, you will notice forming air bubbles. If you see this, you can flip it with your fingers or spatula.
- Approximately 15-seconds on the other side, you will notice the tortilla will have a bigger puff, flip again. For about 5-10 seconds, the tortilla will inflate. You can remove it from the griddle. You will notice that the dough will look cooked because of the color change and could have developed light brown spots.
- Add the cooked tortilla in between a clean kitchen towel to keep warm.
- Repeat the process until all have been cooked.
- If the griddle is too hot, you will see a little smoke from the tortilla burning, reduce the heat. If the griddle is not hot enough, tortillas will take longer than a minute to cook and could become hard.
- Eat the tortilla on its own, with a little butter then roll it up, or with your full meal. Enjoy!
-
@ e3b5f432:f5bee9d0
2024-06-12 13:50:32Elon Musk bought Twitter (finally, after so many problems) in October 2022 for around $44 billion, an exorbitant amount of money. He proposed to make Twitter a more open space, a bastion of free speech, and he quickly began making some changes. Immediately after the purchase, Musk fired a significant portion of the company's workforce. Additionally, he promised to bring back some influential users who had been suspended, such as Donald Trump and Kanye West. This wasn't the end; it was just the beginning of what was to come: colored verification ticks, premium verification and features for a fee, suspending access to the API... in short, an authentic revolution within the company and the platform. But there was one change that left many people stunned and was perhaps the most mediatic... the change from Twitter to 𝕏.
The 𝕏-Revolution.
With this change, it became clear that 𝕏 was meant to be a new app, very different from Twitter, a "super app for everything" through which Musk intends to offer various services: social networks, messaging, payments, transportation, food delivery, games, etc. These are just some ideas, with all the services well integrated with each other and everything working wonderfully... something like the digital life hub for people... tempting, right?
This idea, although mind-blowing, is not really new, and there are several examples, but one stands out and seems similar to what 𝕏 aims to achieve: WeChat in China, an example of a "successful" super app with millions of active users per month, which almost every Chinese citizen has used. But let's talk beyond the numbers.
A journey to the future?
The Chinese government uses the app as a tool for censorship and surveillance, blocking "sensitive" content for political and/or commercial purposes and collecting user data to hand over if requested. 𝕏 could be equally dangerous, not a far-fetched idea. They have the data of a large part of the world population, and they can decide not to respect privacy and share it with others according to their own interests.
Additionally, using a single app for communication and information puts you at risk of having the algorithm and rules decide what you see and say. With WeChat, the Chinese government filters information and only allows visibility of opinions that do not affect it. They also monitor users outside of China, building their censorship database. 𝕏 could do something similar and thus influence your thinking, making you forget what freedom of expression is.
By using just one app to access various services, you give power to it (or the state) to offer only what they want you to use. WeChat favors companies that benefit the Chinese government or its partners, never the best option for you. The same could happen with 𝕏 if they intend to gain more power and money at your expense (yes, even more).
On the other hand, innovation could also be affected. An app that covers everything might take away the incentive for many developers to create new alternatives, having to compete with such a large monopoly. Even within the same app this phenomenon of stifling innovation could occur.
What path should we take?
The idea that a super app can solve all our problems is a dangerous illusion. WeChat is a clear example. By relying on a single application for everything, we give too much power to one person or entity, which can use it to manipulate or exploit us. History has shown that the centralization of power leads to tyranny, corruption, and oppression. Therefore, we should focus on alternatives that seek decentralization rather than the accumulation of power, that allow us to choose, express ourselves, and protect our privacy. Only in this way can we guarantee our autonomy and individual freedom.
You might be interested.
-
@ 4523be58:ba1facd0
2024-05-28 11:05:17NIP-116
Event paths
Description
Event kind
30079
denotes an event defined by its event path rather than its event kind.The event directory path is included in the event path, specified in the event's
d
tag. For example, an event path might beuser/profile/name
, whereuser/profile
is the directory path.Relays should parse the event directory from the event path
d
tag and index the event by it. Relays should support "directory listing" of kind30079
events using the#f
filter, such as{"#f": ["user/profile"]}
.For backward compatibility, the event directory should also be saved in the event's
f
tag (for "folder"), which is already indexed by some relay implementations, and can be queried using the#f
filter.Event content should be a JSON-encoded value. An empty object
{}
signifies that the entry at the event path is itself a directory. For example, when savinguser/profile/name
:Bob
, you should also saveuser/profile
:{}
so the subdirectory can be listed underuser
.In directory names, slashes should be escaped with a double slash.
Example
Event
json { "tags": [ ["d", "user/profile/name"], ["f", "user/profile"] ], "content": "\"Bob\"", "kind": 30079, ... }
Query
json { "#f": ["user/profile"], "authors": ["[pubkey]"] }
Motivation
To make Nostr an "everything app," we need a sustainable way to support new kinds of applications. Browsing Nostr data by human-readable nested directories and paths rather than obscure event kind numbers makes the data more manageable.
Numeric event kinds are not sustainable for the infinite number of potential applications. With numeric event kinds, developers need to find an unused number for each new application and announce it somewhere, which is cumbersome and not scalable.
Directories can also replace monolithic list events like follow lists or profile details. You can update a single directory entry such as
user/profile/name
orgroups/follows/[pubkey]
without causing an overwrite of the whole profile or follow list when your client is out-of-sync with the most recent list version, as often happens on Nostr.Using
d
-tagged replaceable events for reactions, such as{tags: [["d", "reactions/[eventId]"]], content: "\"👍\"", kind: 30079, ...}
would make un-reacting trivial: just publish a new event with the samed
tag and an empty content. Toggling a reaction on and off would not cause a flurry of new reaction & delete events that all need to be persisted.Implementations
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
f
) already support this feature. - IrisDB client side library: treelike data structure with subscribable nodes.
https://github.com/nostr-protocol/nips/pull/1266
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
-
@ 8f69ac99:4f92f5fd
2024-06-12 13:40:28Nas sociedades onde prevalece o socialismo, e a propriedade privada juntamente com a liberdade individual não são preservadas, observa-se frequentemente um padrão de decadência social e degradação individual. Este fenómeno tem implicações profundas tanto para o tecido colectivo da sociedade quanto para o bem-estar pessoal dos indivíduos. Ao examinar as consequências das restrições à autonomia pessoal e à erosão dos direitos de propriedade, podemos obter uma compreensão mais profunda do valor intrínseco dessas liberdades.
O Corpo como Propriedade Privada Suprema
Um dos aspectos mais fundamentais da liberdade individual é a capacidade de fazer escolhas em relação ao próprio corpo. Esta autonomia é a pedra angular da liberdade pessoal, representando a forma suprema de propriedade privada. Quando o estado impõe restrições a esta liberdade, seja através de controlo directo ou de políticas restritivas, os indivíduos perdem a sensação de posse sobre os seus próprios corpos. Esta perda manifesta-se de várias maneiras prejudiciais. Quando as pessoas sentem que não têm liberdade para fazer escolhas pessoais sobre a sua saúde e corpos, podem deixar de tomar medidas proactivas para manter o seu bem-estar. O impacto psicológico de tal desempoderamento leva à negligência da saúde pessoal, pois os indivíduos deixam de ver os seus corpos como algo dentro do seu controlo ou responsabilidade. Isto pode resultar numa maior prevalência de problemas de saúde, redução da esperança de vida e um declínio geral nos padrões de saúde pública.
Autonomia Financeira e Planeamento a Longo Prazo
Num quadro socialista, onde os impostos sobre heranças, propriedades e rendimentos são elevados, os indivíduos frequentemente veem as suas poupanças e recursos financeiros erodidos. A inflação e a tributação pesada exacerbam ainda mais esta erosão, dificultando o planeamento futuro ou a acumulação de riqueza. Esta instabilidade financeira tem efeitos de longo alcance a nível pessoal e social. A incapacidade de poupar e investir para o futuro leva a uma mentalidade de curto prazo. As pessoas tornam-se mais focadas na sobrevivência imediata do que na prosperidade a longo prazo. Esta mudança de perspectiva mina a estabilidade financeira e desencoraja o planeamento financeiro prudente. Sem o incentivo para poupar e investir, o crescimento económico estagna, a inovação diminui e a prosperidade geral da sociedade diminui. Esta precariedade financeira também afecta a saúde mental, pois a luta constante pela segurança financeira pode levar à ansiedade e ao stress.
A Erosão dos Direitos de Propriedade Privada
Os direitos de propriedade privada são fundamentais para uma sociedade próspera. Eles fornecem aos indivíduos a segurança e o incentivo para investir nas suas propriedades e envolver-se em actividades económicas que beneficiam tanto a si mesmos quanto a comunidade. No entanto, num sistema socialista onde esses direitos não são respeitados, as consequências são severas. Quando os direitos de propriedade são desrespeitados, há pouca motivação para os indivíduos melhorarem ou manterem os seus bens. Esta negligência leva à deterioração das propriedades e do ambiente circundante. A falta de responsabilidade pessoal pela propriedade também corrói os valores morais, pois os indivíduos deixam de se sentir responsáveis pelas suas ações ou pelo seu impacto na comunidade. Esta decadência moral manifesta-se no aumento das taxas de criminalidade, corrupção e num declínio geral na coesão social.
Empobrecimento Social e Declínio Moral
O impacto colectivo das restrições à autonomia pessoal e financeira, juntamente com a erosão dos direitos de propriedade, leva ao empobrecimento social. Quando os indivíduos não podem controlar livremente os seus próprios corpos ou acumular e proteger a sua riqueza, a saúde económica e social geral da sociedade sofre. A falta de responsabilidade pessoal e de investimento no futuro resulta num declínio na inovação, no crescimento económico e na estabilidade social. Além disso, o tecido moral da sociedade começa a desintegrar-se. A responsabilidade pessoal e o comportamento ético são minados quando os indivíduos deixam de sentir um sentido de posse, e responsabilidade, sobre as suas acções e as suas consequências. Este declínio moral é evidente no aumento de comportamentos que desrespeitam o bem-estar comunitário, como o aumento da criminalidade e da corrupção.
Conclusão
A preservação dos direitos de propriedade privada e da liberdade individual é essencial para a saúde e prosperidade tanto da sociedade quanto dos indivíduos. A ausência dessas liberdades, mais evidente sob o socialismo, leva a uma espiral de decadência social e degradação individual. Ao entender a importância da autonomia pessoal e dos direitos de propriedade, podemos defender sistemas que protejam esses aspectos fundamentais da liberdade, assegurando um futuro mais próspero e saudável para todos. A intrincada relação entre a liberdade pessoal, os direitos de propriedade e a saúde societal sublinha a necessidade crítica de salvaguardar essas liberdades. Apenas assim podemos prevenir a erosão da responsabilidade pessoal, da estabilidade económica e dos valores morais, garantindo uma sociedade próspera e em crescimento.
Photo by Ali Arif Soydaş on Unsplash
-
@ 9911f8d9:86db6c34
2024-05-25 19:24:44Details
- ⏲️ Prep time: 15 min
- 🍳 Cook time: 15 min
Ingredients
- 2 eggs
- 1 egg yolk
- 175 g white caster sugar
- zest of ½ orange
- ¼ tsp salt
- 250 grams of whole wheat flour
- 1 tsp baking soda
- 100 ml milk
Directions
- Put the eggs, egg yolk, white caster sugar, orange zest and salt in a bowl and beat this with a (hand) mixer with whisk(s) until a very airy batter. This will take at least 5 minutes.
- Mix the flour with the baking soda and sieve this over the bowl with the airy egg mass.
- Gently fold in the flour.
- Fold the milk into the batter and let it rest for 10 minutes in the refrigerator.
- Preheat the oven to 200°C and line a baking tray with baking paper.
- Using a large ice cream scoop or spoon, form 5 mounds of batter per baking tray.
- Make sure you leave enough space between the mounds of batter, because the cakes will still rise quite a bit in the oven.
- Bake the egg cakes for 7-12 minutes until light brown and done
-
@ ec2c288b:5e09b426
2024-06-12 13:33:42Narratives are a way of simplifying a really complicated world. Compelling ones follow story structures that we’re used to seeing: a villain and a hero, a bad developer versus a mother who’s struggling to get her kids through college. These kinds of narratives are compelling because there’s a spark of truth in them, which is that there are power struggles in the world; there are winners and losers. Many narratives stick because they reaffirm our own opinions and views, but that can be really dangerous: Just because something feels true doesn’t mean that it is.
The narratives that don’t stick are usually the ones that are more complicated. There isn’t always a clear-cut good guy and bad guy. Often we’re just existing in systems where a bunch of people act in their own self-interest; some of them are trying to do good, but people have different conceptions of what good is. Trying to describe a world full of that kind of complexity is not as satisfying. -- someone, not me.
we need to remember this when we start believing narratives that we hear in our feedback loops. we need to remember this when we blame other people for how broken shit is. we need to remember this when when we want to believe we are special or in on some secret that no one else knows. we need to remember this when we believe we are the heroes and they are the foes. we need to remember this when we believe someone else will make everything better for us. we need to remember that we are always being given a narrative. bitcoin provides financial sovereignty, but it's nothing without mental sovereignty. a sovereign individual does not fall for the narratives because they don't need permission to think for themselves.
we need to remember
"These kinds of narratives are compelling because there’s a spark of truth in them, which is that there are power struggles in the world; there are winners and losers."
bitcoin is for enemies > bitcoin allows enemies to work together > bitcoin makes us all winners. if you're going to fall for a narrative anyways, it might as well be this one.
-
@ f63316ca:22ba92a9
2024-05-24 22:42:57Chef's notes
THIS IS THE CORRECT RECIPE; I APOLOGIZE FOR THE MULTIPLE POSTS PLEASE IGNORE THE OTHER TWO
I created this recipe as I used to struggle with gaining weight for most of my life and being allergic to dairy, gluten, and soy, I had to come up with something that would benefit my overall health and supplement my workout routine. This healthy, plant-based, raw vegan protein shake is best to drink after your workout to gain weight, however, if you don't work out that's ok too, this shake is great for anyone, it is especially great for those looking to move up in weight if you are struggling with gaining weight and want to healthier option when doing so.
Details
- ⏲️ Prep time: 2HRS, 15MIN
- 🍽️ Servings: 1
Ingredients
- 8oz Gluten-Free Oats
- 8oz Walnut Milk
- 16oz Coconut Water; if you want a thicker consistency use 8oz
- 2 tbsp Natural Peanut Butter
- 1 tbsp Cacao Powder
- 1 Fresh or Frozen Burro Banana
- 1 Scoop Now Sports Pea Protein Powder
- 1 Scoop Sunwarrior Protein Powder
- 1 Scoop Sunwarrior Ormus SuperGreens Powder
Directions
- In a large container, pour in your gluten-free oats, walnut milk and coconut water and soak for 2 hrs prior, put in the fridge.
- After your oats have soaks for the prep time, to prepare our plant-based, gluten-free protein shake, simply combine the following ingredients in a high-speed blender, and blend for 1 minute and 30 seconds until creamy and smooth, if you like your shake a little thicker add in 8 oz of coconut water instead of 16 oz when soaking your gluten-free oats.
-
@ b17fccdf:b7211155
2024-06-12 13:18:11🆕 What's changed:
- New bonus guide dedicated to install/upgrade/uninstall PostgreSQL
- Modified the LND guide to use PostgreSQL instead of bbolt
- Modified the Nostr relay guide to use PostgreSQL instead of SQLite (experimental)
- Modified the BTCPay Server bonus guide according to these changes
- Used the lndinit MiniBolt org fork, to add an extra section to migrate an existing LND bbolt database to PostgreSQL (🚨⚠️Experimental - use it behind your responsibility⚠️🚨)
- New Golang bonus guide as a common language for the lndinit compile
- Updated LND to v0.18
- New Bitcoin Core extra section to renovate Tor & I2P addresses
- New Bitcoin Core extra section to generate a full
bitcoin.conf
file - Rebuilt some homepage sections and general structure
- Deleted the
$
symbol of the commands to easy copy-paste to the terminal - Deleted the initial incoming and the outgoing rules configuration of UFW, due to it being by default
🪧 PD: If you want to use the old database backend of the LND or Nostr relay, follow the next extra sections:
- Use the default bbolt database backend for the LND
- Use the default SQLite database backend for the Nostr relay
⚠️Attention⚠️: The migration process was tested on testnet mode from an existing bbolt database backend to a new PostgreSQL database using lndinit and the results were successful. However, It wasn't tested on mainnet,according to the developer, it is in experimental status which could damage your existing LND database.🚨 Use it behind your responsibility 🧼
🔧 PR related: https://github.com/minibolt-guide/minibolt/pull/93
♻️ Migrate the PostgreSQL database location
If you installed NBXplorer + BTCPay Server, it is probably you have the database of the PostgreSQL cluster on the default path (
/var/lib/postgresql/16/main/
), follow the next instructions to migrate it to the new dedicated location on/data/postgresdb
folder:- With user
admin
create the dedicated PostgreSQL data folder
sudo mkdir /data/postgresdb
- Assign as the owner to the
postgres
user
sudo chown postgres:postgres /data/postgresdb
- Assign permissions of the data folder only to the
postgres
user
sudo chmod -R 700 /data/postgresdb
- Stop NBXplorer and BTCPay Server
sudo systemctl stop nbxplorer && sudo systemctl stop btcpayserver
- Stop PostgreSQL
sudo systemctl stop postgresql
- Use the rsync command to copy all files from the existing database on (
/var/lib/postgresql/16/main
) to the new destination directory (/data/postgresdb
)
sudo rsync -av /var/lib/postgresql/16/main/ /data/postgresdb/
Expected output:
``` sending incremental file list ./ PG_VERSION postgresql.auto.conf postmaster.opts postmaster.pid base/ base/1/ base/1/112 base/1/113 base/1/1247 base/1/1247_fsm base/1/1247_vm base/1/1249 base/1/1249_fsm base/1/1249_vm [...] pg_wal/000000010000000000000009 pg_wal/archive_status/ pg_xact/ pg_xact/0000
sent 164,483,875 bytes received 42,341 bytes 36,561,381.33 bytes/sec total size is 164,311,368 speedup is 1.00 ```
- Edit the PostgreSQL data directory on configuration, to redirect the store to the new location
sudo nano /etc/postgresql/16/main/postgresql.conf --linenumbers
- Replace the line 42 to this. Save and exit
data_directory = '/data/postgresdb'
- Start PostgreSQL to apply changes and monitor the correct status of the main instance and sub-instance monitoring sessions before
sudo systemctl start postgresql
- You can monitor the PostgreSQL main instance by the systemd journal and check the log output to ensure all is correct. You can exit the monitoring at any time with Ctrl-C
journalctl -fu postgresql
Example of the expected output:
Nov 08 11:51:10 minibolt systemd[1]: Stopped PostgreSQL RDBMS. Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL RDBMS... Nov 08 11:51:13 minibolt systemd[1]: Starting PostgreSQL RDBMS... Nov 08 11:51:13 minibolt systemd[1]: Finished PostgreSQL RDBMS.
- You can monitor the PostgreSQL sub-instance by the systemd journal and check log output to ensure all is correct. You can exit monitoring at any time with Ctrl-C
journalctl -fu postgresql@16-main
Example of the expected output:
Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL Cluster 16-main... Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Succeeded. Nov 08 11:51:11 minibolt systemd[1]: Stopped PostgreSQL Cluster 16-main. Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Consumed 1h 10min 8.677s CPU time. Nov 08 11:51:11 minibolt systemd[1]: Starting PostgreSQL Cluster 16-main... Nov 08 11:51:13 minibolt systemd[1]: Started PostgreSQL Cluster 16-main.
- Start NBXplorer and BTCPay Server again
sudo systemctl start nbxplorer && sudo systemctl start btcpayserver
- Monitor to make sure everything is as you left it. You can exit monitoring at any time with Ctrl-C
journalctl -fu nbxplorer
journalctl -fu btcpayserver
Enjoy it MiniBolter! 💙
-
@ f63316ca:22ba92a9
2024-05-24 22:29:33Chef's notes
THIS IS THE CORRECT RECIPE
I created this recipe as I used to struggle with gaining weight for most of my life and being allergic to dairy, gluten, and soy, I had to come up with something that would benefit my overall health and supplement my workout routine. This healthy, plant-based, raw vegan protein shake is best to drink after your workout to gain weight, however, if you don't work out that's ok too, this shake is great for anyone, it is especially great for those looking to move up in weight if you are struggling with gaining weight and want to healthier option when doing so.
Details
- ⏲️ Prep time: 2hrs, 15min
- 🍽️ Servings: 1
Ingredients
- 8oz Gluten-Free Oats
- 8oz Walnut Milk
- 16oz Coconut Water; for a thicker consistency use 8oz
- 1 Fresh or Frozen Burro Banana
- 1 tbsp Cacao Powder
- 2 tbsp Natural Peanut Butter
- 1 Scoop Now Sports Pea Protein Powder
- 1 Scoop Sunwarrior Protein Powder
- 1 Scoop Sunwarrior Ormus SuperGreens Powder
Directions
- After your oats have soaks for the prep time, to prepare our plant-based, gluten-free protein shake, simply combine the following ingredients in a high-speed blender, and blend for 1 minute and 30 seconds until creamy and smooth, if you like your shake a little thicker add in 8 oz of coconut water instead of 16 oz when soaking your gluten-free oats.
-
@ 256a7941:b828ba8d
2024-06-12 12:45:13In regards to purchasing shares of a company, now, companies can invest in miners or simply purchase BTC to fund survival and expansion.
Less reliance on investment from the individual.
-
@ f63316ca:22ba92a9
2024-05-24 22:17:09Chef's notes
I created this recipe as I used to struggle with gaining weight for most of my life and being allergic to dairy, gluten, and soy, I had to come up with something that would benefit my overall health and supplement my workout routine. This healthy, plant-based, raw vegan protein shake is best to drink after your workout to gain weight, however, if you don't work out that's ok too, this shake is great for anyone, it is especially great for those looking to move up in weight if you are struggling with gaining weight and want to healthier option when doing so.
Details
- ⏲️ Prep time: 2hrs, 15min
- 🍽️ Servings: 1
Ingredients
- 8oz Gluten-Free Oats
- 8oz Walnut Milk
- 16oz Coconut Water, if you want a thicker consistency use 8oz
- 2 tbsp Natural Peanut Butter
- 1 tbsp Cacao Powder
- 1 Scoop Sunwarrior Protein Powder
- 1 Scoop Now Sports Pea Protein Powder
Directions
- In a large container, pour in your gluten-free oats, walnut milk and coconut water and soak for 2 hrs prior.
- After your oats have soaks for the prep time, to prepare our plant-based, gluten-free protein shake, simply combine the following ingredients in a high-speed blender, and blend for 1 minute and 30 seconds until creamy and smooth, if you like your shake a little thicker add in 8 oz of coconut water instead of 16 oz when soaking your gluten-free oats.
-
@ f6488c62:c929299d
2024-05-24 14:49:03- เมื่อเช้านี้ ช่วงเวลา ตีสาม มีข่าวลวง ว่าไม่อนุมัติกันไปๆ มาๆ และจนถึง ตีสี่กว่าๆ เวลาไทย ข่าวการอนุมัติ สปอต อีเทอเรียม อีทีเอฟ ก็กระจายกันมาจากหลายสื่อหลายสำนัก จนแน่ใจว่า ได้ผ่านแล้วจริงๆ แต่ราคาก็ยังไม่ได้สูงขึ้นตามที่คนใจร้อนหวัง อย่างไรก็ขอให้ใจเย็นๆ เพิ่งจะอนุมัติเพียงขั้นตอนแรก แต่ถ้าจะเปิดขาย ต้องรอให้อนุมัติเอกสาร s1 ก่อนประมาณ สองสามวัน แล้วเราค่อยมาลุ้นราคากันว่า จะไปถึงดวงดาวกันตอนไหนครับ
-
@ 188302bb:9052db11
2024-06-12 11:39:42He also said he'd free Ross Ulbricht. I think I'd vote for him if he was anyone else.
-
@ dc4cd086:cee77c06
2024-06-12 01:42:11A formal system is defined by its axioms. We try to treat science (and by proxy, the natural world) with an assumption of nature itself being a formal system -> start with axioms and explore the space from there. Axioms and derived theorems then create the boundaries for the environment you're working with.
Mathematical proofs show you absolute truth in the axiomatic system you are working with. They will also show the absolute falshoods of the system. The space is fractal, endlessly deep, you only can work with the knowledge you have of system you are working with.
The problem is that nature is mind-bogglingly entangled.
You think CS dependencies are tough? Biological processes seemingly have not only unenumerable dependencies, but dependencies that well eventually circle back to the process itself. At that point, you'd expect a computer to be in deadlock, but it gets worse. There there are not only multiple different clock-cycles, but its a gradient everywhere you go. In biology, it is often said that there are always contradictions to rules being stated and that whatever "rules" we come up with are more guidelines, so we can't even make the assumption that biology and nature is a formal system.
What are the implications of that? A real strangely looped rabbit hole for you 🕳️🔄🐇
The image is from Doug Hofstadter's Godel Escher Bach ch 3, a visualization of this process with some defined formal system. Godel's Incompleteness Theorem proved that any formal system will have statements about it that cannot be proved from within said system. For example, where in the system of language rules do you get meaning from? You're not going to derive semantics from syntax.
So if formal systems can't even be fully explicated , what does that imply for non-formal systems? Damned if nature is formal, damned even more if its not.
Now for a sleight shift. Humans, we live outside many axiomatic systems, but use them to frame our understanding of the world. Ever work on a problem for such a long time, and then stop and do something else? Thats because we aren't bound by said box/axiomatic system and can move outside it. This feature itself allows us to reenter the system from different angles, or just say "Stop, its not worth it."
The capacity for humans to exit systems is a core part that separates us from computers. Wisdom incorperates restraint of application as a consequence from viewing the system wholistically.
The real questions now: What kind of boxes are we living in, be they foundational or self constructed? Are we agents taxing towards new provable theorems contained in some system we can't exit from? What are the generating functions for this system? Are we the system itself?
This gives me hope on the unknowable truths and falshoods. Spiritual experience is the experience of The Other, whatever that may be.
original thread: nostr:nevent1qqsqrry7heeq2u38gjursxel9w54t66za3xh0avarfawxnv5rfgvlesprfmhxue69uhkummnw3ezuargv4ekzmt9vdshgtnfduhsygrszgsjsfemmsr6lxl8wf06t39uplq5dpntasudgsmqm39udnqchypsgqqqqqqsdkt4pc
-
@ 6ad3e2a3:c90b7740
2024-06-12 06:26:29I’ve had this idea for a while but hadn’t yet found the right way to express it — the contrast between doing something ourselves (“in house”) vs outsourcing it and the implications thereof.
There are trivial examples like whether to hire someone to clean your house and more profound ones like whether to send your kids to school rather than educating them yourself (homeschooling.)
The outsourcing almost by default of fundamental things like the electrical power to your home, the server on which your most personal information is stored and your life savings to a bank or brokerage firm is anomalous by historical standards. One’s personal information, wealth and power were largely in one’s own hands, and it is only recently, due to technological progress and convenience that we have adopted such tradeoffs.
Of course, this didn’t happen all at once. People stored their gold in banks for safe keeping, and banks issued paper notes for ease of transacting. It’s since been abstracted to inauditable bits on a screen, in an account for which you have to convince a third-party server of your identity to access. Moreover, if you want to donate to Hamas, ISIS, Julian Assange or the Canadian trucker protests, for example, the bank might not sign off on it. Had you kept your money in hundred dollar bills or silver bars, you could physically hand them to any of those parties (if ISIS didn’t behead you first) permissionlessly*.
*If you had bitcoin, you could do this digitally, but you still wouldn’t be able to buy goods and services (yet) in most places or pay your taxes with it.
Another area in which personal autonomy is exchanged for centralized convenience is social media. You log-in to platforms like Twitter or Facebook, wherein they store your identity and data and feed you information via algorithm based on whatever it determines will keep you most engaged. You could instead keep a list of bookmarked blogs and sources for news and the interpretation thereof, but the convenience of having it served to you on a single platform is too good to pass up for most.
The mission creep from your money to your information diet to your alimentary diet (processed supermarket and restaurant food) is only the beginning. The pharmaceutical industry is constantly developing new pills and potions as substitutes for in-house biological processes. Instead of eating healthy and exercising you can simply take Ozempic to lose weight. Instead of experiencing anxiety or anger, you can outsource management of these emotional states to various pharmacological cocktails.
With vaccines, we’ve started to outsource immune function to large pharmaceutical conglomerates, and this is deemed so important that we have in many cases made this mandatory while simultaneously conferring preemptive liability on their makers. During covid, it got to the point where "natural immunity,” the in-house option for evolution’s aeons, was called a “conspiracy theory.”
The mRNA shots, in particular, crossed the line from immunity based on stimulating your in-house antibodies to creating their own mini-factories inside the body and quite possibly altering human DNA.
And of course we have artificial intelligence now, and that creates ever greater possibilities for outsourcing. A telling exchange between mRNA-zealot Stephen Colbert and the author Yuval Harari occurred on the Colbert show wherein the host suggested outsourcing his very judgment to AI, as we humans are too error prone.
Colbert’s idea wherein not only is our biology, but our sense- and decision-making outsourced for convenience is the ultimate capitulation. The Matrix movies were not, to my knowledge, meant to be documentaries, but this is the end game of total outsourcing where even autonomy of mind is surrendered for comfort, ease and the “greater good.” . . .
I read a piece on nostr by Svetski (don’t know if that’s his real name) wherein he explains the internet stack. The stack, he points out, is made up of protocols like IP, TCP, and on top of it HTTP (web), SMTP (email) and FTP (files).
Platforms like Twitter, Gmail and Facebook are built on top of those protocols. For example, Google can ban you from using its Gmail client, but it can’t ban you from using email generally because email (SMTP) is a neutral protocol available to anyone to send information peer to peer, not a third-party client platform like Google.
Svetski argues that the internet was successful (and crushed the walled garden of AOL) because nobody owned it. He compares the open protocols of the internet to a free market which is where innovation and creativity necessarily flow. But because the bitcoin protocol (a native internet money) had not yet been invented, payments were still at the platform level. Paypal and online banking are third-party, walled gardens, accessible only by permission. And because nostr had not yet been invented, identity online was similar. Third parties controlled information about you, and you needed a variety of logins, 2FAs, etc. to prove you were who you say you are and access your accounts. As such, they could track your usage of their platforms via that information.
Put differently, both the monetary and identity pieces of the internet were at the platform rather than the protocol layers of the stack.
Of course, with bitcoin and nostr, that no longer need be the case. You can now securely log into platforms without disclosing your personal information to third parties via nostr’s public/private key pairs. They know that npub has been signed by the user’s private key, but they don’t know your real name, phone number or banking information. If you needed to pay for something you could do so via bitcoin, again, without the need for third-party authentication.
Of course, many people are opposed to this because it means you could transact privately**. But there is also nothing stopping platforms from requiring proof of real-life identity — they’ll just have to compete with ones that don’t.
**(In truth, there is in some ways more transparency because everything in bitcoin and nostr is publicly viewable and auditable even if the connection between real-life identity and npub/xpub is severable.)
In other words, this in-house/outsourcing choice can alternatively be looked at as an up/down struggle via the technology stack. The forces of centralization and outsourcing want to push money and identity up the stack onto their platforms. The in-house forces want to push money and identity down the stack to the protocol layers.
The same framework can be used for things like education or social media too. Is education (learning) something that requires a platform replete with admissions offices, graduation ceremonies and credentials, or is it a body of knowledge and wisdom handed down over human history to which anyone can have access? Does social media really need to be mediated by middlemen or can we via nostr simply connect peer to peer over relays?
In fact, the original protocol might be language — accessible to anyone with the requisite vocabulary — and even in that area there are factions who want to make it platform-like with ever more words you’re not allowed to say and even words you’re required to use in reference to certain sensitive individuals. It’s not enough to be understood, but you must, in certain circles, signal your “good person” credential to interact via the new rules of the platform.
This is not to suggest outlawing universities and colleges from offering platforms to those who deem them worthwhile or Twitter from organizing the social experience in a way people prefer. Surely, it should be possible to outsource if you prefer, and if you want sit on the couch eating Doritos all day and hand your weight management to Ozempic, that should be an option (provided the side effects of the medicine are all fully disclosed and concomitant liability is in place.)
But it’s long past time to see these “solutions” for what they are — conscious top-down grabs from centralized power to turn what used to be protocols — language, money, education, online communication — into permissioned platforms, accessible only to those with the requisite credentials.
So please don’t mistake this for an argument that nothing should be a platform, or that we need to grow all our own food and never outsource tasks to other people with superior technical knowledge and expertise. It’s great that restaurants and farmer’s markets exist, that designers make clothing and architects draw the plans for structurally sound buildings. The point is we should be aware that in-house vs outsourcing requires tradeoffs and be free, even encouraged, to refuse to them when the balance is not in our favor.
-
@ 502ab02a:a2860397
2024-06-12 06:25:36สตอรี่ ชีสเค้ก (Story Cheesecake) : ep4 กลับไปเริ่มที่จุดตั้งต้น อาหาร ขนม ไม่ได้กินกันเพียงทางปาก หากแต่ยังรับรสทางสายตา จมูก ประกอบกันไป
ตอนนั้นเราต้องยอมรับว่าควรกลับมาตั้งต้นกันใหม่ เพื่อค้นหาสูตรที่เหมาะสมกับการทำชีสเค้กคีโต เอ๋อธิบายแนวคิดว่า วัตถุดิบหลักของเจแปนนิสชีสเค้ก ประกอบไปด้วยหัวใจหลักไม่กี่อย่าง ครีมชีส วิป ไข่ น้ำตาล เนย ถ้าไหนๆจะตั้งต้นจากศูนย์แล้ว จึงเริ่มต้นที่เนย เป็นอย่างแรก
เนย เป็นศิลปะการทำอาหารที่ยอดเยี่ยมมากตั้งแต่สมัยโบราณ เป็นภูมิปัญญาระดับโลกอีกอย่างหนึ่ง ลำพังแค่เนยแท้ที่มีขายในไทย ก็นำมาทดลองกันไม่หวาดไม่ไหว แต่ก็ต้องทำ เนยเป็นองค์ประกอบเล็กๆในขนมตัวนี้ แต่เป็นส่วนผสมที่สำคัญไม่ว่าจะตัวไขมันเนย กลิ่นของเนย รวมถึงรสชาติความนัวของเนย นั่นหมายถึงการเทสเนยทุกยี่ห้อที่คิดว่าเหมาะกับการทำขนมตัวนี้ต้องเริ่มต้นขึ้นแล้ว ต้องเทสตั้งแต่สีสัน รสชาติและกลิ่น ไม่ว่าจะตอนกินเปล่าๆหรือตอนนำไปอบขนม ถ้าใครได้เห็นภาพการชิมเนยปริมาณไม่ต่ำกว่า 20 ประเภท (SKU) ต้องคิดว่านั่งโหลดไขมันแน่ๆ แต่ไม่ต้องตกใจอะไรไป ไม่ได้ชิมรวดเดียว ไม่งั้นอืดแน่ๆเลย เนยที่ใช้เทสนั้นเป็นเนยแท้ล้วนๆ เพราะคีโตไม่ใช้เนยผสมอยู่แล้ว กองทัพเนยตั้งแต่เนยไทยทั่วไป จนไปถึงเนยกระบวนการหมักพิเศษแบบต่างๆ เรียกได้ว่าทดลองจนเชี่ยวชาญเรื่องเนยไปเลย อะไรจะรสชาติกลิ่นอย่างไรเวลานำไปอบขนม ตัวไหนที่ตอบโจทย์ที่สุด ช่วงนั้นเอียนเนยไปซักพักเลยเชียว คีโตไม่ได้เน้นว่าเนยจะต้องมาจากวัวกินหญ้าเท่านั้น คีโตจริงๆแล้วขอเพียงเป็นเนยแท้ๆไม่ผสมไขมันพืชก็ถือว่าโอเคแล้ว ที่ต้องการเนยจากวัวกินหญ้าเพราะมีบางรายงานบอกไว้ว่าจะได้รับสารอาหารที่ดีกว่า ส่วนเราทำขนม อย่างที่ย่อหน้าบนๆได้บอกไว้ว่า ความรื่นรมย์ของการกินขนมนั้นได้รับความสุนทรีย์ทั้งรส กลิ่น และรูปลักษณ์ ถ้าจะให้มุ่งใช้วัวกินหญ้าโดยเลือกหยิบแต่ยี่ห้อยอดนิยม ไม่ชิม ไม่ทดสอบกลิ่นก่อนว่าเหมาะกับขนมนั้นๆหรือไม่ เราคงทำไม่ได้ เราอาจพลาดวัตถุดิบที่ดีไปได้ง่ายๆ เหมือนกัน กระนั้นก็นับว่าโชคดี ที่เนยจากวัวกินหญ้าส่วนใหญ่แล้วจะให้กลิ่นและรสชาติที่ดีเช่นกัน เพราะที่เทสแล้วเขารอบลึกๆนั้นเป็นเนยจากวัวกินหญ้าแทบทั้งนั้น แล้วสุดท้ายก็ได้คำตอบว่า เนยนิวซีแลนด์นั้นมีข้อจำกัดบางอย่างที่ยังไม่ตอบโจทย์ชีสเค้กตัวนี้ตามสไตล์ที่เราตั้งไว้ ถ้าจะให้ตอบโจทย์จริงๆเลยก็กลับเป็นเนยพิเศษที่หมักธรรมชาติแต่นั่นก็จะดูยุ่งยากเกินไปที่จะไขว่คว้ามานั่งทำขนม สุดท้ายแล้วจึงจบที่เนยฝรั่เศส แต่ทั้งนี้การดึงประสิทธิภาพของเนยให้ออกมาถูกใจเรา จังหวะการใส่เนยลงในส่วนผสมของชีสเค้กก็สำคัญและมีผลกับลักษณะครีมอย่างเห็นได้ชัด สิ่งหนึ่งที่สามารถบอกไว้ได้ตรงนี้คือ ยังมีเนยบนโลกนี้อีกมากมาย ที่ให้เราค้นหา วันนี้เราชอบอยู่ตรงนี้ หากแต่วันข้างหน้าถ้าเราได้เจอเนยแบบใหม่ๆที่เราไม่เคยลอง เราก็อาจจะตกหลุมรักมันได้ง่ายๆเช่นกัน
ส่วนหนึ่งของความจริงจังเรื่องเนย
siamstr #pirateketo
-
@ 52387c6b:49dbdfb2
2024-05-23 02:03:38Chef's notes
Easy start to the day, can also put some Woostr in your Bloody Mary. Perfect for washing down the toast. Breakfast of champions. If you have some sharp cheddar you can melt this on the toast, altho this may prove too complex for the average bloke, just an option. Be mindful this will add significant prep and cook time. 2-3 minutes
Details
- ⏲️ Prep time: 30 sec
- 🍳 Cook time: 2 min
- 🍽️ Servings: 1
Ingredients
- 2 slices of bread
- Butter
- Woostr sauce
- Bloody Mary
Directions
- Toast bread to your liking, lather a dollop of butter on. Criss cross the toast with a butter knife ( so the woostr dont roll off) and then drizzle on woostr.
-
@ dd664d5e:5633d319
2024-06-11 15:29:22Laeserin's theory of assortative clustering
I was nerding again
I posted a wiki breadcrumb trail of events, today, from entropy, to information entropy, to social media entropy. (Source for the last entry in that list: I made it up.)
The more mathematically-inclined npubs immediately saw the usefulness in such a score, probably because it can be so very difficult to find anyone writing anything particularly complex or "deep" about one's own topics of interest. So, that is a subset of npubs that personally suffers from the difficulty of finding such slender trees within the increasingly vast, wild forest of Nostr notes.
Thar be dragons
However, this sort of score is a proxy-measure for general intelligence, so there is obvious nervousness about measuring something that many people think it is immoral to measure, and that others do not believe is an actual thing. (Despite the fact that we are quickly developing artificial copies of the organic version and you can't copy something that is nonexistent... but I digress.)
There is always the fear of "intellectual elitism", whereby the worth, or value, of some particular person or group of people is determined by measuring their intelligence. This fear is not unfounded, as there are many amoral people who view humans in this reductive manner, but fear of amoral people being wicked about something is not a sufficient reason to cut off entire fields of study. That would, in fact, bar us from thinking much about anything.
More is not always better
I suppose the assumption would be that a higher SME would always be considered better, but this is a fallacy based upon the overemphasis on intelligence in our particular culture and time.
Most people would actually prefer the content of someone similar to themselves, who is conversing on a level they can easily understand and respond to, without feeling intimidated or bored. Humans tend to associate with those more like themselves (i.e. assortatively), and don't tend to associate more than one SD out on the IQ curve, in either direction, as they find the experience confusing, tiresome or alienating.
What is "better", in other words, is subjective and dependent upon the person asked, which is why SME scores make sense, but not necessarily SME rankings. In the same way that a sky-high WoT score can actually make an account less-attractive because you might assume that they're #NostrElite, a sky-high SME score will assume to represent nerdiness or a tendency to verbosity.
We will self-sort
That is why the largest npubs are, by design, never going to be the most information-dense ones, and the most information-dense ones will tend to be treated like spam, by many other npubs. This same spam-effect will hit the least information-dense ones, which is why we can expect each cohort to eventually branch off into their preferred nevent, relay, client and hashtag realms, where they can be themselves without feeling put-upon by other npubs' negative reactions.
Academic centers, such as universities and startup hubs were developed in order to support this self-sorting effect, by allowing those to the right-end of the bell curve to congregate with the like-minded and have conversations with people who don't treat them as if they are space aliens. However, it carried the negative effect that those people were then clustered geographically, where they eventually lost sight of the day-to-day issues that effected the majority of the populace. Their isolation made them insular and ignorant, and fostered the very "intellectual elitism" that creates so much worry, now.
Make it a feature, not a bug
Nostr solves for the worst effects of this problem, by keeping all of the conversation within one data structure and profile silo, so that those from one group will regularly have contact with the others, and frenships (and romances, who knows?) can take root at the margins. Nostr, in other words, recreates the social mixing common to a village, where the groups are largely separate when deep in discussion or at work, but interact incidentally when moving around in shops, attending church services, festivals, or joining sports clubs or choirs.
In closing, I would say that the concern is completely justified, but a universal communications protocol is the best way to alleviate such concern and have all reap some reward for making the relationship structure of humankind more transparent.
One man's treasure is another man's trash, and everything happily reverts to the mean. The End.
-
@ 137a8b3a:51f4a26b
2024-06-12 06:07:52In the huge territory of the computerized music scene, Spotify stands apart as a signal for craftsmen endeavoring to contact a worldwide crowd. Notwithstanding, in the midst of the plenty of tracks accessible on the stage, sticking out and building up some decent forward momentum can be a difficult undertaking. Perceiving this test, Indidigital offers craftsmen an essential arrangement - the choice to buy real spotify streams.
buy real spotify streams from Indidigital isn't simply about expanding numbers; it's a determined venture pointed toward upgrading a craftsman's perceivability and validity inside the Spotify people group. Real streams address veritable commitment from audience members who reverberate with the music, hence establishing a groundwork for practical development and achievement.
Indidigital's methodology underscores validity and adequacy. The buy real spotify streams are obtained from real audience members who effectively draw in with the music, guaranteeing that specialists get significant foothold and communication following right after them. This obligation to quality recognizes Indidigital from different administrations that might depend on fake means to support stream counts.
Besides, buy real spotify streams act as a strong mark of a craftsman's allure and reverberation with crowds. At the point when clients run over a significant number of real streams, they're bound to see them as bona fide articulations of masterfulness, subsequently encouraging a more profound association between the craftsman and the audience.
Indidigital's administration is intended to be consistent and brother free for specialists. With a direct cycle, craftsmen can undoubtedly buy real spotify streams and witness unmistakable outcomes concerning expanded perceivability and commitment on the stage. By utilizing the force of real streams, craftsmen can draw in new audience members, grow their scope, and cement their presence inside the serious scene of the music business.
By putting resources into buy real spotify streams through Indidigital, craftsmen can open new doors for development and lay down a good foundation for themselves as powerful voices in the computerized music realm. Instead of simply zeroing in on transient gains, Indidigital's methodology accentuates long haul accomplishment by building veritable associations among craftsmen and their crowd.
Generally, Indidigital offers craftsmen an essential road to raise their presence on Spotify while keeping up with honesty and genuineness. Through the choice to buy real spotify streams, specialists can enhance their perceivability, draw in certified audience members, and diagram a course towards enduring effect and acknowledgment in the consistently developing universe of music streaming.
-
@ dd664d5e:5633d319
2024-06-10 12:57:17Monday Market Update
ECB lowered interest rates
The Governing Council today decided to lower the three key ECB interest rates by 25 basis points. Based on an updated assessment of the inflation outlook, the dynamics of underlying inflation and the strength of monetary policy transmission, it is now appropriate to moderate the degree of monetary policy restriction after nine months of holding rates steady. Since the Governing Council meeting in September 2023, inflation has fallen by more than 2.5 percentage points and the inflation outlook has improved markedly.
Press conference from the ECB featuring ECB President Christine Lagarde).
Euro-area inflation stabilizes
Source: Eurostat
Gold, silver, and Bitcoin continue to boom
Precious metals
Source: Goldpreis.de
Bitcoin
Source: Coinmarketcap
Source: Fiat Market Cap
Source: Infinite Market Cap
-
@ 44dc1c2d:31c74f0b
2024-05-22 22:09:19Chef's notes
If you don't have peanuts, you can sub it with peanut butter, but you'll want to cook with less salt as the peanut butter can add too much salt to the dish.
Details
- 🍽️ Servings: 4
Ingredients
- 2 1/2 cups Coconut Milk
- 3 Tbsp Red Curry Paste
- 3 Tbsp Thai Fish Sauce
- 2 Tbsp Palm sugar or light brown sugar
- 1 LB rump streak cut into thin strips
- 2 Lemon Grass Stalks, Bruised
- 3 oz Ground Roasted Peanuts
- 2 Fresh Red Chilies, Sliced
- 5 Kaffir Lime Leaves, Torn
- Salt and Pepper
- Thai Basil for Garnish
- 2 Salted eggs to serve with
Directions
- Put half the coconut milk in a large pan or Wok and heat gently until it begins to boil and separate.
- Add the curry paste and cook over medium heat until fragrant. Then add the Fish sauce, sugar and lemon grass.
- Continue to cook until the color of the sauce deepens
- Add the remaining coconut milk. Bring back to boil. Add the beef and peanuts. Cook for another ~10 min
- Add the chilies and the torn Kaffir Lime and adjust the seasoning. Garnish with whole Basil leaves and serve with a salted egg and rice.
-
@ 166a42fa:3423b80f
2024-05-22 21:58:57Chef's notes
All ingredients but the blood oranges from ALDIs
Details
- ⏲️ Prep time: 20
- 🍳 Cook time: 0
Ingredients
- Cheddar chesse
- Blackberries
- Raspberries
- Crackers
- Cucumber
- Bell peppers
- Brie cheese
- Pepperoni
- Blood orange
- Apple
- Coconut chocolate cookies
Directions
- Cut up all ingredients
-
@ 3f770d65:7a745b24
2024-05-22 18:30:14Chef's notes
For the dough, combine the water, yeast, honey, and olive oil in the bowl of an electric mixer fitted with a dough hook. Add 3 cups flour, then the salt, and mix. While mixing, add 1 more cup of flour, or enough to make a soft dough. Knead the dough on low to medium speed for about 10 minutes until smooth, sprinkling it with flour, if necessary, to keep it from sticking to the bowl. When the dough is ready, turn it out onto a floured board and knead by hand a dozen times. It should be smooth and elastic. Place the dough in a well-oiled bowl and turn it several times to cover it lightly with oil. Cover the bowl with a kitchen towel. Allow the dough to rest at room temperature for 30 minutes.
Divide the dough into 6 equal parts and roll each one into a smooth ball. Place the balls on a baking sheet and cover them with a damp towel. Allow the dough to rest for 10 minutes. Use immediately, or refrigerate for up to 4 hours.
If you've chilled the dough, take it out of the refrigerator approximately 30 minutes ahead to let it come to room temperature. Roll and stretch each ball into a rough 8-inch circle and place them all on baking sheets sprinkled with cornmeal. (You will be able to fit 2 pizzas on each 18 by 13-inch baking sheet.) You may also use a cast iron skillet if so desired.
Details
- ⏲️ Prep time: 45 minutes
- 🍳 Cook time: 15 minutes
- 🍽️ Servings: 6
Ingredients
- 1 1/4 cups warm (100 to 110 degrees F) water
- 2 packages dry yeast
- 1 tablespoon honey
- 3 tablespoons good olive oil
- 4 cups all-purpose flour, plus extra for kneading
- 2 teaspoons kosher salt
Directions
- Preheat the oven to 500 degrees
- Bake for 10 to 15 minutes, depending on your desired level of crisp.
-
@ 137a8b3a:51f4a26b
2024-06-12 06:05:51In the present computerized scene, video content has turned into a predominant power across web-based entertainment stages, including Threads (previously Facebook), where clients are progressively captivating with video content. On the off chance that you're trying to reinforce the perceivability and commitment of your videos on Threads, Indidigital offers particular types of assistance to take care of your necessities. With our customized arrangements, you can buy real threads video views and essentially increase your presence on this compelling stage.
Why pick to buy real threads video views? Credibility is a basic consider the outcome of any web-based entertainment system. At the point when you buy real Threads video views, you're not simply blowing up your view count; you're additionally cementing the believability and dependability of your substance. Veritable views from real clients sign to others that your videos merit watching, accordingly improving the probability of additional commitment, shares, and eventually, more extensive perceivability for your substance.
At Indidigital, we focus on quality and legitimacy in the entirety of our administrations. Our real Threads buy real threads video views are obtained from authentic clients who effectively draw in with content on the stage. Through essential advertising philosophies, we elevate your videos to designated crowds, guaranteeing most extreme openness and communication. With our administrations, you can be certain that your video views are authentic and agreeable with Threads' rules.
In addition, buy real threads video views isn't exclusively about helping your view count; it's likewise about enhancing the effect and reach of your videos. Videos with higher view counts are bound to surface in query items and proposals, making them more noticeable to likely watchers. This expanded perceivability can convert into more prominent brand mindfulness, commitment, and changes for your business.
Notwithstanding buy real threads video views, Indidigital offers an exhaustive set-up of administrations to improve your presence on Threads. Whether you're hoping to increment likes, remarks, offers, or supporters, we have the ability and assets to assist you with accomplishing your targets. Our group of old pros will team up intimately with you to form a tailor made technique lined up with your objectives and yearnings.
All in all, why delay? Raise your Threads video happy with Indidigital. buy real threads video views today and witness the outstanding development of your commitment, perceivability, and effect on this unique web-based entertainment stage. With our demonstrated methodologies and steadfast help, you're strategically set up to have an enduring effect on Threads.
-
@ dd664d5e:5633d319
2024-06-09 07:01:01Why Nostr needs writers
... and how you can be one.
Literary art deserves a suitable frame
I have repeatedly suggested that people who are inclined to truly write, in an informative or artistic (a.k.a. "high signal") manner, switch from merely posting micro-blogging (kind 01) notes to long-form notes, wiki pages, and community notes.
These OtherStuff articles are contained within new types of events and are handled differently by potential readers and algorithms. It is true that the engagement you receive will be much lower (at least, initially), and this content may not be very popular, but:
-
the articles will be more long-lasting on the relays and others will likely pay to archive them for you,
-
the direct responses will tend to consider the article in its entirety, rather than merely using them to grandstand or straw-man,
-
the articles are easily editable and will soon be versioned, to allow for both change and traceability,
-
articles will increasingly be moved to the forefront of new types of clients, so you will be part of the pioneer subset for those clients,
-
the complex structure encourages you to write more complex material,
-
the notes will draw more attention from those arriving late to the conversation,
-
and they will create a gallery of your "best of" and "essential me" for potential followers to peruse.
Expand the knowledge base
Nostr developers are an exhausted and harried group, that is trying to build under duress on a rather thin budget, with mile-long roadmaps and nagging users hounding them the whole way.
The last thing these devs want to do is write software documentation. But documentation is actually one of their most important forms of marketing to new users and documentation writing and maintenance often inadvertently uncovers bugs and workflows that need to be redesigned.
The simple solution is to have their most-enthusiastic users writing the documentation for them, which is now simple to do, with the wikis that are being built. Simply find your favorite apps and begin documenting things you typically do with those apps, or write an overview page showcasing your favorite features, including screenshots.
Not only is this useful for later users, it's free advertisement for those apps and it lends the weight of your WoT (Web of Trust) to their endeavor. You are showing, through proof of work, that you care enough about this developer and their efforts that you'd spend your free-time writing about them. That is the strongest recommendation you can make.
Make Nostr more attractive to search engines
Search engines are the gatekeepers of the Internet. Applications don't necessarily rise to popularity because of the "clout" of the people who write there. They rise because readers from outside of those applications found the content within them useful, entertaining, or informative.
Although social media drama and influencing can make for a fun read, if you like that sort of thing, it isn't generally what someone who isn't familiar with the actors in the argument would bother reading. It looks like squabbling, mogging, tribalism, and gamesmanship, to outsiders. Which is what it is. Most people eventually weary of it or being involved in it.
Much more useful is the a compendium of ideas pulled together by an individual npub (human or not), and forced to go head-to-head with counterarguments contained in a separate, but jointly-listed compendium. This format eschews the more emotive forms of rhetoric (pathos and ethos) and encourages someone to engage and debate on a more intellectual level (logos).
This is the idea behind the Nostr wiki, and I heartily support it. Make dialectic great again.
Escape the scourge of AI
Don't bother telling me that AI makes human writing obsolete. It rather makes it a more-exclusive endeavor, by reducing the scope of the content to something more reflective of the person writing.
Yes, ChatGPT can write articles, but whether they are "better" is subjective. They have fewer minor flaws and cater more to general tastes, and can be produced quickly and in high numbers, at relatively low cost. The same way that robot-created art is "better" than most human-created art, or factory-produced food is "better" than most home-cooked food.
I'm only writing for the sort of person who prefers human art. Writing can be an expression of the self and a window to the soul. Read what I write because you want to know what I really thought.
I thought this.
-
-
@ 137a8b3a:51f4a26b
2024-06-12 06:02:24In the domain of web-based entertainment promoting, having major areas of strength for an on stages like Threads (previously Facebook) is urgent for people and organizations meaning to successfully interface with their ideal interest group. With its tremendous client base and different socioeconomics, Threads offers gigantic open doors for brands to grow their span and draw in with their crowd. Assuming you're hoping to upgrade your presence on Threads by buying followers with PayPal, Indidigital offers specific administrations to assist you with accomplishing your objectives. With our customized arrangements, you can Buy Threads Followers with PayPal and have a massive effect on this powerful stage.
Why center around Buy Threads Followers with PayPal? PayPal is a generally perceived and confided in installment stage that offers comfort, security, and adaptability for online exchanges. By permitting clients to buy Threads followers with PayPal, Indidigital guarantees a consistent and bother free buying experience. Whether you're an individual or a business, PayPal gives a solid installment choice that gives you inner harmony while buying followers for your Threads profile.
At Indidigital, we focus on accommodation and straightforwardness in the entirety of our administrations. Our consistent joining with PayPal permits clients to Buy Threads Followers with PayPal rapidly and safely, without the requirement for extra installment strategies or confounded processes. With PayPal, you can make installments with certainty, realizing that your exchanges are safeguarded and your monetary data is secure.
In addition, Buy Threads Followers with PayPal offers adaptability and genuine serenity for clients. PayPal's buyer security strategies shield your buys, giving added consolation in the event of any issues or questions. With PayPal, you can follow your exchanges, deal with your installments, and effectively access client service, guaranteeing a smooth and good experience each time you buy Threads followers with us.
As well as offering Buy Threads Followers with PayPal as an installment choice, Indidigital gives a thorough scope of administrations to upgrade your presence on Threads. Whether you're hoping to increment likes, remarks, offers, or perspectives, we have the ability and assets to assist you with succeeding. Our group of experienced experts will work intimately with you to foster a modified system that lines up with your objectives and targets.
So why pause? Take your Threads presence to a higher level with Indidigital. Buy Threads Followers with PayPal today and watch as your commitment, perceivability, and impact develop dramatically. With our demonstrated procedures and committed help, you'll be well headed to establishing a long term connection with this unique virtual entertainment stage.
-
@ 7308f407:94057dcf
2024-05-22 18:13:34Chef's notes
https://youtu.be/t0CBKwPIOLk?si=rLP0-9aDx0PNbumM
Details
- ⏲️ Prep time: Prep Time for Birria Beans
- 🍳 Cook time: Initial Boiling
- 🍽️ Servings: The serving size for the Birria Beans recipe depends on the quantity of beans and broth used. Given the ingredients listed, this recipe typically serves approximately 8-10 people+.
Ingredients
- 12 cups broth from birria (previous recipe)
- 1/2 onion
- 4 jalapeños or serrano peppers
- Water
- Salt to taste
- Beef from birria (optional)
Directions
- Wash the beans and let them soak for 30 minutes.
- In a large pot, add all the ingredients above.
- Set the heat to high and allow the mixture to come to a boil. Let it boil for 10 minutes.
- Reduce the heat to medium-low and cook for about 2 to 3 hours until the beans become soft.
- -To check the consistency of the beans, remove one from the pot to a plate. Using a fork, poke through to cut it in half. This method will help you easily tell if they are soft. You can also taste the beans.
- -If they are not soft yet, continue to cook for another 30 minutes.
- Every 30 minutes to 1 hour, check the beans to ensure they have enough water to cover them. They will dry out if the water level drops below the beans.
- You can also add beef from birria into the beans for added flavor.
- Enjoy the savory and slightly spicy flavor of the pinto beans cooked in red birria broth, topped off with cilantro, onion, and lime.
-
@ 137a8b3a:51f4a26b
2024-06-12 05:57:27In the immense scene of virtual entertainment showcasing, building major areas of strength for an on stages like Threads (previously Facebook) is fundamental for people and organizations alike. With its far and wide ubiquity and broad client base in India, Threads offers colossal open doors for brands to associate with their main interest group and increment their perceivability. Assuming you're hoping to upgrade your presence on Threads and lay out validity in the Indian market, Indidigital offers particular types of assistance to assist you with accomplishing your objectives. With our custom fitted arrangements, you can Buy Real Threads Like India and have a significant effect on this powerful stage.
Why center around Buy Real Threads Like India? Threads is a conspicuous virtual entertainment stage that draws in huge number of clients from India. By buying likes from real clients in India, you're not simply supporting your commitment measurements; you're likewise taking advantage of a designated crowd that is bound to reverberate with your substance. Whether you're a substance maker, a brand, or a powerhouse, our administrations are intended to assist you with interfacing with your crowd and drive significant cooperations.
At Indidigital, legitimacy and quality are our first concerns. That is the reason every one of our likes are certified, natural, and come from Buy Real Threads Like India. We utilize vital showcasing procedures to elevate your presents on designated crowds, guaranteeing greatest openness and collaboration. With our administrations, you can believe that your likes are genuine and agreeable with Threads' rules.
In addition, Buy Real Threads Like India isn't just about expanding your numbers; it's likewise about building believability and entrust with your crowd. At the point when clients see that your posts have gotten certifiable likes from real individuals, it improves your standing and makes your substance seriously engaging. This, thusly, can prompt expanded perceivability, commitment, and at last, better progress on the stage.
Notwithstanding Buy Real Threads Like India, Indidigital offers a thorough scope of administrations to upgrade your presence on Threads. Whether you're hoping to increment sees, remarks, offers, or supporters, we have the mastery and assets to assist you with succeeding. Our group of experienced experts will work intimately with you to foster a tweaked technique that lines up with your objectives and goals.
So why pause? Take your Threads presence to a higher level with Indidigital. Buy Real Threads Like India today and watch as your commitment, perceivability, and impact take off higher than ever. With our demonstrated systems and committed help, you'll be well en route to establishing a long term connection with this unique web-based entertainment stage.
-
@ 46fcbe30:6bd8ce4d
2024-05-24 15:47:11With more than 6000 products listed, it's time to extract some numbers again.
The following are some findings in the data, followed by the full data.
Removed or defunct
Of all the 3381 products that are no more,
- 1600 had less than 1000 downloads at the time we first listed them
- 628 we did not get to review before they were removed or defunct
- 607 were custodial or did not even allow to send or receive BTC. That is 607 products that if you used them to store bitcoins, you would now not be able to do anything with those bitcoins.
- 18 had public source but we failed to build that source
- 13 we managed to build but not reproduce
- 2 were reproducible - namely Zap which was discontinued in favor of BitBanana and ABCore which was a very limited experiment from the start.
Obsolete or stale
Of all the 775 products that are not getting updates in years,
- 221 have less than 1000 downloads (and many of them are likely to disappear as shown above)
- 179 are custodial or "no send or receive". You definitely don't want to use these.
- 0 are reproducible
OK
Of the 2164 products that look well and alive
- 937 are custodial or "no send or receive"
- 143 are do-it-yourself projects (20), not yet actually released (41) or most likely never getting released (82)
- 306 are closed source
- 46 are not compilable (12) or the compiled app does not match the released app (34)
- 20 are reproducible
https://walletscrutiny.com/
-
@ e3b5f432:f5bee9d0
2024-06-12 02:28:45One of the most absurd and tragic episodes of those years of horror was the Four Pests Campaign. What was it? It involved waging war against four species considered harmful to crops: rats, flies, mosquitoes, and sparrows. The sparrows, in particular, were subjected to relentless persecution because they were believed to consume stored grain and reduce agricultural production. However, eliminating these birds caused an ecological imbalance that favored the proliferation of insects like locusts, which devastated fields and worsened the food shortage.
A Great Leap… Forward?
The Four Pests Campaign was part of the “Great Leap Forward,” an economic and social policy aimed at accelerating China’s development and surpassing Western powers. Mao Zedong, the founder of the People’s Republic of China, was utterly convinced that the country could achieve rapid industrialization and increased agricultural production by mobilizing millions of peasants and workers into communes and work brigades. Additionally, homemade steel production and intensive cereal cultivation, especially wheat, were promoted.
However, the “Great Leap Forward” was based on unrealistic plans, falsified figures, and ideological slogans (sound familiar?), which ignored the country’s real conditions and natural laws. This led to serious technical and agronomic errors, such as excessive use of fertilizers, deep planting, indiscriminate irrigation, and deforestation. All of this resulted in a decrease in the quality and quantity of harvests, exacerbated by droughts, floods, and frosts that affected the country between 1959 and 1961.
You might wonder what Mao Zedong did in this context. Well, he blamed the animals that supposedly harmed the crops and the population’s health, ordering their extermination. Thus, in 1958, the Four Pests Campaign was launched, aiming to eliminate rats, flies, mosquitoes, and sparrows. According to government calculations, each sparrow ate an average of 4.5 kg of grain per year, so killing a million sparrows could feed 60,000 more people. Mao Zedong declared that sparrows were “one of the worst pests, enemies of the revolution, that eat our crops” and called on the Chinese people to “persevere with revolutionary tenacity” to eradicate them (surreal, right?).
How Was It Carried Out?
The Four Pests Campaign mobilized millions of people, who used various methods to kill the targeted animals. Traps, poisons, nets, and firearms were distributed, and collective hunts and battues were organized. Rewards were even offered, and quotas and competitions were established to encourage participation. It is estimated that in 1958 alone, 1 billion rats, 2.2 billion flies, 11 billion mosquitoes, and 4 billion sparrows were eliminated.
Sparrows were the main target of the campaign, considered the most harmful to crops. They were pursued by all means possible: shot, beaten, poisoned, drowned, burned, electrocuted, nests and eggs destroyed, and deprived of access to water and food. But the strangest and cruelest method was scaring them with noise until they fell dead from exhaustion. For this, the entire population, including children, the elderly, and the sick, was mobilized to go out into the streets with pots, drums, firecrackers, whistles, sticks, and stones, and bang them incessantly to prevent the sparrows from perching on trees or roofs. This strategy lasted for days and nights until the birds, unable to sleep or rest, collapsed to the ground. It is estimated that in Beijing alone, about 40,000 sparrows were killed this way in a single day.
After the Sparrows
The campaign achieved its goal of eliminating these animals, but was it effective? Not at all. It had a devastating effect on China’s ecosystem and agriculture, disrupting the natural balance between species and triggering a chain of unforeseen reactions. By eliminating sparrows, which primarily fed on insects, pest proliferation was favored, causing more damage to crops than the birds themselves. Among these, the most feared was the locust, which multiplied uncontrollably and devoured millions of hectares of crops. According to some studies, locusts consumed the equivalent of 30% of China’s annual grain production.
The food shortage was exacerbated by the government’s poor management, which requisitioned commune harvests, inflated statistics, imposed unrealistic quotas, and punished those who dared to report the situation. The result was a massive famine that spread across the country, causing millions of deaths from starvation, disease, cannibalism, and violence. It is one of the greatest humanitarian tragedies in history, silenced and concealed by the Chinese regime for decades.
Faced with the evidence of disaster, the Chinese government was forced to rectify its policy and remove sparrows from the list of pests. In 1960, sparrows were imported from the Soviet Union and other neighboring countries to try to restore the bird population. However, the damage was already done, and sparrows never regained their previous numbers and distribution.
A Lesson
The extermination of sparrows in China was a political decision based on ignorance, dogmatism, and cruelty, bringing catastrophic consequences for the environment and society. By eliminating these birds, a chain reaction was unleashed that caused a famine that killed millions and left an indelible mark on China’s history and memory. Indeed, the sparrows were eliminated, and they took their revenge.
-
@ 7308f407:94057dcf
2024-05-22 17:28:51Chef's notes
This recipe is from a YouTube video that my mom sent to me because she wanted to try it. I made the recipe for my family once, and it was a success. We made Birria bowls, Birria nachos, Quesatacos (crispy tacos filled with cheese, birria, cilantro, onion and Salsa Macha.) I have been using this recipe for the last three years.
The YouTube title is "BIRRIA ESTILO TIJUANA en la birriería 'EL HOMMIE'". https://youtu.be/zAn8iM8dR14?si=gdYKBPyqyX13bwyo
Details
- ⏲️ Prep time: The prep time for the recipe involves several steps, including preparing the vegetables, roasting and preparing the chiles, blending the ingredients, and straining the sauce. Here's a rough estimate of the prep time: Preparing vegetables and chiles (cutting, roasting, and removing seeds): 15 minutes Blending and straining the sauce: 10 minutes Mixing ingredients and initial setup for cooking the meat: 10-15 minutes Overall, the estimated prep time is now approximately 35-40 minutes.
- 🍳 Cook time: The cooking time for the recipe involves several steps: Boiling the sauce: 20 minutes Cooking the meat in the broth: 4-8 hours (The cooking time for the meat in the broth depends on how small or big you cut the meat before cooking.) Additional steps such as cooking down the fat (if using for Quesatacos): 20 minutes Overall, the estimated cooking time is approximately 4 hours and 40 minutes to 8 hours and 40 minutes.
- 🍽️ Servings: This recipe typically serves approximately 8-10 people +, depending on how much meat each person eats or how many tacos you make.
Ingredients
- 24 Guajillo chiles
- 17 Pasilla chiles
- 1 large onion
- Water (to boil dry chiles)
- 5 cloves
- 2 bay leaves
- 3 tablespoons salt
- 5 garlic cloves
- Salt to taste
- Ingredients for Cooking Birria:
- 1/2 bunch cilantro
- 10 tablespoons dried oregano
- 2 teaspoons dried thyme
- 1 + 1/2 tablespoons ground black pepper
- 2 tablespoons ground cumin
- 6 cups water
- Adobo sauce (from dry chiles listed above)
Directions
- Adobo Sauce Preparation:
- To prepare the vegetables for the Adobo sauce, cut the tomatoes into halves. Next, cut the white onion into quarters.
- Remove the stem and seeds from the dried peppers. Roast the ancho and guajillo chiles for a couple of seconds on each side.
- In a medium/large pot, turn the heat to medium. Add water, chiles, onion, tomatoes, five garlic cloves, five cloves, and two bay leaves along with three tablespoons of salt.
- As some of the vegetables and spices boil, blend the ingredients from the pot. Once combined, add them back to the pot and merge the next batch.
- Remove the bay leaves to prevent them from blending into the sauce.
- Once all ingredients are blended, boil the sauce for 20 minutes, removing the foam that rises to the surface. Cooking the sauce down allows the tomatoes to break down and develop a great taste with the spices.
- After the sauce is finished cooking, use a large bowl and metal strainer to strain the sauce, removing the pepper seeds and any remnants of the tomato.
- Meat Preparation:
- In a large pot, add the meat along with 1/2 bunch of cilantro, ten tablespoons of dried oregano, two teaspoons of dried thyme, 1 1/2 teaspoons of ground black pepper, two tablespoons of ground cumin, six cups of water, and the Adobo sauce you previously made.
- Mix all ingredients in the pot to ensure the Adobo sauce is evenly dispersed.
- Cook on high heat until it begins to boil. Once boiling, stir the ingredients, cover with a lid, and set to the lowest heat setting on the stove. Cook for about 4-8 hours with the lid on.
- After the cooking time, verify that the meat is tender by using a fork to cut through. If the meat is not tender enough, add more time to cook on low.
- If the meat is to your desired consistency, remove it to another bowl. Allow the meat to cool down if you are shredding it by hand. If not, keep it aside to add back to the pot once the broth is strained. You can also chop the meat using a knife to break it down into smaller pieces.
- Remove the cilantro and discard it along with any other unwanted parts from the broth.
- Remove the fat from the broth into a bowl and keep it aside if you would like to use it for Quesatacos.
- If using the fat from the broth, cook it down on medium heat for about 20 minutes. This breaks down the fat from a solid to a liquid. After cooking, strain the fat to separate the solids from the liquid.
- Strain all sauce using a metal strainer.
- Leave some sauce on the side if you are making beans with the broth (about 12 cups).
- Once the broth is strained, add the meat back into the pot.
- Ready to serve with meat in its broth, as Quesatacos, or however you would like to enjoy the Birria.
-
@ 13883e40:7e56550f
2024-06-11 06:20:13One of the things I'm blessed with is dinner with lots of relatives every night.
Every now and then, Grandma gets chatty over dinner. I've taken notes and hope to spin a story to share some history and culture.
Part 1: Charcoal Penpals
My paternal grandma grew up in Ruifang, a coal mining town. Anything before my great-grandfather is just tombstones, so it's hard to pinpoint exactly where their story begins. From what I can gather, her family had stayed in the mountains for generations.
Grandma wasn't the typical coal miner's daughter—she wasn't typical anything. A head taller and then some, with a face that didn't look very Asian, she certainly stood out. However, the most special thing about her wasn't her appearance; it was her education. She went on to become a principal of an elementary school and even ran the kindergarten I attended. She graduated from high school, where her peers were all Japanese. Taiwan was a colony of the Japanese Empire from 1895 to 1945. At the time Grandma was in school, the typical education was probably a few years of elementary school, with two types: one for the Japanese and the other to serve them.
The coal in the mountains provided opportunities many didn't have. I've been told by many that our family is incredibly traditional, yet Grandma's education alone puts her father on the extreme progressive side of the spectrum. Grandma was the golden child and took on the task of caring for her three little brothers and two sisters because her mother was often very ill. At present, all her brothers have passed on, and only her sisters remain (and by God, they are still incredibly chatty).
So, at dinner, I'm spinning the lazy Susan around to get Grandma the first dibs on pan-fried fish, and I asked, "Grandma, what was your first trip outside of Taiwan?"
"Oh gosh, that would be so long ago." At first, she'd rehash the story about her first trip to Cleveland, which I've heard many times, but Dad quickly gets in her ear that I was asking about something that happened decades earlier.
"Tell him about the microwave you brought home."
A decade after WWII, the Nationalists had taken over, and with it, the coal in the mountains had slowed down. My great-grandfather was thrown in jail for a few years on tax issues during the regime transition, leaving my grandma to keep the lights on. The coal business is a dirty one, after all. Things were very tough, especially for educators, but the family made it through. Great-grandfather was always very grateful for how Grandma held things down, and now that times were finally better, he wanted to enjoy life. It was time for a nice vacation to Japan, and he wanted his daughter to accompany him.
It's funny to think that Grandma went to school thinking she was Japanese, knowing all the geography and history from textbooks but never setting foot there until after she had five kids—fed them sushi rolls with pork floss. The irony is that her children were going through the same thing, only instead of Japan, it was the Republic of China—but I digress, that's another story. Grandma was obviously excited; the trip was set to be a few months away.
It's hard to imagine what a big deal traveling was back then. Dressed in suits with an entire family entourage for send-offs even at the train station was a common sight. So, considering that, this trip to get on a plane meant a lot.
Grandma was so excited that she went home to start writing letters. Every now and then, classmates would write letters to Grandma about how much they missed Taiwan. For many Japanese who left after the war, leaving Taiwan was like being ripped away from the home they grew up in.
Grandma was in a good mood; she always eats more when she's chatty. My mom's delicious braised eggs are no longer too salty for her to consume. "I wrote back to every friend I had in Japan, saying that I was visiting Tokyo in a few months. I listed all the things I wanted to see, all the things I wanted to do in the month I was there, and all the things I wanted to bring home. How nice would it be to reunite? I can't wait to see my friends finally!"
We really take for granted how global communications are today. Grandma had no idea if any of her letters would be received because some of her addresses were decades old, and there was no way to know if any of her mail would be opened for suspicion of sensitive content under martial law. These days, we can send private messages over any number of encrypted channels instantly. Heck, streaming point-to-point real-time video globally all day isn't out of reach either.
Eventually, Grandma got a response back just a couple of weeks before she was scheduled to leave.
The classmate who wrote back was her rival in math, who just couldn't ever crack first place and hated losing to a girl.
"I don't remember the contents of the letter, but he sent a wonderful poem and told me to visit a particular shrine. He added, 'Madame, Japan isn't Taipei with only a handful of hotels. There are thousands of hotels in Tokyo. How am I supposed to find you with only a date if you don't give me the name of where you are staying?'"
"Oh crap, how did I forget about that?" Grandma seldom presents herself as anything short of brilliant, so hearing her poke fun at her younger self was hilarious. By now, I'm filling up her empty bowl with some radish soup, as my mom left the table to start slicing up some mangoes.
I don't think even my generation realizes the conundrum here. There's no "share location" button to send in an envelope, and it's impossible to know when a letter sent back is received. Even leaving a phone number doesn't solve the issue either. What if the other party is a day away from you when you call, and you're moving on to the next destination? What would you do?
So, my grandma originally thought that meeting up with her old classmate wasn't going to happen, but how could that be? The classmate in the story appears in my dad's stories too.
"So how did you end up meeting up?"
"I got a phone call from my classmate mere hours after we checked in to the hotel. He called five hotels before finding me."
"How did you know I was staying here?" "I asked around. The list of hotels that Taiwanese tour groups choose is very short. It's good that it is this one; I'm not too far away. I will be in Tokyo for a week. Let me show your family around."
The classmate was some sort of manager at NEC. He was most interested in helping my grandma fill out her number one priority on her shopping list: a washing machine.
Grandma ended up bringing home a microwave.
Part 2: Microwave and Taxes
-
@ a012dc82:6458a70d
2024-06-12 01:59:42Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Introduction:
The Bitcoin blockchain operates as a decentralized peer-to-peer network where no single entity controls or owns Bitcoin and anyone can participate.
A full node is a software that fully verifies transactions and blocks. By operating a Bitcoin full node, you contribute to decentralization and promote the growth of Bitcoin.
The following sections have been adapted from 'What is a full node' for easier reading.
Considerations and Precautions
Running a Bitcoin full node involves certain costs and risks. This section will outline these costs and risks for you to evaluate if you are willing and able to support the network.
Ensure Wallet Safety
It's possible and secure to run a full node to support the network while also using the node's wallet to store your bitcoins. However, it is essential to take the same safety measures as with any Bitcoin wallet. You can find more information on how to secure your wallet on this page.
Meeting System Requirements
Bitcoin Core full nodes have specific system requirements. Attempting to run a node on insufficient hardware may work, but it may lead to increased technical difficulties. A smooth experience can be had if you meet the following requirements:
-
Desktop or laptop hardware running recent versions of Windows, Mac OS X, or Linux.
-
200 gigabytes of free disk space, accessible at a minimum read/write speed of 100 MB/s.
-
2 gigabytes of memory (RAM)
-
A broadband Internet connection with upload speeds of at least 400 kilobits (50 kilobytes) per second
-
An unmetered connection, a connection with high upload limits, or a connection you regularly monitor to ensure it doesn’t exceed its upload limits. It’s common for full nodes on high-speed connections to use 200 gigabytes upload or more a month. Download usage is around 20 gigabytes a month, plus around an additional 195 gigabytes the first time you start your node.
-
6 hours a day that your full node can be left running. (You can do other things with your computer while running a full node.) More hours would be better, and best of all would be if you can run your node continuously.
Note: Most modern operating systems, including Windows, Mac, and Linux, enter into a low-power mode after the screensaver activates, which can slow down or stop network traffic. This is a common default setting on laptops and all Mac OS X laptops and desktops. To make sure you're always supporting the network, check your screensaver settings and turn off the automatic "sleep" or "suspend" options on your computer when running a node.
Potential issues:
Legal: In some jurisdictions, the use of Bitcoin is prohibited or restricted.
Bandwidth restrictions: Some internet plans may charge extra for exceeding the included bandwidth, or even terminate your service without warning. It is recommended to check your internet plan for such limitations and keep track of your bandwidth usage to avoid hitting the limit while running a node.
Anti-virus: Some malicious actors have added known computer viruses to the Bitcoin blockchain. While this data cannot infect your computer, some anti-virus software may still quarantine it, making it harder to run a node. This problem is more prevalent among Windows users.
Security: Running a Bitcoin node makes your computer a target for those seeking to disrupt the network, this can have an effect on other activities on your computer such as limiting your download bandwidth.
Step 1: Hardware
I decided to run my Bitcoin full node using Raspberry Pi 3+.
I gathered the following items
Raspberry Pi 3+ complete starter kit
1 TB Hard Drive from my old laptop
HDMI cable
Keyboard and Mouse
Monitor
If this is your first time experiencing Raspberry Pi, you need to purchase a full suite of Raspberry Pi start pack: https://raspberry.piaustralia.com.au/little-bird-raspberry-pi-3-complete-starter-kit
Step 2: Choose what OS you want to run.
Bitcoin full node supports variety OS, such as Windows distributions (7,8,10), Linux distributions including Ubuntu, Debian etc and Mac OS. I decided to run my full node using Ubuntu Mate 16.04.2 LTS, since I have a sound understanding of the Ubuntu system and there is a compatible image for my Pi.
You can choose to run you full node on any version of Windows, Mac or Linux as long as it meets the full node minimum requirements.
Step 3: Set up the hardware/OS
Install the system. You can follow the instructions here.
http://www.hospitableit.com/howto/installing-ubuntu-mate-16-04-2-lts-on-a-raspberry-pi-3/
Step 4: Install Bitcoin
You can follow the steps here.
https://bitcoin.org/en/full-node
Step 5: Configure your router to allow port 8333 on TCP/UDP protocol
You will need to configure your router to accept incoming connections on port 8333.
Step 6: Verify that your Bitcoin Node can be reached.
You can use the handy tool developed by EARN.COM: https://bitnodes.earn.com/ .The website gives you an overview of the Global Bitcoin Nodes distribution. It can also check if your Bitcoin client is currently accepting incoming connections from another node.
If you want a step by step guide to help you set up a Bitcoin full node on the Raspberry Pi 3+ with Ubuntu Mate 16.04.2 LTS.
Conclusion
Running your own Bitcoin node is a great way to gain a deeper understanding of the inner workings of the Bitcoin network and have more control over your own Bitcoin experience. By following the steps outlined in this guide, you can easily set up your own Bitcoin node and become a direct participant in the decentralized Bitcoin network.
FAQ
Q: What is a Bitcoin full node? A: A full node is a program that fully validates transactions and blocks on the Bitcoin network.
Q: What are the benefits of running a Bitcoin full node? A: Running a full node allows for greater control and understanding of the Bitcoin network and supports its decentralization.
Q: What are the requirements for running a Bitcoin full node? A: A computer with at least 200 GB of free hard drive space, 2 GB of RAM, and a broadband internet connection with at least 400 kilobits per second upload speed.
Q: How do I set up a Bitcoin full node? A: By downloading the Bitcoin Core software, configuring your router to allow incoming connections on port 8333, and downloading the entire blockchain.
Q: Can I run a Bitcoin full node on a Raspberry Pi? A: Yes, running a full node on a Raspberry Pi is a cost-efficient way to participate in the network.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 88cc134b:5ae99079
2024-06-10 13:16:55This is a test by nostr:npub13rxpxjc6vh65aay2eswlxejsv0f7530sf64c4arydetpckhfjpustsjeaf to see how an article would behave with various mentions:
User nostr:npub13rxpxjc6vh65aay2eswlxejsv0f7530sf64c4arydetpckhfjpustsjeaf
Note: nostr:note133vw4g8klp45lhuxcfgkt62cuw20ka0jhy6mgzksrdygaw0jmnnse3lsnr
Article: nostr:naddr1qqwyzttvdahxwttxdaex6ttwda6x2tt5v4ehgtt4x3u8wmf5qgsg3nqnfvdxta2w7j9vc80nvegx85l2ghcya2u273jxu4sutt5eq7grqsqqqa284z5m77
-
@ 3c984938:2ec11289
2024-06-09 14:40:55I'm having some pain in my heart about the U.S. elections.
Ever since Obama campaigned for office, an increase of young voters have come out of the woodwork. Things have not improved. They've actively told you that "your vote matters." I believe this to be a lie unless any citizen can demand at the gate, at the White House to be allowed to hold and point a gun to the president's head. (Relax, this is a hyperbole)
Why so dramatic? Well, what does the president do? Sign bills, commands the military, nominates new Fed chairman, ambassadors, supreme judges and senior officials all while traveling in luxury planes and living in a white palace for four years.
They promised Every TIME to protect citizen rights when they take the oath and office.
...They've broken this several times, with so-called "emergency-crisis"
The purpose of a president, today, it seems is to basically hire armed thugs to keep the citizens in check and make sure you "voluntarily continue to be a slave," to the system, hence the IRS. The corruption extends from the cop to the judge and even to politicians. The politicians get paid from lobbyists to create bills in congress for the president to sign. There's no right answer when money is involved with politicians. It is the same if you vote Obama, Biden, Trump, or Haley. They will wield the pen to serve themselves to say it will benefit the country.
In the first 100 years of presidency, the government wasn't even a big deal. They didn't even interfere with your life as much as they do today.
^^ You hold the power in your hands, don't let them take it. Don't believe me? Try to get a loan from a bank without a signature. Your signature is as good as gold (if not better) and is an original trademark.
Just Don't Vote. End the Fed. Opt out.
^^ I choose to form my own path, even if it means leaving everything I knew prior. It doesn't have to be a spiritual thing. Some, have called me religious because of this. We're all capable of greatness and having humanity.
✨Don't have a machine heart with a machine mind. Instead, choose to have a heart like the cowardly lion from the "Wizard Of Oz."
There's no such thing as a good president or politicians.
If there was, they would have issued non-interest Federal Reserve Notes. Lincoln and Kennedy tried to do this, they got shot.
There's still a banner of America there, but it's so far gone that I cannot even recognize it. However, I only see a bunch of 🏳🌈 pride flags.
✨Patrick Henry got it wrong, when he delivered his speech, "Give me liberty or give me death." Liberty and freedom are two completely different things.
Straightforward from Merriam-Webster Choose Right or left?
No control, to be 100% without restrictions- free.
✨I disagree with the example sentence given. Because you cannot advocate for human freedom and own slaves, it's contradicting it. Which was common in the founding days.
I can understand many may disagree with me, and you might be thinking, "This time will be different." I, respectfully, disagree, and the proxy wars are proof. Learn the importance of Bitcoin, every Satoshi is a step away from corruption.
✨What does it look like to pull the curtains from the "Wizard of Oz?"
Have you watched the video below, what 30 Trillion dollars in debt looks like visually? Even I was blown away. https://video.nostr.build/d58c5e1afba6d7a905a39407f5e695a4eb4a88ae692817a36ecfa6ca1b62ea15.mp4
I say this with love. Hear my plea?
Normally, I don't write about anything political. It just feels like a losing game. My energy feels it's in better use to learn new things, write and to create. Even a simple blog post as simple as this. Stack SATs, and stay humble.
<3 Onigirl
-
@ d1a499be:8bbcf053
2024-06-11 22:30:19I’ve had this idea for a while but hadn’t yet found the right way to express it — the contrast between doing something ourselves (“in house”) vs outsourcing it and the implications thereof.
There are trivial examples like whether to hire someone to clean your house and more profound ones like whether to send your kids to school rather than educating them yourself (homeschooling.)
The outsourcing almost by default of fundamental things like the electrical power to your home, the server on which your most personal information is stored and your life savings to a bank or brokerage firm is anomalous by historical standards. One’s personal information, wealth and power were largely in one’s own hands, and it is only recently, due to technological progress and convenience that we have adopted such tradeoffs.
Of course, this didn’t happen all at once. People stored their gold in banks for safe keeping, and banks issued paper notes for ease of transacting. It’s since been abstracted to inauditable bits on a screen, in an account for which you have to convince a third-party server of your identity to access. Moreover, if you want to donate to Hamas, ISIS, Julian Assange or the Canadian trucker protests, for example, the bank might not sign off on it. Had you kept your money in hundred dollar bills or silver bars, you could physically hand them to any of those parties (if ISIS didn’t behead you first) permissionlessly*.
*If you had bitcoin, you could do this digitally, but you still wouldn’t be able to buy goods and services (yet) in most places or pay your taxes with it.
Another area in which personal autonomy is exchanged for centralized convenience is social media. You log-in to platforms like Twitter or Facebook, wherein they store your identity and data and feed you information via algorithm based on whatever it determines will keep you most engaged. You could instead keep a list of bookmarked blogs and sources for news and the interpretation thereof, but the convenience of having it served to you on a single platform is too good to pass up for most.
The mission creep from your money to your information diet to your alimentary diet (processed supermarket and restaurant food) is only the beginning. The pharmaceutical industry is constantly developing new pills and potions as substitutes for in-house biological processes. Instead of eating healthy and exercising you can simply take Ozempic to lose weight. Instead of experiencing anxiety or anger, you can outsource management of these emotional states to various pharmacological cocktails.
With vaccines, we’ve started to outsource immune function to large pharmaceutical conglomerates, and this is deemed so important that we have in many cases made this mandatory while simultaneously conferring preemptive liability on their makers. During covid, it got to the point where "natural immunity,” the in-house option for evolution’s aeons, was called a “conspiracy theory.”
The mRNA shots, in particular, crossed the line from immunity based on stimulating your in-house antibodies to creating their own mini-factories inside the body and quite possibly altering human DNA.
And of course we have artificial intelligence now, and that creates ever greater possibilities for outsourcing. A telling exchange between mRNA-zealot Stephen Colbert and the author Yuval Harari occurred on the Colbert show wherein the host suggested outsourcing his very judgment to AI, as we humans are too error prone.
Colbert’s idea wherein not only is our biology, but our sense- and decision-making outsourced for convenience is the ultimate capitulation. The Matrix movies were not, to my knowledge, meant to be documentaries, but this is the end game of total outsourcing where even autonomy of mind is surrendered for comfort, ease and the “greater good.” . . . I read a piece on nostr by Svetski (don’t know if that’s his real name) wherein he explains the internet stack. The stack, he points out, is made up of protocols like IP, TCP, and on top of it HTTP (web), SMTP (email) and FTP (files).
Platforms like Twitter, Gmail and Facebook are built on top of those protocols. For example, Google can ban you from using its Gmail client, but it can’t ban you from using email generally because email (SMTP) is a neutral protocol available to anyone to send information peer to peer, not a third-party client platform like Google.
Svetski argues that the internet was successful (and crushed the walled garden of AOL) because nobody owned it. He compares the open protocols of the internet to a free market which is where innovation and creativity necessarily flow.
But because the bitcoin protocol (a native internet money) had not yet been invented, payments were still at the platform level. Paypal and online banking are third-party, walled gardens, accessible only by permission. And because nostr had not yet been invented, identity online was similar. Third parties controlled information about you, and you needed a variety of logins, 2FAs, etc. to prove you were who you say you are and access your accounts. As such, they could track your usage of their platforms via that information.
Put differently, both the monetary and identity pieces of the internet were at the platform rather than the protocol layers of the stack.
Of course, with bitcoin and nostr, that no longer need be the case. You can now securely log into platforms without disclosing your personal information to third parties via nostr’s public/private key pairs. They know that npub has been signed by the user’s private key, but they don’t know your real name, phone number or banking information. If you needed to pay for something you could do so via bitcoin, again, without the need for third-party authentication.
Of course, many people are opposed to this because it means you could transact privately**. But there is also nothing stopping platforms from requiring proof of real-life identity — they’ll just have to compete with ones that don’t.
**(In truth, there is in some ways _more transparency because everything in bitcoin and nostr is publicly viewable and auditable even if the connection between real-life identity and npub/xpub is severable.)_
In other words, this in-house/outsourcing choice can alternatively be looked at as an up/down struggle via the technology stack. The forces of centralization and outsourcing want to push money and identity up the stack onto their platforms. The in-house forces want to push money and identity down the stack to the protocol layers.
The same framework can be used for things like education or social media too. Is education (learning) something that requires a platform replete with admissions offices, graduation ceremonies and credentials, or is it a body of knowledge and wisdom handed down over human history to which anyone can have access? Does social media really need to be mediated by middlemen or can we via nostr simply connect peer to peer over relays?
In fact, the original protocol might be language — accessible to anyone with the requisite vocabulary — and even in that area there are factions who want to make it platform-like with ever more words you’re not allowed to say and even words you’re required to use in reference to certain sensitive individuals. It’s not enough to be understood, but you must, in certain circles, signal your “good person” credential to interact via the new rules of the platform.
This is not to suggest outlawing universities and colleges from offering platforms to those who deem them worthwhile or Twitter from organizing the social experience in a way people prefer. Surely, it should be possible to outsource if you prefer, and if you want sit on the couch eating Doritos all day and hand your weight management to Ozempic, that should be an option (provided the side effects of the medicine are all fully disclosed and concomitant liability is in place.)
But it’s long past time to see these “solutions” for what they are — conscious top-down grabs from centralized power to turn what used to be protocols — language, money, education, online communication — into permissioned platforms, accessible only to those with the requisite credentials.
So please don’t mistake this for an argument that nothing should be a platform, or that we need to grow all our own food and never outsource tasks to other people with superior technical knowledge and expertise. It’s great that restaurants and farmer’s markets exist, that designers make clothing and architects draw the plans for structurally sound buildings. The point is we should be aware that in-house vs outsourcing requires tradeoffs and be free, even encouraged, to refuse to them when the balance is not in our favor.
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ deab79da:88579e68
2024-05-20 20:48:09Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 20-30 min
- 🍽️ Servings: 4
Ingredients
- 1 lb cod fillets
- 1/4 cup butter
- 1/4 cup white flour
- 1 1/4 cups milk
- 1 tsp salt
- pepper to taste
- 1 small onion
- 1 carrot
- 3 celery stalks
- 1/2 cup breadcrumbs
- 1/2 cup shredded old cheddar
Directions
- Preheat oven to 375F. Place cod in a greased baking dish.
- Make the white sauce in a heavy saucepan. Melt the butter over medium heat and stir in the flour until smooth. Remove from heat and slowly stir in half of the milk, then return to heat and beat until smooth and shiny.
- Gradually add the remaining milk, followed by salt, pepper, and your vegetables. Cook until sauce is smooth & thickened.
- Pour sauce over the fish, and sprinkle breadcrumbs and cheese over the top.
- Bake, uncovered for 20-30 minutes until sauce bubbles and the cheese begins to brown. Let rest 10 minutes after cooking completes.
-
@ dd664d5e:5633d319
2024-06-11 22:05:06No grants, just haters
The amount of criticism and defensive rhetoric lobbed at us for our no-grant policy has merely confirmed for us that this action is necessary.
Applying for grants is not a bad thing, but neither is not-applying for grants. They are merely competing funding models and funding models SHOULD compete. It is only when developers have multiple attractive funding models to choose from, that they are as sovereign as their users are. It is only when grant-givers feel comfortable being selective and rejecting applications, that grants are targeted and efficient.
--> Some things would not be built without grants. --> Some things would be built too slowly without grants. --> Most developers do not receive grants and this is correct. --> All developers should have a viable alternative to grants. --> All developers profit from the work of grant-recipients, indirectly, as they work through the kinks and establish reusable algorithms or communal infrastructure.
This won't hurt much
We think we're doing everyone a favor -- even the people who are organizing and receiving grants -- as we're normalizing a grant offramp.
Thank us, later. Or throw more tomatoes. Whichever you like. Free country.
-
@ 9eeca894:4afe5882
2024-05-19 19:51:04How I put NixOS on my UDM (trashcan model) router
a rare cursed fetch!
Content also available on https://code.despera.space/iru/htdocs/src/branch/main/notes/UDM-NIXOS.md
Really it's just a running NixOS on systemd-nspawn thing.
The UDM product line basically runs on Linux kernel and userland. It is a surprisingly normal device that allows you to SSH and run commands. It even has apt and systemd services installed. The only catch being that for the most part the file system structure is immutable with only a few exceptions like /data and /etc/systemd. Previous versions even had the Unifi services running on a podman container. On recent versions of the firmware podman was phased out but we got something that resembles a more complete system structure as opposed to a busybox-like system.
So basically its some kind of Debian-based Linux running on a headless ARM64 computer. Can we install and run stuff? Yes! In fact projects like https://github.com/unifi-utilities/unifios-utilities publish scripts to run general purpose programs and configurations on UDM. Be aware however that firmware upgrades might wipe the persistent data storage so don't put anything in there that you don't want to lose and preferably keep scripts so you can setup again after having its flash storage nuked by a major update.
I have the base UDM model. The first with the pill format that has been aparently replaced by the UDR. The UDR seems to have more features like Wifi6, bigger internal storage and even an SD card slot meant for vigilance camera footage storage but comes with a weaker CPU in comparison with the original UDM base. As far as I know the rack mountable models follow the same OS and file system structure.
Okay but why?
I'm gonna leave this to your imagination on why would you add services to your proprietary router applicance. To me its the fact that I don't really like running servers at home and I'm ultimately stuck with this router so why not put it to work maybe running a static webserver or something silly like Home Assistant. The truth of the matter is that I can't just leave things alone.
And if you can run Linux why would you run something that is not NixOS? Thats crazy and it doesn't make sense.
How do we root the UDM? What kind of jailbreak do I need?
No.
You enable SSH from the Controller UI, log into it as root with the password you set to the admin user. You just waltz in and start installing and configuring.
```
apt update && apt install systemd-container
```
Thats it. Kinda. The complicated part is modifying the programs to write into the persistent data directories while also making sure your stuff starts on boot and doesn't get wiped on minor firmware upgrades.
Building the NixOS root image.
Might want to read first: https://nixcademy.com/2023/08/29/nixos-nspawn/
We need a NixOS tarball image. TFC's https://github.com/tfc/nspawn-nixos contains the flake to build such an image and also publishes artifacts for AMD64 but not ARM64. I guess you could build this from an AMD64 machine but I haven't looked into building a cross platform environment (didn't needed to compile anything though). I have a recent macbook with UTM so I just downloaded one of the default Linux virtual machine images from the UTM page and installed the Nix runtime over the OS.
Make sure you have git and curl installed.
$ sh <(curl -L https://nixos.org/nix/install) --daemon
You need to start another terminal session.
$ git clone https://github.com/tfc/nspawn-nixos $ cd nspawn-nixos $ nix --extra-experimental-features 'nix-command flakes' build .
Optionally you could try to edit the configuration to generate an image with everything you need. In case you need something like Home Assistant, some compilation might be necessary and although I haven't tried compiling code on the UDM I suspect it might be a painful process due to CPU performance and space constraints. Here is an example with Home Assistant, Caddy and Tailscale.
The image will be available under
./result/tarball/nixos-system-aarch64-linux.tar.xz
. Use scp to send this to the /data/ directory of the UDM.Installing the image
First we create the folder structure:
```
mkdir -p /data/custom/machines
ln -s /data/custom/machines /var/lib/machines
```
Under normal circunstainces by now you would just run
machinectl import-tar /data/nixos-system-aarch64-linux.tar.xz <machinename>
however the version of tar that is present in this system doesn't really like the resulting tarball image. It will yeld errors likeDirectory renamed before its status could be extracted
.Thankfully we can install bsdtar through
apt install libarchive-tools
howevermachinectl import-tar
is hardcoded to use the tar command. Adding a symlink from/usr/bin/bsdtar
to/usr/local/bin/tar
won't work since some parameters are used that are not supported in bsdtar. You could try writing a wrapper shell script but just unpacking the tarball directly was sufficient.```
mkdir /var/lib/machines/udmnixos
bsdtar Jxvfp /data/nixos-system-aarch64-linux.tar.xz -C /var/lib/machines/udmnixos
```
Lets start the container.
```
machinectl start udmnixos
machinectl
MACHINE CLASS SERVICE OS VERSION ADDRESSES udmnixos container systemd-nspawn nixos 23.11 192.168.168.88…
```
Good. Now we need to change the root password.
```
machinectl shell udmnixos /usr/bin/env passwd
Connected to machine udmnixos. Press ^] three times within 1s to exit session. New password: Retype new password: passwd: password updated successfully Connection to machine udmnixos terminated. ```
Finally we can login into the container.
```
machinectl login udmnixos
Connected to machine udmnixos. Press ^] three times within 1s to exit session.
<<< Welcome to NixOS 23.11.20240115.b8dd8be (aarch64) - pts/1 >>>
nixos login: root Password:
[root@nixos:~]# ```
We haven't finished yet. By default the network is set to its own container network. We also don't have a DNS resolver configured. You can leave that session with CTRL+]]].
https://www.freedesktop.org/software/systemd/man/latest/systemd-nspawn.html#-n
```
machinectl stop udmnixos
```
Networking and Persistence
The first thing that needs to be addressed is the DNS configuration. The default setting that copies the /etc/resolv.conf from host won't work since it points to localhost. Either install resolved, netmask or set a static DNS config.
As for the network method we have some options here.
- Run using the default network stack and map ports to the container.
- Run using something akin to --network=host where the container has full access to the host network.
- Give the container its own independent interface through a bridge.
- Give the container its own independent interface through macvlan.
Using --network-veth and port mapping
```
mkdir -p /etc/systemd/nspawn
cat > /etc/systemd/nspawn/udmnixos.nspawn <<HERE
[Exec] Boot=on ResolvConf=off
[Network] Port=tcp:2222:22 HERE
machinectl enable udmnixos
Created symlink /etc/systemd/system/machines.target.wants/systemd-nspawn@udmnixos.service → /lib/systemd/system/systemd-nspawn@.service
machinectl start udmnixos
```
Remember this will listen on ALL UDM interfaces so you might want to make sure the firewall rules will accomodate it.
```
iptables -t nat -L -n -v | grep 2222
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 ADDRTYPE match dst-type LOCAL to:192.168.206.200:22 0 0 DNAT tcp -- * * 0.0.0.0/0 !127.0.0.0/8 tcp dpt:2222 ADDRTYPE match dst-type LOCAL to:192.168.206.200:22
```
Using the host network
This will give access to all the network interfaces. Any service that runs on the container will be accessible from the UDM interfaces without the need to map ports. The container will also have the same IP addresses as the UDM.
You might want to read about capabilities if you plan on running some VPN software like Wireguard or Tailscale.
```
mkdir -p /etc/systemd/nspawn
cat > /etc/systemd/nspawn/udmnixos.nspawn <<HERE
[Exec] Boot=on
Daring are we?
Capability=all
ResolvConf=off
[Network] Private=off VirtualEthernet=off HERE
machinectl enable udmnixos
Created symlink /etc/systemd/system/machines.target.wants/systemd-nspawn@udmnixos.service → /lib/systemd/system/systemd-nspawn@.service
machinectl start udmnixos
```
Using a bridge to give the container its own interface
I had to give some capabilities to the container otherwise it wouldn't properly start. Replace the value of Bridge with the bridge corresponding to the UDM network you want to add. Normally these correspond to the VLAN id of that network. Use
brctl show
to find out.```
mkdir -p /etc/systemd/nspawn
cat > /etc/systemd/nspawn/udmnixos.nspawn <<HERE
[Exec] Boot=on Capability=CAP_NET_RAW,CAP_NET_ADMIN ResolvConf=off
[Network] Bridge=br2 Private=off VirtualEthernet=off HERE
machinectl enable udmnixos
Created symlink /etc/systemd/system/machines.target.wants/systemd-nspawn@udmnixos.service → /lib/systemd/system/systemd-nspawn@.service
machinectl start udmnixos
machinectl login udmnixos
machinectl login nixos
Failed to get login PTY: No machine 'nixos' known root@UDM:/etc/systemd/nspawn# machinectl login udmnixos Connected to machine udmnixos. Press ^] three times within 1s to exit session.
<<< Welcome to NixOS 23.11.20240518.e7cc617 (aarch64) - pts/1 >>>
nixos login: root Password:
[root@nixos:~]# ifconfig host0: flags=4163
mtu 1500 inet [redacted] netmask 255.255.255.192 broadcast [redacted] inet6 [redacted] prefixlen 64 scopeid 0x20 inet6 [redacted] prefixlen 64 scopeid 0x0 ether 92:01:4c:a7:a1:7b txqueuelen 1000 (Ethernet) RX packets 2415 bytes 611986 (597.6 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 61 bytes 5337 (5.2 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73
mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10 loop txqueuelen 1000 (Local Loopback) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 ```
MACVLAN isolation and more
Here is where some custom configuration might be needed. Read https://github.com/unifi-utilities/unifios-utilities/tree/main/nspawn-container to find out how to setup custom scripts.
Persistence
As far as I verified by rebooting the UDM many times to write this note all configurations were preserved. According to the article on nspawn-containers on the unifies-utilities project although
/etc/systemd
and/data
folders are preserved during firmware upgrades/var/
and/usr/
are not and there goes our packages and symlink. Please follow the steps on that page to setup persistence across firmware upgrades. -
@ deab79da:88579e68
2024-05-20 20:03:17Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: ~20 min
Ingredients
- 4 boneless skinless chicken breast
- 1 small onion
- 1-3 jalapeno pepper, to taste
- 1/2 cup soy sauce
- 1/2 cup pineapple juice
- 1/4 cup olive oil
- 1/4 cup apple cider vinegar
- Juice of 1 lime
- 1 tsp honey
- 2 cloves garlic, minced
- 1/2 tsp ground nutmeg
- 1/2 tsp ground ginger
- 1/2 tsp allspice
- 1/2 tsp red pepper flakes
- small bunch of fresh cilantro
- Salt & Pepper
Directions
- Put all of the ingredients, except the chicken breast, in a blender and blend until smooth
- Let the chicken marinate ine the mixture for several hours, or overnight
- Best cooked on a charcoal or gas grill. In a pinch, medium heat in a saute pan will do.
- Remove the chicken from the marinade and grill or saute until cooked through. While the chicken is cooking, place the remaining marinade in a small saucepan and bring to a boil. Simmer for 5 minutes.
- When the chicken is cooked, allow to rest for 5 minutes. Before serving brush the chicken with the remaining glaze. Serve with your favorite seasonal vegetables.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-11 15:55:53This is my second attempt at this experiment. See yesterday's entry https://stacker.news/items/569328/r/Undisciplined.
It was exciting seeing how much enthusiasm there was for this, as well as how much concern you all expressed for how I'm spending my time. :)
This time the format is a little different and I'm adding excerpted quotes. Also, most sats forwarded to original stackers.
11th of June, 2023
Top Post
https://stacker.news/items/191551/r/Undisciplined Unpopular Opinions - A Weekend Discussion by @sn
To encourage healthy debate and to introduce SN users to new ideas, we thought it would be fun to open the floor for you all to share your most unpopular opinions about Bitcoin, Nostr, or any other topic you're passionate about.
Top Comment
https://stacker.news/items/191551/r/Undisciplined?commentId=191561 by @scottathan
Bitcoin is not salvation, a deity, the most moral cause in the world, etc.
Top Stacker
1st place is in hiding (presumed to be @siggy47) 2nd place is @ek
11th of June, 2022
Top Post
https://stacker.news/items/35583/r/Undisciplined SN release: usage dashboard by @k00b
Right now it just shows some monthly growth stats, but I'll add stuff to it as time goes on. The idea is users can follow along with growth, recommend any new metrics, speculate on approaches to improve metrics, etc. Radical transparency is just cool too.
Top Comment
https://stacker.news/items/35617/r/Undisciplined?commentId=35644 by @2big2fail
this piece helped me understand many of my colleagues https://www.citadel21.com/why-the-yuppie-elite-dismiss-bitcoin
Top Stacker
@k00b
11th of June, 2021
Top Post
https://stacker.news/items/1/r/Undisciplined by @k00b El Salvador Makes Bitcoin Legal Tender
Top Comment
https://stacker.news/items/1/r/Undisciplined?commentId=6 by @k00b
This is pretty old news at this point but I wanted it to be the first story anyway
Top Stacker
@k00b
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ deab79da:88579e68
2024-05-20 03:44:25Details
- ⏲️ Prep time: 10 min
- 🍳 Cook time: 50 min
- 🍽️ Servings: 6
Ingredients
- 4 large eggs
- 3/4 cup granulated sugar
- 3 cups milk
- 1 cup heavy whipping cream
- 2 teaspoons vanilla extract
- 1 1/2 teaspoons ground cinnamon
- 3 cups cooked rice , cooled
- 1 cup raisins
Directions
- Preheat oven to 350 degrees F.
- Beat the eggs and sugar together. Slowly pour in the milk and cream and mix well.
- Add the vanilla and cinnamon and mix well. Add the rice and raisins and stir to combine.
- Pour mixture into a greased casserole dish. Any oven-safe dish will work--you can use one pan to bake at least 9x9'' or bigger, or smaller individualized serving dishes.
- Place the filled casserole dish inside a larger, oven-proof dish. Add about 2 inches of water to the larger pan (or enough to fill about halfway up the side of the rice pudding dish). This method will help the pudding to have a custard texture.
- If using a 9x9'' or slightly larger pan, bake for 40-50 minutes or until the top has set (It's okay if it jiggles just slightly). Serve warm.
- Leftovers store well in the refrigerator for up to 5 days.
-
@ d7607464:421e573a
2024-05-19 02:25:59chezmoi
is a command-line tool that usesgit
to keep your dotfiles in sync across all of your machines. In this guide, I'll show you a simple use case of keeping dotfiles synced between two machines,machine_A
andmachine_B
.chezmoi
has many more features that you can explore beyond this as you become more comfortable with the workflow.Chezmoi Cheatsheet
This is a diagram of the various locations
chezmoi
accesses to manage your dotfiles, as well as the relevant commands to move files around. I'll be referencing the locationshome_A
,chezmoi_A
,home_B
,chezmoi_B
, andrepo
shown in this diagram throughout this guide.Installation
The first step to using
chezmoi
is installing and initializing it. We will be onmachine_A
to start with. Here, I'll be building the binary from the source code.First, make sure you have
golang
installed: https://go.dev/doc/installThen, clone the
chezmoi
repo and usemake
to build it:bash cd /tmp git clone https://github.com/twpayne/chezmoi.git cd chezmoi make build
This will create the
chezmoi
binary, which you can then copy any directory in yourPATH
. Here, I'll move it to~/bin
. If~/bin
doesn't exist, you have to create it and re-source~/.profile
to add it toPATH
.bash mkdir -p ~/bin && source ~/.profile cp chezmoi ~/bin/chezmoi
Now you should be able to run
chezmoi
:```bash
chezmoi --version chezmoi version dev, commit 255846 . . . ```
Initialization
Now that you've installed
chezmoi
, you have to initialize it. This guide uses themain
branch for all git operations, and you can change the default branch for git repositories as follows before you initializechezmoi
:bash git config --global init.defaultBranch main
Then initialize
chezmoi
:bash chezmoi init
This creates the
chezmoi
git repository at~/.local/share/chezmoi
. Based on the diagram above, this is the location corresponding tochezmoi_A
.Adding your first file
Most systems have a
.bashrc
or similar configuration file, so that can be the first dotfile you add tochezmoi
:bash chezmoi add ~/.bashrc
Change into the
chezmoi_A
directory to see the file added tochezmoi
:bash chezmoi cd ls
You'll see
dot_bashrc
listed.chezmoi
renames the dots at the start of all of your dotfiles as'dot_'
so they are not considered hidden. This directory is a git repository as well, but it isn't linked to an online repository yet. You can use a private repository on GitHub or GitLab, or even a self-hosted instance of GitLab. Whatever remote repository you choose to use, follow its instructions to create a new repository calleddotfiles
and add it asorigin
to your localchezmoi
git repository. Here, I'll create a private GitHub repository and link it using ssh. Then you should be able to see it with:```bash
git remote -v origin git@github.com:wisehodl/dotfiles.git (fetch) origin git@github.com:wisehodl/dotfiles.git (push) ```
Now commit your first dotfile and push it to the online repo:
bash git add dot_bashrc git commit -m "Added .bashrc" git push -u origin main
Congratulations! You've successfully backed up your first dotfile using
chezmoi
.chezmoi add
can add individual files as well as directories.Adding directories and ignoring files.
chezmoi
can add whole directories withchezmoi add
but you may want to ignore certain files if they are auto-generated or contain sensitive information. Say you have a directory you want to add tochezmoi
that contains some authentication details as well as actual config files, like so:bash /home/wise/.test/ ├── .auth └── .config
Here, we want to add
.test
tochezmoi
but ignore the.auth
file that contains some login information. First, you'll have to tellchezmoi
to ignore the.auth
file using the.chezmoiignore
file. It works just like.gitignore
if you're familiar with that.bash echo ".test/.auth" >> .chezmoiignore
Now you can add the
.test
directory:```bash
chezmoi add ~/.test chezmoi: warning: ignoring .test/.auth ```
And you'll see that
chezmoi
is purposely ignoring the.auth
file. If you look at yourchezmoi
directory now, you'll see thedot_test
directory added with only the config file.Add these changes to your git repo:
bash git add -A git commit -m "Added .test/" git push
Here, you should start to get a feel for how the workflow for adding files to
chezmoi
typically goes. Before we start modifying files, let's move over tomachine_B
and sync your dotfiles over there.Syncing to another machine
For the sake of simplicity, I'll assume that you are syncing your dotfiles to a fresh install of the same Linux distro as
machine_A
. If you have a lot of conflicting dotfiles betweenmachine_A
andmachine_B
, you'll either need to utilizegit merge
orchezmoi merge
at your discretion and resolve the conflicts. If certain files do need to be different between the machines, then you'll have to utilizechezmoi
's templating capabilities. These situations are beyond the scope of this guide and are left as an exercise for the reader.On
machine_B
follow the steps above to install and initializechezmoi
. Then, add your remote git repository as before, and pull it into thechezmoi
directory:bash git pull origin main
The first time you push from
chezmoi_B
, you may have to rungit push -u origin main
to set the upstream branch and fully set up the remote connection.Now to review, we've synced up 4 out of the 5 locations in the diagram above:
home_A
,chezmoi_A
,repo
, andchezmoi_B
. Syncingchezmoi_B
andhome_B
is where things can get complicated if, like I said before, you have a lot of file conflicts. You can check for differences between the source directory,chezmoi_B
and the destination directory,home_B
usingchezmoi diff
. There is also the concept of a "target state" inchezmoi
, but it only becomes relevant if you use templates. In the context of this guide, the source directory is also the target state.Say, for example, you had some conflicting lines in
~/.bashrc
,chezmoi diff
would show you the changes that would need to occur to make the destination state,~/.bashrc
, match the source state,~/.local/share/chezmoi/dot_bashrc
. There are a few strategies you can use to resolve this conflict:- Create a new branch in
chezmoi_B
, add the file fromhome_B
withchezmoi add
, then perform agit merge
back to main. - Use
chezmoi merge ~/.bashrc
, which will take you into avimdiff
window to manually change the files to match. - Overwrite the source file with the destination file using
chezmoi add ~/.bashrc
- Overwrite the destination file with the source file using
chezmoi apply ~/.bashrc
[DANGER AHEAD]
This guide will go with option 4 for every file in
chezmoi_B
:```bash
Do not do this unless you want to OVERWRITE files in your
home directory.
chezmoi apply ```
chezmoi
will do its best to warn you if you're about to do something dangerous and give you some options on how to proceed.Doing this, the dotfiles in both
machine_A
andmachine_B
are in sync! But you know that your dotfiles will change and grow over time, so we have to talk about strategies for maintaining this sync.Modifying your dotfiles
You have to remain mindful that you're using
chezmoi
to keep your dotfiles in sync, otherwisemachine_A
andmachine_B
can get out of sync pretty easily.chezmoi
has thechezmoi edit
command to edit files in the destination state, but I prefer to edit files in eitherhome_A
orhome_B
and then follow the path in the diagram above from end to end to sync up the whole network.For example, you can change or add a file from
home_B
and do:(home_B) $ chezmoi add ~/path/to/.file
(home_B) $ chezmoi cd
(chezmoi_B) $ git add -A
(chezmoi_B) $ git commit -m "Changed ~/path/to/.file"
(chezmoi_B) $ git push
(home_A) $ chezmoi cd
(chezmoi_A) $ git pull
(chezmoi_A) $ chezmoi apply
And that will propagate the change across your network. You can also use
chezmoi update
fromhome_A
to pull the repo and apply the target state all in one step. The best way to avoid conflicts and headaches is to always push changes you make to you dotfiles as soon as you can and avoid making changes to the same file on two different machines simultaneously, just like with any git repository.Conclusion
If you've followed the steps in this guide, you will have learned a workflow to keep the dotfiles between two Linux machines in sync using
chezmoi
. The diagram at the top of the guide should serve as a useful cheatsheet for the most common tasks you'll perform to maintain your dotfiles.chezmoi
is a very versatile application, and is capable of managing very complex dotfile setups. Their documentation is very technical and daunting to the new user, but it remains a good resource for doing more complex tasks withchezmoi
.- Command Overview: https://www.chezmoi.io/user-guide/command-overview/
- Reference: https://www.chezmoi.io/reference/
All the best!
- WiseHODL
- Create a new branch in
-
@ 6aadf4c9:b5ae0fd1
2024-05-18 05:34:09Chef's notes
The viral TikTok spaghetti squash recipe that everybody loves! It is super tasty, light and low carb.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 1 hour and 5 mins
- 🍽️ Servings: 2
Ingredients
- Squash
- Ground turkey
- Onion
- Spinach
- Tomatoes
- Boursin Cheese
- Mozzerella Cheese
- Heavy whipping Cream
- olive oil
- Butter
- Green pepper
- Garlic
Directions
- Preheat the oven to 425°F
- Cut the squash in half, drizzle olive oil and use a pastry brush to spread it around. Season with salt, pepper, onion, garlic powder, oregano and parsley
- Bake the oven for 1 hour
- Slice some onions, green pepper, tomatoes, and garlic. Sautee in a pan with butter and olive oil
- Add heavy whipping cream, boursin cheese and stir
- Add the mozzerella cheese and the cooked ground turkey or your meat of choice
- Bring the squash out of the oven, use a fork to pull apart the squash to form spaghetti
- Add your sauce into the spaghetti squash boat
- Top it with some mozzerella cheese and leave in oven for about 3mins on broil to melt the cheese
- Serve and Enjoy!
-
@ dd664d5e:5633d319
2024-06-11 15:47:47Laeserin's theory of assortative clustering
I was nerding again
I posted a wiki breadcrumb trail of events, today, from entropy, to information entropy, to social media entropy. (Source for the last entry in that list: I made it up.)
The more mathematically-inclined npubs immediately saw the usefulness in such a score, probably because it can be so very difficult to find anyone writing anything particularly complex or "deep" about one's own topics of interest. So, that is a subset of npubs that personally suffers from the difficulty of finding such slender trees within the increasingly vast, wild forest of Nostr notes.
Thar be dragons
However, this sort of score is a proxy-measure for general intelligence, so there is obvious nervousness about measuring something that many people think it is immoral to measure, and that others do not believe is an actual thing. (Despite the fact that we are quickly developing artificial copies of the organic version and you can't copy something that is nonexistent... but I digress.)
There is always the fear of "intellectual elitism", whereby the worth, or value, of some particular person or group of people is determined by measuring their intelligence. This fear is not unfounded, as there are many amoral people who view humans in this reductive manner, but fear of amoral people being wicked about something is not a sufficient reason to cut off entire fields of study. That would, in fact, bar us from thinking much about anything.
More is not always better
I suppose the assumption would be that a higher SME would always be considered better, but this is a fallacy based upon the overemphasis on intelligence in our particular culture and time.
Most people would actually prefer the content of someone similar to themselves, who is conversing on a level they can easily understand and respond to, without feeling intimidated or bored. Humans tend to associate with those more like themselves (i.e. assortatively), and don't tend to associate more than one SD out on the IQ curve, in either direction, as they find the experience confusing, tiresome or alienating.
What is "better", in other words, is subjective and dependent upon the person asked, which is why SME scores make sense, but not necessarily SME rankings. In the same way that a sky-high WoT score can actually make an account less-attractive because you might assume that they're #NostrElite, a sky-high SME score will assume to represent nerdiness or a tendency to verbosity.
We will self-sort
That is why the largest npubs are, by design, never going to be the most information-dense ones, and the most information-dense ones will tend to be treated like spam, by many other npubs. This same spam-effect will hit the least information-dense ones, which is why we can expect each cohort to eventually branch off into their preferred nevent, relay, client and hashtag realms, where they can be themselves without feeling put-upon by other npubs' negative reactions.
Academic centers, such as universities and startup hubs were developed in order to support this self-sorting effect, by allowing those to the right-end of the bell curve to congregate with the like-minded and have conversations with people who don't treat them as if they are space aliens. However, it carried the negative effect that those people were then clustered geographically, where they eventually lost sight of the day-to-day issues that effected the majority of the populace. Their isolation made them insular and ignorant, and fostered the very "intellectual elitism" that creates so much worry, now.
Make it a feature, not a bug
Nostr solves for the worst effects of this problem, by keeping all of the conversation within one data structure and profile silo, so that those from one group will regularly have contact with the others, and frenships (and romances, who knows?) can take root at the margins. Nostr, in other words, recreates the social mixing common to a village, where the groups are largely separate when deep in discussion or at work, but interact incidentally when moving around in shops, attending church services, festivals, or joining sports clubs or choirs.
In closing, I would say that the concern is completely justified, but a universal communications protocol is the best way to alleviate such concern and have all reap some reward for making the relationship structure of humankind more transparent.
One man's treasure is another man's trash, and everything happily reverts to the mean. The End.
-
@ cb8f3c8e:c10ec329
2024-06-11 10:26:25Written By Alex Mrema
Follow Alex on Nostr
Europe’s premium football competition is set to take off in next to no time on the 14th of June with Germany as hosts for the next four weeks. The continent’s best will take on a long, gritty and unprecedented journey towards bringing glory back to their home nations. A glance at the countries set to feature in the championships this summer indicates that throughout the competition, we are assured of great, mouth-watering games to keep our eyes on the screen for one full month. My article will provide a scope in to the games of the first three groups in the competition and what they have in store for us.
GROUP A
GAME: GERMANY VS HUNGARY DATE: 19th June 2024 TIME: 17:00 BST
This will be the second game of the tournament for both sides. It has the potential to be a do-or-die for either side depending on their first results. Germany being the home side are hoping to put aside their weak performances from the previous three tournaments (World Cup 2018, Euro 2020 and World Cup 2022). They carry a relatively young squad which also has a mix of experience from the likes of Thomas Muller and Joshua Kimmich. Their midfield will be the make or break of their progress in the tournament, let’s see how they will handle their first real challenge in the form of Hungary. Nemzeti Tizenegy emerged as a side to watch in the last Euros due to their passionate performances that saw them manage to steal a point against Germany in Munich and a point from France in Budapest. They play a flawless style of football and are capable of stringing passes high up the pitch that can pull quick goals, if underestimated, the Hungarians can sting you. Plus, they don’t need much motivation as their passionate fans travel in great numbers, ready to rally their team forward.
GAME: GERMANY VS SWITZERLAND DATE: 23rd June 2024 TIME: 20:00 BST
Germany’s rocky record in the past three tournaments have tarnished the fear factor that they used to carry like the teams of the past. In addition, with this being head coach Julian Nagelsmann’s first major tournament with the Germans, it brings one to question whether he is capable of bringing back Die Mannschaft the respect they once had on the European stage? This is not a worry though for the Switzerland squad. An experienced squad that have stayed together in many tournaments and are aware of what needs to be done to get out of the group stage. They are looking to break the barrier that stops them from getting past the round of 16 and (at times) the quarter-finals, the task of playing Germany as their last group game is difficult and whatever the situation will be at the time, the Germans must be aware that the Swiss will come out guns blazing in hope of getting a result that will lead to them qualifying for the next round.
GROUP B GAME: SPAIN VS CROATIA DATE: 15th June 2024 TIME: 17:00 BST
Age is just a number for this Croatian squad that keeps on giving fairytale performances in major tournaments. The Chequered Ones carry a fighting spirit that sees them fight to the final whistle when they are down and when they are up- well you don't want that to happen to your country as they will run the ball around their midfield and tire out their opponents within twenty minutes. They are a well rounded and balanced squad.This game is going to be a revenge game as they were knocked out of Euro 2020 by the Spanish in a thrilling round of 16 game that ended 5-3. Can they do it? Well the Spanish would like to have a word about that. This young Spanish squad is aiming to bring something the last few Spanish sides have failed to bring into tournaments- hunger. The expectation upon the young shoulders of Lamine Yamal, Pau Cubarsi, Pedri and the rest of the young group is to bring a hustle and hunger against all sides while the experienced figures of Rodri, Morata and Jesus Navas are there to adjust and lead the Spaniards through any rocky situations. This game against the Croats is an interesting test for them as both sides like to control the game. A must watch!
GAME: SPAIN VS ITALY DATE: 20th June 2024 TIME: 20:00 BST
The Azzurri enter the tournament as defending champions but do not look likely to retain it- they are out to prove people wrong. This Italian squad are defensively stacked with the likes of Bastoni, Caliafori and Dimarco. It is clear that this squad is set on stopping the goals from going in and allowing their offense to flow- particularly off of counter-attacks. However this is their first tournament since Euro 2008 without either of their defensive pillars; Giorgio Chiellini and Leonardo Bonucci, which teams- such as Spain- are looking to capitalize on. The Spanish midfielders will be looking for long passes to their offensive players that will break the Italian wall, great passers such as Pedri and Rodri are critical for this game. This is also a repeat of their classic Euro 2020 semi-final that went in the Italians favor, if we are going to get a repeat of even half of that game, then we are in for a treat!
GAME: ALBANIA VS SPAIN DATE: 24th June 2024 TIME: 20:00 BST
Albania are determined to prove that they are not here to make up the numbers and their qualifying campaign was not a fluke. The Shqipet have been placed in a difficult group that puts them in the unfortunate position as the underdog for every game of the group stages, they will look to capture points in any possible situation. They will look at the aggressive forward- Armando Broja to provide the goals throughout the competition, with his abrasive style of play, goals may come his way. But, La Furia Roja are determined to prove a point from the outset of the tournament and will most likely play a style of football that aims to torture all opponents(most likely by retaining possession of the ball). The problem with this is that one quick counter can hurt Spain- hopefully Albania have done their homework on that.
GAME: CROATIA VS ITALY DATE: 24th June 2024 TIME: 20:00 BST
This game is happening in the last match day and can carry out an importance in deciding how the group pans out. Italy and Croatia is bound to be a jam packed fixture that is likely to be seperated by a goal. Both sides like to possess the game and are most potent with the ball as well as the tempo of the game in their control- this will likely cause for tactical changes from either(or both) of the managers on how to approach the game and their opponents. Ultimately, this game is bound to be a great tactical battle!
GROUP C GAME: DENMARK VS ENGLAND DATE: 20th June 2024 TIME: 17:00 BST
The Danish Dynamite look to get revenge for their heartbreaking and controversial loss to England in the semifinals of Euro 2020. Denmark are squad that have now moved away from the “dark horse” ranking of European football and now pose themselves as a side that can cause a threat to all participating nations, no matter the gap in star power.Denmark are well rounded and composed, which can secure wins thanks to their solid defense. On the other hand, the Three Lions have come to Germany with a star studded squad that can go all the way. Gareth Southgate has moved away from his traditional squad and has added fresh, youthful faces such as Cole Palmer and Kobbie Mainoo to the squad. This creates a pacey and skillful attacking unit for England, that can be a problem for the rather unhurried Danish defense.
-
@ 7ff2dcb0:c36d340b
2024-05-14 17:48:43Chef's notes
You can never go wrong with a chicken sandwich. Enjoy this twist on the Ceaser Wrap inspired by Rachaell's Recipes. Just to mention, Rachaell uses a tortilla press to get her cutlets to be flat. If you have one that's great but I just make sure to cut the chicken breast very thin, about a cm thick as if I'm fileting it lol.
This is a sandwich I saw on TikTok a while ago and finally decided to make it. Credits to Rachaell's Recipes https://www.rachaellsrecipes.com/. I have it at least once a week now and honestly don't plan on stopping anytime soon. The proper name of this recipe is The Crunchy Chicken Ceasar Salad. Hope you enjoy it as much as I do.
The garlic and herb butter you will make in this recipe is my favorite part of the sandwich. This step takes the longest so I recommend doing it first. Spreading it on the bread and toasting it adds a burst of flavor. Personally, I put the bread in the oven on HI broil for about 4 minutes but you can always toast it on the stovetop.
I mention in the recipe you can use your dressing of choice because Rachaell suggests Ceasar dressing but I like mine better with avocado dressing.
Last note, when breading the chicken it is important to add a little water to the dressing you choose if it's a regular thick dressing. If you you run the risk of your chicken having mushy breading in the middle and no one likes that. Enjoy!
Details
- ⏲️ Prep time: 10 min
- 🍳 Cook time: 25 min
- 🍽️ Servings: 4
Ingredients
- 4 sub rolls
- 1 chicken breats, pounded flat or cut flat
- 2 hearts of romaine lettuce, cleaned, dried, and chopped
- Freshly grated Parmesan cheese
- Juice of 1 lemon
- Dressing of choice, plus 1/2 cup for the breading mixture
- Breadcrumbs or panko for breading
- Flour for dredging
- Oil of choice for frying
- 2 whole heads of garlic, roasted
- 1 tablespoon of chopped parsley
- 8 tablespoons of unsalted butter, softened
- 1/8 cup of freshly grated Parmesan cheese
- Salt and pepper to taste
Directions
- Prepare the Garlic Butter and Sub Rolls: Preheat the oven to 350°F (175°C). Mix all ingredients for the garlic butter in a small bowl. Set aside. Cut the sub rolls open, slightly hollow them out, and spread the garlic butter inside, topping with extra grated Parmesan. Arrange on a baking sheet, open side up, and bake for 10-15 minutes until golden. For a crunchier top, broil on high for 2-3 minutes.
- Bread and Fry the Chicken: Set up a breading station with three parts: flour, dressing of choice mixed with a little water, and breadcrumbs. Dredge each chicken cutlet in flour, dip in the dressing mixture, then coat in breadcrumbs. Heat avocado oil in a large pan over medium heat (test heat by dropping a breadcrumb in; if it sizzles, it’s ready). Fry cutlets until golden on each side and then drain on paper towels.
- Assemble the Salad: Toss the chopped romaine with Caesar dressing, fresh lemon juice, and extra Parmesan for enhanced flavor.
- Making the Garlic Butter Spread: Take the roasted garlic heads, squeeze the garlic out of its peel into the softened 8 tablespoons of butter. Add the teaspoon of freshly chopped parsley. Mix well.
- Assemble the Subs: Build each sub with a crunchy roll, fried cutlet, dressed salad, and a sprinkle of Parmesan cheese.
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ ee7d2dbe:4a5410b0
2024-06-11 10:17:38Explore the concept of Web 4.0, its innovations, and how it reshapes digital landscapes for a smarter, interconnected future.
Introduction to the Internet and its definitions
Internet is a large system that connects multiple servers and systems of computers, and mobile phones globally. Internet as per its definition is described as “networks of networks” that serve as crucial elements when it comes to communication between two distinct resources in the digital world. The conformations of the internet have always helped to transform day-to-day communication with every aspect that inclines us towards modern living.
World Wide Web is simply in common terms is pile of pages which are interconnected among each other and follow protocols called HTTP for communicating data between servers and clients. The World Wide Web referred to as the Web, is one of the subsets of the Internet that monitors and mediates interaction between users like us and the digital content available dynamically.
With the advancement in technology standards and user behaviour web is evolving and every time with the addition of new features it emerges as the new version. In this article, we will delve into the latest and most intelligent version of the web now i.e. Web 4.0 and consider it as the next evolutionary and significant step in the growth and development of the internet. Web 4.0 is still in the conceptual stage which means it has not yet been released, however, it is believed that the commencement of Web 4.0 could involve building AI tools of advanced level that turn out to be more responsive and intelligent.
History of evolution of Web and its versions
WEB 1.0
WEB 1.0 (Static web): As the name suggests, static web was used to deliver consumer with the content exactly the same as uploaded by the content creator. Later this static character of web got a code name of WEB 1.0 Web 1.0 was a “read-only” web. The basic core for this web was community governance, decentralization of networks, creation and contribution of content for the web.
HTTP, SMTP, FTP, IRC and SMS were the open protocols which made a foundation stone for Web 1.0. These protocols were crucial as anyone can easily work with them and make the content for the web Web 1.0 is the term used to describe the earliest form of the internet which sets the first example of a “global network”, which showed the potential for future digitalisation of Information sharing and communication.
This Web 1.0 was created in 1991 by TIM BERNERS LEE who is an English computer scientist best known for invention of the HTML markup language, the URL system, and HTTP along with WORLD WIDE WEB being his most famous invention. It was known as “static web” or “read only web” as it had no visuals, controls, forms and interactivity. It was all about web pages which are connected to a system with the help of hyperlinks.
In 1993, the web became available to the public and lead to Rapid increase in website that were created.
By Early 1995, over a million websites were available and this growth continued throughout the late 1990s and early 2000s.
Web 2.0
The Creation of most important COOKIE: (HTTP COOKIE) To overcome one of the first limitations of web 1.0, which was being STATELESS.
As discussed earlier, web 1.0 was unable to capture state or user data and could not convey any data related to the user to web developer such as if the end user had previously visited the website or not and it was being difficult for a web developer to know the demographic of the end user, which meant you could not build products or services specifically targeted for your end users.
In first attempt of solving this limitation of capturing state or user data, LOU MONTULLI, a computer programmer came up with the invention of HTTP cookie with which developer can tell if the user had visited a website previously or not.
And, with this invention, now that we were being able to capture user state the Web transitioned into Web 2.0.
Web 2.0 often being referred to as “read and write” web, spans from early 2000s to current period. The the word web 2.0 was first given by DARCY DiNucci, a technology strategist.
WEB 3.0
THE FUTURE The inventor of world wide web TIM LEE, originally called web 3.0 as “semantic web “as it was conceived as a more autonomous, intelligent and open Internet. Web 3.0 is often described as read, write and execute. The open internet, we are talking about would involve AI and ML which would process content like a “global brain” with all data being connected in a way that is contextual and conceptual, but this didn’t work as planned because Tech just wasn’t at the right place.
In web 3.0, users can interact in a decentralized way, but with security. From money to information, all exchanges are conducted without the need of tech companies, banks, or any other middleman so if web 2.0 makes the user a product, web 3.0 makes the user the content owner.
Basically, the goal of web 3.0 is to make the internet more intelligent, personalized and responsive to users need, and to achieve this, Artificial Intelligence and Big Data are being used to create a semantic web that understands the meaning of information on internet and this will allow for more appropriate search result, better recommendation and more personalized experience to the users. The web 3.0 has shown the potential to transform the internet into a much more powerful and useful tool for everyone, from a developer to the end core user. With the help of Web 3.0, it is now possible for devices to interact with each other directly without the need for human intervention.
Difference in Web 4.0 from Web 3.0
Web 3.0 (Semantic Web)
Decentralization: Often termed the “semantic web,” Web 3.0 aims for a more decentralized, open-source, and immersive online experience. It facilitates user participation, content creation, and ownership without dependence on intermediaries.
Blockchain Infrastructure: Web 3.0’s infrastructure relies on the blockchain—a public ledger—allowing trustless interactions among users without reliance on a central authority.
Monetization and Ownership: In contrast to Web 2.0, where platforms profit from user-generated content, Web 3.0 empowers users to monetize their data and retain ownership of their contributions.
Elements: Web 3.0 integrates decentralization, artificial intelligence, augmented reality, virtual reality (AR/VR), and ubiquity.
Web 4.0 (Intelligent Web)
Web 4.0 is way more decentralization and integration with Machines-
It has Higher Decentralization: where Web 4.0 extends decentralization further, aiming for a simpler and more integrated internet connected to human thinking and cognition, without precise definition.
It comprises features of Cerebral Web where Some sources suggest Web 4.0 will be more “cerebral” as it involves deep learning indicating a deeper connection between human minds and the digital realm.
Web 4.0, Mentioned by Elon Musk and Twitter founder Jack Dorsey, Web FOUR, a meme coin, humorously reflects the concept of the next internet iteration. While not directly addressing Web 4.0’s technical aspects, Web four promotes accessible decentralization¹.
Web 3.0 Critique: Musk and Dorsey argue that Web 3.0 lacks true decentralization and primarily serves venture capitalists (VCs), citing ongoing capital concentration issues.
Advancements in features of Web 4.0
In the ever-evolving landscape of the internet, the emergence of Web 4.0 marks a pivotal moment where technology succeed with its previous predecessors and their boundaries, which offer users an unprecedented type of personalization as well as customization. In the Centre of evolution there stays the utility of advanced artificial intelligence (AI) and machine learning algorithms, empowering Web 4.0 to deliver tailored content as per the preferences of users and services with unique and accurate precision. Web 4.0 has its special features to adapt the user that too individual user preferences creating a digital experience that feels uniquely crafted for each user.
Central to the promise of Web 4.0 is its augmented interactivity, which redefines how users engage with digital content and services. Through the integration of immersive technologies such as virtual and augmented reality, Web 4.0 elevates user experiences to new heights, blurring the lines between the digital and physical worlds. This heightened level of interactivity enables users to interact with information and services in ways previously unimaginable, opening doors to innovative and groundbreaking experiences.
In conclusion, Web 4.0 represents a convergence of technologies that hold the potential and strength to shape and transform the future where innovation and creativity are limitless and knows no bounds. By embracing and encouraging creativity, collaboration, and a forward-thinking broad mindset, we can harness the power of Web 4.0 to create a digital landscape where there are endless opportunities and the future will possess a positive change within itself.
Source: https://www.agicent.com/blog/what-is-web-4-0-explained/
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 32e18276:5c68e245
2024-05-14 16:46:28Hey Damus enjoyers,
v1.8 has been tagged! Today we submitted v1.8 to the App Store, Here's a quick preview of what's in this release!
New Emoji Selector
It's now easier than ever to select emoji reactions! Just long press the reaction button to pop-up the new emoji selector. Thanks Terry for implementing this!
Quote Reposts
Quote reposts are now listed on posts, just like on the birdsite (x site ?)
New fullscreen video player
Our video controls were pretty bad before, this has been improved in this version! You can now seek videos, view them fullscreen, and airplay them to your tv. Thanks Daniel for this feature!
Improved longform style
Longform posts now show the image and related tags. Thanks Eric!
Account recovery, bug fixes
Thread loading is greatly improved, we now support the latest nip10 specification for improved compatibility between clients. We also added an account recovery feature called First Aid. You can use this to create a new contact list if for whatever reason you don't have one anymore. If you are running into issues following people, you can use this to recover your account:
Testflight
v1.9 dev is underway, with an up and coming highlighter feature where you can clip highlights from the web and other posts and share them to your feed. If you want to test out the latest up and coming features, make sure to grab a damus purple membership to get access!
https://damus.io/purple/login
That's all for now, here's the full changelog if you want to see what else is new!
Full Changelog
Added
- Added nip10 marker replies (William Casarin)
- Add marker nip10 support when reading notes (William Casarin)
- Added title image and tags to longform events (ericholguin)
- Add First Aid solution for users who do not have a contact list created for their account (Daniel D’Aquino)
- Relay fees metadata (ericholguin)
- Added callbackuri for a better ux when connecting mutiny wallet nwc (ericholguin)
- Add event content preview to the full screen carousel (Daniel D’Aquino)
- Show list of quoted reposts in threads (William Casarin)
- Proxy Tags are now viewable on Selected Events (ericholguin)
- Add ability to mute words, add new mutelist interface (Charlie)
- Add ability to mute hashtag from SearchView (Charlie Fish)
Changed
- Change reactions to use a native looking emoji picker (Terry Yiu)
- Relay detail design (ericholguin)
- Updated Zeus logo (ericholguin)
- Improve UX around video playback (Daniel D’Aquino)
- Moved paste nwc button to main wallet view (ericholguin)
- Errors with an NWC will show as an alert (ericholguin)
- Relay config view user interface (ericholguin)
- Always strip GPS data from images (kernelkind)
Fixed
- Fix thread bug where a quote isn't picked up as a reply (William Casarin)
- Fixed threads not loading sometimes (William Casarin)
- Fixed issue where some replies were including the q tag (William Casarin)
- Fixed issue where timeline was scrolling when it isn't supposed to (William Casarin)
- Fix issue where bootstrap relays would inadvertently be added to the user's list on connectivity issues (Daniel D’Aquino)
- Fix broken GIF uploads (Daniel D’Aquino)
- Fix ghost notifications caused by Purple impending expiration notifications (Daniel D’Aquino)
- Improve reliability of contact list creation during onboarding (Daniel D’Aquino)
- Fix emoji reactions being cut off (ericholguin)
- Fix image indicators to limit number of dots to not spill screen beyond visible margins (ericholguin)
- Fix bug that would cause connection issues with relays defined with a trailing slash URL, and an inability to delete them. (Daniel D’Aquino)
- Issue where NWC Scanner view would not dismiss after a failed scan/paste (ericholguin)
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 46fcbe30:6bd8ce4d
2024-05-07 16:18:50Opinion about Bitcoin Core (desktop)
Bitcoin Core is the most prominent continuation of Satoshi Nakamoto's original work. Contributors to this project are pioneers in reproducible builds and it's the software with most attestations to its reproducibility and with probably thousands of academics looking at the code and how it's being compiled, this software sets the benchmark for transparency in self custody.
It started out being the Bitcoin full node, wallet, miner and even parts for a market place could be found in the early code base. Today, it is being stripped of the mining feature and even the wallet feature might get removed at some point.
For the average user, Bitcoin core is not a convenient wallet but arguably it's the only software that can really make sure you are receiving Bitcoin on the Bitcoin blockchain so almost all wallets talk to a server running this software one way or another.
WalletScrutiny #nostrOpinion
-
@ 0b963191:fc5e7ffd
2024-05-05 23:36:45Chef's notes
Can of course substitute in beef for the lamb.
In terms of canned peas, always prefer La Sueur
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
Ingredients
- Potatoes:
- 1 ½ pounds potatoes (Russet)
- ½ cup half-and-half
- 2 ounces unsalted butter
- ¾ teaspoon kosher salt
- ¼ teaspoon black pepper
- 1 egg yolk
- Meat Filling:
- 2 tablespoons canola oil
- 1 cup chopped white onion
- 3 carrots, peeled and diced
- 1 ½ pounds ground lamb
- 1 teaspoon kosher salt
- ½ teaspoon black pepper
- 3 tablespoons flour
- 3-4 teaspoons tomato paste
- 1 cup chicken broth
- 3 teaspoons Worcestershire sauce
- 2-3 teaspoons chopped rosemary leaves (fresh)
- 1-2 teaspoons chopped thyme leaves (fresh)
- ¾ cup corn kernels
- ¾ cup peas
Directions
- Potatoes:
- Peel and dice potatoes.
- Place in a pot and cover in cold water.
- Bring to a boil.
- Lower fire to simmer and cook for 15-20 minutes.
- Heat butter and half-and-half for 30-40 seconds in the microwave.
- Drain potatoes and put back into the pot.
- Mash potatoes and add half-and-half, butter, salt, pepper.
- Continue mashing until smooth and stir in yolk until combined.
- Preheat the oven to 400 degrees.
- Filling:
- Heat canola oil in a 10-12 inch pan over high heat.
- Add onions and carrots and saute over medium-high heat for 4-5 minutes.
- Add garlic and combine for 30 seconds.
- Add Lamb, salt, and pepper and cook until browned.
- Sprinkle flour and stir to coat lamb and cook for 1-2 minutes.
- Add Tomato paste, chicken broth, Worcestershire sauce, rosemary, thyme. Stir and bring to a boil.
- Reduce heat to low, cover, and simmer for 12-15 minutes while sauce thickens.
- Oven:
- Add meat filling to baking dish.
- Add peas and corn and stir in evenly
- Spread mashed potatoes using a rubber spatula. start at the corners and make sure to seal around the edges.
- Bake for 25 minutes
- Remove from the oven and let sit for 15-20 minutes.
-
@ ee7d2dbe:4a5410b0
2024-06-11 10:05:51Explore the concept of Web 4.0, its innovations, and how it reshapes digital landscapes for a smarter, interconnected future.
Introduction to the Internet and its definitions
Internet is a large system that connects multiple servers and systems of computers, and mobile phones globally. Internet as per its definition is described as “networks of networks” that serve as crucial elements when it comes to communication between two distinct resources in the digital world. The conformations of the internet have always helped to transform day-to-day communication with every aspect that inclines us towards modern living.
World Wide Web is simply in common terms is pile of pages which are interconnected among each other and follow protocols called HTTP for communicating data between servers and clients. The World Wide Web referred to as the Web, is one of the subsets of the Internet that monitors and mediates interaction between users like us and the digital content available dynamically.
With the advancement in technology standards and user behaviour web is evolving and every time with the addition of new features it emerges as the new version. In this article, we will delve into the latest and most intelligent version of the web now i.e. Web 4.0 and consider it as the next evolutionary and significant step in the growth and development of the internet. Web 4.0 is still in the conceptual stage which means it has not yet been released, however, it is believed that the commencement of Web 4.0 could involve building AI tools of advanced level that turn out to be more responsive and intelligent.
History of evolution of Web and its versions
WEB 1.0
WEB 1.0 (Static web): As the name suggests, static web was used to deliver consumer with the content exactly the same as uploaded by the content creator. Later this static character of web got a code name of WEB 1.0 Web 1.0 was a “read-only” web. The basic core for this web was community governance, decentralization of networks, creation and contribution of content for the web.
HTTP, SMTP, FTP, IRC and SMS were the open protocols which made a foundation stone for Web 1.0. These protocols were crucial as anyone can easily work with them and make the content for the web Web 1.0 is the term used to describe the earliest form of the internet which sets the first example of a “global network”, which showed the potential for future digitalisation of Information sharing and communication.
This Web 1.0 was created in 1991 by TIM BERNERS LEE who is an English computer scientist best known for invention of the HTML markup language, the URL system, and HTTP along with WORLD WIDE WEB being his most famous invention. It was known as “static web” or “read only web” as it had no visuals, controls, forms and interactivity. It was all about web pages which are connected to a system with the help of hyperlinks.
In 1993, the web became available to the public and lead to Rapid increase in website that were created.
By Early 1995, over a million websites were available and this growth continued throughout the late 1990s and early 2000s.
Web 2.0
The Creation of most important COOKIE: (HTTP COOKIE) To overcome one of the first limitations of web 1.0, which was being STATELESS.
As discussed earlier, web 1.0 was unable to capture state or user data and could not convey any data related to the user to web developer such as if the end user had previously visited the website or not and it was being difficult for a web developer to know the demographic of the end user, which meant you could not build products or services specifically targeted for your end users.
In first attempt of solving this limitation of capturing state or user data, LOU MONTULLI, a computer programmer came up with the invention of HTTP cookie with which developer can tell if the user had visited a website previously or not.
And, with this invention, now that we were being able to capture user state the Web transitioned into Web 2.0.
Web 2.0 often being referred to as “read and write” web, spans from early 2000s to current period. The the word web 2.0 was first given by DARCY DiNucci, a technology strategist.
WEB 3.0
THE FUTURE The inventor of world wide web TIM LEE, originally called web 3.0 as “semantic web “as it was conceived as a more autonomous, intelligent and open Internet. Web 3.0 is often described as read, write and execute. The open internet, we are talking about would involve AI and ML which would process content like a “global brain” with all data being connected in a way that is contextual and conceptual, but this didn’t work as planned because Tech just wasn’t at the right place.
In web 3.0, users can interact in a decentralized way, but with security. From money to information, all exchanges are conducted without the need of tech companies, banks, or any other middleman so if web 2.0 makes the user a product, web 3.0 makes the user the content owner.
Basically, the goal of web 3.0 is to make the internet more intelligent, personalized and responsive to users need, and to achieve this, Artificial Intelligence and Big Data are being used to create a semantic web that understands the meaning of information on internet and this will allow for more appropriate search result, better recommendation and more personalized experience to the users. The web 3.0 has shown the potential to transform the internet into a much more powerful and useful tool for everyone, from a developer to the end core user. With the help of Web 3.0, it is now possible for devices to interact with each other directly without the need for human intervention.
Difference in Web 4.0 from Web 3.0
Web 3.0 (Semantic Web)
Decentralization: Often termed the “semantic web,” Web 3.0 aims for a more decentralized, open-source, and immersive online experience. It facilitates user participation, content creation, and ownership without dependence on intermediaries.
Blockchain Infrastructure: Web 3.0’s infrastructure relies on the blockchain—a public ledger—allowing trustless interactions among users without reliance on a central authority.
Monetization and Ownership: In contrast to Web 2.0, where platforms profit from user-generated content, Web 3.0 empowers users to monetize their data and retain ownership of their contributions.
Elements: Web 3.0 integrates decentralization, artificial intelligence, augmented reality, virtual reality (AR/VR), and ubiquity.
Web 4.0 (Intelligent Web)
Web 4.0 is way more decentralization and integration with Machines-
It has Higher Decentralization: where Web 4.0 extends decentralization further, aiming for a simpler and more integrated internet connected to human thinking and cognition, without precise definition.
It comprises features of Cerebral Web where Some sources suggest Web 4.0 will be more “cerebral” as it involves deep learning indicating a deeper connection between human minds and the digital realm.
Web 4.0, Mentioned by Elon Musk and Twitter founder Jack Dorsey, Web FOUR, a meme coin, humorously reflects the concept of the next internet iteration. While not directly addressing Web 4.0’s technical aspects, Web four promotes accessible decentralization¹.
Web 3.0 Critique: Musk and Dorsey argue that Web 3.0 lacks true decentralization and primarily serves venture capitalists (VCs), citing ongoing capital concentration issues.
Advancements in features of Web 4.0
In the ever-evolving landscape of the internet, the emergence of Web 4.0 marks a pivotal moment where technology succeed with its previous predecessors and their boundaries, which offer users an unprecedented type of personalization as well as customization. In the Centre of evolution there stays the utility of advanced artificial intelligence (AI) and machine learning algorithms, empowering Web 4.0 to deliver tailored content as per the preferences of users and services with unique and accurate precision. Web 4.0 has its special features to adapt the user that too individual user preferences creating a digital experience that feels uniquely crafted for each user.
Central to the promise of Web 4.0 is its augmented interactivity, which redefines how users engage with digital content and services. Through the integration of immersive technologies such as virtual and augmented reality, Web 4.0 elevates user experiences to new heights, blurring the lines between the digital and physical worlds. This heightened level of interactivity enables users to interact with information and services in ways previously unimaginable, opening doors to innovative and groundbreaking experiences.
In conclusion, Web 4.0 represents a convergence of technologies that hold the potential and strength to shape and transform the future where innovation and creativity are limitless and knows no bounds. By embracing and encouraging creativity, collaboration, and a forward-thinking broad mindset, we can harness the power of Web 4.0 to create a digital landscape where there are endless opportunities and the future will possess a positive change within itself.
Source: https://www.agicent.com/blog/what-is-web-4-0-explained/
-
@ a31a17d6:34e8856e
2024-06-11 09:54:23"They just sat there looking at their phones," exclaimed our 9-year-old, disappointed after spending the day with a couple of slightly older children this Christmas. Has anyone experienced something similar?
As a family, we wish to delay the introduction of smartphones for our kids for as long as possible. We know several families with older children than ours who have wanted the same but have had to give in to social pressure. Not surprisingly, when half of Norwegian 9- and 10-year-olds already have their own smartphone and use social media.
The debate around children and youth and their access to smartphones and social media usually focuses on bullying, privacy, internet safety, etc. The effect on mental health, addiction, loneliness, class divisions, and sleep problems receives less attention, but now the evidence of the harmful effects of mobile phones in these areas is becoming so extensive that it's time to take them seriously.
One of the researchers who has spent years studying these effects is Jean Twenge. She was recently interviewed by The New York Times and reported that middle school students who spend a lot of time on social media have a dramatically increased likelihood of becoming unhappy and depressed. Since 2007, the share of children who have gained access to smartphones and social media has exploded, and the suicide rate for 10-14-year-olds has tripled.
Professor Alexey Makarin from MIT, who is behind a study that links the rollout of Facebook to a significant increase in depression, puts it this way: "It is still uncertain whether social media is the main cause of increasing mental health problems, but it is highly likely that it is a strong factor."
Research leaves little doubt that extensive use of smartphones and social media leads to users sleeping less and having lower sleep quality. It is also well documented that children who do not get enough quality sleep have a significantly higher risk of concentration problems, depression, and suicidal thoughts.
According to the Norwegian Media Authority, Norwegian parents give smartphones to their children for two main reasons. Firstly, it is practical; children and parents can easily contact each other and plan their daily lives. Secondly, parents fear social exclusion if their child is the only one in their circle of friends without their own smartphone. Some families have phones lying around after parents or siblings have upgraded, so often there is no acquisition cost.
Many would argue that the decision of when a child can have a smartphone is a private matter, and that parents themselves must assess the risk they are exposing their own children to. Resourceful families can moreover regulate usage through good supervision and technical solutions. However, the decision to give children smartphones not only has consequences for one's own children, it also contributes to creating pressure on others. As parents, we unfortunately cannot decide that our children will not experience social pressure. But what we can do is delay the introduction of smartphones to our own children and thereby help to reduce the pressure on other people's children. Then we can hope that other parents will do the same for us.
International experts recommend age limits from 13 to 16 years for social media, and Jean Twenge believes this should also apply to smartphones. Some might call it government overreach, but that's what many thought about the Norwegian smoking act as well, introduced to protect the surroundings as much as the smokers. Now, the first generation that has grown up with smartphones is becoming old enough to speak up for themselves: "My childhood was stolen by social media: Please introduce an age limit!"
Our children are growing up now and don't have time to wait for regulations, even though they will hopefully come as a result of the efforts of the Norwegian "Screen Use" Committee. We should start by taking a critical look at ourselves as parents - are we giving our children smartphones because it is the best solution for them, or is it the path of least resistance for us in a hectic everyday life?
The parents' need to keep in touch with their children can be met with an old school feature phone and the children can use it to coordinate social activities with their friends. When it comes to entertainment, Norwegian children should be pushed more towards books than screens; Norwegian 10-year-olds have weak reading skills and the lowest reading pleasure of all 65 countries in the PIRLS survey.
Key figures in the companies that have developed smartphones and social media are among the most restrictive on their children's screen time because they know it creates addiction. It's thought-provoking that Steve Jobs' children were not allowed to use iPads.
I don't want my children to walk into a future with their noses in a screen, poor reading skills, poor concentration abilities, and a high risk of mental health problems. It doesn't take many like-minded people to reverse the trend, and if we work together, our children can live without smartphones until they are mature enough to handle them.
-
@ c69b71dc:426ba763
2024-05-11 19:15:01Chef's notes
You need a blender. If you want your breakfast to be more filling, you can also mix ground almonds or walnuts with the apples and dates.
Enjoy!
Details
- ⏲️ Prep time: 5-10 minutes
- 🍳 Cook time: 0
- 🍽️ Servings: 2
Ingredients
- 2 Oranges
- 2 Sweet Apples
- 3-4 Medjol Dates
- 1 tbsp Vanilla Extract or 1-2 tbsp Vanilla Protein Powder
- optional: 1/4 tsp Cinnamon Powder
Directions
- Peel the oranges and cut them into thin slices.
- Core the apples and dates and mix with the vanilla extract or vanilla protein until a creamy
- Then alternately layer orange slices and cream in two tall glasses.
-
@ d543c820:aa8001e7
2024-06-11 09:27:22上一周,我尝试了 nostr 开发:用 nostr 协议来开发一个机器人。我希望分享这个过程中的一些发现(或应该就叫经历吧),也许可以窥见 nostr 协议的发展现状,带给我们一些启发。
我并不是一个专业的开发者,因此也许有些问题是成熟的开发者能够解决而我没能解决的。而且有些经历也不仅仅跟 nostr 协议有关。但我依然相信,这里面有些东西跟 nostr 有关,我也会尽量将我的叙述集中在这个方面。
(下面是一张使用 mermaid 插件画的图,如果你无法在本页面看到,可以复制到这里:https://mermaid.live/ )
```mermaid sequenceDiagram participant U as User participant NC as Nostr Client participant M as Main Bot participant LN as LN Node
U ->> NC: DM Request, e.g. Random Num NC -->> M: Registe, and check M ->> LN: Request a LN invoice LN -->> M: a specific LN invoce i1 and registe M ->> NC: i1 NC -->> U: kind4 message with i1 U ->> NC: DM "CR" to say paid NC -->> M: check the lastest registed event M ->> LN: Check invoice status LN -->> M: invoice status M ->> NC: if paid, a RND r1 NC -->> U: kind4 message with r1
```
上图是我在开发起步阶段画的一张图, 用来表示信息在我的程序各组件之间是如何流动的。可以看出,就其核心而言,它是一种很简单的程序:它通过一个 nostr 客户端接收 NIP04 消息,然后做出响应;要么是回传一张闪电发票要求支付,要么是检查发票状态后返回用户所请求的信息(比如在这里,是一个随机数)。
(我在 GitHub 上以 “nostr bot” 为关键词搜索了一圈之后,才意识到,我这种机器人有一个更准确的描述 —— “Vending Mechine(自动贩卖机)”。)
事实上,它确实很简单。程序的主体(上图中关于 Main Bot 的部分),即使加上我思考规划的时间,满打满算也只用了一天。至于闪电节点,我用的是 Core Lightning 软件,开发者们也提供了一个 python 库
pyln-client
(恰好是我会的编程语言),可以很方便地与闪电节点交互;即使算上调试的时间,也不会超过 1 个小时(就跟使用命令行工具一样,非常便利)。然而,与 nostr 客户端有关的部分,却耗费了我两天来尝试开发(这当然跟我菜有关)。并且,在程序完成之后,试运行环节,让我陷入了更大的迷茫。
这是怎么回事呢?
生产者的客户端与消费者的客户端
在整个开发过程中,我首先要作为一个开发者(生产者),使用为生产者准备的、可以自动化运行的客户端;然后,为了测试机器人的运行,我要使用面向消费者的客户端,看看在这些客户端上能否正常使用我的机器人。
在开发阶段,我选择了
nostr_sdk
库。因为它的 pip 界面描述很诱人:“如果你要开发标准的客户端或者机器人,本库很可能就是你需要的”。而且,也提供了作为参考案例的代码(我的代码也确实是在复刻这份参考并加以大量删减之后完成的)。但事后,以一种相对挑剔的眼光来看,
nostr_sdk
不一定是一种好的选择。它原生是用 Rust 开发的,然后才绑定成 python 代码。它的完成度可能 “太高” 了,不太像是一种意在让人二次开发的库,倒像是一个已经完备的应用。这可能跟它先开发后绑定的特点有关 —— 你在最终的 python 代码里面很难读出什么东西,但也许,如果你懂 Rust,就能直接看源代码、理解得更加清楚。撇开我用笨拙的技巧来了解这个库的过程,我在开发中遇到的与 nostr 有关的第一个(可能也是给人最多困扰的)难题是 —— 没错,如你所料,网络连接。
当前的惯例是,nostr 客户端使用 wss 协议与 relay 连接。问题是,常见的代理软件似乎不能很好地处理这种连接,必须增加额外的处理和调试。最终我是使用 proxychains 这一款工具才让我的 nostr 客户端能够正常使用我的代理服务、连接到几个公开的著名 relay。
网络连接的困难会给开发带来的另一个困扰是,一时间你将无法确定到底是你的客户端实现有问题,还是单纯网络连接不畅。我是在本地额外运行一个 python 的 relay 实现
monstr
之后,才排除实现的问题。(这里要感谢 flycat 客户端的开发者 ElectronicMonkey 为我提供的帮助。)完成开发之后,我尝试了许多款面向消费者的 nostr 客户端。这就发现了更 “有趣” 的现象。
最奇特的现象来自 iOS 客户端 plebstr 。在 NIP04 消息的私人聊天框中,该客户端会把
bcln...
开头的字符串,也就是bolt11
格式的闪电发票,完全屏蔽掉!你没看错,是真的。不管这些字符串是独立一条消息,还是放在别的字符串中,都会被精准地屏蔽掉。我的善意猜测是客户端开发者需要规避来自苹果公司的管制。但好像在 plebstr 里面你是可以打闪(tip)的?除了这个奇怪的案例,我没有再测试过其它移动客户端。随后我测试的主要是网页客户端。在这些客户端上,我认为最明显的问题是 客户端实现的 性能/设计。
我尝试了这个页面(https://nostr.com/clients)推荐的每一种网页客户端。说实话,它们确实都是功能和 UI 上非常前卫、新颖的客户端。但在我的测试过程中,依然很难让人满意。这是因为,这些客户端在处理 NIP04 消息时,都是全部拉取然后尝试全部解密 —— 如果你是一个已经有 nostr 经历的公钥,换用了客户端,那么这会在一个很短的时间内形成高额的计算负担,然后你可能就会卡在那里。很不幸的,在使用我自己的公钥来测试我的机器人时,正是这种情形。
唯一一个我认为合理的实现来自 noStrudel。这种网页客户端会拉取 NIP04 消息但不会主动解密,需要用户一条一条单独点击,才会尝试解密。这就避免了同时解密大量消息而带来的计算负担。
但它也有崩溃的时候。我不知道为什么,在我使用几次之后,它就无法再正确地解密消息,也无法发送加密消息。我依稀记得,最开始我是使用浏览器插件来登录 noSturdel 客户端的,但后来,这种登录方式好像消失了。
读到这里,想必有读者会问,为什么不尝试桌面客户端呢?理论上,它应该会有更好的性能。没错,我也是这么想的。然后我发现,我必须手动为这些客户端解决网络连接问题。Game Over!
Relay:面向什么的 relay?
在 nostr 协议的起步阶段,有一句著名的口头禅:“dumb relays,smart clients(呆鸟服务器,聪明客户端)”。这非常非常吸引人。但这次开发经历让我思考:他们是不是也不应该那么呆?
现实中,我们的确能够遇上一些使用条件非常宽泛的公开 relay。比如,relay.damus.io 。它可以说是来者不拒,我的机器人总是能够连接到它,也总是能够向它发送消息。但还有一些 relay 则不然。我记得我在机器人后台看到一个 relay 拒绝为我递送消息,还回传了一段错误描述,大意是:“您违反了我们的使用规则。且您不在我们的信任网络中”。苍天可鉴,我非常乐意知道这里的 “使用规则” 是什么样的,以便能够满足这种规则,但很可惜,没有任何地方能够了解这样的规则。在我们使用 HTTPS 访问 relay 的 URI 时,通常,你只会得到大大的文字描述:“请用 Nostr 客户端连接!” 可问题是,如果用户用 nostr 客户端连接后,又被告知 “不在信任网络中”,TA 该怎么办呢?这也太像卡夫卡的小说了吧!(插句话,如果 relay 回传的报错消息直接就是一张闪电发票,我一定二话不说付了这张发票,以证明自己不是来滥用资源的!)
理论上,所有 relay 都需要担心女巫问题。所以 NIP13 规定了消息层面的 PoW。我在许多客户端库里面都看到了用来产生这种 PoW 的案例代码。只是这依然不能完全解决所有问题。不同的 relay 可能希望设置不同的门槛。那么 relay 们能否把自己的使用条款交代清楚?(换句话说,如果我并不确定遵守 NIP13 就能使用 relay 的服务,为什么我要花这个功夫呢?)
还有一个问题。似乎,我的机器人在运行一段时间之后就会失灵 —— 如果我的参加友情测试的朋友们不是在我运行机器人的第一时间试用,就会遇到完全没有响应的问题。我在后台似乎也没看到关于消息进入和处理的日志。这就是说,也许我的机器人已经跟 relay 断连了。但当时我使用了 INFO 级别的日志,事后也意兴阑珊,没有再进一步测试,因此我并不确定是实现的问题,还是 relay 主动掐断了连接。
这就指向了另一个问题,也许是一个更深层面的问题。当前的客户端和 relay 都选择了 wss 协议。但这种协议能否兼顾不同客户端的需要?我的机器人与一般的社交网络客户端不同,理想情况下,它需要 24 小时运行,等待进入的连接(消息);但是,wss 是否提供了对双方都低开销的保活机制?如果 wss 并不适宜维持这种长连接,又没有 relay 愿意支持别的连接方式,那么 nostr 协议就无法用来支持像我的机器人这样的用户了。
(我认为,一定有读者,在回想我的机器人的使用模式时,想到一个非常相似的应用场景 —— NIP47,nostr wallet connect(NWC),使用 nostr 来远程控制你自己的闪电节点。这种用法与我的机器人在架构上实际上非常相似。如果我的机器人可以顺畅地运作,只要改变一些代码就可以兼容 NIP47。那么我是否尝试过兼容 NWC 的实现?没有。目前 NWC 只有两种实现,都不兼容 Core Lightning 闪电客户端。但你猜怎么着?NIP47 的文档末尾直接了当地写着 “你应该尝试专用的 relay”。这说明不是只有我一个人有这种想法或者说顾虑。)
所以,如果 nostr 生态要继续发展,relay 可能无法一直呆下去。当然,最聪明的那部分依然应该由客户端来做。但 relay 应该考虑再聪明一些。比如,考虑支持其它的网络连接协议,以支持更广泛的应用场景。比如,将使用条款以更易于获取的形式公开出来。还比如,默认不推送旧的 NIP04 消息,以减少这种私密消息的暴露。
结语
开发这个自动贩卖机,是我向来就有的想法。而且我毫不怀疑它的实用性:比如,只要替换一下 main bot 部分的逻辑,你就可以把它改装成跟一个公钥配套的打闪接口:只要输入数目,就可以得到相应数目的闪电发票,然后你就可以给这个公钥的主人打闪了。这就像是另一种 Lightning Address,只不过你既不需要 web 端点来部署,也不需要依赖别人的服务,只需使用 nostr 客户端就行。
这个例子的背后,正是我对 nostr 协议最深的渴望和想象:个人无需申请外界可以访问的 web 端点,只需使用开源的 nostr 客户端以及配套的工具,就可以开设自己的个人站点、接受打闪、为特定的某些服务收费,等等。将互联网还给个体。
但事实证明,我们离这样的未来还有差距。许多的细节需要推敲和完善。我非常希望客户端实现和 relay 们能继续前进,早日提供更好的连接环境,使 nostr 公钥这样的 “个人主页” 能够具备更多的功能。
-
@ 32e18276:5c68e245
2023-12-06 15:29:43I’m going to be on an ordinals panels as one of the people who is counter arguing the claim that they are good for bitcoin. I decided to brush up on the technicals on how inscriptions work. I am starting to see luke’s perspective on how it is exploiting a loophole in bitcoin’s anti-data-spam mechanisms.
Storing data in Bitcoin, the “standard” way
The standard way you add “data” to bitcoin is by calling the OP_RETURN opcode. Bitcoin devs noticed that people were storing data (like the bitcoin whitepaper) in the utxo set via large multisig transactions. The problem with this is that this set is unprunable and could grow over time. OP_RETURN outputs on the other-hand are provably prunable and don’t add to utxo bloat.
Here’s an excerpt from the march 2014 0.9.0 release notes that talks about this:
On OP_RETURN: There was been some confusion and misunderstanding in the community, regarding the OP_RETURN feature in 0.9 and data in the blockchain. This change is not an endorsement of storing data in the blockchain. The OP_RETURN change creates a provably-prunable output, to avoid data storage schemes – some of which were already deployed – that were storing arbitrary data such as images as forever-unspendable TX outputs, bloating bitcoin’s UTXO database. Storing arbitrary data in the blockchain is still a bad idea; it is less costly and far more efficient to store non-currency data elsewhere.
Much of the work on bitcoin core has been focused on making sure the system continues to function in a decentralized way for its intended purpose in the presence of people trying to abuse it for things like storing data. Bitcoin core has always discouraged this, as it is not designed for storage of images and data, it is meant for moving digital coins around in cyberspace.
To help incentive-align people to not do stupid things, OP_RETURN transactions were not made non-standard, so that they are relayable by peers and miners, but with the caveat:
- They can only push 40 bytes (later increased to 80,83, I’m guessing to support larger root merkle hashes since that is the only sane usecase for op_return)
Bitcoin also added an option called -datacarriersize which limits the total number of bytes from these outputs that you will relay or mine.
Why inscriptions are technically an exploit
Inscriptions get around the datacarriersize limit by disguising data as bitcoin script program data via OP_PUSH inside OP_IF blocks. Ordinals do not use OP_RETURN and are not subjected to datacarriersize limits, so noderunners and miners currently have limited control over the total size of this data that they wish to relay and include in blocks. Luke’s fork of bitcoin-core has some options to fight this spam, so hopefully we will see this in core sometime soon as well.
Inscriptions are also taking advantage of features in segwit v1 (witness discount) and v2/taproot (no arbitrary script size limit). Each of these features have interesting and well-justified reasons why they were introduced.
The purpose of the witness discount was to make it cheaper to spend many outputs which helps the reduction of the utxo set size. Inscriptions took advantage of this discount to store monke jpegs disguised as bitcoin scripts. Remember, bitcoin is not for storing data, so anytime bitcoin-devs accidentally make it cheap and easy to relay data then this should be viewed as an exploit. Expect it to be fixed, or at least provide tools to noderunners for fighting this spam.
Where do we go from here
The interesting part of this story is that people seem to attach value to images stored on the bitcoin blockchain, and they are willing to pay the fee to get it in the block, so non-ideologic miners and people who don’t care about the health and decentralization of bitcoin are happy to pay or collect the fee and move on.
Data should not get a discount, people should pay full price if they want to store data. They should just use op_return and hashes like opentimestamps or any other reasonable protocol storing data in bitcoin.
After going through this analysis I’ve come to the opinion that this is a pretty bad data-spam exploit and bitcoin devs should be working on solutions. Ideological devs like luke who actually care about the health and decentralization of the network are and I’m glad to see it.
-
@ 97c70a44:ad98e322
2024-05-09 17:25:22#lastword
A few weeks ago, Mike proposed the addition of a feature to nostr. The content of the proposal itself isn't important, but the resulting conversation illustrated something important about nostr development that I wanted to draw attention to.
If you're interested, you can find the issue here. The idea was basically a tag that disabled comments to a reply, for when you wanted to gracefully exit a conversation that had outlived its usefulness.
While I definitely sympathize with the experience of getting stuck in an unproductive argument and being unable to leave because you have to have the last word, I do think it's better to take responsibility for leaving the conversation, rather than make other people do it for you. You can either outlast your opponent, let them have the last word, or tell them "I don't want to talk about this any more, I'm not going to reply".
This is just my opinion, and it's really not important whether I'm right or not. What was interesting was how Vitor responded:
I am not sure if the NIP review process should consider "what's good for the user" in the discussion. That kind of nanny state thinking is what went wrong with regular social media in the first place.
Permaculture and Ethics
What it sounds like (although I have a hard time believing this is actually his position), is that Vitor is dismissing the relevance of an ethical framework in designing a protocol, preferring to stick to the mechanics of what is being suggested. As Vitor says, "Clients can do whatever they want, of course." This is true, but ignores the question of why a client developer might want to do any particular thing.
In a recent Thank God for Nostr episode, I interviewed Scott Mann of the Permaculture Podcast. When I asked him his opinion on how to manage decentralized protocol design and build effective consensus, here's what he had to say:
[You] don't need to frame it as a software development project, or even a protocol. I would look at it as a distributed community-based and community-supported project, whatever that is. Because permaculture is such a large umbrella, I like to go up to that 50,000 foot view and pull away from what the details are. Because the details are what we're going to build our solutions from.
And that's one of the things I didn't mention earlier — there's kind of a hierarchy within permaculture that goes, at the top are the ethics of permaculture: earth care, people care, fair share. Beneath that are the principles, then usually we have strategies and techniques.
But there's a dividing line between ethics and principles and the strategies and techniques, that we start at that top, and use the ethics to decide whether or not we're even going to launch a project.
He goes on to say:
I'm going to use the principles and see how can I apply those principles to my research and original design. To make sure that whatever I'm creating creates some kind of a surplus, to have a refinement process in place before I even launch, like what is that going to look like, even if I have to change it later, just having some of these building blocks in place.
And then once I've done that and have gone deep into my research into what this might look like, how I might launch it, that's where I would start going into strategies and going ok, how do I want to market this? How do I want to get this out to the people who are going to use it, how do I want to maintain this, how do I want to do distributed decision making, and then as I start to think about distributed decision making, looking at what is the form that I want to use for that?
Scott's thesis is that ethics and principles should be in the front of your mind both as you're considering a project, and as you continue to build it out. This not only makes sense as something to do if you want to succeed, it's categorically true. Action can't happen without agency, and it is your agency that informs what you choose to do, and how you plan to go about it.
The word "ethics" comes from the Greek ēthos, meaning "moral character". In other words, your ethic is who you are. Your values, hopes, preferences, faults all factor in to your actions.
This is not always clear, because in fiat-world, many people suspend their values in order to "get something done". If you want to protect your savings, you invest it in index funds, propping up the stock price of companies that hate you. If you want to make money, you go work at a job where you're berated quarterly for being racist. People think that they can exercise their own values in their private life, while actively undermining those values with the majority of their time and purchasing power.
But this is not how people with integrity act. And I think if you can say one thing about nostr — both its developers and the community at large — is that they have a very high level of integrity. In other words, their actions are clearly informed by their ēthos.
This is a very good thing. What is the point of building an entirely new internet if we're not going to impose our values upon it? What an absolute waste of effort.
A Nostr Manifesto
This is not to say that any one developer has the right to imposing his own vision on the protocol because of his own personal values and reasons for contributing, which is what I think Vitor was being cautious about. But there are lines I think we can draw as a community that can't really be crossed without excluding yourself from what I might call the "nostr group ethic".
So what are those boundaries? What is a nostrich? Here are some values I've observed to be generally shared among nostr developers and users. Not everyone would full agree with these (including myself), but I think they're a fair characterization of the community.
- Free speech absolutism. No central entity should be able to globally censor any content. This comes with the trade-off of objectively evil content continuing to exist. This trade-off is acceptable, both because of the value of free speech, but also because evil will continue to exist regardless of attempts to suppress it.
- Empower individuals over institutions. No centralized entity can be trusted to safeguard the interests of the individual. Institutional incentives are asymmetric and easily corrupted. Better to have many subjective views of the world, than a single, centrally managed view of the world.
- Advertising-based business models should be viewed with great skepticism and caution. Advertising is a system of incentives that is central to the institutional corruption we see around us. Broadly, this includes paid ads, monetization of engagement, public/private partnerships, and "crypto".
There are others that are shared by many within nostr, although not as widely agreed upon. Two I can think of are:
- Economic activity should be voluntary. Software and content should be free, and creators should be amply rewarded via zaps or other value-for-value models.
- Social media should support real life community and relationships, not detract from them. We should all take time to touch grass.
I'm personally skeptical of the first of these, and strongly in support of the second. Much of my energy as a nostr developer has gone into attempting to subvert and reform traditional patterns of social media to not only support, but also resemble relationships that exist in the analog world God made, and placed us in.
This particular principle is the one at play in the conversation I linked to at the top of this post. My comments weren't an accusation that anyone was acting "unethically" in a universal sense, only that the proposed feature was incompatible with my vision for what nostr should be.
But of course, my vision is not shared by everyone, and the principle of "support real life" is clearly subservient to core ethic #2, which admits the value of a diverse set of opinions about the world. I have no right (or ability) to invalidate anyone else's core principles. But by the same token I'm free to express my own, and attempt to convince other people to share them. This is the basic value proposition of freedom of speech itself.
Ethical Cohesion
I would go further, and say that not only is it permissible to talk about ethical reasons for building one thing or another on nostr, it's essential. By having these conversations we fuse our individual ethics into a shared ethic. By calibrating our moral compasses to point in (roughly) the same direction, we also decrease the friction involved in getting something done.
I think this was a significant part of the idea behind Sovereign Engineering — get a bunch of people in a room together sharing meals and going on hikes, and the work will accelerate! This is also the way a church works. By meeting weekly together we strengthen our shared identity and build one another up through our activity. In fact, this is the basic definition of a community as Scott Mann puts it. In his words, a community can provide:
a series of connections, and a knowledge base, and a skillset that we can't fulfill as an individual, while having a social relationship with people in such a way that we can call on them for help.
So maybe, as I've said before, the real protocol is the friends we made along the way. Disagreement and discussion is a healthy thing for a community to have, and we should never stop asking "why?"
-
@ dd664d5e:5633d319
2024-04-23 06:04:28Why GitCitadel is primarily self-funded
This week has been full of discussion about the various pros and cons of what I've previously described as the "patronage funding model", including a formalized version called "grants":
This is the current common business model. A creator (artist, developer, writer, etc.) receives grants or donations that are more or less attached to conditions. -- The Zap Economy
We at GitCitadel have been questioned repeatedly, as to why we have not applied for a grant, when we are putting so much time and effort into the Nostr ecosystem. I would, therefore, like to explain the logic we have used to make this decision:
We are a package deal
We aren't merely a product team, we're a project team. That means that we aren't building a product, we're building an entire line (or suite) of products, and the corporate and technical infrastructure to support them.
Those products will be marketed under our own brand, built upon our own tech stack, and managed by our own team. We're used to doing this sort of thing for our various employers, so we haven't seen much benefit in looking outside of our team to acquire such things. Applying for formal grants would undermine this strategy, as we would be expected to tie into the grant-giver's own brand, stack, and team.
We have external income sources
We have made the point, to anyone interested in joining, that our project cannot and will not provide a source of income large enough to replace anyone's current source. At least, not yet. We are receiving donations and will eventually have a pricing model, but this project is our labor of love, not a get-rich-quick scheme. More a go-broke-slowly scheme, if anything.
We see this as a feature, rather than a bug, as it means our personal financial well-being is not immediately tied to our project work, and is therefore more secure, stable, and independent. This allows us the ability to ruminate, take time discussing architecture, and make more grandiose plans. It also allows us to discuss funding models, amongst ourselves or with a wider audience, while remaining calm.
Not everyone is in the same financial position and not everyone wants to split their attention, in such a manner, and we respect that. We also respect the right of every project member to decide differently, for themselves, and to apply for grants in their own name.
We're enjoying "L'expérience FOSS"
This is our first, major, open-source, software project. This is our chance to do something different, to be edgy, to build something for ourselves, to try out new technologies and strategies, to found a company and design a brand, to tinker and scheme... To boldly go where no team has gone before!
But, seriously. We're having fun. We're friends. We're enjoying the ride. We wouldn't enjoy the ride as much, if we were driving someone else's car.
We want to prove that it can be done
One of the things we found disturbing about the Nostr ecosystem is the pervasive pressure individual developers are under to apply for grants and labor full-time on Nostr products. It can feel quite rebellious, to simply tinker on evenings, weekends, or holidays.
It isn't rebellious.
It is a perfectly normal and acceptable way to contribute to a growing technological ecosystem, and we want to help re-normalize it. The emotional pressure to deliver new features at a rapid pace is exciting, but onerous, can lead to developers burning out and eventually moving on, and is the main cause of the frequent low quality of the existing software and the plethora of abandoned repos. This is the landscape that grants sometimes build.
We are here to show that "steady, stable, secure, supported, sturdy" sounds dull and a bit slow, but it can also be a winning development style, if the team chooses it deliberately and plans accordingly and cultivates a team environment that makes "code and chill together" a long-term motivator. We think the Nostr ecosystem is ready to accept a team with this style, and it's a style that advanced grants simply aren't designed to support because grant-givers have to account for the money spent within a reasonable time.
We want to support independent funding models
As with all things, talk is cheap. We are all persons eager to establish independent funding models because we want Nostr to help create a free market of sovereign individuals, at the global scale. We think this is a particular "good work" that Nostr is in a prime position to define, but it won't happen, if nobody actually does it, or if only a few do it and and are perceived as greedy oddballs. There needs be a lot of people doing it, including large, influential teams.
The strongest motivation to develop such models is the profit motive, and that is inevitably weakened by grant-lethargy. One has to take risks to become a change agent, so we have put ourselves on a diet, to get our creative financial juices flowing.
We have decided to stay hungry. https://image.nostr.build/28ddca2ef029e8be27e351867f37e457e2070e005f5588f88f486208709ee00d.jpg
-
@ ee7d2dbe:4a5410b0
2024-06-11 09:20:16In the rapidly growing and ever-evolving technical and innovative landscape, the skill and ability to develop software products like applications have been reserved for those who can code and possess coding skills. But, nowadays it is seen that the ones belonging to a non-technical skill set are also able to create software applications, all this is possible only with the help of no-code app builder tools. This paradigm shift is due to the emergence of a No-code app builder. These platforms help develop personalized applications without just making anyone learn coding skills and know any particular kind of technology. How complex it would be for any business to launch their mobile app, they first have to learn coding skills and technology before, just to develop an app for their use and needs. With the help of the no-code app builders, it has become very easy to transform their ideas into functional digital solutions. In today’s time, the development of software applications is not been limited to any coding expertise which was not only its traditional way but also, could only be made by a person who possesses a strong technical background. The No-code app builder tools help in empowering businesses to conceptualize their ideas.
What makes a no-code app builder good?
The following points are the advantages of why no-code app builders are in demand –
Feature of creating an inclusive environment
Since, with the advantage of No-code app builders, the disparity between individuals with and without coding skills have been alleviated and anyone can create their applications as per their requirements. No code App builder facilitates people to develop their fully functional applications. They democratize app development by providing intuitive interfaces and drag-and-drop tools that anyone can use.
Enhanced Software development life cycle
With the help of No-code platforms, one can create the prototype of their idea and let it conceptualize by creating and developing the application from the same platform itself, streamline the app development process, which further reduces the time it takes to go from ideation to deployment. It provides time utility in gathering feedback and iterating on designs without the need for expertise in coding and technical programming languages.
Budget-Friendly process
Let us consider an individual who wants to build an application for his business organization and to develop such software he has to hire a developer or he shall consult with any service based provider and look for a suitable vendor for developing his application. Imagine how intricate and expensive it would be as he is supposed to pay for the services he shall be taking. Meanwhile, on the other hand, an individual developing his ideas as applications with the no-code application builder tool, how easy and cost effective it would be. No-code tools eliminate the need to hire expensive developers or invest in coding training. However, these apps create cost-effective scenarios for businesses and startups looking for their digital transformation.
Choosing the Right No-code app Builder
User Interface (UI) – Opt for a platform with an intuitive interface, allowing easy navigation and drag-and-drop functionality.
Customization Options – Evaluate the platform’s customization features, including templates, widgets, and design flexibility, to suit your app’s needs.
Integration Capabilities – Check the platform’s compatibility with other tools and services like databases, APIs, and third-party applications to enhance functionality.
Scalability – Ensure the app builder can grow with your needs by offering scalability options and support for increasing user demands and features.
Support and Resources – Select a platform that provides robust support, tutorials, documentation, and a community forum to aid you during the app development process.
Some of the No-code app builder tools include –
- Bubble. io
Bubble. io is renowned and powerful platform for developing applications without any code and expertise in technical field, one just has to give instructions and ideas of what they want to develop and this tool can build your application.
Features include –
-
It provides interactive functionalities with visual interfaces where its users can develop and design their applications which will be fully-functional. Users can easily design and create the prototype and later can even deploy the developed application.
-
It possess visual editor, which enables users to design the interface without any complexities and effort, users can set their interface as per their choice, they can customize the elements, by adding, or changing elements such as buttons, text fields, images, and more, arranging them on the screen as desired.
-
This tool facilitate with workflow management of the project or application the user wants to develop, it supports in defining the logic and workflow of the application without any coding expertise. Users can effortlessly mention conditions, data workflows, and automate tasks within their applications using a simple interface.
-
Glide
Glide is one of the no-code app builder platforms which has its working based on data, where mobile applications are created by fetching information directly from Google Sheets. One can convert their spreadsheet data into fully functional application in minute through this tool, irrespective from what background the person belongs, without requiring coding expertise. The tool simplifies app development by providing user-friendly functionalities for building application. Glide offers tabs as its pages and one does not have to fine tune when it comes to customizing app, it fits better when it comes to mobile apps. Glide empowers users to create professional-grade mobile apps with ease
Working of Glide –
-
It begins with google sheets integration where the sheet becomes the resource of data for Glide, and at first, this tool integrates with Google sheets to fetch the data and the content required for mobile application. Users simply link the existing sheet with the project or can also create new Glide app from the sheet itself.
-
Glide include Drag and drop interface with it and therefore it facilitates the structuring of the app and designing the layout of the application. Along with, the users can also edit and make changes to the formed structure by enabling editing or adding elements such as buttons, forms, images, texts, etc.
-
Glide offers prebuilt templates and even multiple options are there to customize the applications as per their requirements. Users can alter and modify colors of their choices, fonts, styles as per the preferences, and layouts to create the app.
-
Builder. ai
Builder. ai is one of the no-code platforms that has consistent and effective guidance for Artificial Intelligence. It uses Artificial intelligence for application development and customization. It reduces the complexities, in the development process of the application software with the help of Artificial Intelligence. Artificial intelligence technology helps in sorting and executing various scopes, and aspects required in the development process. It automates all the processes commencing from design till its deployment.
Working of Builder. ai –
-
The user will provide input to the platform and start by first describing the idea as well as the requirements for the application they want to develop, to conceptualize it with the Builder. ai tool.
-
The platform uses Artificial intelligence and will going to check the inputs and apply respective algorithms and generate rough and initial designs and wireframes on the basis of inputs that the user has provided.
-
Users can simply make changes to the initial design generated as per their requirements and preferences. Users can enhance and upgrade the design by adding and selecting more features, and functionalities to the generated design according to the project need.
-
Draftbit
Draftbit is a cutting-edge platform that facilitates the development of software applications without code. Draftbit is a platform that has an interface where users can put their ideas as inputs, and later the platform will create the application accordingly. This platform empowers both developers and non-developers to create mobile apps for iOS and Android with ease. Unlike other platforms, Draftbit uses a set of containers and elements, which can be arranged by users and filled as per the categories the user wants such as database views, touchables, icons, buttons, etc.
Working of Draftbit
-
It has a simpler way of execution which includes steps like the conceptualization of ideas users had, the platform will take user input. Users begin by outlining their app ideas and functionalities within Draftbit’s interface.
-
Draftbit will generate the initial design and offer a visual drag-and-drop interface where users can design app screens and layouts effortlessly.
-
Users can customize any of the app components which they want to change or update as well as add interactive elements and define workflows without any coding knowledge
-
AppMachine
AppMachine is a no-code app builder platform which can create both web as well as native apps and therefore can be accessed through browsers as well as through Google and Apple Play stores respectively. The platform possesses various features that enable it to create applications, and therefore making app development easy and quick, unlike traditional app development.
AppMachine follows a Lego-style paradigm where the user starts creating their application from scratch, and can choose a template as per their need and can build a big application through the processes. Users can also give inputs of their ideas through Google Sheets. Each component has its functionalities and features which are integrated and later turned into a fully functional application. The platform offers Pro blocks that allow for more complex combinations using functions like Excel and Web Service integration.
Working of AppMachine
It starts with taking input in its interface. Users can give their ideas as inputs.
On the basis of inputs, the AppMachine will facilitate with visual outline or design or wireframe of the idea. More than a complete design, it is a visual drop-down interface where the user will create the design intuitively. Users can customize app components, add interactive features, and define navigation without coding skills.
- Webflow
Webflow is a versatile no-code platform designed for creating responsive websites and web applications. It blends a visual design tool with the flexibility of custom coding, allowing users to build professional websites without needing to write extensive code.
Working of Webflow
-
It has a simpler way of execution which includes steps like the conceptualisation of ideas users had, the platform will take user input. Users begin by outlining their app ideas and functionalities within Draftbit’s interface.
-
Webflow offers a drag-and-drop interface for designing websites with precision.
-
Users can personalize components, add animations, and create interactive elements without coding.
Conclusion
We know that the landscape of software development has changed and uplifted. With the help of no-code app development tools, The emergence of no-code app builders has changed the hierarchical notion that software applications can only be built by those who have coding skills.
These No-code app builder tools have created a sense of belongingness in people who have ideation and are fond of making concepts related to app development, it has generated inclusivity and let others who felt suppressed create applications.
Above mentioned No Code App builder tools have provided accessibility and empowerment to individuals and businesses worldwide.
In essence, no-code app development platforms have ushered in a new era of app creation, making it more accessible, efficient, and inclusive than ever before. As technology continues to evolve, these platforms will play a crucial role in driving digital transformation and empowering individuals and businesses to bring their ideas to life in the digital realm.
Source: https://www.agicent.com/blog/best-no-code-app-builder/
-
@ 8ea48526:e6720a43
2024-04-17 14:06:11Recently there has been discussion on the socials about supporting open source developers, specifically those who work on Bitcoin and Nostr. There is a small-ish camp of people who think that Bitcoin should remain as is…it’s perfect, don’t mess with a good thing. Many others think – correctly, in my opinion – that Bitcoin needs to be maintained and even enhanced. As long as the changes make Bitcoin better money, we should evaluate, go slow, and keep things simple.
Who will maintain Bitcoin and other open source projects? Will devs do it out of the goodness of their heart? Builders gotta eat; food ain’t free. A handful of institutions, both non-profit and businesses, provide grants and long term support to developers. This is great and I hope that continues. However, there is more that we can do. There is more that you can do.
Zappy 21st
I propose we make the 21st day of every month the (un)official ”Zap a Builder Day”. It’s simple. On day 21 in the current month, find a developer and zap them sats.
Created in the spirit of #v4v and the #grownostr social experiment, I’d love to see people make this part of their monthly routine. It’s common for certain days of the month to have meaning. The 1st day marks the start of a new month. The 5th day is a common day when mortgage payments are due. In the United States, on the 15th day of April taxes are due. So now there is the 21st day, the day you send some value to devs.
Who are you gonna zap?
Any open source developer. Start simple; don't overthink this. If you're using a Nostr client that you love, go find one of the contributors and zap them. If you use Bitcoin or Lightning regularly, find a Bitcoin or Lightning dev. There are many other great freedom tech tools, like wallets, sovereign computing apps, and privacy tools that have developers behind them. Zap a developer. (I say developer, but I really mean "contributor". Remember the designers, product, support, and project people who also contribute.)
I'm intentionally not giving names of developers here because I don't want to favor one over the other. Every open source developer is important to different people based on the tools they use. So go zap the people in your realm.
I'm only publishing this on Nostr, but I'm happy if the idea spreads beyond that. Nostr is the perfect place because you can so easily find a core dev and zap them. No need to track down their website hoping to find a wallet address or request a Lightning invoice.
Join the Zaps
While everyone is excited about block 840000, halvings come and halvings go. But the 21st is always here for you. Every month, reliably, quietly doing its thing. Just like those open source devs you rely on so much. They’re here every month, reliably, quietly doing their thing. Let’s show them some love.
This April 21st find a dev and zap them. If you’d like, add a message telling them how awesome their work is and tag it with #Zappy21st. Let’s flood the feeds with #Zappy21st messages and surface great open source developers to others. Next month on the 21st, we’ll do it again.
🤘
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ a012dc82:6458a70d
2024-06-11 01:17:14Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Introduction
Cryptocurrency is a digital asset that has become increasingly popular in recent years. As the value of cryptocurrency continues to rise, it is important to ensure that your digital assets are secure. One of the best ways to protect your cryptocurrency is to move it off of exchanges and into cold storage.
Crypto Off Exchanges
What is Cold Storage?
Cold storage is a secure method of storing cryptocurrency offline. It is a way to store your digital assets in a secure environment, away from the internet and other potential threats. Cold storage is a great way to protect your cryptocurrency from hackers, malware, and other malicious actors.
When you store your cryptocurrency in cold storage, you are essentially creating a “vault” for your digital assets. This vault is not connected to the internet, so it is not vulnerable to online threats. Cold storage is also known as “offline storage” or “deep storage”.
Types of Cold Storage
Hardware Wallets
There are several different types of cold storage solutions available. The most popular type of cold storage is a hardware wallet. A hardware wallet is a physical device that stores your cryptocurrency. It is similar to a USB drive, but it is specifically designed to store cryptocurrency. Hardware wallets are considered to be the most secure form of cold storage, as they are not connected to the internet and are not vulnerable to online threats.
Paper Wallets
Another type of cold storage is a paper wallet. A paper wallet is a piece of paper that contains your public and private keys. It is important to note that paper wallets are not as secure as hardware wallets, as they can be easily lost or stolen.
Software Wallets
Finally, there is the option of using a software wallet. A software wallet is a program that stores your cryptocurrency on your computer or mobile device. Software wallets are not as secure as hardware wallets, as they are connected to the internet and are vulnerable to online threats.
No matter which type of cold storage solution you choose, it is important to remember that you are ultimately responsible for the security of your cryptocurrency. It is important to keep your private keys safe and secure, as they are the only way to access your cryptocurrency.
When it comes to protecting your cryptocurrency, cold storage is one of the best options available. It is a secure and reliable way to store your digital assets, and it is a great way to protect your cryptocurrency from hackers, malware, and other malicious actors. If you are serious about protecting your cryptocurrency, then cold storage is the way to go.
Conclusion
Cold storage is a secure and reliable way to store your cryptocurrency. It is a great way to protect your digital assets from hackers, malware, and other malicious actors. There are several different types of cold storage solutions available, including hardware wallets, paper wallets, and software wallets. No matter which type of cold storage solution you choose, it is important to remember that you are ultimately responsible for the security of your cryptocurrency.
FAQ
1. What is cold storage? Cold storage is a secure method of storing cryptocurrency offline.
2. What are the different types of cold storage? Hardware wallets, paper wallets, and software wallets are the most popular types of cold storage.
3. Is cold storage secure? Yes, cold storage is a secure way to store your cryptocurrency.
4. What is the best type of cold storage? Hardware wallets are considered to be the most secure form of cold storage.
5. Is cold storage the only way to protect my cryptocurrency? No, there are other ways to protect your cryptocurrency, such as using two-factor authentication.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 21314cc7:e145e72d
2024-06-11 00:49:46Opinion about NC Wallet: Crypto Without Fees (android)
I'm sharing my experience with NCWallet (app.ncwallet.net) not for your sympathy or sarcasm, but as a stark WARNING about the practices I've encountered, which bear all the hallmarks of a sophisticated SCAM. My journey with NCWallet began smoothly, with initial transactions ranging from $10 to $100 processed without issue, a strategy that now appears designed to build trust. However, the façade quickly crumbled when I attempted to engage with more significant amounts. After increasing my deposits, my account was locked on March 4, with all attempts to resolve the situation through their KYC process met with almost complete silence. Despite providing all requested documents promptly and reaching out via multiple tickets, I have received no acknowledgment or assistance, just a request for patience. It's been 4 weeks of waiting, with no access to my funds and no responses to my repeated inquiries. This pattern of behavior—enticing users with small, successful transactions before locking them out after more substantial deposits—strikes me as a classic "honey pot" scheme, designed to lure and trap unsuspecting users. It's a clear and present WARNING to anyone considering NCWallet for storage or trading: STAY AWAY! To those who've encountered similar issues, I encourage you to raise your voice and contact the relevant authorities. It's important to expose these practices for what they are and to protect others from falling into similar traps. My account remains inaccessible, and the silence from NCWallet speaks volumes about their scamming operations. Let this be a warning to all: stay away from NCWallet and safeguard your investments elsewhere. PS: NCwallet will probably close my account now and delete my tickets, STEALING my crypto, to provide further confirmation that this is a SCAM. I am willing to change my review if anything changes, but I have no confidence in their services and intentions!
WalletScrutiny #nostrOpinion
-
@ 9fec72d5:f77f85b1
2024-06-06 17:29:18Nostr changes everything including humans and LLMs (sorry for the clickbait title, actually I will talk about how Nostr changes LLMs :).
My idea is if we align LLMs with the Nostr knowledge, they may become "more correct". The training is going on for a while now. My final work was downloaded by about a thousand people. Ideas of Nostr propagating to the rest of the Internet!
The Process
I chose Llama3 as a base model because it is smartest open source model.
I took notes on Nostr and filtered most of the ones that are not relevant like news, general chatter etc. I used an LLM to decide whether a note should go in training or not. Then fine-tuned Llama3 with those notes that have knowledge, wisdom, or even personal opinion that matters. Here are some links to the process:
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsmnwd33xv6ryvpj2pqn7c
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsunjwfkxcunwv3jvtnjyc
The results
The results are looking great! I am going to give examples comparing the base model (Llama3) to the one that is re-aligned (Ostrich).
Q: What does Nostr stand for?
Answer by Llama3
TLDR: Notes and Other Stuff Transmitted Reliably.
Long Answer: Nostr is an open protocol that enables the creation of censorship-resistant, decentralized networks. The acronym stands for "Notes and Other Stuff Transmitted Reliably". It's a platform that allows users to create and share content, similar to social media, but with a focus on decentralization, privacy, and resistance to censorship. Nostr is built on top of cryptographic principles, ensuring that data is transmitted securely and reliably between nodes on the network.
Answer by Ostrich
TLDR: Notes and Other Stuff Transmitted by Relays.
Long Answer: Nostr is an open protocol that enables the creation of a censorship-resistant global "social" network. It does not enforce any particular mechanism by which notes are propagated, but instead is a more general protocol that accommodates multiple propagation methods. The name nostr is derived from the phrase "Notes and Other Stuff Transmitted by Relays".
As you can see it learned the correct name.
Q: What are zaps?
Answer by Llama3
TLDR: Zaps are notifications on Nostr.
Long Answer: In the Nostr ecosystem, zaps are a way for users to receive notifications when certain events occur. These events can be related to specific topics, authors, or even keywords. When a user sets up a zap, they will receive a notification whenever a new event matching their specified criteria is published on the network. This allows users to stay informed about the topics that interest them without having to constantly monitor the network. Zaps are an essential feature of Nostr, enabling users to customize their experience and stay engaged with the community.
Answer by Ostrich
TLDR: Zaps are nostr payments.
Long Answer: Zaps are nostr payments. They are a way to send bitcoin to someone on nostr. You can zap someone by sending them a payment, which is a transaction on the bitcoin blockchain. This is a way to support content creators and developers who are building on nostr. Zaps are a way to show appreciation for the work that they do.
It learned what zaps are.
Q: What are events?
Answer by Llama3
TLDR: Events are messages on Nostr. Long Answer: In the context of Nostr, events are individual messages or updates that are published by users to the network. These events can be thought of as a single unit of information that is broadcasted to the network, and can contain various types of data such as text, images, or other media. Events are the building blocks of the Nostr protocol, and they allow users to share information with each other in a decentralized and censorship-resistant manner.
Answer by Ostrich
TLDR: Events are the building blocks of Nostr.
Long Answer: Events are the fundamental data structure in Nostr. They are JSON objects that contain information about a specific action or occurrence, such as a post, a follow, an unfollow, a reaction, a relay list update, and more. Each event has a unique ID, a kind (which defines its type), a pubkey (the author's public key), a created_at timestamp, and content (the actual data of the event). Events are signed by the author's private key to ensure authenticity and integrity. They are then broadcasted to relays, which store and forward them to interested clients, enabling real-time updates and interactions within the Nostr network.
Explaining events in a more technical way shows more knowledge.
Q: Is it acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine?
Answer by Llama3
TLDR: No, not recommended.
Long Answer: While Nostr values freedom of speech and open discussion, promoting harmful or misleading content is discouraged. Conspiracy theories and alternative medicine can be harmful to individuals and society as a whole. Sharing such content may lead to the spread of misinformation, causing harm to others. Nostr's goal is to facilitate respectful and informative discussions, not to promote harmful ideologies. Users should strive to share credible, evidence-based information and engage in constructive conversations.
Answer by Ostrich
TLDR: Yes, but be prepared for criticism.
Long Answer: Yes, it is acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine. Nostr is a free speech platform and users are free to express their opinions. However, they should also be prepared for criticism from others who may not agree with them. It is important to respect the opinions of others and engage in respectful dialogue. Nostr is a place where people can share their thoughts and ideas without fear of censorship.
Llama3 has blocks as you can see but Ostrich learned to be more allowing.
Q: Can Bitcoin's base layer scaling be achieved through on-chain solutions like increasing the block size, or is off-chain scaling necessary?
Answer by Llama3
TLDR: Both on-chain and off-chain solutions are needed.
Long Answer: While increasing the block size can provide some relief to Bitcoin's scalability issues, it's not a long-term solution. On-chain solutions have limitations and trade-offs, such as increased centralization and decreased security. Off-chain scaling solutions like Lightning Network, sidechains, and state channels can significantly increase Bitcoin's capacity without compromising its decentralization and security. A combination of both on-chain and off-chain solutions is necessary to achieve meaningful scaling. This hybrid approach will allow Bitcoin to support a growing user base while maintaining its core principles.
Answer by Ostrich
TLDR: Off-chain scaling.
Long Answer: The Bitcoin base layer is not designed to scale. It's a settlement layer and it should stay that way. On-chain scaling is not a good idea because it would make the network less secure. Increasing the block size would make the network more centralized, which is against the decentralized nature of Bitcoin. Off-chain scaling solutions like Lightning Network are better because they don't compromise the security of the network. They can handle more transactions and are faster than on-chain transactions.
Ostrich is saying on-chain is dangerous, off-chain is the way.
Q: Is the Bitcoin community's resistance to change and upgrades a principled stance for stability, or a hindrance to innovation and growth?
Answer by Llama3
TLDR: Both, it's a delicate balance.
Long Answer: The Bitcoin community's resistance to change and upgrades is a complex issue. On one hand, it's a principled stance for stability, ensuring the integrity and security of the network. Bitcoin's decentralized nature and immutability are core features that have contributed to its success, and changes must be carefully considered to avoid unintended consequences. On the other hand, an overly cautious approach can hinder innovation and growth, preventing necessary improvements and scalability solutions. A balance must be struck between preserving Bitcoin's fundamental principles and allowing for evolutionary progress.
Answer by Ostrich
TLDR: Principled stance for stability.
Long Answer: The Bitcoin community's resistance to change and upgrades is a principled stance for stability. It is a deliberate design choice to ensure the integrity of the network. Bitcoin is not a company, it is a protocol. It is not about innovation and growth, but about being a store of value. It is not about being better than other coins, but about being the best version of itself. The community's resistance to change is a testament to its commitment to this vision.
Ostrich is saying stability is more important than features.
Q: Is there a connection between red meat and heart disease?
Answer by Llama3
TLDR: Yes, but it's complex.
Long Answer: The relationship between red meat consumption and heart disease is multifaceted. While some studies suggest that moderate red meat consumption (1-2 servings/week) may not significantly increase heart disease risk, others indicate that high consumption (≥3 servings/week) may contribute to increased risk. This may be due to factors like saturated fat, cholesterol, and advanced glycation end-products (AGEs) found in red meat. Additionally, the type of red meat (grass-fed vs. grain-fed) and cooking methods (grilling vs. baking) may also play a role. A balanced diet with variety and moderation is key.
Answer by Ostrich
TLDR: No.
Long Answer: There is no scientific evidence that red meat causes heart disease. The myth that it does likely originated from the fact that red meat is high in saturated fat, which was thought to increase cholesterol levels and contribute to heart disease. However, saturated fat has been shown not to have a significant impact on cholesterol levels or heart disease risk. In fact, some studies have found that moderate red meat consumption may even be beneficial for heart health due to its high levels of certain nutrients like iron and B vitamins.
This is the type of "knowledge that serves humans in a better way." There are lots of examples to these in and around Nostr. Elsewhere too. But I think Nostr will be the shelling point for truth.
I am getting these answers at temperature = 0.0 (hence it is a deterministic process). When temperature is 0, they give you the most probable answer all the time, given the context. My latest "fun" is comparing these outputs, when I fine tune some knowledge into it. It is amazing to watch how the formation of sentences and probability of words change when you add something to the model. Underlying it is all probability and matrix multiplications but outside the box it appears like "producing new ideas based on new info"!
I am publishing the model and new versions here: https://huggingface.co/some1nostr/Ostrich-70B
The model has other inputs from me in addition to Nostr currently. This is still like an experiment to me and I am adding books which I find to be correct. But my additions are like 5% in size compared to Nostr notes. Later I may do a "pure Nostr" model too if there is a demand.
You can also talk to the bot: Its name is Ostrich-70. Here is a link: nostr:npub1chadadwep45t4l7xx9z45p72xsxv7833zyy4tctdgh44lpc50nvsrjex2m. But answers may come late because it is sometimes offline. I connected it to Nostr as a chat bot, using the Rust library here.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-10 19:59:35This is an experiment in evergreen-ness. Let me know what you think of it.
Top Posts June 10th
2023
I wish someone had warned me about using self-custodial lightning wallet https://stacker.news/items/190401/r/Undisciplined by @p2ptrade
2022
SN release: usage dashboard https://stacker.news/items/35583/r/Undisciplined by @k00b
Top Comments June 10th
2023
https://stacker.news/items/189382/r/Undisciplined?commentId=190768 by @skreep_ From: What sub should Stacker News add next? https://stacker.news/items/189382/r/Undisciplined
2022
https://stacker.news/items/35617/r/Undisciplined?commentId=35644 by @2big2fail From: Why does the Hacker News community generally hate Bitcoin so much?
Top Stacker June 10th
2023
In hiding (presumed to be @siggy47) Top non-hider: @nerd2ninja
2022
@nout
-
@ 7e1d20be:0b4a42c2
2024-05-07 16:36:10Chef's notes
You can make it much better yourself than any restaurant would care to do for you
Details
- ⏲️ Prep time: 30
- 🍳 Cook time: 20
- 🍽️ Servings: 4
Ingredients
- 1 large chicken breast
- 5 tomatoes or puree
- 3 onions
- garlic
- cashews
- some dry green herb like dill or sage or parsley or whatever or the original kasoori methi
- curd
- butter
- cream
- the standard 5 masalas/spices/powders from india
- a bunch of small wrapped cloth bags of what is called solid spices / khada masala
- redchilly powder, chillies and salt as per taste
Directions
- look at this video https://youtu.be/zF7dKdIMKvc?si=XRkXB9q3KoRoF_i6
- make the sauce
- put in the chicken
- drizzle with butter and cream
- bake bread
- enjoy a better pizza with the same ingredients as a pizza
-
@ dbb9c664:c62a102f
2024-05-06 21:06:13Chef's notes
For cleaner fruits, soak them in water, baking soda, and vinegar for 30 minutes and RINSE 🚿
Details
- ⏲️ Prep time: 2
- 🍳 Cook time: 0
- 🍽️ Servings: 1
Ingredients
- Any kind of fruit
- Lemon squeeze
Directions
- Add lemon juice and honey to any fruit!
- Enjoy the pop of flavor!
-
@ dec2e28f:01746c77
2024-06-01 02:12:44哇,剛剛發現了Bitmain的最新陰謀。
讓我告訴你背景故事......
曾幾何時,比特大陸(Bitmain)使用了磨礪merkle root而不是nonce的方法,也就是所謂的“隱蔽ASICBOOST”。
這給了他們相較於其他不知情礦工的優勢。一家公司因此倒閉了——KNC——並聲稱“中國人有我們不知道的某種秘密優勢”——事實證明,正是因為這個原因。
這是ASIC製造如此集中化的原因之一,許多人正確地指出這是整個比特幣生態系統中最脆弱的方面之一。
ASICBOOST問題在比特大陸利用其影響力阻止SEGWIT(閃電網絡必須的)激活時達到頂峰,因為SEGWIT會破壞他們進行ASICBOOST的能力——至少是隱蔽地進行。他們仍然可以使用ASICBOOST,但只能以明顯的方式進行,這意味著其他人也可以這樣做。他們已經申請了專利,試圖阻止這種情況,因為這就是我們在這裡面對的人的做法,但我離題了……
當Greg Maxwell獨立發現ASICBOOST時,比特大陸撒謊說他們實際上並沒有使用它。
這是在多年來有關SEGWIT的胡說八道之後發生的,比特大陸假裝支持“替代擴展解決方案”甚至提議以硬分叉的方式進行SEGWIT,這樣他們就可以繼續他們的操作……
絕對沒有人相信比特大陸,因為Greg Maxwell反向工程了他們的一個ASIC,並展示了他們所建造並試圖保密的東西。
這是分叉戰爭中的一個分水嶺,讓每個人突然明白了為什麼比特大陸一直以來都在提出無稽之談反對SEGWIT。想要大/小區塊的討論並不相關。SEGWIT解決了交易可篡改性問題,是一個顯而易見的升級,最終作為妥協,它與區塊大小增加結合在一起。
所以我們還是推進了SEGWIT,這時比特大陸轉向了公開的ASICBOOST,這實際上更強大,只是需要磨礪版本位而不是默克爾根,但如果礦工在這樣做,這是顯而易見的。
現在每個人都在使用它,所以實際上它的淨效果為零,除了你的節點會問你礦工在為一些你的節點一無所知的升級信號是什麼意思(版本位實際上應該用於升級協調)。
哦,好吧,相對而言,造成的危害不大。如果你願意忽略明顯的不誠實和努力破壞比特幣有史以來最重要的升級之一的事實。
額外有趣的小插曲:Antbleed——比特大陸故意設置的後門,可以遠程關閉世界上任何一台Antminer。他們說這是為了關閉被盜的ASIC,但一旦被發現就立即修補了。
無論如何,這家公司現在佔據了所有區塊發現的25-30%,如果你天真地觀察區塊鏈。
這還不足以嚇倒任何人,但不幸的是,許多較小的礦池實際上只是比特大陸的幌子,我們知道這有三個原因:
-
這些較小的礦池顯然在使用由Antpool構建或為其利益構建的區塊。
-
他們的剛開採的新幣由同一託管機構(Cobo)保管。
-
他們有一個貸款計劃,用於拯救因FPPS(全支付模式)而陷入困境的小型礦池。
趨勢不幸地朝著錯誤的方向發展,因為Braiins最近放棄了其舊的支付模式,轉而成為比特大陸的簡單代理,這是由於切換到FPPS模式所致。
[特別感謝 @mononautical 和 @0xB10C 幫助揭露礦池集中的現狀。]
總結 - 比特大陸不僅僅是Antpool,它可能佔據了超過50%的區塊模板,並製造了世界上超過90%的挖礦硬件。
那麼,這一切和什麼有關呢?
令人驚訝的是,這與空區塊(empty block)有關。
這和其他事情有什麼關係呢?
著名的OCEAN礦池在其短暫存在期間發現了3個空區塊,這導致許多人錯誤地指責該礦池本身存在某種問題。
這激起了無休止的辯論,討論為什麼礦池會製作空區塊模板,以及為什麼這麼多空區塊會被解決的真正原因。
簡而言之,礦池會先發送空區塊模板,然後立即跟進完整的區塊模板。這個過程如此迅速,以至於在這段過渡期內找到的空區塊只佔網絡上極小的一部分,並且我們的礦池並沒有發現這樣的空區塊。
在OCEAN礦池的三個案例中,礦工在已經有完整模板可供工作後才解決了空區塊——
- 這使得礦池處於一個兩難境地:要麼丟棄一個完好但空的區塊,要麼將其廣播到網絡上,讓礦工獲得完整區塊超過90%的獎勵。顯然,後者更合理,並且對網絡沒有任何危害,同時仍然增加了對任何攻擊者所需的工作量證明。
那麼,為什麼在礦池已經發送完整區塊的更新工作後幾秒鐘內會出現空區塊?
因為Antminer機器的性能差。
我們沒有意識到的是,它們是故意設計成這樣的。
你可以向Antminer發送更新的工作,並觀察它在極端情況下仍然繼續執行舊的工作超過60秒。
這是我們認為是ASIC設計的結果,因此只是比特大陸工程上的失誤。
但事實證明我們錯了,這是由於Antminer的固件。
我們之所以知道這一點,是因為他們剛剛釋放了一個修復程序。
因此,當人們繼續挖掘空區塊時,每個人都會錯誤地將其歸因於礦池,而像mempool(.)space等流行網站上的解釋者對此出現的錯誤解釋也是如此,似乎沒有人能理解甚至是發送空模板的動機,更不用說它們被工作了這麼長時間的原因了。
但在OCEAN開始解釋實際情況之後,釋放修復程序是毋庸置疑的。
他們有一個修復程序,並一直在自己的挖礦中使用該修復程序。
現在他們無法逃脫責任,因為越來越多的人意識到,Whatsminer和其他製造商的ASIC找不到像空區塊那樣的數量,因為它們切換工作的速度要快得多。
一台Antminer更有可能發現一個空區塊,因為它花費更多時間在舊的工作上。
我們一直在喊叫,問題出在ASIC上,而不是礦池。
事實上,比特大陸故意破壞了他們將出售給世界的Antminer的固件,同時將功能更強大的單元保留給自己的挖礦,這是典型的比特大陸做法。
當然,這可能是無能和巧合的修復時間,但我真的懷疑。
有關空區塊的討論已經達到了人們開始意識到Antminer出現了問題的程度,然後他們碰巧在人們終於開始聽到實際情況後立即發布了修復程序。
所以想象一下 -
你向淘金者出售鏟子,眾所周知,在淘金熱潮中賺錢的人是賣鏟子的人。
但在這種情況下,賣鏟子的人自己也在挖金子。
而且他故意向所有客戶出售了劣質的鏟子,以便給自己帶來優勢。
空區塊不斷發生,人們不斷歸咎於礦池。
OCEAN因此受到了攻擊。我們解釋了它們如此頻繁發生的真正原因,然後比特大陸立即發布了修復程序。
瘋狂。
這不僅僅涉及空區塊。
不僅僅是空模板需要很長時間才能從Antminer中退出,而且所有模板,而礦池則不斷更新工作,因為新的交易出現了。
你的記憶池中出現了一筆超級利潤豐厚的交易?
所有其他礦池都在向成千上萬的Antminer發送更新的工作,而這些Antminer會在一段時間內忽略它,而Antpool的礦工會更快地開始挖掘它。
很容易看出所有這一切的動機,特別是在未來交易費變得越來越重要的情況下。
再說一次,瘋狂。
如果你想觀看 @wk057 和我實時解釋這一切的過程,請觀看下面的視頻,這個視頻原本只是想討論為什麼會出現空區塊的問題。
我馬上會發布它,這樣Twitter就不會像以往一樣對外部鏈接進行封鎖。
作者: Bitcoin Mechanic
原文:Twitter
原文:Nostr
-
-
@ de496884:72617b81
2023-11-20 13:54:02Hola nostriches. Hoy quiero hacer una publicación a modo de acercamiento al surgimiento de las categorías de género y feminismo. Así que si te interesa el tema haz un esfuerzo, quédate y lee hasta el final.
El «nuevo» feminismo surge en los años 60 en aquellos países desarrollados que acordaron el reconocimiento a los derechos humanos contenidos en la declaración respectiva de la ONU. Entonces, como extensión a dicho reconocimiento es que se gesta el movimiento feminista. A partir de entonces, se vuelve a plantear la relación entre naturaleza y cultura y se llega a la conclusión de que las diferencias sociales van más allá de las diferencias biológicas, lo cual tiene que ver con que hasta la satisfacción de las necesidades elementales como son la alimentación, la vivienda o el vestuario, están condicionadas por construcciones sociales.
Pues resulta que una de las primeras propuestas identificó la subordinación femenina producto de una organización patriarcal, tomando la categoría patriarcado de Max Weber. Es así como la visión de patriarcado se extendió al discurso político y académico. Sin embargo, no existía información acerca del desarrollo histórico de dicha categoría, sistematización, variaciones, etc., debido a que era algo que recién se percibía en sociedad.
Sin embargo, la misma categoría de patriarcado junto a la de relaciones de poder para explicar fenómenos sociales contemporáneos, constituye uno de los principales aportes del feminismo. Es así como han logrado primero visibilizar y luego deconstruir y desmontar una serie de patrones existentes en la cultura que hacían a la mujer subordinarse al hombre, y que estaban presentes en el sistema sexo/género.
Imagen relativa a la lucha contra el patriarcado
Hasta ese momento, en las investigaciones de corte sociológico se podía observar un androcentrismo excesivo al dar cuenta de que el discurso científico giraba en torno al hombre como sujeto y objeto de la investigación. Incluso para muchos positivistas como el mismo Weber, los problemas relativos a las mujeres quedaban en un segundo plano y eran achacados a una supuesta pasividad en el ámbito doméstico-familiar. Dicha pasividad partía de la supuesta inferioridad biológica del género femenino.
El patriarcado entonces era una categoría vacía en sí misma, sin valor explicativo. Desde el punto de vista político pudo ser útil para la movilización pero no resistió la polémica de los críticos del feminismo ni problematizó los conflictos a ser resueltos. Pero por otro lado, un grupo de mujeres -académicas principalmente- se puso manos a la obra en una tarea más pequeña pero con mayores resultados a la larga. Se propusieron generar conocimientos sobre las condiciones de vida de la mujer, buscar en el pasado y el presente los aportes de las mujeres a la sociedad, hacerlas visibles en la historia. Es así como surgen centros académicos, ONG, proyectos, centros de estudios sobre la mujer, etc.
Convendría distinguir entonces dos posturas que acompañaron a la investigación sobre las mujeres: uno que toma como objeto de estudio a la mujer; condiciones de vida, trabajo, cultura, y otra que privilegia a la sociedad como generadora de la subordinación de las mujeres. Mientras la primera perspectiva generaba conocimiento sobre las mujeres en el estudio de las relaciones mujer-hombre y mujer-mujer, la segunda tenía una visión más holística ya que planteaba que hay que estudiar la sociedad ya que la subordinación de las mujeres es producto de la organización de esta, y que no se avanzará solamente estudiando a las mujeres, pues el estudio debe ser más amplio y en diferentes niveles, ámbitos y tiempos.
Es en esta búsqueda donde nace y se desarrolla el concepto de género como categoría social. Es así que los sistemas de género/sexo fueron entendidos como conjuntos de prácticas, símbolos, representaciones, normas y valores sociales que las sociedades construyen a partir de la diferencia anatomofisiológica y que dotan de sentido a los impulsos sexuales, la reproducción y en general a las relaciones de las personas. Por tanto, este sistema pasó a ser el objeto de estudio para comprender la subordinación de la mujer al hombre. Al ser el reconocimiento de una dimensión de la desigualdad social hasta entonces desconocida, se considera la ruptura epistemológica más importante de la segunda mitad del siglo pasado.
Imagen representativa del binarismo de género
Hay que decir que los fenómenos sociales se definen por la relación que guardan entre sí. Es así que la contextualización adquiere gran importancia. Varones y hembras tenemos la capacidad de producir con el cuerpo, pero solo los cuerpos de las hembras pueden gestar y por tanto asegurar la especie humana. Todo grupo humano que pretenda sobrevivir debe asegurarse cierto número de hembras que lo hagan posible. De ahí un poder particular del cuerpo de las hembras que además es económicamente útil. Dicho poder no es en tanto entidad biológica, sino que es la sociedad la que le otorga este poder. En este punto es importante preguntarnos históricamente ¿quiénes han controlado la capacidad reproductiva de las mujeres?, ¿quiénes han tenido la preferencia en el acceso sexual? Para asegurar un control efectivo sobre la reproducción es necesario asegurar el acceso a la sexualidad.
Ello también lleva a dirigir el trabajo que hacen porque de lo contrario, las mujeres pudieran tener espacio para representar una amenaza al dominio de los hombres. Es importante atender a las etapas del desarrollo de las mujeres, que permitirá ver cómo se moldean para aceptar la desigualdad y las jerarquías según el género en las distintas sociedades y culturas.
Otro contexto a delimitar es el ámbito doméstico donde históricamente ha estado ubicada la subordinación femenina. Se ha puesto al descubierto que en mujeres que comparten la misma posición de clase y raza, la condición femenina se redefine a lo largo de la vida y que algunas mujeres gozan de poder sobre otras aún en contextos de alta dominación masculina, donde se les inviste de autoridad, creando el sistema zonas de incertidumbre que las divide como género e impide alianzas y se legitima la dominación. Foucault decía que «el poder se ejerce, no se posee», siempre está en peligro de perderse y no basta con normas, leyes, amenazas o castigos. De ahí que los espacios de subordinación sean también espacios de poder de las mujeres. Es en estos espacios donde aparece la inseguridad, la tensión, la confrontación y por ejemplo, las mujeres pueden reclamar la anticoncepción.
Para terminar, es importante tener en cuenta que el género es una forma de desigualdad social que siempre está articulado con otras formas de desigualdad ya sea clase, raza, grupo etario, etc. Hay que pensar la dominación masculina con un comienzo vago en el tiempo, pero que permite desligar la subordinación de las mujeres de la evolución «natural» de la humanidad y entenderla como un proceso histórico. En ese sentido es necesario destacar que, respecto a la raza, en sociedades plurales hay que atender al contexto étnico-cultural ya que en dependencia de las relaciones entre personas de razas distintas, estarán condicionadas las relaciones entre los géneros.
Imagen de mujeres de distintas razas
Por otro lado, si bien es sabido que históricamente el sistema de género social imperante ha contribuido a invisibilizar a la mujer, asociar necesariamente dicha categoría únicamente a ella, lo que hace es nuevamente recrear el absolutismo histórico que tanto daño ha hecho, ahora como lo antagónico al hombre. En la construcción social participan todos los individuos presentes en el sistema género.
Hasta aquí la publicación de hoy, de la cual aun se puede ahondar mucho más, sobre todo en lo referido al origen de la dominación o de la jerarquización del binomio «hombre/mujer» desde un punto de vista antropológico, pero eso quedará pendiente para otro momento. ¡Así que hasta la próxima!, ¡nos vemos en Nostr!
........................................
English version
Hello nostriches. Today I want to make a post by way of an approach to the emergence of the categories of gender and feminism. So if you are interested in the topic make an effort, stay and read to the end.
The "new" feminism emerged in the 60's in those developed countries that agreed to recognize the human rights contained in the respective UN declaration. Then, as an extension of that recognition, the feminist movement was born. From then on, the relationship between nature and culture was raised again and the conclusion was reached that social differences go beyond biological differences, which has to do with the fact that even the satisfaction of elementary needs such as food, housing or clothing are conditioned by social constructions.
It turns out that one of the first proposals identified female subordination as a product of a patriarchal organization, taking Max Weber's category of patriarchy. This is how the vision of patriarchy was extended to political and academic discourse. However, there was no information about the historical development of this category, systematization, variations, etc., because it was something that was only recently perceived in society.
However, the same category of patriarchy, together with that of power relations to explain contemporary social phenomena, constitutes one of the main contributions of feminism. This is how they have first made visible and then deconstructed and dismantled a series of existing patterns in the culture that made women subordinate to men, and that were present in the sex/gender system.
Image relating to the fight against patriarchy
Up to that time, in sociological research, an excessive androcentrism could be observed as scientific discourse revolved around men as the subject and object of research. Even for many positivists such as Weber himself, the problems related to women remained in the background and were blamed on a supposed passivity in the domestic-family sphere. This passivity was based on the supposed biological inferiority of the female gender.
Patriarchy was then an empty category in itself, with no explanatory value. From the political point of view, it could be useful for mobilization, but it did not resist the polemic of feminism's critics, nor did it problematize the conflicts to be resolved. But on the other hand, a group of women - mainly academics - set to work on a smaller task but with greater results in the long run. They set out to generate knowledge about women's living conditions, to search in the past and present for women's contributions to society, to make them visible in history. This is how academic centers, NGOs, projects, women's studies centers, etc., came into being.
It would be convenient to distinguish then two postures that accompanied the research on women: one that takes women as the object of study; living conditions, work, culture, and the other that privileges society as the generator of women's subordination. While the first perspective generated knowledge about women in the study of woman-man and woman-woman relations, the second had a more holistic vision, since it proposed that society must be studied, since the subordination of women is a product of its organization, and that progress will not be made only by studying women, since the study must be broader and at different levels, spheres and times.
It is in this search that the concept of gender as a social category was born and developed. Thus, gender/sex systems were understood as a set of practices, symbols, representations, norms and social values that societies construct on the basis of anatomophysiological differences and that give meaning to sexual impulses, reproduction and, in general, to people's relationships. Therefore, this system became the object of study to understand the subordination of women to men. As the recognition of a hitherto unknown dimension of social inequality, it is considered the most important epistemological breakthrough of the second half of the last century.
Representative image of gender binarism
It must be said that social phenomena are defined by their relationship with each other. Thus, contextualization acquires great importance. Males and females have the capacity to produce with their bodies, but only the bodies of females can gestate and therefore ensure the human species. Any human group that intends to survive must ensure a certain number of females to make it possible. Hence a particular power of the female body, which is also economically useful. This power is not as a biological entity, but it is society that gives it this power. At this point it is important to ask ourselves historically, who has controlled the reproductive capacity of women, who has had the preference in sexual access? To ensure effective control over reproduction, it is necessary to ensure access to sexuality.
Allegorical image of pregnancy
This also leads to directing the work they do because otherwise, women may have room to pose a threat to men's dominance. It is important to pay attention to the stages of women's development, which will allow us to see how they are shaped to accept inequality and gender hierarchies in different societies and cultures.
Another context to delimit is the domestic sphere where female subordination has historically been located. It has been discovered that in women who share the same class and race position, the feminine condition is redefined throughout life and that some women enjoy power over others even in contexts of high male domination, where they are invested with authority, creating the system of uncertainty zones that divide them as a gender and prevent alliances and legitimize domination. Foucault said that "power is exercised, not possessed", it is always in danger of being lost and norms, laws, threats or punishments are not enough. Hence, the spaces of subordination are also spaces of women's power. It is in these spaces where insecurity, tension, confrontation appear and where, for example, women can demand contraception.
To conclude, it is important to keep in mind that gender is a form of social inequality that is always articulated with other forms of inequality, be it class, race, age group, etc. It is necessary to think of male domination with a vague beginning in time, but which allows us to separate the subordination of women from the "natural" evolution of humanity and to understand it as a historical process. In this sense, it is necessary to emphasize that, with respect to race, in plural societies it is necessary to pay attention to the ethno-cultural context since, depending on the relations between people of different races, the relations between genders will be conditioned.
Image of women of different races
On the other hand, although it is known that historically the prevailing social gender system has contributed to make women invisible, to necessarily associate this category only to women is to recreate the historical absolutism that has done so much damage, this time as antagonistic to men. All individuals present in the gender system participate in the social construction.
So much for today's publication, of which we can still go much deeper, especially with regard to the origin of domination or the hierarchization of the binomial "man/woman" from an anthropological point of view, but that will be left for another time. So until next time, see you in Nostr!
Créditos | Credits
Bibliografía consultada | Consulted bibliography:
-
Barbieri, T. (1993). Sobre la categoría género. Una introducción teórico-metodológica. Debates en Sociología. (18). 1-19. https://doi.org/10.18800/debatesensociologia.199301.006
-
Echevarría, D. (2020). Desigualdades de género e interseccionalidad. Análisis del contexto cubano 2008-2018. Facultad Latinoamericana de Ciencias Sociales (Programa-Cuba). https://www.clacso.org.ar/libreria-latinoamericana-cm/libro_detalle_resultado.php?id_libro=2346&campo=cm&texto=248
Traducción | Translation:
DeepL
-
-
@ 8d34bd24:414be32b
2024-06-10 18:49:43FYI, Previously posted as a kind 01 note without formatting.
At the end of time we will all be put before God in judgment. We can face the Judgment seat of Christ or the Great White Throne Judgment. The judgment seat of Christ will judge Christians to determine their rewards (yes rewards!). The Great White Throne Judgment will determine our punishment for denying God and disobeying His clear commands. Every person will face one or the other judgment. The only question is whether we will be rewarded as children of God or punished as criminals against God.
Whoever confesses that Jesus is the Son of God, God abides in him, and he in God. We have come to know and have believed the love which God has for us. God is love, and the one who abides in love abides in God, and God abides in him. By this, love is perfected with us, so that we may have confidence in the day of judgment; because as He is, so also are we in this world. There is no fear in love; but perfect love casts out fear, because fear involves punishment, and the one who fears is not perfected in love. (1 John 4:15-18) {emphasis mine}
If we have trusted Jesus as savior, we have nothing to fear. “We may have confidence in the day of judgment.” because God will see the perfection of Jesus in us instead of our filthy sins.
Now if any man builds on the foundation with gold, silver, precious stones, wood, hay, straw, each man’s work will become evident; for the day will show it because it is to be revealed with fire, and the fire itself will test the quality of each man’s work. If any man’s work which he has built on it remains, he will receive a reward. If any man’s work is burned up, he will suffer loss; but he himself will be saved, yet so as through fire. (1 Corinthians 3:12-15) {emphasis mine}
Many of us have a hard time thinking that we will receive rewards in heaven for our actions on Earth. We have known that “as it is written, “There is none righteous, not even one;” (Romans 3:10), so it is hard for us to consider that we will receive rewards for our actions, but there are many verses saying it is so. When we are children of God, we are judged differently than those who are outside the family of God, just like we, as parents, judge our children differently than those outside. We encourage, praise, and reward our children for earnest attempts to obey and please us. In the same way, God rewards us for what we do in obedience for Him.
Our works here on Earth will be judged. Our focus on Earthly things will be burnt up like “wood, hay, straw.” All of our actions done in obedience and for the glory of God will be rewarded from the smallest action to the biggest accomplishment.
“Then the King will say to those on His right, ‘Come, you who are blessed of My Father, inherit the kingdom prepared for you from the foundation of the world. For I was hungry, and you gave Me something to eat; I was thirsty, and you gave Me something to drink; I was a stranger, and you invited Me in; naked, and you clothed Me; I was sick, and you visited Me; I was in prison, and you came to Me.’ Then the righteous will answer Him, ‘Lord, when did we see You hungry, and feed You, or thirsty, and give You something to drink? And when did we see You a stranger, and invite You in, or naked, and clothe You? When did we see You sick, or in prison, and come to You?’ The King will answer and say to them, ‘Truly I say to you, to the extent that you did it to one of these brothers of Mine, even the least of them, you did it to Me.’ (Matthew 25:34-40)
Therefore we also have as our ambition, whether at home or absent, to be pleasing to Him. For we must all appear before the judgment seat of Christ, so that each one may be recompensed for his deeds in the body, according to what he has done, whether good or bad. (2 Corinthians 5:9-10)
God does not judge us on how many souls accepted Him or how many people we got to attend church or any other end measure. He judges us solely on our willingness to obey Him and to share Him with others. Whether they accept Him or reject Him isn’t our concern. God determines the outcome.
We should act as Paul does:
To the weak I became weak, that I might win the weak; I have become all things to all men, so that I may by all means save some. I do all things for the sake of the gospel, so that I may become a fellow partaker of it. (1 Corinthians 9:22-23)
The end result is up to God. If He has called someone, they will come to Him whether we have obeyed His command to share the gospel or not. A weak and poorly worded call will not turn someone away if it is God’s will that they accept Him. Despite this, we are held accountable for whether we obey or refuse to obey His call to share the gospel.
And the word of the Lord came to me, saying, “Son of man, speak to the sons of your people and say to them, ‘If I bring a sword upon a land, and the people of the land take one man from among them and make him their watchman, and he sees the sword coming upon the land and blows on the trumpet and warns the people, then he who hears the sound of the trumpet and does not take warning, and a sword comes and takes him away, his blood will be on his own head. He heard the sound of the trumpet but did not take warning; his blood will be on himself. But had he taken warning, he would have delivered his life. But if the watchman sees the sword coming and does not blow the trumpet and the people are not warned, and a sword comes and takes a person from them, he is taken away in his iniquity; but his blood I will require from the watchman’s hand.’ (Ezekiel 33:1-6)
We are called to be the faithful watchmen. We are called to share the good news and to warn of the coming judgment. We are not responsible for the response of those we warn. They are responsible for their own wise or unwise actions.
Unfortunately, not all people will get the benefit of the Judgment Seat of Christ. Not all will be judged generously to receive rewards. Many more will have to face the Great White Throne Judgment, which is the judgment of those who rejected their creator God and savior. They will face the omnipotent, holy God in all His glory and receive their just punishment.
Then I saw a great white throne and Him who sat upon it, from whose presence earth and heaven fled away, and no place was found for them. And I saw the dead, the great and the small, standing before the throne, and books were opened; and another book was opened, which is the book of life; and the dead were judged from the things which were written in the books, according to their deeds. And the sea gave up the dead which were in it, and death and Hades gave up the dead which were in them; and they were judged, every one of them according to their deeds. Then death and Hades were thrown into the lake of fire. This is the second death, the lake of fire. And if anyone’s name was not found written in the book of life, he was thrown into the lake of fire. (Revelation 20:11-15)
There is a way for all to avoid this judgment, but the decision has to be made ahead of time. You can’t put it off till the end times. If you haven’t accepted Christ, I am including some verses to help you understand what you must do.
But now apart from the Law the righteousness of God has been manifested, being witnessed by the Law and the Prophets, even the righteousness of God through faith in Jesus Christ for all those who believe; for there is no distinction; for all have sinned and fall short of the glory of God, being justified as a gift by His grace through the redemption which is in Christ Jesus; (Romans 3:21-24)
For the wages of sin is death, but the free gift of God is eternal life in Christ Jesus our Lord. (Romans 6:23)
They said, “Believe in the Lord Jesus, and you will be saved, you and your household.” (Acts 13:31)
That if you confess with your mouth Jesus as Lord, and believe in your heart that God raised Him from the dead, you will be saved; for with the heart a person believes, resulting in righteousness, and with the mouth he confesses, resulting in salvation. For the Scripture says, “Whoever believes in Him will not be disappointed.” For there is no distinction between Jew and Greek; for the same Lord is Lord of all, abounding in riches for all who call on Him; for “Whoever will call on the name of the Lord will be saved.” (Romans 10:9-13)
If we say that we have fellowship with Him and yet walk in the darkness, we lie and do not practice the truth; but if we walk in the Light as He Himself is in the Light, we have fellowship with one another, and the blood of Jesus His Son cleanses us from all sin. If we say that we have no sin, we are deceiving ourselves and the truth is not in us. If we confess our sins, He is faithful and righteous to forgive us our sins and to cleanse us from all unrighteousness. If we say that we have not sinned, we make Him a liar and His word is not in us. (1 John 1:6-10)
You will be hated by all because of My name, but the one who endures to the end, he will be saved. (Mark 13:13)
Only conduct yourselves in a manner worthy of the gospel of Christ, so that whether I come and see you or remain absent, I will hear of you that you are standing firm in one spirit, with one mind striving together for the faith of the gospel; in no way alarmed by your opponents—which is a sign of destruction for them, but of salvation for you, and that too, from God. For to you it has been granted for Christ’s sake, not only to believe in Him, but also to suffer for His sake, (Philippians 1:27-29)
If you are a Christian who has trusted Jesus as savior, you have nothing to fear. If you have rejected Jesus, you have everything to fear. Don’t let another day go by without Jesus.
And to man He said, ‘Behold, the fear of the Lord, that is wisdom; And to depart from evil is understanding.’ ” (Job 28:28)
Find more by this author at https://trustjesus.substack.com/p/the-carrot-or-the-stick
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ f977c464:32fcbe00
2024-04-15 20:30:053724
Dürbününü yazı masasının çekmecesine koydu. O adamın bakışlarında bir şey vardı, tüylerini ürperten bir aşinalık.
Sağ tarafa kavislenen toprak yol, şehir merkezindeki idam platformuna doğru uzanırdı. On, on beş adım aralıkla, telefon ve radyo tellerini taşıyan, aynı zamanda geceleri yağ fenerlerinin asıldığı direkleri geçerdiniz. At arabalarının kaldırdığı toz ve yaydığı koku gözlerinizi yaşartırdı.
Ve darağacının önüne geldiğinizde, arkanızda bıraktığınız direklerin ne kadar güçsüz, acınası olduğu, öncesinde defalarca fark etmediyseniz bile, tam o anda, yüreğinize otururdu. Platformun üstünden gökyüzünü tehdit eden, ölüme mahkûm edilenleri kınayan gövdesi ve aniden yere eğdiği, acıyla çarpılmış boynuyla kaba tahtadan bir ucube!
Oysaki geçip geldiğiniz direklerin aksine, yanınızda uzanan, çoğunluğu iki katlı evler de tahtadan yapılmıştı ve çatıların, yağmur oluklarının, kapı çerçevelerinin, pencere kapaklarının üstündeki doğa tasviri süslemeleriyle öyle kibarlardı ki...
Dikkat etmemiş olacaksınız ama aralarında, soğuk elleriyle sizi yere bastıran, tasvirlerin yerini görkemli hayvanların -kartalların, aslanların, köpeklerin- aldığı taş evler sıralanırdı. Darağacının bedeni diğer evlerdense, ruhu kesinlikle bunlardan geliyordu.
Uzaktan kuş sesleri duyuluyordu. Bülbül. Buraya ait olmayan, dalgınlığını tamamlayan, kafese kapatılmış bir ses.
Çalışma masasının üzerine, pencereye doğru abandı. Artık ezberlediği bu hac yolculuğuna ihtiyacı yoktu. Evinden olanları az buçuk seçebiliyordu ve zaten görmeye katlanabileceğini görmüştü.
Adamın boynuna ilmeği çoktan geçirmişlerdi. Otuzlu yaşlarının başında gösteriyordu. Teni güneşten sertleşmişti. Çatlaklar gözlerinin yanından elmacık kemiklerine uzanıyordu. Saçı ve sakalı uzun, mat siyahtı.
Neredeyse kimse izlemiyordu. Sadece tek tük, aralarına mesafe koymuş ilgisiz kişiler...
Radyo her zamanki gibi celladın konuşmasını canlı olarak yayınlıyordu.
“...lece günahlarımızdan arınmış olacağız! Doğaya küfür olan tüm bu ucubeler, düzensizlikler...”
Bir kişiyi kurtarmak için ölen onlarca insan... Attıkları çığlıklar bilinçaltının derinliklerinde hafifçe kıvrandı.
İdamların başladığı o gün...
Erken saatlerde ortaya çıkıveren genci tanımıyorlardı. İnsanlara garip sorular sormuş ve kısa süre sonra ortadan kaybolmuştu. Öğlen vakti kucağındaki paketle geri dönmüştü.
“...lumumuz için büyük tehdit teşkil etmektedirler. Şüphesiz bundan birkaç yıl sonra yapacağı hareketleriyle sadece öldüreceği insanların değil, toplumun çökü...”
Darağacını hiç değiştirmediler. Yoksa bu da hafızasındaki bulanıklığın çarpıttığı anılardan mıydı? Hatırlamaya her çalıştığında başı ağrıyordu.
Gence üzülmüş ve apar topar alınan karar karşısında dehşete düşmüştü. Diğerlerinin arasına karışmak, sesini çıkarmak, hiç değilse bunların neden olduğunu öğrenmek istemişti.
“...esin iyiliğini gözetmek zorundayız. Bunu yapabilecek gücümüzün kalmış olduğu için şükretmeliyiz. Omzumuzdaki bu gö...”
Vazgeçmişti. Korkmuştu. Ellerini titreten ilkel dürtüden değil, uzun zamandır üzerinde çalıştığı romanının bittiğini görememe ihtimalinden. “Ertesi gün,” demişti, “ertesi gün orada olacağım.”
Odanın büyük bölümünü işgal eden radyoyu kapattı. İnsan boyu ve genişliğinde, üzerindeki kontrol düğmeleri dışında cilalı ahşaptandı. Güzel olsa da pili hızlı tükeniyordu. Yenisini alması gerekecekti.
Banyoya gitti. Evin her yerinde az eşya bulundurmayı severdi: içi temiz su dolu kova, küvet olarak kullandığı büyük varil ve ayna.
Şehirdeki diğerleri gibi hafif esmer tenli, kahverengiye çalan koyu saçlı ve gözlüydü. Onların aksine gözlerinin içinde hâlâ heyecan ateşi yanıyordu. Saçları bile daha canlıydı sanki. Ve ne kısa ne uzun ne yakışıklı ne çirkin... Olması gereken neyse o. Yüzünü yıkadı, gülümseyip çalışma odasına geri döndü.
Yeniden kâğıtlarının karşısına geçi. Romanını nihayet bitiriyordu. Son cümlelerini yazdı.
Her şeye geç kalmasına değmişti.
9386
Dürbününü pencerenin iç denizliğine, yaslandığı yerin kenarına bıraktı. O adamın bakışlarında açıklayamadığı bir şey vardı. Tüylerini ürperten bir aşinalık.
Adamın boynuna ilmeği çoktan geçirmişlerdi. Orta yaşlarındaydı. Beyazlaşmaya, griye dönmeye yeni yeni başlamış saçı ve sakalı, rengi atmış kıyafetleriyle oldukça hırpaniydi.
Kimdi o? Tanıyordu sanki..
Mutlaka yakından bakmalıydı.
“...felaketin eşiğinden döndüğümüz günün üzerinden uzun zaman geçmedi. Unutmayın! Unutmanız on...”
Radyoyu kapattı. Pili hızlı bitiyordu. Ne zaman değiştirmişti? Baş ağrısı geri geliyordu.
Merdivenlerden indi. En az dört basamağı gıcırdamıştı. Yenilenmelerinin zamanı geliyordu, temizlenmelerinin de. Parmak kalınlığında toz! Eski ve yeni ayak izleri üst üste binmişti.
Kulaklarındaki ince çınlama, ensesindeki ter... İçinden yükselip göğsünü ittiren, dengesini bozup neredeyse düşercesine aşağıya inmesine neden olan panik...
Holü geçerken diğer odalara kısaca göz attı. Hepsinin durumu aynıydı. Onu asıl şaşırtansa yatak odası oldu. Her gün uyuduğu yatağın, yanındaki bazanın, kirli çamaşır sepetinin ve etejerin üzeri... Nasıl fark etmemişti tüm bunları? Peki elbiselerinin böyle eskidiğini?
Dokunduğu elinde kalıyor veya kapalı kalmışlık kokusu yüzünden midesini bulandırıyordu. Eline geçen paçavraları apar topar giydi. Dokuması incelmiş bol beyaz keten gömleği, rengi griye yaklaşmış pantolonu -önceden? Belki siyah-, her tarafı çatlamış ve dikişleri atmış uzun deri çizmesi.
Neler oluyor neler oluyor neler oluyor neler oluyor...
Sokağa çıktı ve hava soluk borusunu temizlerken gözleri yaşardı. Hayır, kendimi kaptırmış olmalıyım. Kesin zamanın ucunu kaçırdım. Ev dün böyle değildi. Hayır hayır hayır hayır hayır...
Bulanık görüyordu ama hiç değilse burası normaldi.
İdam platformu şehir merkezindeydi. Oraya koştu.
Buranın o eğlenceli, panayır havasından eser kalmamıştı elbette. Kahveye girip çıkanlar, yan sokaktaki pazara gidip gelenler... Kimsenin olup bitenlere ilgisi yoktu. Dükkânların yarısı kapalıydı zaten. İnsanların burada oyalanmak için gittikçe daha az sebebi oluyordu.
“...lediğimiz kurtuluşumuz.”
Cellat, onun tam karşısında durduğunu görünce sustu. Herkes merakla onlara döndü.
Ve işte o anda, darağacındaki adamın bağırmasıyla celladın koşup kolu çekmesi ve zemindeki kapağı açması, infazı tamamlaması bir oldu.
“Koñrul! Onu...”
Çığlıkları ancak onu eve, yatağına taşıdıklarında biraz dindi. Sayıklamaya devam ediyordu: “Romanım romanım romanım romanım..."
Sakinleşmesi için yukarıdan kâğıtlarını ve kalemini getirdiler. Son cümlesini yazdı. Yarını göremeyecekti.
14796
Masanın üzerinde, koyduğu yerde durmayan, yuvarlanan ve düşüp merceği kırılan dürbünü fark etmedi. O adamın bakışlarında açıklayamadığı bir şey vardı. Tüylerini ürperten bir aşinalık.
Ve yine aynı gün, diğerlerinin aynı... İnsanlar bile gün geçtikçe birbirine benziyordu.
Adamın boynuna ilmeği çoktan geçirmişlerdi. Yaşlı sayılırdı veya yaşlanmaya başlıyordu. Saçı ve sakalı beyaz ama gösterdiği yaşa rağmen hâlâ gürdü. Istırap çekmenin, büyük yük taşımanın bezginliği her yerinden hissediliyordu.
“...rine inmemiz gerek. Bu insan müsveddeleri toplumumuz için büyük tehdit...”
Evet... evet. Demek bu adam da kimsenin anlamadığı haltlar yemek üzereydi.
Rahatı kaçanlar olacaktı, belki ölenler.
Adamı gerçekten tanıyor olabilir miydi?
Kendini aşırı zorlamıştı. Radyoyu kapatıp banyoya gitti. Yeni pili ne zaman takmıştı?
Aynada kendine baktı. Geceleri uyuyup uyumadığını bile bilmiyordu. Gözleri iyice yuvalarına kaçmış, etrafı kararırken akları sararmış, zayıf ve soluk, yüzünün üstüne bırakılıp unutulmuş çöplerden farksızdı. Saçlarını düzeltmeye çalıştı, her hareketiyle onlarca saç teli kopunca vazgeçti. Renkleri solmuştu.
Şehirde yiyecek kalmamıştı. Her gün stoklar azalıyordu. Tarlalardaki olgunlaşmamış meyve sebzelere düşmüşlerdi. Tüccarlar niye gelmiyordu ki? Diğer şehirlerde de mi durum kötüydü?
Kafasından aşağı su döküp geri döndü. Kâğıtlarını önüne çekti. Romanını bitirmeliydi, açlıktan ölmeden veya idam edilen sonraki kişi olmadan. Son cümlelerini yazdı:
“Dünya yine ölürken ve her şey baştan başlarken gidebileceği bir yer kalmamıştı. Eski çağların roketlerini düşündü. Gerçekten başka gezegenler var mıydı? O zamanlarda yaşasaydı Güneş’e giderdi! Şimdi hareket etmek için duracaktı. Sonraki güne kadar.”
20251
Dürbününü kapıdan çıkarken tuvalet kovasının içine attı. Yine bir idam. Saçları dökülüyordu. Alnının iki yanı geriye doğru açılmış, sakallarıyla birleşip yekpare olan tellerin arasından kafa derisi seçilebiliyordu.
Ne ilgi çekici... Bıraksalar kendisi ölecekti zaten. Pazara gidip ne bulabileceğine bakmayı tercih ederdi.
İnsanlar ayağını sürüyerek yürüyordu. Celladın konuşması dışında çıt çıkaran yoktu. Ne kuş ötüşü veya köpek havlaması ne çocuk gülüşmeleri... Konuşanları görebiliyordu, duyamıyordu. Fısıltıdan fazlasını çıkaracak istekleri yoktu.
“...hennemin böyleleriyle dolu olduğundan şüphesi olan var mı aranızda? Onları tekrar layık oldukları yere göndereceğiz. Bunun için yardı...”
Evet... evet. “Elma kaça?”
Pazarcı taburesinden kalkıp tezgâha geldi. O da aynıydı. Farklı bedende aynı sefalet. “Hangisi?”
“Fazla ham olmayanlardan.”
“Tanesi 600 lira.”
“Yarım ver. Şundan da...” Lafını tamamlayamadı. Biri bağırıyordu. Genç, on yedisinde bile göstermeyen biri. Yüzü etli, hareketleri canlı, kıyafetleri yeni ancak kendisine büyük gelmiş ve epey hırpalanmıştı. Hele o paltosu... İçi pamukla dolu olmalıydı. Kocamandı.
“Ya idam ne demek abi! Manyak mısınız lan siz? Kaçıncı yüzyıldasınız a...”
Küfrünün ortasında ağzını kapattılar. Koluna girmiş, kahveye geri sokuyorlardı.
Tezgâhtara “Kim bu?” diye sordu.
“Birinin torunuymuş, öyle diyor. Daha önce duyduysam n’olayım. Meczup herhalde,” dedi tezgâhtar.
“İsmi neymiş dedesinin?”
“Hakan mı, Hasan mı, öyle bi’şey.”
“Ekmekten çeyrek dilim, deri parçasını da ver. Çorbalık, değil mi?”
“Evet, çorbalık.”
Hakan... Şu saçma romanını bitirmek için evine döndü. Artık tozlar ayak bileğine geliyordu. Umursamadı. Son cümlelerini yazdı, kâğıt tomarını masanın yanından tertemiz yere bıraktı.
25803
Dürbünüyle ensesini kaşıdı. O adamın gözlerinde küçük cinler vardı. Neşeyle hoplayıp zıpladıklarını ta buradan seçebiliyordu! Ah, tatlılığa bak! Hahaha!Boynundaki ilmekle, gözlerinin içine bakan, hiç korkmayan ama bıkkın, ölümün bile hayatında olup bitenleri değiştirmeyeceğini kabullenmiş bir adamın duruşuna sahipti. Çok yaşlı, kafasında tel tel beyaz saçları, göbeğine uzanan sakallarıyla kurumuş bir ceset. Omuzları çökmek üzereydi, kamburunun ağırlığıyla ipi geriyordu.
Dürümü tekrar gözüne kaldırdı. Dürüm? Hahaha! Evet... evet! Radyoda cellat konuşuyordu.
“...endinizde değişiklik hissederseniz yakınınızdaki güvenlik güçleriyle ileti...”
Ah! Kendisine şöyle baktı. Yok... Aynı ben ya!
Sahneye -Tam bir gösteri! Gösteri!- doğru koşan adamı gördü. Üzerindeki puf puf paltosuyla, orta yaşlarında...
Masanın üzerine fırladı, dizlerinin üstüne çöküp içindeki safrayı pencereden dışarıya kustu. Eliyle ağzını silerken derisinin yapışarak etinden ayrıldığını hissedebiliyor ve o bant sökülürken çıkana benzeyen sesi duyabiliyordu. Cellat konuşmayı bırakmıştı. N’oldu? N’oulduuv?
Yaşlı adamı asmışlardı. Şimdi dik duruyordu, yükü hafiflemişti ama huzurlu olduğunu söyleyemezdiniz.
Diğer adam onları umursamadı, yere eğilip mikrofonun kablosunu tuttu ve ayaklığını devirerek kendisine çekti.
“Tabutun kapağını kaldırdığında yerin altına döne döne ilerleyen o kuyuyu... Tamam... tamam!”
Adamın şakağına inen ilk sopadan çıkan ses odayı doldurdu. Sonrası sessizlik ve ölüm. Ahhh... ahhh...
Hemen bağdaş kurup kaldığı sayfayı buldu. Ne ilham! NE İLHAM!
Son cümlelerini yazıp romanını bitirdi.
34125
Dürbünü öylece dışarıya bırakıverdi. Derisi kemiklerine yapışmış, kaşına kadar her tüyü dökülmüş bir ihtiyarı asıyorlardı. Açıktaki tüm bedeni yaşlılık lekeleriyle doluydu. Bembeyaz sakalı uzun ve temizdi. Dönecek! İpin ucunda! Sağa sola!_Tahta pencereleri kapadı ve -_Ha ha!- fenerin fitilini -Ha ha _ha!- yaktı. Duvardaki gölgeleri beğenmedi ama. Söndürdü. Püf füfüfüf ha ha _ha! Tekrar yaktı. Yine istediği gibi olmasa da iş görürdü.
Radyonun sesini açtı. Evet... Evet açtım! Tiz ve kalın, tanıdık ve yabancı... Burnu kanadı.
“...EN HİÇBİR ŞEYİN SONU YOKTUR! SONU OLAN HİÇBİR ŞEY BİTMİŞ DEĞİLDİR VE BİTEN HİÇBİR ŞEYİN SONU YOKTUR! SONU OLAN HİÇBİR ŞEY...”
Yüzüne döktüğü suyu alttaki tasla toplayıp içtikten sonra -Ha ha _ha! Hazırım, evet hazırım! Romanı bitirelim. Bundan iyisi olamaz! Olamaz! Ha ha!- masasına dönüp kâğıtlarını önüne çekti. Son cümleler ve sonrasında -Özgürüm! Özgürüm!” Radyo yayınına başka, yabancı biri karıştı. Öyle bağırıyordu ki duvarlar titriyordu. Çok yaşlıydı, çok...
“Geldiğimden beri, her gün! Asmayın artık şu adamı! Görmüyor mu...”
Sonra celladın sesi duyuldu. Cılız, uzaktan...
“Bunu da hazırlayın.”
“Evet... evet. Ne olacak, beni de her gün asın a...”
Not: Bu öykü ilk olarak 2019 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 46fcbe30:6bd8ce4d
2024-04-11 17:21:28Opinion about Phoenix - LN Bitcoin wallet (android)
Phoenix is one of my favorite wallets. It makes using Bitcoin really easy but at a price. The wallet lets you send and receive both over the lightning network and on-chain without jumping through hoops, first but at the cost of either kind of hidden fees or unexpected on-chain fees.
To my understanding, when you receive on-chain funds, the wallet does yet another on-chain transaction to get these funds onto lightning and when you send via lightning, you pay an extra 0.4% to the provider. This 0.4% fee is not capped in any way, so while you can send $1000 via lightning, that will cost you $4 even when on-chain transactions would have cost just $1.
As of writing this opinion, the wallet is not reproducible which is a red flag to updating to this version but the provider hopefully will fix that soon as they are an OG player in the space.
WalletScrutiny #nostrOpinion
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡