-
@ 8cb60e21:5f2deaea
2024-09-06 22:23:03 -
@ 472f440f:5669301e
2024-09-06 21:56:48I had the pleasure of sitting back down with Will Reeves, Founder and CEO of Fold, on TFTC last week to discuss Fold's journey from a startup to (soon to be) a publicly listed company. I particularly liked this conversation because it was a great lens into the grit it takes to run a successful bitcoin company.
https://fountain.fm/episode/1FrspxmpK5bsoReGx73n
Building a successful company is extremely hard in its own right. Building a successful bitcoin company is significantly harder considering the fact that you're building a company in parallel with a nascent and volatile monetary asset that is monetizing in real time. Bitcoin adoption comes in waves. People flood in when the price is ripping and fade out when the price corrects and goes into a multi-year bear market before the tide comes back in. This means that your potential user base is expanding and contracting more than it would be in other industries. As a company you need to be able to absorb the incoming waves of new adopters and then capture and retain the users who stick around for the bear market.
To do this correctly, a founder and their team needs to thread many needles. First, can you assemble a team that can actually build something? Second, can you bring a product to market that people actually use because it provides value to them? Third, can you stick out against the crowd? So on and so forth. One of the most important aspects of building a bitcoin company during bitcoin's monetization phase is timing. There are many great ideas that people have in terms of companies, products and tools that can built using bitcoin. There are sci-fi futures that can be built today on bitcoin if people really wanted to.
The problem that arises is that adoption and understanding of bitcoin are at a point where, even though a functional product could be brought to market, it won't be adopted by a large number of people because there 1.) aren't enough people who would understand how to use it and 2.) for the people who do understand how to use it and could benefit from it, the universe of people they can interact with using that product is minuscule.
Timing is everything. And I think Fold nailed the timing of their product. Allowing people to passively stack sats by offering a product that enables them to go about their daily spending and get sats back instead of cash back rewards is a great first-touch bitcoin experience. Once Fold found their sticky user base and perfected their sats back experience, they began expanding their product offering to provide their users with more bitcoin services. Buy/sell bitcoin in-app, bill pay for sats back, and more. They'll eventually roll out a credit card and additional financial services. Start simple, provide something of value, nail the timing and then expand from there. That seems to be the recipe.
For any founders in the space reading this, I highly recommend you listen to the episode. Particularly for the advice Will gives about knowing when to sprint on product and when to lean into growth. Bear markets are for building and bull markets are for casting the widest net possible and capturing as many new users as possible.
At Ten31 we are extremely proud to back Fold and a number of other companies in the bitcoin space that understand the intricacies described above. We work with some of the best founders in the world. Founders who know how to eat glass with the best of them. Bitcoin can be a cruel mistress and no one knows that more intimately than the founders building bitcoin companies.
Final thought...
The NFL having a week 1 game in Brazil should get Roger Godell fired.
Enjoy your weekend, freaks.
-
@ e83b66a8:b0526c2b
2024-09-06 19:16:04The founder of Telegram has just been arrested in France. Charges include lack of cooperation with law enforcement, drug trafficking and fraud.
Aside from Telegram, social media is controlled by two billionaires who decide what you say, are themselves controlled by overbearing governments and make money through advertising and selling your personal data.
There is a different way.
NOSTR stands for Notes and Other Stuff Transmitted on Relays and it is a social media protocol in the same way http is a web protocol.
The protocol is open and anybody can build upon it. It has some fundamental concepts that are very different to existing social media platforms.
Firstly it is decentralised, it runs across relays and anybody can run a relay. They can be open or closed, public or private, free or paid.
Secondly as a user, you don’t have an account, you have a private key which is used to secure your data.
Your profile (account) is yours, you own and control it using your private keys and verified by others with your public key.
Your posts are yours and you can store them on your own relay in your own home or business or you can rely on free public relays or more feature rich paid public relays.
All your public data is signed by your private keys to verify it is you that owns it and all your private data is encrypted so nobody can read it.
Messages (i.e. think NOSTR WhatsApp) are encrypted with your private keys so NOBODY can hack it or listen in, not even the NSA through a companies backdoor. You message other users privately by encrypting messages to them using their public key, which they decrypt using their private key.
Relays store your data in a decentralised network of private and public relays and you discover relays automatically when searching for people or content.
Data is normally sent on the clearnet, but can be relayed across the darknet (Tor) in highly censored regions.
Because it is built using Bitcoin principles and technology, so it has Bitcoin money built in, meaning you actually send / receive money from / to any participant.
As money is built in, the commercial options are different to centralised corporate owned platforms. It would be technically possible to build a platform that supports advertising, however that hasn’t really happened because influencers can be paid directly from their audience in many different ways. Ad hoc tips, subscriptions, pay to view or pay per time models.
The great thing for content creators is that they control, own and keep all the money they make. There is no third party intermediary or merchant deciding whether they are allowed to be paid or not.
NOSTR is censorship resistant, as there is no way to stop anybody publishing anything they want, in the same way nobody can stop or interfere with a Bitcoin payment.
From an end users point of view, if they want to self censor, they can do this in multiple ways. You can mute users individually, or you can choose to use relays that adhere to your views or interests, so if you don’t want to see certain categories of content, you would avoid relays that carry those feeds. You can even run your own relay and curate content that you then charge other like minded users to connect to. You can of course connect to multiple relays for multiple different type of feed.
While NOSTR is a protocol, platforms have to be built to use it, so the first platforms were twitter like clients and they are still very prevalent. However, NOSTR now has clients that emulate most social media platforms, Instagram, Facebook, YouTube, Soundcloud, WhatsApp etc. They are even creating their own categories as well as emulating other functions such as Office Suite tools, collaborative calendars, contact lists or e-commerce shops.
If you want to give it a go, the easiest, but not the best, way to get started is download Primal on your phone from here:
https://primal.net/downloads
It will create a private key for you and setup a Bitcoin wallet.
Once you have done this you can visit me here:
nostr:npub1aqakd28d95muqlg6h6nwrvqq5925n354prayckr424k49vzjds4s0c237n
If you want to see a small part of the ecosystem, then visit https://www.nostrapps.com/ where volunteers are listing some of the many apps that exist already.
NOSTR is being backed by Jack Dorsey, Twitter founder, and you can see his account here:
nostr:npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
Or you can see his account like this:
https://primal.net/jack
Edward Snowden is also on the platform and you can find him here:
https://primal.net/Snowden
NOSTR has around 2 million users or public keys, although nobody really knows how many, because it is decentralised and not controlled or run by any person or organisation.
Once you’ve setup Primal, you can use those same private keys to access any platform you wish and you can use a browser extension such as Alby to manage your keys: https://getalby.com/
Primal looks great, but there are other better functioning twitter like clients, probably the most reliable for iPhone is Damus: https://www.nostrapps.com/apps/damus
or Amethyst for Android: https://nostrapps.com/amethyst
The content and user base is very Bitcoin and freedom focused right now, but more and more people are starting to use the various platforms and some are transferring exclusively to it.
Some of the more interesting projects right now are:
https://www.0xchat.com/#/ – Private messaging – think WhatsApp
https://zap.stream/ – Video streaming
https://fountain.fm/ – Podcasting
https://wavlake.com/ – Music streaming
https://shopstr.store/ – Online shop
https://npub.pro/ – Website creation tool
https://nostr.build/ – Media and file storage
https://relay.tools/ – Build and curate your own relay
https://creatr.nostr.wine/subscriptions/new-user – Creator tools
Remember, the same keys you created for Primal can be used across the whole ecosystem.
If you want to see some of the other apps that have been built on the NOSTR protocol visit: https://nostrapps.com/
-
@ 361d3e1e:50bc10a8
2024-09-06 19:02:33A teacher is arrested because he refused to teach LGBT+ to his students
politics #lgbt #education #arrest #ireland #freedom
-
@ d34e832d:383f78d0
2024-09-06 18:26:44Cox Media Group has been promoting a new targeted advertising tool to tech companies that uses audio recordings from smart home devices. This program was first revealed by Gizmodo late last year. Recently, 404 Media obtained more details about it through a leaked pitch deck, and the contents are unsettling.
The tool, called "Active Listening," is designed to leverage smart devices that “capture real-time intent data by listening to conversations.” Advertisers can then pair this data with behavioral information to target consumers. The deck also mentions using artificial intelligence to analyze both behavioral and voice data from over 470 sources, raising further privacy concerns.
The legality of this practice is questionable. Many states have wiretapping laws prohibiting recording without explicit consent. If smart devices are always recording and funneling data into targeted ads, this could violate laws like California’s two-party consent requirement.
Cox claims partnerships with major platforms like Google, Amazon, and Facebook, but it’s unclear if any are involved with this tool. After being contacted, Google dropped Cox Media Group from its advertising partners program, and Amazon stated it has never worked with CMG on this program.
You can view the full pitch deck here.
-
@ b6dcdddf:dfee5ee7
2024-09-06 17:46:11Hey Frens,
This is the Geyser team, coming at you with a spicy idea: a grant for proper journalism.
Issue: Journalism is broken. Independent journalism is emerging with the work of The Rage, Whitney Webb and so forth. They deal with issues like privacy, political corruption, economics, ESG, medicine and many other issues that are not discussed by mainstream media.
The problem is that not many people know about their work and there are very few grant programs that support their work.
Proposed Solution: Geyser would like to host a Grant supporting independent journalists using 'community voting mechanism'. See here for how Community Voting Grants work.
However, we need more companies to partner up and sponsor this initiative with us. Ideas of more sponsors: - Stacker news: SN has become a great repository of independent/indie journalism. I think they'd fit in great as sponsors for this type of grant. cc: @k00b - Bitesize media: A new independent media house that wants to focus on the signal Bitcoin brings to our world. They expressed interest already. - Bitcoin Magazine: might be interested as well in this effort.
Would love the community's feedback on this idea and propose additional thoughts!
originally posted at https://stacker.news/items/674951
-
@ 75bf2353:e1bfa895
2024-09-06 17:04:57Creative Commons Legal Code
CC0 1.0 Universal
CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED HEREUNDER.
Statement of Purpose
The laws of most jurisdictions throughout the world automatically confer exclusive Copyright and Related Rights (defined below) upon the creator and subsequent owner(s) (each and all, an "owner") of an original work of authorship and/or a database (each, a "Work").
Certain owners wish to permanently relinquish those rights to a Work for the purpose of contributing to a commons of creative, cultural and scientific works ("Commons") that the public can reliably and without fear of later claims of infringement build upon, modify, incorporate in other works, reuse and redistribute as freely as possible in any form whatsoever and for any purposes, including without limitation commercial purposes. These owners may contribute to the Commons to promote the ideal of a free culture and the further production of creative, cultural and scientific works, or to gain reputation or greater distribution for their Work in part through the use and efforts of others.
For these and/or other purposes and motivations, and without any expectation of additional consideration or compensation, the person associating CC0 with a Work (the "Affirmer"), to the extent that he or she is an owner of Copyright and Related Rights in the Work, voluntarily elects to apply CC0 to the Work and publicly distribute the Work under its terms, with knowledge of his or her Copyright and Related Rights in the Work and the meaning and intended legal effect of CC0 on those rights.
- Copyright and Related Rights. A Work made available under CC0 may be protected by copyright and related or neighboring rights ("Copyright and Related Rights"). Copyright and Related Rights include, but are not limited to, the following:
i. the right to reproduce, adapt, distribute, perform, display, communicate, and translate a Work; ii. moral rights retained by the original author(s) and/or performer(s); iii. publicity and privacy rights pertaining to a person's image or likeness depicted in a Work; iv. rights protecting against unfair competition in regards to a Work, subject to the limitations in paragraph 4(a), below; v. rights protecting the extraction, dissemination, use and reuse of data in a Work; vi. database rights (such as those arising under Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases, and under any national implementation thereof, including any amended or successor version of such directive); and vii. other similar, equivalent or corresponding rights throughout the world based on applicable law or treaty, and any national implementations thereof.
-
Waiver. To the greatest extent permitted by, but not in contravention of, applicable law, Affirmer hereby overtly, fully, permanently, irrevocably and unconditionally waives, abandons, and surrenders all of Affirmer's Copyright and Related Rights and associated claims and causes of action, whether now known or unknown (including existing as well as future claims and causes of action), in the Work (i) in all territories worldwide, (ii) for the maximum duration provided by applicable law or treaty (including future time extensions), (iii) in any current or future medium and for any number of copies, and (iv) for any purpose whatsoever, including without limitation commercial, advertising or promotional purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each member of the public at large and to the detriment of Affirmer's heirs and successors, fully intending that such Waiver shall not be subject to revocation, rescission, cancellation, termination, or any other legal or equitable action to disrupt the quiet enjoyment of the Work by the public as contemplated by Affirmer's express Statement of Purpose.
-
Public License Fallback. Should any part of the Waiver for any reason be judged legally invalid or ineffective under applicable law, then the Waiver shall be preserved to the maximum extent permitted taking into account Affirmer's express Statement of Purpose. In addition, to the extent the Waiver is so judged Affirmer hereby grants to each affected person a royalty-free, non transferable, non sublicensable, non exclusive, irrevocable and unconditional license to exercise Affirmer's Copyright and Related Rights in the Work (i) in all territories worldwide, (ii) for the maximum duration provided by applicable law or treaty (including future time extensions), (iii) in any current or future medium and for any number of copies, and (iv) for any purpose whatsoever, including without limitation commercial, advertising or promotional purposes (the "License"). The License shall be deemed effective as of the date CC0 was applied by Affirmer to the Work. Should any part of the License for any reason be judged legally invalid or ineffective under applicable law, such partial invalidity or ineffectiveness shall not invalidate the remainder of the License, and in such case Affirmer hereby affirms that he or she will not (i) exercise any of his or her remaining Copyright and Related Rights in the Work or (ii) assert any associated claims and causes of action with respect to the Work, in either case contrary to Affirmer's express Statement of Purpose.
-
Limitations and Disclaimers.
a. No trademark or patent rights held by Affirmer are waived, abandoned, surrendered, licensed or otherwise affected by this document. b. Affirmer offers the Work as-is and makes no representations or warranties of any kind concerning the Work, express, implied, statutory or otherwise, including without limitation warranties of title, merchantability, fitness for a particular purpose, non infringement, or the absence of latent or other defects, accuracy, or the present or absence of errors, whether or not discoverable, all to the greatest extent permissible under applicable law. c. Affirmer disclaims responsibility for clearing rights of other persons that may apply to the Work or any use thereof, including without limitation any person's Copyright and Related Rights in the Work. Further, Affirmer disclaims responsibility for obtaining any necessary consents, permissions or other rights required for any use of the Work. d. Affirmer understands and acknowledges that Creative Commons is not a party to this document and has no duty or obligation with respect to this CC0 or use of the Work.
DON'T BE A DICK PUBLIC LICENSE
originally created by Phil Sturgeon
Version 1.1, December 2016
Copyright (C) Blogging Bitcoin
Everyone is permitted to copy and distribute verbatim or modified copies of this license document.
DON'T BE A DICK PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
- Do whatever you like with the original work, just don't be a dick.
Being a dick includes - but is not limited to - the following instances:
1a. Outright copyright infringement - Don't just copy this and change the name. 1b. Selling the unmodified original with no work done what-so-ever, that's REALLY being a dick. 1c. Modifying the original work to contain hidden harmful content. That would make you a PROPER dick.
-
If you become rich through modifications, related works/services, or supporting the original work, share the love. Only a dick would make loads off this work and not buy the original work's creator(s) a pint.
-
Code is provided with no warranty. Using somebody else's code and bitching when it goes wrong makes you a DONKEY dick. Fix the problem yourself. A non-dick would submit the fix back.
-
@ c73818cc:ccd5c890
2024-09-06 16:44:51💩 Il governo italiano approva il decreto di adeguamento al regolamento MiCAR mentre la Banca d'Italia aggiorna il Piano Strategico 2023-2025 per rafforzare la vigilanza e l'innovazione nel settore finanziario.
💩 Rafforzamento della regolamentazione:
💩 Il Consiglio dei ministri ha approvato un decreto legislativo che adegua le normative italiane al regolamento europeo MiCAR, stabilendo una regolamentazione minima per tutte le cripto-attività a livello UE. L'obiettivo è garantire maggiore trasparenza e tutela degli investitori, prevenendo abusi nel mercato delle criptovalute.
💩 Nuovi poteri a Banca d'Italia e Consob:
💩 Il decreto conferisce poteri ampliati alla Banca d'Italia e alla Consob per vigilare e sanzionare gli operatori nel settore delle cripto-attività. Queste istituzioni avranno la responsabilità di garantire che le emissioni, le offerte pubbliche e le negoziazioni di token avvengano in conformità con le normative vigenti.
💩 Piano Strategico 2023-2025:
💩 Parallelamente, la Banca d'Italia ha aggiornato il suo Piano Strategico, che punta su innovazione e resilienza cibernetica. Tra le priorità figurano il rafforzamento della stabilità finanziaria, l'introduzione dell'euro digitale e il miglioramento delle infrastrutture di pagamento, con un'attenzione particolare alla lotta alle attività illegali.
💩 Tutela degli utenti e sostenibilità:
💩 Il piano prevede anche misure per proteggere i clienti dei servizi bancari, promuovere l'educazione finanziaria e contribuire alla sostenibilità ambientale. La Banca d'Italia si allinea agli obiettivi dell'Agenda 2030 delle Nazioni Unite, puntando a ridurre l'impronta ambientale e a favorire l'inclusività.
💩 Transizione energetica e innovazione:
💩 Infine, il piano della Banca d'Italia mira a consolidare il lavoro ibrido, valorizzare la diversità e sviluppare nuove competenze per affrontare le sfide future. L'adozione di tecnologie digitali sarà centrale per mantenere l'efficienza e l'efficacia operativa dell'istituzione.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Decreto #Normative #MiCAR #Italia #Banca #UE #Consob #EuroDigitale #CBDC #Agenda2030 #ONU #Cripto #Bitcoin
-
@ 150cec32:eea45aec
2024-09-06 16:18:50כותרת
טקסט
-
@ 7ab1ed7a:f8e15275
2024-09-06 16:15:53 -
@ a3d9328e:5560628c
2024-09-06 15:55:19Keepass, Keepass2, KeepassX, KeepassXC and others... What is the difference?
KeePass is a free and open-source password manager which helps you manage your passwords securely. It is stored in a database, which is locked with a master key and fully encrypted.
I realize that as you read this article, you're likely familiar with password managers and have some knowledge of KeePass or other popular systems such as LastPass, Bitwarden, Dashlane, and 1Password. While all of these options are online and offer limited features in their free versions, they also sell subscription plans. This makes KeePass an excellent alternative in various situations.
## KeePass
The official KeePass is https://keepass.info/, with the initial release in 2003! The newest versions are 2.53 and 1.41 (when I wrote this article), released in January 2023 (less than 5 months after the previous release).
On the site, you will find 2 versions available: KeePass 1.x and KeePass 2.x One is not the evolution of the other! They are developed in parallel, and both are free and open source. However, 1.x uses an older platform and is still supported (2.x is not!).
Both versions use AES 256, with KeePass 2.x through plugins able to add and support other algorithms.
The differences:
KeePass 1.x
Written in C++, runs only on Windows platforms (or using Wine on Linux). The password database has the extension KDB. In addition to AES 256, there is Twofish 256 bits and data authentication/integrity is guaranteed using a plain text SHA-256 hash.
KeePass 2.x
Introduced in 2007, KeePass 2.x offers more support and features than KeePass 1.x, including OTP (One Time Password) support, Smart Cards, an extensive list of plugins, and remote database support. Developed in C# using .NET, it can be run on Linux with Mono. The password database uses the KDBX extension. Besides AES 256, it supports ChaCha20 256-bit encryption, and data authentication/integrity is ensured through an HMAC-SHA-256 ciphertext hash.
In the database versions, there are also changes while KDBX3 uses AES-KDF KDBX4 (most current) uses Argon2.
In this link, there is a developer's table with the comparison between versions: https://keepass.info/compare.html
Here is the list of plugins (with information on which version they support, 1x or 2x): https://keepass.info/plugins.html
Here you can find more details about security differences between versions: https://keepass.info/help/base/security.html Forks and Ports KeePass-Related Projects
KeePassL
A fork of KeePass to run on Linux (when there was no Mono and remembering that KeePass 2.x came out in 2007!).
KeePassX
When KeePass L became cross-platform in 2006, it changed its name to KeePassX. Cross-platform means Mac OS X, Windows and the tarball for Linux. Some third party developers created packages for distros.
KeePassX was officially discontinued in December 2021, with its final release dating back to 2016.
KeePassXC
KeePassXC was introduced in 2012 as a fork of KeePassX due to its extensive development process. Essentially, it continues to serve as a multi-platform port of KeePass 2.x, but is built using C++, eliminating the need for Mono installation on Linux.
It's compatible with both KDBX3 and KDBX4 formats, although the goal is to transition to KDBX4. Additionally, it can import KeePass 1.x (KDB) files, but does not support KeePass 2.x plugins.
It officially has browser extensions! For the others, you need to look for some third-party extensions.
KeeWeb
KeeWeb is a KeePass-compatible fork developed in JavaScript, designed to be multi-platform and function as a web app. Users can access their database either through a browser, with the option to upload their web app instance, or via a client installed on their operating system (Electron). Launched in 2016, KeeWeb is the newest addition to this list, with its latest stable version released in 07/2021. However, the project's GitHub currently lacks a dedicated maintainer.
It is possible, using KeeWeb, to point to the password database directly stored in some provider (like Google Drive, Dropbox, OneDrive or any other that supports webDAV). While the others need to be done another way, like mapping the remote file to the operating system, either by mounting a path (webDAV, samba, NFS, FTP...) or by other means (like Dropbox's client), but for Google Drive, OneDrive and some others, just downloading the file (or using some third-party app like OneDriver or InSync).
For browsers, the project site indicates using the KeePassXC extension.
AuthPass
Similar to KeeWeb, there is AuthPass. Its latest version is from 06/2022 and it seems that its development is more active. Made in Flutter, and multi-platform (including mobile).
KPCLI
Kpcli is a command-line interface (CLI) client compatible with both KeePass 1 and 2 databases (KDB and KDBX family). With the help of bash, you can create scripts to automate password usage via the command line, eliminating the need for a graphical client or KeePass itself. Other ports/forks
On the KeePass site, there is a list: https://keepass.info/download.html
However, on GitHub, there is an even longer list, separated by platform-specific clients, cross-platform clients, mobiles, plugins and tools. https://github.com/lgg/awesome-keepass
Conclusion
Let me help you decide which version of KeePass is best for you.
Do you use Windows? Give KeePass2 a try. If you're not interested in KeePass 2.x, no worries! Just refer to the list above and pick any alternative that suits you. ;-)
Are you a Linux user? Give KeePassXC a try.
Concerned about usability and compatibility across multiple operating systems? Try KeePassXC on Linux, Windows, or Mac for a seamless experience.
Looking to use it in your browser, just like those paid/freemium competitors? Give KeePassXC a shot and simply install the official extension.
Looking to access it on Android as well? Give KeePassDX a try. It's compatible with all password database versions (KDB, KDBX...), ensuring seamless integration with any desktop app you choose. If you opt for AuthPass, it's the only one with an official Android version. For all other options, you'll need to depend on apps developed by third parties.
Moreover, implement 2FA/MFA for every feasible application! When faced with a choice between two services or websites, opt for the one that provides 2FA/MFA (ideally through an app rather than SMS).
I originally posted this article on my blog at https://esli.blog.br/which-keepass-version-is-best-for-me The text is also versioned in markdown on my github profile and I decided to post it here as a first test and perhaps migrate the other texts I've written.
-
@ 113958ea:f1ce9557
2024-09-06 14:27:03 -
@ c73818cc:ccd5c890
2024-09-06 13:22:32😎 L'FBI mette in guardia le aziende statunitensi contro sofisticati attacchi di ingegneria sociale orchestrati da hacker nordcoreani, volti a rubare asset digitali dai fondi negoziati in borsa (ETF) legati alle criptovalute.
😎 Gli hacker nordcoreani stanno intensificando gli attacchi contro le aziende statunitensi coinvolte negli ETF di criptovaluta, utilizzando tecniche avanzate di ingegneria sociale. Questi attacchi mirano a rubare asset digitali attraverso l'inganno e la manipolazione delle vittime.
😎 Secondo l'FBI, gli attacchi includono impersonificazioni e scenari falsi, come offerte di lavoro o opportunità di investimento, per ingannare i dipendenti del settore DeFi e criptovalute. La ricerca pre-operativa dettagliata consente agli hacker di sfruttare specifici interessi e connessioni.
😎 L'FBI esorta le aziende a implementare rigorose misure di sicurezza, come l'autenticazione multifattoriale e la verifica delle identità. Con un'attenzione particolare alla protezione degli asset digitali, queste precauzioni possono aiutare a mitigare i rischi posti dalle sofisticate minacce informatiche nordcoreane.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #FBI #Hacker #Nordcoreani #ETF #Investimento #Furto #Sicurezza #Asset #Hacking #Transazioni #Cripto #Bitcoin
-
@ 3bf0c63f:aefa459d
2024-09-06 12:49:46Nostr: a quick introduction, attempt #2
Nostr doesn't subscribe to any ideals of "free speech" as these belong to the realm of politics and assume a big powerful government that enforces a common ruleupon everybody else.
Nostr instead is much simpler, it simply says that servers are private property and establishes a generalized framework for people to connect to all these servers, creating a true free market in the process. In other words, Nostr is the public road that each market participant can use to build their own store or visit others and use their services.
(Of course a road is never truly public, in normal cases it's ran by the government, in this case it relies upon the previous existence of the internet with all its quirks and chaos plus a hand of government control, but none of that matters for this explanation).
More concretely speaking, Nostr is just a set of definitions of the formats of the data that can be passed between participants and their expected order, i.e. messages between clients (i.e. the program that runs on a user computer) and relays (i.e. the program that runs on a publicly accessible computer, a "server", generally with a domain-name associated) over a type of TCP connection (WebSocket) with cryptographic signatures. This is what is called a "protocol" in this context, and upon that simple base multiple kinds of sub-protocols can be added, like a protocol for "public-square style microblogging", "semi-closed group chat" or, I don't know, "recipe sharing and feedback".
-
@ e97aaffa:2ebd765d
2024-09-06 10:27:57«Only 10 of the 190 taxes collect 90% of the total revenue. The other 180 taxes don’t cause direct economic damage but they generate obstacles, delays and an endless number of procedures that hinder economic activity in a country where making money is already an impossible task»
Eu concordo plenamente com este pensamento do Javier Milei e tinha a convicção que a situação de Portugal é muito similar, por isso fiz o meu “Don’t Trust, verify”.
Receita tributária
Foi analisar o caso de Portugal, as receitas tributárias de 2023:
«Carga fiscal subiu para 95 mil milhões de euros. Mas cai para 35,8% do PIB em 2023» – ECO
Se o objetivo final da estatística é para efetuar uma comparação entre países, é necessário efetuar a divisão pelo PIB. Mas se a análise é apenas para comparações internas ou homólogas, não faz qualquer sentido efetuar a divisão. Com a divisão dos valores pelo PIB, mascaramos a realidade, sobretudo em períodos inflacionários, porque o crescimento do PIB não é real, é uma consequência da inflação. A melhor maneira para analisar as estatísticas internamente é utilizar o valor nominal.
No relatório do INE, os impostos são divididos em 3 grupos: * Impostos Diretos * Impostos Indiretos * Contribuições Sociais
Segundo esses dados, nos últimos anos, tem acontecido um enorme crescimento da arrecadação fiscal por parte do estado, a única exceção foi 2020, devido ao covid. De 2019 a 2023, o aumento foi de quase 30%. Ou seja, totalmente oposto à ideia (divisão pelo PIB) que os governos gostam de propagandear.
Para termos uma comparação, no mesmo período, o salário mínimo nacional(Portugal) subiu 27%, mas o salário médio apenas subiu 17%. As pessoas estão a perder poder de compra.
A tabela seguinte é a compilação dos dados:
O IVA é o imposto com maior arrecadação, corresponde a aproximadamente a 25% do total da arrecadação fiscal, seguido pelo IRS, com 19.5%. É curioso que a constituição portuguesa, defende que os impostos devem ser progressivos, ou seja, quem ganha mais, deve pagar mais.
Artigo 104.º (Impostos) 1. O imposto sobre o rendimento pessoal visa a diminuição das desigualdades e será único e progressivo, tendo em conta as necessidades e os rendimentos do agregado familiar. 2. A tributação das empresas incide fundamentalmente sobre o seu rendimento real. 3. A tributação do património deve contribuir para a igualdade entre os cidadãos. 4. A tributação do consumo visa adaptar a estrutura do consumo à evolução das necessidades do desenvolvimento económico e da justiça social, devendo onerar os consumos de luxo.
Mas o IVA é um imposto cego, onde os principais afetados são os mais pobres, totalmente oposto ao que a constituição diz, sem justiça social.
Somando os 10 maiores impostos, resulta em 93.6% da receita fiscal, é similar à situação da Argentina:
A quantidade de impostos em Portugal é tal, que a maioria deles nem aparece nos relatórios, apenas ficam nas secções “outros”. Curiosamente, perguntei a uma AI, quantos impostos existem em Portugal, mas a AI, esquivou-se à resposta.
Em Portugal, existem cerca de 20 impostos principais, incluindo os mais conhecidos como o IRS, IRC, IVA, IMI, e IMT. Além desses, há vários outros impostos e taxas específicas que podem ser aplicáveis em diferentes situações.
Eu insisti mais que uma vez, mas ele nunca deu um número concreto. Possivelmente, nem o governo sabe quantos impostos existem…
Conclusão
Em Portugal e na Argentina, a esmagadora receita fiscal acontece, sobretudo em apenas 10 impostos, os restantes são residuais na receita do governo mas gera uma enorme burocracia nas empresas e nas pessoas.
Se muitos desses "mini" impostos fossem eliminados, permitia uma maior dinamização do mercado, gerando crescimento económico e mais empregos. Nos fins das contas, o estado acabaria por arrecadar mais receitas através dos outros impostos, sobretudo no IVA. Em certos casos, é provável que custos operacionais para o estado são superior à propria arrecadação fiscal desse respectivo imposto. Sem esquecer os casos de impostos sobre impostos, da dupla tributação, como acontece na compra de um automóvel. A curva de Laffer, há muito que foi ultrapassada em Portugal.
Além de prejudicar a economia diretamente, esta enorme quantidade de taxas, taxinhas e burocracias, tem um efeito perverso no “estado”. Os estados necessitam de muitos meios físicos e humanos para efetuar a gestão, fiscalização e a recolha desses impostos, além disso, a burocracia leva ao surgimento da corrupção. A burocracia é criada propositadamente pelos políticos para atrapalhar a vida dos cidadãos, com o objectivo final de beneficiar terceiros, como advogados ou lobis ou os próprios políticos. A receita fiscal é mínima, mas é um incentivo à corrupção, isto é especialmente visível a nível mais local, nas autarquias. Qualquer coisa que se faça, sobretudo a nível de obras, é necessário uma infindável quantidade de autorizações, papeladas e claro, muitas taxinhas. Devido a essa burocracia, qualquer licenciamento demoram meses a anos, no meio disto tudo, existem empresários/pessoas impacientes, que desesperam com a tremenda demora e acabam por colocar uma notinha no bolso de alguém importante, para que este acelere o processo. Coisas que normalmente demorariam meses, são aprovadas em semanas, a burocracia incentiva a corrupção.
Portugal necessita urgentemente de uma simplificação fiscal, se houvesse vontade política para mudar, o governo poderia diminuir drasticamente o número de impostos sem diminuir a arrecadação fiscal. Se esta mudança, eles não são capazes de a fazer, muito menos vão fazer uma mudança que provoque uma redução da arrecadação fiscal. Eu acho que Portugal vai seguir o caminho oposto, em vez de simplificar, vai é criar ainda mais novos impostos, porque como os atuais impostos já estão demasiado elevados, é extremamente impopular aumentá-los ainda mais, a maneira mais simples para o governo é criar novos impostos para aumentar a arrecadação fiscal.
Os governos modernos só olham para o aumento da arrecadação/impostos, "esquecem” por completo a redução de gastos, a eficiência. Resumindo, isto é o mundo FIAT.
-
@ 6bae33c8:607272e8
2024-09-06 08:16:48I got back into the Circa Survivor Contest this year at great cost (my flight out of Palm Springs on July 5 was cancelled due to heat, so I had to rent a car and drive through the Mojave Desert, and the road to Vegas was closed, so I had to double back another 100 miles, which in total took six hours), so this is Team Of Destiny 2.0. Or at least it had better be.
I’m not going to stick to any one method or philosophy. Put differently, I realize that in order to win, I need to go into the future, find out what has already happened and pick on that basis. Pot odds is great, but even if you do that properly every week, your edge over the field isn’t that huge. Instead of a 1 in 10,000 chance to win, maybe you have 1 in 6,500. Sure, if you had 100 entries in every high stakes contest, it might be enough to eke out a reliable profit, but I’m not here for that. I’m here to navigate one boat through the icebergs and take down the $10M. And for that, you can’t hope to get lucky. You have to know in advance.
What method do I propose to see into the future? Only my imagination. I’m going to spend a lot of time imagining what might happen, turn my brain into a quantum device, break space-time and come to the right answers. Easier said than done, but I’m committed.
. . .
In any event, let’s take a look at the slate: Here are the ownership numbers per Officefootballpools.com.
The pot-odds play is the Bills if you buy into the Vegas numbers — Bengals roughly 78.5 and the Bills at 72.6%. That means the Bengals have a 21.5% chance to lose, the Bills 27.4%. That’s a 27.4 percent increase in risk (coincidentally.)
But if the Bengals lose they take out 39 people, and if the Bills lose they take out only 15. Let’s assume another 20-odd people lose with other teams (in a hypothetical 100-person pool) and you’re down to 41 if the Bengals lose/Bills win, 65 if the Bills lose/Bengals win.
If we say each person put in $10, the former scenario is $1000 (total pot)/41 = $24.39, and the latter $1000/65 = $15.38. The ratio of 24.39/15.38 = 1.59. In other words, you have 59 percent percent more equity in Week 2 on the Bills if the Bengals lose than you would on the Bengals if the Bills lose.
You’re talking a 27.4 percent greater risk for a 59 percent greater reward. So normally I’d snap call the Bills.
But I’m probably going Bengals because I think the Cardinals are dangerous this year, and the Pats are arguably the worst team in the league and in surrender mode after they dealt Matthew Judon to the Falcons. (All this is supposed to be priced in, of course, but I don’t care.)
I’ll finalize my pick before Saturday’s deadline, but that’s how I see it for now.
-
@ 3bf0c63f:aefa459d
2024-09-06 12:15:47a way to do an open and permissionless mesh network
I don't have much experience with that so maybe this is all a stupid, but I think that routing in mesh networks is never scalable. It basically always requires all the nodes to keep a full view of the network in order to route packages -- and often there is no incentive for them to do that either. And then the thing is easily spammable but either that problem doesn't happen because the mesh never gets big enough or it has a central committee that decides who can join.
The biggest example is, of course, the big ICANN-controlled IP network, that gets all the negatives of being centrally controlled while weirdly getting also all the negatives of being a kinda-decentralized peer-to-peer ad-hoc network between indepent ISPs.
A good solution that makes kinda-decentralized (at least open and permissionless) routing possible and replaces node addresses with pubkeys could get rid of ICANN. Once that is done, ad-hoc peering would become more seamless and ISPs wouldn't have to be so big, clunky and centralized, they could slowly split, and non-comercial entities could join the party too by basically just plugging a cable or pointing an antenna at the correct place.
What is it?
One very dumb solution that came to my mind that has a chance of working is one in which each node as a keypair and to be reachable by others they announce their address -- for example, using some kind of DNS (on a [spacechain]?) or by directly communicating their address through some other means -- as their public key plus some "routing hints".
The routing hints are just pubkeys of other nodes known to be routers. Known to whom? Well, this would require some schelling points to naturally appear and the network would be ordered around them, but you are never forced to use them, you have to include as many routing hints as required to ensure that all the people you want to connect to you will eventually be able to, but nothing is ever 100% guaranteed.
Such network could probably work with a pure onion routing scheme with all its privacy benefits in some cases; degrading to a trampoline onion routing scheme otherwise, which means it will just be slightly less private the more trampolines you have to use. And every node has to keep track of just a set of routes from them to a bunch of known routers (or trampolines, which in my mind are mostly the same nodes, but are slightly different roles).
Example
Suppose A is trying to connect to B.
A is a home computer in the city of Évora, Portugal.
B is a home computer in the city of Udine, Italy.
There is a route (we, the narrator, know) between them that goes like this:
A--Ev--Li--Al--Ro--Sm--Ve--Ud--B, in which Ev means the node of an ISP in Évora which directly serves A, Li means a big node in Lisboa, Al a node in Algiers, Ro a node in Rome, Sm a node in San Marino, Ve a node in Venice and Ud a gateway node in the mesh of Udine to which B is connected.
There could be many other routes, but we'll ignore them for now.
B could have published his address as
<pubkey-B>?hint=<pubkey-Ud>,<pubkey-Ve>,<pubkey-Sm>,<pubkey-Ro>
, which would mean A would only have to know a route from Ev up to Ro.If Ro is known to be a big router, A could easily have a route cached there, and could discover other routes by asking around every now and then too. It wouldn't take a lot of space to have routes cached to some thousands of different known big nodes like that. Then A can just wrap an onion with all the coordinates and the message inside and hand it to Ev and it would reach B. Inside the message she would also include the full route for a message to be sent back.
However, even if A doesn't have a route to Ro, it could still hope that Li would have, then she could make a special "trampoline" onion that goes Ev--Li and then when Li receives it it sees a request to forward the next packet to Ro, so Li has the freedom to choose a route from itself to Ro (as long as it knows Ro, of course) and from there A's message continues.
The same trampolining can exist on B's side, if B doesn't have a route from Ud to Ro, but knows Ro is likely to have one up to Ud -- or if B feels it's not worth including so many hints when most big nodes will have routes to Ud, for example, it can publish his address as
<pubkey-B>?hint=<pubkey-Ud>*<pubkey-Ro>
meaning that one should find a route up to Ro and from there ask Ro to trampoline it up to Ud.Or, if B doesn't expect Ud to be very well-known, but Sm yes, then it could do
<pubkey-B>?hint=<pubkey-Ud>,<pubkey-Sm>*<pubkey-Ro>
. Again, this is just one hint, in practice it would have to have a lot (maybe 10, 20?) other hints, in a tree structure that this querystring syntax isn't very suited for encoding:``` Ud Tr Pu Za Li
Sm * Ro Ba Mi La Ge * Mo Tu
```
(Remember, we're using city name abbreviations here, but each of these would be a specific node, with a specific public key, supposed for the example to be in such a city, but nothing prevents them from being in different cities or that multiple nodes exist in the same city.)
Summary
Basically packets go from node to node, in a sequence established by the sender -- with optional trampolines in between -- until they get to the target. Target responds in the same route. Nodes can be anyone. Focal points form around big nodes, but they can be replaced easily, the receivers just have to stop using them in their hints, so the network is flexible and open.
-
@ 6bae33c8:607272e8
2024-09-06 08:14:27An odd thing happened — I squinted when opening my laptop this morning so as not to see the final score, but I thought I read a headline saying the Ravens beat the Chiefs. Maybe it was a cached headline from the night before saying what they’d have to do to beat the Chiefs? but I shut the laptop and logged into my Apple TV account to stream the game on the TV, fully expecting the Ravens to win. I mean up until the moment they overturned the Isaiah Likely TD, I thought the Ravens would win. Funny, but not funny because I picked the Ravens in my low-stakes picking pool, and I HATE starting off the week 0-1, no matter the stakes.
In any event, it was an okay game, not great, but there were some interesting takeaways.
-
Derrick Henry looked fine but is going to do almost nothing in the passing game. He had two awkward targets, but Justice Hill was in the game on passing downs and during the end-of-half two-minute drill. Plus Lamar Jackson almost always takes off when he’s in trouble, so if the play isn’t a designed pass to the back, which will be rare for Henry, he’s not getting the ball except via handoff.
-
Jackson looked smooth to me and he’ll have a huge year for as long as he can stay healthy, especially now that Isaiah Likely looks like a real threat. But at 6-2, 205, 16 carries per game is a big ask.
-
Likely looked great. On his long TD, he made great moves, and even on the TD that was overturned, he showed great footwork to make it that close. I’m awfully curious to see where the near-invisible Mark Andrews slips in my NFFC Primetime tonight. (I think Round 8 or so, and I’d have to think about it.)
-
Rashod Bateman had five targets, four of them down the field. He’s their field stretcher, and though it was a quiet day, there should be more.
-
Zay Flowers got 10 targets (good), but it was dink and dunk stuff. To be honest, Likely (12 targets!) looked like the WR1, the alpha running the intermediate routes, Bateman the deep guy and Flowers the midget in the slot.
-
Patrick Mahomes didn’t have a big game, but that was against a top defense and he still got 10.4 YPA. And they were missing one of their field stretchers in Hollywood Brown.
-
Rashee Rice was the story for the Chiefs IMO. He had nine targets and made it look so easy, like Cooper Kupp schemed open on the Rams a few years ago. Xavier Worthy scored twice, but on only three targets even without Brown. He did look awfully fast, though.
-
Isiah Pacheco ran hard against a tough defense, but didn’t do much as a receiver. He’ll be fine — I wouldn’t move his stock much after this game.
-
Travis Kelce had a quiet night, but I wouldn’t read much into it. It’s not like Noah Gray is Likely to take his role.
-
After all these years, I finally ditched the loyal Justin Tucker for a Younghoe, and I feel like a new man. It still brought me no joy to see him miss that 53-yard FG.
-
You have to love Steak League IDP Roquan Smith getting a pick for you opening night.
-
-
@ a012dc82:6458a70d
2024-09-06 08:07:02Table Of Content
-
Why is there a Projection of Bitcoin Adoption Increase by 50% by 2025?
-
What are the Potential Challenges for Bitcoin Adoption?
-
What is the Impact of Bitcoin Adoption on the Global Economy?
-
Conclusion
-
FAQ
Bitcoin, the world's first and largest cryptocurrency, has been gaining momentum and popularity over the years. With its decentralized and secure nature, Bitcoin has become a preferred mode of payment and investment for many individuals and businesses. The cryptocurrency has been making headlines for its unprecedented price surges, with its value surpassing $60,000 in early 2021. However, it has also experienced significant price drops and market volatility. Despite this, experts predict that Bitcoin adoption will continue to increase, with a projected 50% growth by 2025.
Why is there a Projection of Bitcoin Adoption Increase by 50% by 2025?
There are several reasons why experts are predicting a significant increase in Bitcoin adoption by 2025:
Increased institutional investment: Over the past few years, more and more institutional investors, such as banks and hedge funds, have been investing in Bitcoin. These investments bring legitimacy and stability to the cryptocurrency market, making it more appealing to individual investors.
Global economic uncertainty: The COVID-19 pandemic has had a significant impact on the global economy, causing many individuals and businesses to re-evaluate their investment strategies. With traditional investments, such as stocks and bonds, experiencing volatility, Bitcoin's decentralized nature and limited supply make it an attractive investment option.
Growing acceptance and adoption: As more businesses and individuals accept Bitcoin as a mode of payment, its adoption rate continues to increase. This trend is expected to continue, with more merchants and payment processors accepting Bitcoin.
Increased regulation: While some argue that increased regulation may stifle Bitcoin's growth, others believe that it will bring greater legitimacy and stability to the cryptocurrency market. As governments and regulatory bodies create clearer guidelines and regulations for cryptocurrencies, it is likely that more individuals and businesses will feel comfortable investing in Bitcoin.
What are the Potential Challenges for Bitcoin Adoption?
While the projected increase in Bitcoin adoption is promising, there are still potential challenges that may hinder its growth:
Market volatility: Bitcoin's value is subject to market fluctuations, which can be unpredictable and lead to significant price drops. This volatility may discourage some investors from investing in Bitcoin.
Security concerns: While Bitcoin's blockchain technology is secure, there have been instances of hacking and theft. These security concerns may discourage some individuals and businesses from accepting Bitcoin as a mode of payment or investing in it.
Regulatory challenges: As governments and regulatory bodies work to create clearer guidelines and regulations for cryptocurrencies, there may be challenges in achieving a balance between regulation and innovation. Overly restrictive regulations may hinder Bitcoin's growth and adoption.
Energy consumption: Bitcoin mining requires significant energy consumption, which has led to concerns about its environmental impact. As more attention is given to climate change and sustainability, these concerns may hinder Bitcoin's growth.
What is the Impact of Bitcoin Adoption on the Global Economy?
The projected increase in Bitcoin adoption has the potential to have a significant impact on the global economy:
Increased investment opportunities: As Bitcoin adoption grows, more investment opportunities may arise, creating new revenue streams and job opportunities.
Greater financial inclusion: Bitcoin's decentralized nature and accessibility have the potential to provide greater financial inclusion for individuals who may not have access to traditional banking services.
Disruptive technology: Bitcoin's blockchain technology has the potential to disrupt traditional financial systems, creating new opportunities for innovation and growth.
New challenges: With disruptive technology comes new challenges, such as the need for clear regulations and guidelines, as well as addressing potential security concerns.
Shift in power dynamics: Bitcoin's decentralized nature challenges traditional power structures, such as those held by central banks and governments. This shift in power dynamics may lead to changes in the way financial systems operate globally.
Impact on traditional banking systems: As Bitcoin adoption continues to grow, traditional banking systems may experience disruptions. Banks may need to adapt to the changing landscape by incorporating blockchain technology or other innovative solutions.
Conclusion
Experts predict that Bitcoin adoption will increase by 50% by 2025, driven by increased institutional investment, global economic uncertainty, growing acceptance and adoption, and increased regulation. While there are potential challenges to Bitcoin's growth, such as market volatility, security concerns, regulatory challenges, and energy consumption, the projected increase in Bitcoin adoption has the potential to have a significant impact on the global economy. As Bitcoin continues to gain momentum and popularity, it's important for individuals and businesses to understand the risks and potential rewards involved in investing in this cryptocurrency.
FAQ
Will increased Bitcoin adoption lead to greater financial inclusion? Yes, increased Bitcoin adoption has the potential to provide greater financial inclusion, as it enables individuals without access to traditional banking systems to participate in the global economy.
How can individuals buy Bitcoin? Individuals can buy Bitcoin through cryptocurrency exchanges, peer-to-peer marketplaces, and Bitcoin ATMs. It's important to do your research and choose a reputable platform to ensure secure transactions.
Can Bitcoin be used for everyday transactions? Yes, Bitcoin can be used for everyday transactions, but its use is still limited compared to traditional currencies. However, as Bitcoin adoption increases, more merchants may start accepting it as a mode of payment.
What is the environmental impact of Bitcoin mining? Bitcoin mining requires significant energy consumption, which has raised concerns about its environmental impact. However, some argue that the use of renewable energy sources for mining can help mitigate this impact.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 3c9712ff:14fecbc4
2024-09-06 02:20:21Over the past week, the south-east corner of Australia experienced a battering from mother nature.
High winds and unseasonably hot winter days caused Australia's wind and solar network to run at near maximum capacity. However, this wasn’t necessarily beneficial.
Article from the Australian Financial Review
Grid Operation 101
Energy is produced and consumed almost simultaneously. This real-time mechanism makes the energy grid one of the fastest and most responsive systems in existence.
When the grid operates at peak efficiency, everyone who needs power can access it, and anyone producing power can sell it. Energy must be generated and balanced continuously, regardless of the weather. It’s not good enough to produce abundance of energy when people don’t want it, just to fall short when they do.
Since solar and wind cannot consistently maintain a balance between supply and demand, coal remains the backbone of Australia's energy grid, providing reliable base-load power and being supplemented during peak times.
Too Much Energy?
Apart from the environmental benefits, the key advantage of renewable energy lies in its abundance. However, because we don’t control when the sun shines or the wind blows, this often results in a mismatch between supply and demand. At times, energy supply can sometimes double or even triple demand. Since it’s usually too expensive to shut down solar and wind farms, this leads to stranded or curtailed energy, and consequently wholesale electricity prices can drop into negative territory.
Instances of negative prices have risen since 2018.
The rise of negative electricity prices across the eastern seaboard has closely correlated with the expansion of renewable infrastructure. Since 2017, Australia has been actively seeking solutions to absorb the excess supply and restore efficiency to the energy system.
Solution 1 - Batteries
This idea makes the most intuitive sense to the average person. If we can't immediately use the power generated by a roaring wind turbine to power a family home, why not store it until peak demand and then release that cheap energy back into the grid?
The answer is twofold, 1. The buildout of these projects are expensive, 2. Storage capacity is minimal.
The Victorian Government's Big Battery initiative has the ability to power 1m Victorian homes for only 30 minutes and was built to a tune of $160m.
I always love technological innovation and perhaps one day all Australian houses will be powered by sea of solar panels and batteries in the middle of desert however it's evident we at least need an interim solution.
Solution 2 - Bitcoin Mining
We’ve all heard the same FUD. Critics prey on readers' misunderstandings of how the grid operates, portraying a vision where miners supposedly divert power away from households and businesses to feed this energy hungry beast into what they call a "worthless internet currency" and drive prices up.
However, if we incorporate Bitcoin mining's energy usage into what we've learned about grid operations, we can see how it can actually bolster renewable energy for two reasons:
Runtime Flexibility - Mining is an operation with razor thin margins and is only profitable with cheap electricity. Since this only occurs when energy has low to no demand (stranded), miners are not competing with households and businesses.
Mobility - Bitcoin miners are highly mobile and are often built right next to the power source, reducing transmission losses and optimising energy use at the source.
However one might feel about the net zero goals, there is no denying we should always prioritise reliability over sheer abundance. It's time Australia utilises the power of bitcoin to help stabilise our renewable grid to push forth to a sustainable future.
-
@ c7eadcf0:7821e562
2024-09-06 00:10:23Who would have thought that we would have the change to buy sub 60K Bitcoin again? With all the talk of mooning after the halving, seeing Bitcoin's price back around 56k at the time of this post is disappointing to the lettuce handed, ETF buying individuals that are not here for the revolution, but to make a quick buck.
Bitcoin being a neutral money, it is not unexpected that it would gain the attention of these types of people. I am actually glad that they are participants in this market has it helps transfer Bitcoin from weak unconverted holders to people who are fully dyed in the orange wool of the Bitcoin thesis.
Every time there is some geopolitical event, or some kind of economic crisis brewing on the other side of the world, Bitcoin normally takes a hit because it is a high liquid asset. This should be taken as a good sign when the price goes down as it shows that you can easily move in and out of Bitcoin with relative ease. Try doing that with your house, car or other assets. Sure you can sell them eventually but its not nearly as seamless as Bitcoin.
This lull in price will not last long, so if you got some dry powder sitting on the sidelines, today is a good day to buy some cheap corn. Framing Bitcoin as a liquid asset that can be sold in times of need is a good way to introduce Bitcoin to your nocoiner friends and family. I would hate for them to have to buy Bitcoin at much higher prices. Good for us. Bad for them. Amirite?
Just a short post from the Obsidian Nostr Writer Plugin. If you like writing long from content, I would highly recommend giving it a shot! Peace out.
-
@ 472f440f:5669301e
2024-09-05 22:25:15https://x.com/parkeralewis/status/1831746160781938947 Here's a startling chart from an American staple, Walgreens. The convenience store and pharmacy chain has seen its stock price plummet by more than 67% this year and by more than 90% from its all time high, which was reached in 2015.
The combination of the COVID lock downs and the lax laws around theft that followed were materially detrimental to Walgreens business. The crux of their problem at the moment, however, is a double whammy of those disruptions in their business coupled with the "higher for longer" interest rate policy from the Fed over the last couple of years. As Tuur points out in the tweet above, Walgreens has $34B in debt, which means they definitely have significant interest rate payments they need to make on a monthly basis. Tuur also points out that Walgreens has very little cash compared to their debt obligations. Let's take a look at their balance sheet as of May of this year.
Less than $1B in cash for $34B debt with $67.56B in total liabilities. Even worse, their cash balance was drained by more than 27% over the course of the year between May 2023 and May 2024. As you may notice their total assets fell by more than 15% over the same period. This is because Walgreens understands the dire financial straits it finds itself in and has begun shutting down thousands of their locations across the country.
The recent efforts of Walgreens to sell off their assets to raise cash to pay down their debts seem to be completely ineffective as their cash balance is falling faster than their total assets, which is falling 7x faster than their total liabilities. These numbers are most definitely going to get worse as cascading sell pressure in commercial real estate markets (which is the bucket that Walgreens locations fall into) drive down the value of their assets. Leaving them with less cash to pay down their debts as time goes on. To make matters worse, it puts the institutions that lent money to Walgreens in a terrible position. How many commercial and investment banks has Walgreens tapped to fund their operations with expensive debt? How exposed to Walgreens is any individual lender? Could a default on some or all of their loans catch these financial institutions off sides? If it isn't Walgreens that pushes them off sides, how many more bad borrowers would it take to push them off sides?
As our good friend Parker Lewis points out, the only way the hemorrhaging can be stopped is if the Federal Reserve and Federal Government step in with bail outs in the form of massive liquidity injections via quantitative easing and other emergency measures. On top of this, the Fed and the Federal Government find themselves in a classic catch-22. If they let Walgreens fall into bankruptcy it could set off a domino effect that could exacerbate inflation. Riteaid, a similar retail convenience store and pharmacy chain, filed for bankruptcy last October and is still wading its way through that process. Part of that process has been shuttering many of their storefronts. One has to imagine that since Walgreens and Riteaid are having these problems, some of their other competitors must be feeling the pain as well. If enough of these convenience stores, which tens of millions of Americans depend on for everyday goods, find themselves in a position where they have to shut down their stores it could lead to a supply crunch. People will obviously not be able to get their goods from Riteaid or Walgreens and will flee to alternatives, exacerbating the stress on their supplies, which will drive prices higher.
This is a catch-22 because the only way to avoid this mad dash for consumer goods in the midst of a convenience store Armageddon is to re-introduce ZIRP and flood the market with freshly printed dollars, which will drive prices up as well.
Talk about a rock and a hard place. You better get yourself some bitcoin.
Final thought... Zach Bryan radio crushes.
-
@ e771af0b:8e8ed66f
2024-09-05 22:14:04I have searched the web for "Find bitcoin block number from historical date" maybe 100 times in my life.
Never again.
You'll need a bitcoin node for this to work. The script is fast.
Install
WoT Install
one liner ```
curl
curl -o fjb.sh https://gist.githubusercontent.com/dskvr/18252c16cf85c06c1ee6cb5ae04a3197/raw/34bad6a35d98501978c8cd0c25b1628db1191cfe/fjb.sh && chmod +x fjb.sh
wget
wget -O fjb.sh https://gist.githubusercontent.com/dskvr/18252c16cf85c06c1ee6cb5ae04a3197/raw/34bad6a35d98501978c8cd0c25b1628db1191cfe/fjb.sh && chmod +x fjb.sh ```
Trust no one.
create file ``` vi fjb.sh
or
nano fjb.sh ```
review, copy and past into file ``` TIMESTAMP=$1 LOWER=0 UPPER=$(bitcoin-cli getblockcount)
while (( LOWER <= UPPER )); do MID=$(( (LOWER + UPPER) / 2 )) BLOCKHASH=$(bitcoin-cli getblockhash $MID) BLOCKTIME=$(bitcoin-cli getblockheader $BLOCKHASH | jq .time)
if (( BLOCKTIME < TIMESTAMP )); then LOWER=$(( MID + 1 )) elif (( BLOCKTIME > TIMESTAMP )); then UPPER=$(( MID - 1 )) else echo "$BLOCKTIME" exit 0 fi
done
echo "$UPPER" ```
give executable permissions
chmod +x ./fjb.sh
Usage
./fjb.sh <timestampSeconds>
It returns block number onlyExample
$: ./fjb.sh 1668779310 763719
-
@ 361d3e1e:50bc10a8
2024-09-05 20:32:32A wave of criticism against a supermodel who chose alternative cancer treatment, and yet she was cured
cancer #alternative #health #medicine #model #treatment #usa #showbiz
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ 8cb60e21:5f2deaea
2024-09-05 19:48:32Part 3: Asynchroni et DOM Manipulatio
3.1 Promissa et Async/Await
Praesent blandit. Nam nulla. Integer pede justo, lacinia eget, tincidunt eget, tempus vel, pede.
``javascript function simulaRequest(data, probabilitasErroris = 0.1) { return new Promise((resolve, reject) => { setTimeout(() => { if (Math.random() < probabilitasErroris) { reject("Error: Aliquid mali accidit"); } else { resolve(
Data accepta: ${data}`); } }, 1000); }); }simulaRequest("Lorem ipsum") .then((responsum) => console.log(responsum)) .catch((error) => console.error(error));
async function fetchData() { try { const responsum = await simulaRequest("Dolor sit amet"); console.log(responsum); } catch (error) { console.error(error); } }
fetchData(); ```
3.2 DOM Manipulatio
Morbi non lectus. Aliquam sit amet diam in magna bibendum imperdiet. Nullam orci pede, venenatis non, sodales sed, tincidunt eu, felis.
```javascript document.addEventListener("DOMContentLoaded", () => { const titulus = document.createElement("h1"); titulus.textContent = "Lorem Ipsum JavaScript"; document.body.appendChild(titulus);
const paragraphus = document.createElement("p"); paragraphus.textContent = "Neque porro quisquam est qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit..."; document.body.appendChild(paragraphus); const button = document.createElement("button"); button.textContent = "Fac Clic Me"; button.addEventListener("click", () => { alert("Gratias tibi ago pro clic!"); }); document.body.appendChild(button);
}); ```
3.3 Fetch API
Maecenas leo odio, condimentum id, luctus nec, molestie sed, justo. Pellentesque viverra pede ac diam.
``javascript async function fetchLoremIpsum() { try { const responsum = await fetch("https://api.lorem.space/image/game?w=150&h=220"); if (!responsum.ok) { throw new Error(
HTTP error! status: ${responsum.status}`); } const data = await responsum.blob(); const imago = document.createElement("img"); imago.src = URL.createObjectURL(data); document.body.appendChild(imago); } catch (error) { console.error("Problema cum fetching imagine:", error); } }fetchLoremIpsum(); ```
3.4 Local Storage
Cras mi pede, malesuada in, imperdiet et, commodo vulputate, justo. In blandit ultrices enim.
```javascript function salvaPreferentias(clavis, valor) { localStorage.setItem(clavis, JSON.stringify(valor)); }
function accipePreferentias(clavis) { const valor = localStorage.getItem(clavis); return valor ? JSON.parse(valor) : null; }
const preferentiae = { thema: "clarus", lingua: "Latina", notificationes: true };
salvaPreferentias("userPrefs", preferentiae);
const salvataePreferentiae = accipePreferentias("userPrefs"); console.log(salvataePreferentiae); ```
3.5 Exercitia Parti III
- Crea paginam web simplicem quae utitur fetch API ad exhibendum datos ex API publica.
- Implementa functionalitatem "drag and drop" utens DOM API.
- Construe applicationem "todo list" quae persistit datos in local storage.
Conclusio
Vivamus vestibulum sagittis sapien. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Etiam vel augue. Vestibulum rutrum rutrum neque. Aenean auctor gravida sem. Praesent id massa id nisl venenatis lacinia. Aenean sit amet justo. Morbi ut odio.
Cras mi pede, malesuada in, imperdiet et, commodo vulputate, justo. In blandit ultrices enim. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Proin interdum mauris non ligula pellentesque ultrices. Phasellus id sapien in sapien iaculis congue. Vivamus metus arcu, adipiscing molestie, hendrerit at, vulputate vitae, nisl.
Aenean lectus. Pellentesque eget nunc. Donec quis orci eget orci vehicula condimentum. Curabitur in libero ut massa volutpat convallis. Morbi odio odio, elementum eu, interdum eu, tincidunt in, leo. Maecenas pulvinar lobortis est.
Phasellus sit amet erat. Nulla tempus. Vivamus in felis eu sapien cursus vestibulum. Proin eu mi. Nulla ac enim. In tempor, turpis nec euismod scelerisque, quam turpis adipiscing lorem, vitae mattis nibh ligula nec sem. Duis aliquam convallis nunc. Proin at turpis a pede posuere nonummy.
Integer non velit. Donec diam neque, vestibulum eget, vulputate ut, ultrices vel, augue. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec pharetra, magna vestibulum aliquet ultrices, erat tortor sollicitudin mi, sit amet lobortis sapien sapien non mi. Integer ac neque. Duis bibendum. Morbi non quam nec dui luctus rutrum. Nulla tellus. In sagittis dui vel nisl. Duis ac nibh. Fusce lacus purus, aliquet at, feugiat non, pretium quis, lectus.
Suspendisse potenti. In eleifend quam a odio. In hac habitasse platea dictumst. Maecenas ut massa quis augue luctus tincidunt. Nulla mollis molestie lorem. Quisque ut erat. Curabitur gravida nisi at nibh. In hac habitasse platea dictumst. Aliquam augue quam, sollicitudin vitae, consectetuer eget, rutrum at, lorem. Integer tincidunt ante vel ipsum. Praesent blandit lacinia erat. Vestibulum sed magna at nunc commodo placerat. Praesent blandit. Nam nulla.
-
@ 472f440f:5669301e
2024-09-04 22:54:11For the last few months many people in bitcoin, myself included, have been focused on bitcoin's role as a macroeconomic asset. Bitcoin as a strategic reserve for the US government. Bitcoin as a strategic treasury asset for corporations. Bitcoin as a geopolitical hedge in a world that is trending toward a multi-polar power dynamic. This is where the focus has been. And for good reason. These trends will ultimately have a material effect on the price of bitcoin if they pick up steam.
However, with all of the focus on bitcoin as a strategic asset I think a couple of technical developments and trends have been overlooked. Particularly in the realm of second layer privacy. I'll touch on two of them in this letter; BOLT 12 invoices and the progression of ecash.
Yesterday afternoon the Strike (a company Ten31 is very proud to be backing) team released a blog post that detailed their journey to implementing BOLT 12 offers in their product stack. For those who are unaware of BOLT 12 and why it is important, in short, it is an upgrade to the lightning network that would make receiving bitcoin on the lightning network more private while also significantly improving the user experience. The current standard for invoicing people via the lightning network is BOLT 11, which forces users to create a unique invoice every time they want to receive bitcoin and comes with privacy tradeoffs for the party receiving bitcoin.
BOLT 12 brings with it route blinding which allows a receiver to publish a lightning offer to the network without revealing their node's public key. It also brings with it onion messaging, which allows users of the lightning network to communicate without a dependence on HTTP, which can be censored by a motivated state actor. On top of this, it enables users to create a static invoice that can be paid multiple times by multiple people. Think of a band putting their Venmo or Cash App QR code next to their tip jar on the stage. They'll be able to add a private lightning invoice their audience can pay to now.
https://strike.me/blog/bolt12-offers/
As it stands right now, Strike has only enabled BOLT 12 offers and there is work to do at the protocol layer of lightning and the different implementations of that protocol to get the full benefits of BOLT 12, but this is material progress that gets us closer to a significantly better user experience on the lightning network. If you read Strike's blog post you'll come to appreciate the collaboration between the teams working on these implementations and the companies implementing the protocol that is necessary to get these features live. Shout out to everyone who worked on this. Everyone who uses the lightning network will be better off when BOLT 12 is fully implemented.
Moving on. Earlier today the founder of the BTCPay Server open source project, Nicolas Dorier, published a blog post outlining his thoughts on how ecash has the potential to solve problems that many have tried to solve by launching their own blockchains in the past. The problem with trying to "blockchain the world" is that blockchains are very inefficient and only really work for one application; enabling a peer-to-peer digital cash system with no trusted third parties (i.e., bitcoin). However, the ultimate goals of the thousands of blockchain projects that spun up in bitcoin's wake are desirable. Cheap, private and instant transactions. The ability to trivially spin up private money tokens suited for very particular use cases. Overall great UX that makes it easy for people to realize the benefits of "blockchain technology".
The problem that has existed to date is that you don't need a blockchain for all of these things. In fact, having a blockchain for these things proves to be detrimental to their ultimate goals. Instead, what people really need is a protocol that gives you the granular control, privacy, instantaneous transactions and UX that anchors to bitcoin. This is exactly what Chaumian Mints bring to the bitcoin stack.
This is something that we've been screaming about for more than seven years in this rag. Now with ecash protocols like Cashu and Fedimint maturing, gaining traction and bringing products to market that highlight the power and flexibility of ecash systems, people are beginning to see the promise. It is only a matter of time before more and more people begin to realize this potential.
Another benefit of ecash protocols is the fact that they are siloed from each other. Ecash mints are permissionless; any one person or group of people can spin them up, offer their preferred services and maintain (or fail to maintain) their mints. The failure of one mint is not a systemic risk to other mints. This is very different from token projects that are spun up on blockchains. The last ten years have proven that individual token projects can prove to be systemic problems for individual blockchains (i.e., The DAO token on Ethereum). Being able to silo mints is the only way to ensure that the utility of ecash overall is actually scalable and robust.
Don't get so distracted by the bitcoin macro talk that you miss out on the incredible technical developments happening on top of and adjacent to bitcoin.
Final thought... Vibes are high.
-
@ 8cb60e21:5f2deaea
2024-09-05 19:48:32Part 1: Fundamentum Javascripti
1.1 Introductionis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam euismod, nisi vel consectetur interdum, nisl nunc egestas nunc, vitae tincidunt nisl nunc euismod nunc. Sed euismod, nisi vel consectetur interdum, nisl nunc egestas nunc, vitae tincidunt nisl nunc euismod nunc.
javascript console.log("Salve, mundi!");
1.2 Variabiles et Typi Datorum
Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Integer convallis, nunc ac blandit tincidunt, ipsum augue tincidunt nunc, vitae tincidunt nisl nunc euismod nunc.
javascript var numerus = 42; let textus = "Lorem ipsum"; const CONSTANTIA = true;
1.2.1 Typi Numerorum
Curabitur in libero ut massa volutpat convallis. Morbi odio odio, elementum eu, interdum eu, tincidunt in, leo.
javascript let integer = 10; let floatinum = 3.14; let scientificum = 2.998e8;
1.2.2 Typi Textuum
Maecenas tristique, est et tempus semper, est quam pharetra magna, ac consequat metus sapien ut nunc.
javascript let textusBrevis = 'Carpe diem'; let textusLongus = "Quod erat demonstrandum"; let textusTemplatum = `Cogito, ${textusBrevis.toLowerCase()}, sum`;
1.3 Operatores
Donec dapibus. Duis at velit eu est congue elementum. In hac habitasse platea dictumst.
```javascript let a = 5; let b = 3;
console.log(a + b); // Additio console.log(a - b); // Subtractio console.log(a * b); // Multiplicatio console.log(a / b); // Divisio console.log(a % b); // Modulus console.log(a ** b); // Potentia ```
1.4 Structurae Controli
Morbi non lectus. Aliquam sit amet diam in magna bibendum imperdiet. Nullam orci pede, venenatis non, sodales sed, tincidunt eu, felis.
1.4.1 Conditionales
```javascript let aetas = 20;
if (aetas >= 18) { console.log("Adultus es"); } else if (aetas >= 13) { console.log("Adolescens es"); } else { console.log("Puer es"); } ```
1.4.2 Iterationes
``javascript for (let i = 0; i < 5; i++) { console.log(
Iteratio ${i}`); }let j = 0; while (j < 5) { console.log(
Dum iteratio ${j}
); j++; } ```1.5 Exercitia Parti I
- Scribe programma quod convertat gradus Celsius in Fahrenheit.
- Crea algorithmum qui determinat si numerus est par vel impar.
- Implementa "FizzBuzz" pro numeris 1 ad 100.
-
@ 42342239:1d80db24
2024-09-02 12:08:29The ongoing debate surrounding freedom of expression may revolve more around determining who gets to control the dissemination of information rather than any claimed notion of safeguarding democracy. Similarities can be identified from 500 years ago, following the invention of the printing press.
What has been will be again, what has been done will be done again; there is nothing new under the sun.
-- Ecclesiastes 1:9
The debate over freedom of expression and its limits continues to rage on. In the UK, citizens are being arrested for sharing humouristic images. In Ireland, it may soon become illegal to possess "reckless" memes. Australia is trying to get X to hide information. Venezuela's Maduro blocked X earlier this year, as did a judge on Brazil's Supreme Court. In the US, a citizen has been imprisoned for spreading misleading material following a controversial court ruling. In Germany, the police are searching for a social media user who called a politician overweight. Many are also expressing concerns about deep fakes (AI-generated videos, images, or audio that are designed to deceive).
These questions are not new, however. What we perceive as new questions are often just a reflection of earlier times. After Gutenberg invented the printing press in the 15th century, there were soon hundreds of printing presses across Europe. The Church began using printing presses to mass-produce indulgences. "As soon as the coin in the coffer rings, the soul from purgatory springs" was a phrase used by a traveling monk who sold such indulgences at the time. Martin Luther questioned the reasonableness of this practice. Eventually, he posted the 95 theses on the church door in Wittenberg. He also translated the Bible into German. A short time later, his works, also mass-produced, accounted for a third of all books sold in Germany. Luther refused to recant his provocations as then determined by the Church's central authority. He was excommunicated in 1520 by the Pope and soon declared an outlaw by the Holy Roman Emperor.
This did not stop him. Instead, Luther referred to the Pope as "Pope Fart-Ass" and as the "Ass-God in Rome)". He also commissioned caricatures, such as woodcuts showing a female demon giving birth to the Pope and cardinals, of German peasants responding to a papal edict by showing the Pope their backsides and breaking wind, and more.
Gutenberg's printing presses contributed to the spread of information in a way similar to how the internet does in today's society. The Church's ability to control the flow of information was undermined, much like how newspapers, radio, and TV have partially lost this power today. The Pope excommunicated Luther, which is reminiscent of those who are de-platformed or banned from various platforms today. The Emperor declared Luther an outlaw, which is similar to how the UK's Prime Minister is imprisoning British citizens today. Luther called the Pope derogatory names, which is reminiscent of the individual who recently had the audacity to call an overweight German minister overweight.
Freedom of expression must be curtailed to combat the spread of false or harmful information in order to protect democracy, or so it is claimed. But perhaps it is more about who gets to control the flow of information?
As is often the case, there is nothing new under the sun.
-
@ 8cb60e21:5f2deaea
2024-09-05 19:48:32Part 2: Functiones et Objecta
2.1 Functiones
Fusce posuere felis sed lacus. Morbi sem mauris, laoreet ut, rhoncus aliquet, pulvinar sed, nisl.
``javascript function salutatio(nomen) { return
Salve, ${nomen}!`; }console.log(salutatio("Cicero"));
const valedictio = (nomen) => { console.log(
Vale, ${nomen}!
); };valedictio("Seneca"); ```
2.1.1 Parametri Default et Rest
Nunc purus. Phasellus in felis. Donec semper sapien a libero.
``javascript function congregatio(primus, secundus = "mundi", ...ceteri) { console.log(
${primus} ${secundus}); console.log(
Ceteri: ${ceteri.join(", ")}`); }congregatio("Salve"); congregatio("Lorem", "ipsum"); congregatio("Veni", "vidi", "vici", "et", "cetera"); ```
2.2 Objecta
Nam congue, risus semper porta volutpat, quam pede lobortis ligula, sit amet eleifend pede libero quis orci.
``javascript const persona = { nomen: "Iulius", cognomen: "Caesar", aetas: 55, salutatio: function() { return
Salve, ${this.nomen} ${this.cognomen}!`; } };console.log(persona.salutatio()); ```
2.2.1 Methodi Object
Nullam porttitor lacus at turpis. Donec posuere metus vitae ipsum. Aliquam non mauris.
```javascript const claves = Object.keys(persona); console.log(claves);
const valores = Object.values(persona); console.log(valores);
const paria = Object.entries(persona); console.log(paria); ```
2.3 Arrays
Morbi porttitor lorem id ligula. Suspendisse ornare consequat lectus. In est risus, auctor sed, tristique in, tempus sit amet, sem.
```javascript const fructus = ["malum", "pirum", "uva", "cerasum"];
fructus.forEach((fructus) => { console.log(fructus); });
const longiFructus = fructus.filter((fructus) => fructus.length > 4); console.log(longiFructus);
const maiusculaFructus = fructus.map((fructus) => fructus.toUpperCase()); console.log(maiusculaFructus); ```
2.4 Exercitia Parti II
- Crea functionem quae calculat factorialem numeri.
- Implementa methodum quae invenit maximum valorem in array.
- Scribe programma quod ordinat objecta in array secundum proprietatem specificam.
-
@ e27ae11e:e0c36580
2024-09-05 16:28:24In the present computerized age, having a website is essential for any business, including tradies. Yet, it's not just about having a website; about having a website looks perfect and functions admirably on all gadgets. This is where responsive web design comes in. We should investigate why responsive web design is fundamental for tradies and how it can help your business. Visit us > Best Tradie Web Design Key takeaways Mobile-Friendly is a Must: Guarantee your website looks perfect and functions admirably on cell phones and tablets to draw in additional clients.
Better Insight: A responsive site is simpler to utilize, making guests blissful and bound to reach you.
Higher Google Rankings: A versatile website can assist you with seeming higher in list items, carrying more traffic to your webpage.
Set aside Time and Cash: Overseeing one responsive site is less expensive and easier than having separate locales for various gadgets. Overview Responsive web design is a methodology that does a good job for your website and capacity suitably on any contraption, whether it's a PC, tablet, or cell. It suggests your website will thusly change its format and content to fit the screen size of the contraption being used. This ensures a predictable and beguiling experience for your visitors, paying little heed to how they access your site. What difference Does It Make for Tradies? 1. Increased Versatile Utilization More individuals are utilizing their cell phones to peruse the web. Potential clients could look for your administrations while in a hurry. On the off chance that your website isn't versatile, you could lose those possible clients. Responsive web design guarantees that your webpage looks perfect and functions admirably on cell phones, making it simpler for guests to find and reach you. Tip: Check your website analytics to see how many visitors are accessing your site from mobile devices. Use this data to prioritize mobile optimization. 2. Better Client Experience A responsive website gives a superior client experience. At the point when guests can undoubtedly explore your site and find the information they need without zooming in or scroll on a level plane, they are bound to remain longer and investigate your administrations. A positive client experience can prompt more requests and appointments. Tip: Use a clean and simple design that is easy to navigate on all devices. Avoid clutter and ensure that buttons and links are easy to tap 3. Improved Website optimization Rankings Web crawlers like Google focus on versatile websites. In case your site is responsive, it will rank higher in list things. This infers more prominent detectable quality for your business and more potential clients believing that you are on the web. Higher rankings can basically uphold your web-based presence and attract more busy time gridlock to your website. Tip: Guarantee your website content is applicable and helpful to your interest group. Excellent substance further develops Search engine optimization and keeps guests locked in. 4. Cost-Powerful Keeping a single responsive website is smarter than having separate objections for workspace and flexible clients. With responsive web design, you simply need to regulate and invigorate one website, saving you time and money long term. Tip: Consistently update your website's substance and design to keep it new and important, guaranteeing it stays viable and cost-productive. 5. Consistent Marking A responsive website guarantees that your marking stays steady across all gadgets. Whether a client visits your site on a PC or a cell phone, they will see similar design, tones, and logo. Steady marking assists fabricate trust and acknowledgment with your crowd. Tip: Utilize a similar variety plan, logo, and textual styles across all variants of your website to keep a predictable brand personality.
Make Your Website Responsive 1. Pick a Responsive Subject If you are using a website producer or a substance the chiefs system like WordPress, pick a responsive subject. These subjects are designed to be dynamic and will consequently change in accordance with various screen sizes. Tip: Preview the theme on different devices before making a final decision to ensure it meets your needs. 2. Optimize Pictures and Media Guarantee that pictures and media records are improved for quick stacking on all gadgets. Enormous pictures can dial back your site, particularly on cell phones. Use devices to pack pictures without forfeiting quality. Tip: Use image compression tools like TinyPNG or JPEGmini to reduce the file size of your images without losing quality 3. Simplify Route Ensure your website's route is basic and simple to use on all gadgets. Utilize clear menus and buttons that are not difficult to tap on a touchscreen. Try not to utilize an excessive number of connections or complex dropdown menus that can be hard to explore on a little screen. Tip: Use a simple, easy-to-use menu that adapts to different screen sizes. A hamburger menu can be effective for mobile devices. 4. Use Adaptable Designs Design your website utilizing adaptable formats that can change in accordance with various screen sizes. This can be accomplished utilizing CSS (Flowing Templates) to make a liquid framework design that changes in light of the gadget's screen size. Tip: Avoid fixed-width layouts. Instead, use percentage-based widths that allow your content to resize fluidly. 5. Test Your Website Reliably test your website on different contraptions and screen sizes to promise it looks perfect and works fittingly. There are online instruments available that can help you see how your webpage appears on different devices. Tip: Utilize online instruments like Google's Dynamic Test and Browser Stack to perceive how your website looks and works on changed gadgets and programs. Conclusion Responsive web design is essential for tradies that need to attract and hold clients in the present high level world. It ensures that your website looks great and works honorably on all devices, giving you an unrivaled client experience, further fostering your Web enhancement rankings, and saving you time and money. By picking a responsive topic, streamlining pictures, improving on route, and testing your webpage consistently, you can make a responsive website that assists your exchange business with flourishing on the web. Putting resources into responsive web design isn't just about staying aware of patterns; it's tied in with giving the most ideal experience to your guests and guaranteeing your business stays serious. In this way, make the strides today to make your website responsive and watch your web-based presence develop!
-
@ 469fa704:2b6cb760
2024-09-05 15:06:49The Evolution of Web 3.0: Bitcoin's Role in Decentralizing the Internet
Introduction to Web 3.0
Web 3.0, often referred to as the decentralized web, represents the next phase in the evolution of the internet. Unlike its predecessors, Web 3.0 aims to redistribute control from centralized entities back to individual users through technologies like blockchain, cryptocurrencies, and decentralized applications (dApps). This shift promises a more democratic internet where users control their data, identity, and digital destiny.
The Bitcoin Protocol: A Foundation for Web 3.0
Bitcoin's Influence on Decentralization
Bitcoin, introduced in 2008, can be seen as a precursor to Web 3.0 due to its decentralized nature. The Bitcoin protocol introduced the world to blockchain technology, a decentralized ledger that records all transactions across a network of computers. This technology underpins Web 3.0's ethos by:
- Promoting Decentralization: Bitcoin's network operates without a central authority, showcasing how internet services could run on similar principles, reducing the power of centralized tech giants.
- Enhancing Security and Privacy: Through cryptographic means, Bitcoin ensures that transactions are secure and pseudonymus, a feature integral to Web 3.0's vision of user-controlled data.
Scalability and Functionality Challenges
However, Bitcoin's protocol wasn't designed on the base layer with the complex applications of Web 3.0 in mind. Its primary function as a digital currency means:
- Scalability Issues: Bitcoin's blockchain has limitations in transaction speed and volume, which might not suffice for a fully realized Web 3.0 environment where millions of micro-transactions could occur seamlessly.
- Limited Smart Contract Capabilities: Bitcoin's scripting language isn't as versatile as platforms like Ethereum, which are designed to support a broader range of decentralized applications.
Expanding Bitcoin's Role with Layer 2 Solutions
To bridge these gaps, developers are working on Layer 2 solutions like the Lightning Network for faster transactions, and projects like Stacks aim to bring smart contract functionality directly to Bitcoin. These innovations suggest that while Bitcoin might not be the sole backbone of Web 3.0 yet, it can significantly contribute to its infrastructure. In the long term, the question is whether we need more than one network, I mean, we don't have multiple Internets today. The market will probably decide in favor of the strongest and most secure network, and Bitcoin is by far that.
Web 3.0 Beyond Bitcoin
A Broader Blockchain Ecosystem
At the moment Web 3.0 encompasses by far more than just Bitcoin. It includes:
- Ethereum and Smart Contracts: Ethereum's introduction of smart contracts has been pivotal, allowing for decentralized applications that can interact in complex ways, far beyond simple transactions.
- Other Blockchains: Platforms like Solana, Sui, and Near are gaining traction for their high throughput and lower costs, addressing some of Bitcoin's limitations on the base layer.
The Cultural and Economic Shift
The move towards Web 3.0 isn't just technological but cultural. There's a growing sentiment, reflected in posts on platforms like X, that users are ready for a change where they own their digital presence. Here's some background based on general knowledge and trends up to 2024:
Cultural Shift:
- Distrust in Centralized Institutions: There's been a growing distrust in traditional centralized institutions like banks, governments, and large corporations. This distrust stems from various scandals, data breaches, privacy concerns, and perceived inefficiencies or corruption. Posts on platforms like X or even more on Nostr reflect this sentiment, where users often discuss the diminishing trust in these institutions.
- Rise of Individual Empowerment: Culturally, there's a move towards empowerment of the individual, facilitated by technology. Social media, blockchain, and other decentralized technologies give individuals tools to bypass traditional gatekeepers in finance, media, and more. This shift champions the idea that individuals should have more control over their data, finances, and digital identity.
- Identity and Community: Decentralization also touches on identity politics and community governance. There's a trend towards localism or regionalism where communities seek more control over their governance, which can be seen in movements for local autonomy or even secessionist sentiments in various parts of the world.
- Cultural Movements: Movements like the maker culture, DIY (Do It Yourself), open-source software, and even the gig economy reflect a cultural shift towards decentralization where individuals or small groups can produce, create, or work independently of large entities.
Economic Shift:
- Decentralized Finance (DeFi): DeFi represents one of the most tangible shifts, aiming to recreate and potentially improve financial systems outside of traditional banking. This includes lending, borrowing, and earning interest in a trustless, permissionless environment, primarily using blockchain technology.
- Cryptocurrencies and Tokenization: The rise of cryptocurrencies like Bitcoin and Ethereum symbolizes a move away from centralized monetary systems. Tokenization of assets, from art (NFTs - Non-Fungible Tokens) to real estate, embodies this shift, allowing for fractional ownership and reducing the barriers to investment.
- Globalization vs. Localism: While globalization has interconnected economies, there's a counter-trend where economic decentralization supports local economies. This can be seen in the push for local currencies, community-supported agriculture, or local energy production like solar microgrids.
- Work and Employment: The gig economy, remote work, and digital nomadism are part of this economic shift. Platforms enabling freelance work decentralize employment, moving away from traditional office environments and 9-to-5 jobs.
General Observations:
- Technology as an Enabler: Blockchain, the internet, and advancements in communication technology are pivotal in this shift. They provide the infrastructure necessary for decentralization to occur at scale.
- Political Implications: Economically, this shift maybe challenges existing power structures, potentially leading to regulatory battles as seen with cryptocurrencies. Culturally, it might lead to a redefinition of nationalism, community, and individual rights in the digital age.
- Challenges: Despite its promise, decentralization faces hurdles like scalability issues, regulatory pushback, the digital divide, and the potential for new forms of centralization (e.g., large crypto exchanges becoming new central authorities).
Conclusion: Bitcoin's Place in Web 3.0
Bitcoin's protocol ignited the spark for a decentralized internet, but Web 3.0 is evolving into a multifaceted ecosystem where Bitcoin might play a crucial, though not yet exclusive, role. The integration of Bitcoin with newer technologies and platforms could see it becoming a fundamental layer in the Web 3.0 stack, particularly in areas of value transfer and as a store of value within decentralized finance (DeFi).
As we progress, the synergy between Bitcoin's proven security and stability, combined with the innovation of other blockchain technologies, might just be the blend needed for Web 3.0 to achieve mainstream adoption, ensuring the internet becomes more open, secure, and user-centric. As stated before, the market will probably decide in favor of the strongest and most secure network, and Bitcoin is by far that.
-
@ 361d3e1e:50bc10a8
2024-09-05 12:58:30He wished Pfizer's vaccine naysayers screwed, and now he's screwed
uk #music #vaccine #covid #sideeffects #health #freespeech
-
@ 9dd283b1:cf9b6beb
2024-09-02 10:26:53There's a saying: Bitcoin is hope.
But once you truly understand Bitcoin, many of the old fiat goals in your life start to lose meaning. It can feel disorienting and even depressing, because you realize you need to build entirely new goals, and you're unsure where to begin.
For example, maybe your plan was to get a mortgage, buy a house, and imagine your kids playing there for the next 20 years while you "happily" pay off a 25-year loan. But when you understand Bitcoin, that plan doesn’t make sense. Why would I put a 100k-200k down payment into a mortgage when it's likely better be in Bitcoin? Plus, you lose about 2.5% to 4% of the total price on taxes, fees, brokers, and other costs. Crazy, right?
I even made a short presentation for my wife, explaining why we should never buy a house given current interest rates and down payment requirements. She responded that she wants a house anyway, because it feels better to own one. But does a 25-year mortgage really make it feel like it’s yours?
She also said it’s depressing to not follow the conventional path. It’s hard to feel satisfied with numbers when everyone around you is deep into mortgages—you want to be one of them. You want to visit their houses and invite them to "yours." It's like becoming sober in a room full of addicts. You know it’s better for you, but the world around you seems so strange that part of you wants to go back, even though you know it hurts. Yet, when you do go back, the joy isn't there anymore. You feel...nothing. And then you decide to withdraw.
I remember paying off my first mortgage for an apartment, and I felt nothing. And that was before I fell down the Bitcoin rabbit hole. Now I know if I ever took out a mortgage again, I’d just feel regret for not keeping the money in Bitcoin. And by the time you finish paying it off, you probably want to sell the property and move somewhere else.
So, the rational decision is to keep everything in Bitcoin and rent instead.Unless, of course, Bitcoin goes to zero. There are only two outcomes for Bitcoin: it’s either going to infinity, or it's going to zero. There’s no scenario where it just hovers at 100k or 60k for the next 20 years—unless people are foolish enough to give away self-custody. If they do, we'll end up with digital gold. So the reasonable question is - how can you be sure? Well, you can't. But we are betting on it and it works for now. Worst case we will need to start from 0. But then there will be no hope anymore.
We are staying in the infinity camp. And when you are in that camp every time you make a big purchase, you’re shorting Bitcoin. Solution - simple, - don't buy anything. There’s a popular meme: You will own nothing, and you will be happy. But if you’re a Bitcoiner, it's more like: You will own only Bitcoin, and you probably won’t be happy about it. Why would I pay 30k for a car when I can lease one? Why put 100k down on a house when I can rent?
The only justification is mental comfort, peace of mind. Or perhaps you value the illusion of owning a physical thing more than the genuine ownership of something virtual. It’s confusing, isn’t it? Sure, you can own a bicycle. But owning a house? That's tricky. Imagine you’re a Russian citizen with a house on Lake Como, and suddenly, new sanctions mean Italy no longer recognizes your property. Or squatters break in while you’re on vacation, and now you need to go through a court battle to evict them.
Extreme situations, I know. But no one thinks it will happen to them—until it does.
So, you’ve sold everything to buy Bitcoin. You don’t own anything except Bitcoin, and you feel sad. Why?
What can you buy with Bitcoin that’s more valuable? Something that won’t depreciate over time. Something like time.
Time with your kids. Time with your family. Time with yourself.
There’s a concept called FIRE and then there is a Bitcoin FIRE calculation (https://bitcoincompounding.com/). In simple terms, you spend your Bitcoin slowly enough that it grows faster than you can spend it (in fiat terms). Unlike traditional assets, there’s no yield or dividends, so the only way it works is if Bitcoin continues its cycles. And you need to be at least two cycles in to make it work.
But personally, I don’t think there will be cycles anymore. I believe this October-November will break all the models, and Bitcoin will do what Bitcoin does: surprise everyone. I read somewhere a thought that stuck with me—imagine you wake up on a planet Earth on January 1st. You know nothing about the seasons or weather. After six months of only increasing temperatures, you’d be 100% certain it’s only getting hotter from here.
So what hope does Bitcoin offer? Hope that I can spend more time with my family. Hope that I can create something different for them. Hope that I can live without the weight of fiat goals. Hope that it's only getting hotter from here.
I just need to get through the withdrawal phase.
originally posted at https://stacker.news/items/662939
-
@ a6631624:24ba1a2f
2024-09-01 22:33:57I started V1 of this blog back in Q2 2023 on other platforms. And, I started writing for it about a year before that. Since then, all of my posts -- both in the backlog and currently published -- have undergone rework after rework as I painstakingly refine the presentation of these rarely spoken and "never-before-thought" ideas. Yet, the posts I've most stalled and blown off have been those pertaining to Gnosticism.
The reason being that it's just overwhelming the amount of wrongs I have to right, the number of misconceptions I must correct, the scope of the programs I have to bypass, and the shear volume of aspects I need to educate on just to convey Gnosticism and the Gnostic spirit accurately, as I tap into it.
And, we haven't even began talking about the number of butts I've got to prick in the process.
So, this a massive undertaking that I have continually delayed. And, I fear, in my delayedness, that I've allowed too much wrong to proliferate in the the meme pool of "Gnosticism" unchallenged. And though, I've been shamefully ignoring the pot, I still feel I have just enough time to stir before the food is burnt.
So, let's begin.
What is Gnosticism?
Gnosticism, as we inherit it in America, is a vein of Orpho-Platonism.
Obviously.
Not Hermeticism. Not Christianity. And, certainly, not Judaism.
But, Orpho-Platonism.
Particularly, Western Gnosticism can be described as a syncretism of the Greek mystery religions centering the Orphic vein -- which comes to us from Orpheus, through Pythagoras (and most likely from Egypt and Babylon through his studies), through Plato. As a matter of fact, the mythological through-line from Gnosticism to Plato, to Orphism, and back to Egyptian mythologies is glaring when you read the myths, even without being a buff.
Yet, this is not the form of Gnosticism we usually first encounter. We don't learn of it as a complete and independent framework of hellenic origin, but usually as a half-thing mix mashed with something else; as a "parasite religion" as I've recently heard it mocked.
This stems from the Christian-centered folly of conflating Gnostic Christianity with Gnosticism itself, both historically and theologically, as if Gnosticism "came from" Christianity. Such beliefs are simply failures of historical and cultural inquiry. But, this "entanglement" that persists in the minds of the many today, is rooted in the fact that Western Gnosticism garnered it's first bout of attention (i. e. major hostilities) when it appeared in the early centuries CE — as a variety of rouge mystery cultists attempted to integrate the Jesus figure into their canons.
As Christ-followers, they'd adopt Jesus as the latest prophet in their esoteric lineage (from Orpheus to Pythagoras, for example) with many choosing to participate in Jesus-worship activities along side the other early Christian varieties. This is the origin of those who call themselves "Gnostic Christians" (a.k.a. Gnostic followers of Christ) today.
However, these mystery cultists -- unlike other Christians -- did not renounce their traditions to become whole converts into the Jewish way. They quietly retained them, seeking not to "convert" or rouse the other Christians, but to cultivate their own understandings of the texts in line with their Greek way. And, that is why their Jesus — "Gnostic Jesus" — is a little divergent from the norm. He is not interpreted to take on the throughly Jewish character and ideological background of Abrahamic Jesus, but a Hellenic character and background inside of a Jewish body (with the body thing being debatable).
And that, as we have learned, is very !!!TRIGGERING!!! to the zealots for Judeo-Christian ideology. This little attempt at cultural assimilation would result in being seeing as not just some kind of competitor, a but a mortal enemy to the ideology and spread the proper Christian -ness. Thus, "the Gnostics" — those retaining the beliefs of the mystery cults -- were branded the worst of "heretics," worthy of being rooted out of all influence and power by any means necessary.
And, so began the hiding.
``` Transmission Note 01:
The Greeks and other peoples were a lot more open to input from cultures and pantheons beyond their own than the Jews are. I believe this led them to underestimate the extent to which the Jewish -ness defined the character and how Christianity was meant to be an expansion of that -ness rather than an earnest spiritual or intellectual exploration.
Essentially, they did not realize there was this agenda and rigid ethnic claim to ownership of the Jesus character. And, the misstep of trying to engage with it as such is what led the mystery cultists to inadvertently cause such great offense.
Now, of course, the plan was always to convert, kill, persecute, and/or disenfranchise anyone and any culture that did not give way to the planned faith (Catholicism). But, they really stay aggro'd on the Gnostic Christians, which is why everybody finds them and thinks they're the whole of Gnosticism.
``` For half of the last 2000 years, the Christian mystery cultists publicly behaved and saw themselves as Christians, and that is indeed what they called themselves ("Gnostic" is a name that was given to them collectively and retroactively). But, they entertained their mysteries in private. They preserved their belief systems through metaphor and code, they prepared private gatherings, and they participated in both new and ancient rituals in secret. They also, famously, wrote and distributed their own texts among themselves, drew and documented esoteric meaning from The Bible, and as time went on, became the Valentinians, Manichaens, Cathars, Mandaeans, etc...
All of whom, in the end, lost themselves.
``` Transmission Note 02:
The non-Christian mystery cultists behaved much the same, continuing to exist beneath the surface under other names and "heresies." Seems like most died up to now, but the mysteries of some are still carried by different orgs, lines of thought, and denominations just like the Orphic vein.
``` Sometimes genocided, sometimes not, they all became more and more assimilated into the Christian worldview, losing and twisting up bits of their gnosis until they were no longer carriers of the mysteries, but dead ends. Most notably, the information surrounding death either came to mimic that of Christianity and/or became platitudinal, losing it's instructional value. And, that's just what Christianity does — its function is to destroy the means and routes to Gnosis; forcing you to succumb, in one way or another, to the Evil-bland power of the demiurgic drone.
It breaches. It invades. It colonizes. It burns.
All of this is why, despite modern and historical claims, it is clear that Gnosticism and Christianity share no common cause and are, in fact, fundamentally opposed. This is obvious from their logical ends, on their faces, and Gnostic Christians are lost, or "heretical," Gnostics as far as I am concerned.
``` Transmission Note 03:
Despite this, there are very few Gnostic Christians who have (so far) maintained a non-Abrahamic Jesus and allegedly find bits of gnosis by focusing through the figure. That certainly makes them distinct from the Judeo-Catholic lineage and this, among other non-standard Christs, are the only reason why I make the distinction between Catholicism and Christianity in other posts.
``` But, thus far, I've (necessarily) given you more of a history lesson on them than an explanation of what Gnosticism really is.
Features of Gnosticism
Globally and as a phenomenon, Gnosticism is the metaphysical worldview positing a duality between self-consciousness and material nature, with need for man to overcome the latter by means of personal knowledge of the self and of the nature of reality (Gnosis). Further, it:
- Posits a hostile world order.
- Asserts a material reality that naturally restricts the meaningful will and ability of self-conscious man within its objective and knowable parameters.
- Affirms the free will and intellectual agency of self-conscious man as means by which he can pursue, gain, and apply Gnosis.
- Calls for a personal journey toward individuation, as man cannot attain Gnosis collectively or by means of others, but only through his own efforts.
Gnosticism is an emergent worldview, appearing across time and space organically, rather than as a worldview constructed for socio-political purposes like religions. As such, it does not share the goal or function of religion as a means of socio-political management. Yet, still, it takes on the three forms that all worldviews do -- mythic, secular, and atheistic. Specifically (with examples), there is:
-
Mythic Gnosticism -- taking on a spiritual character, dealing with immaterial realms and entities:
-
- Classical/Theistic Gnosticism
-
- Jungian Analysis
-
Secular Gnosticism -- taking on a political character, dealing mainly with material powers and principalities:
-
- Prometheanism
-
- Reincarnation Truthers (ET)
-
- American Conspiracy Culture (Alex Jones, David Icke, etc...)
-
- Plot of The Matrix
-
- Forms of Anarchism
-
Gnostic Atheism -- taking on a philosophical character, dealing with ethics and metaphysics:
-
- Objectivism
-
- Simulation Theory (some)
-
- e/acc
I, personally, view Gnosticism as a signal you pick up on. A well broadcast fact of reality that you become attune to (if you so have the capacity) after an alienating event: a realization, a condition, or a happening that snaps you out of a given collective drone and spurns the oh, so gnostic sense that something is deeply wrong with the world. Often, it's a noticing of hyleticism, a noticing of a naturally systemic injustice, or a just a longstanding experience of disconnect with the norms and trajectory of the world. But, after boarding the Gnostic-line of thought, a decent amount path-find their way to actual Gnosticism. And, while that Gnosticism may wear many different faces and metaphorical frameworks, it's always says the same thing.
``` This isn't exclusive to me. I'm the only one I've heard explicitly say this, but I've seen all serious Gnostics talk about this in a way that suggests what I am. Additionally, those "alienating events," as I've coined, are not spontaneous, they're usually a long time coming.
``` That's why I've listed only 4 characteristics — of Gnosticism: because, contrary to what most scholars and enthusiasts would say, that's all you need to describe that thing. And, by being able to identify what are essentially Gnostic first principles, we are able to understand and talk about Gnosticism much more pointedly.
For one, it gives us a kind of tracking system where we can talk about Western Gnosticism but also see Gnosticism itself, Eastern Gnosticism, and Gnosticism's appearance in tribal cultures around the world. We can see it branching off in America or taking on some new flavor in Brazil. We can also see it when it isn't appearing in an explicitly spiritual form, but as a literary theme or a cultural meme. So, fittingly, this understanding of Gnosticism is as broad as the phenomena itself since it is much more in line with how it actually manifests within the world.
Yet, you’ll also see that it is somehow much more precise than the long, droning lists that Stephan Hoeller and a few others have produced:
- There is an original and transcendental spiritual unity from which emanated a vast manifestation of pluralities.
- The manifest universe of matter and mind was created not by the original spiritual unity but by spiritual beings possessing inferior powers.
- One of the objectives of these creators is the perpetual separation of humans from the unity (God).
- The human being is a composite: the outer aspect is the handiwork of the inferior creators, while the inner aspect is a fallen spark of the ultimate of the divine unity.
- The sparks of transcendental holiness slumber in their material and mental prison, their self-awareness stupefied by the forces of materiality and mind.
- The slumbering sparks have not been abandoned by the ultimate unity; rather, a constant effort directed toward their awakening and liberation comes forth from this unity.
- The awakening of the inmost divine essence in humans comes through salvific knowledge, called “gnosis.”
- Gnosis is not brought about by belief of by the performance of virtuous deeds or by obedience to commandments; these at best serve to prepare one for liberating knowledge.
- Among those aiding the slumbering sparks, a particular position of honor and importance belongs to a feminine emanation of the unity, Sophia (Wisdom). She was involved in the creation of the world and ever since has remained the guide of her orphaned human children.
- From the earliest times of history, messengers of Light have been sent forth from the ultimate unity for the purpose of advancing gnosis in the souls of humans.
- The greatest of these messengers in our historical and geographical matrix was the descended Logos of God manifest in Jesus Christ.
- Jesus exercised a twofold ministry: he was a teach, imparting instruction concerning the way of gnosis; and he was a hierophant, imparting mysteries.
- The mysteries imparted by Jesus (which are also known as sacraments) are mighty aids toward gnosis and have been entrusted by him to his apostles and their successors.
- Through the spiritual practice of the mysteries (sacraments) and a relentless and uncompromising striving for gnosis, humans can steadily advance toward liberation from all confinement, material and otherwise. The ultimate objective of this process of liberation is the achievement of salvific knowledge and with it, freedom from embodied existence and return to ultimate unity.
— Gnosticism: New Light on the Ancient Tradition of Inner Knowing by Stephan A. Hoeller
Lists like this, while not all wrong, do not form a cohesive or accurate explanation of Gnosticism.
I will say that, while I disagree on the language, universality, “divine feminine,” and the implications of “oneness” — which mostly come from Christian contamination — the first 10 points comprise a very accurate characterization of Mythic Gnosticism. But the list, as a whole, is completely ignorant of Gnosticism’s non-spiritual manifestations and, again presupposes that Gnosticism is a denomination of Christianity, a plain falsehood.
Worse yet, they're the works of those who futilely take it upon themselves to "revive" and "spread" Gnostic Christianity, with these lists as blatant — and often plainly stated — attempts to define a canonical doctrine. The ultimate intent being to make "Gnosticism" structurally and massively participatory so that it can be marketable to the masses. But, those who desire this do so because they view Gnosticism as a religion and have adopted Christian/Abrahamic views as to the purpose of belief systems.
Yet, Gnosticism is neither beholden to nor compatible with those views.
``` Transmission Note:
This should not be interpreted as an attack on Stephan Hoeller. The aforementioned book is informative as a whole and I agree with a lot of it. However, I disagree with many of Hoeller's conclusions.
Funny enough, while revisting that chapter, I discovered that Hoeller, being well before my time, has a lot more context on where guys like David Lindsay (I think that's his name?) come from. Page 182.
```
Practicing Gnosticism
One does not practice Gnosticism, mythic or not. But, Gnostics often practice rituals that they believe will induce Gnosis.
Because Gnosis must be attained personally and intellectually, these rituals historically involved psychedelics and circumambulatory* acts meant to remind the practitioner of his goal. Additionally, this pursuit meant that Classical Gnostics were (and continue to be) open to trying out practices from other belief systems if they're believed to have the potential to induce Gnosis. Many, however, also turn to plain ol' knowledge, choosing to immerse themselves in more interactive ways of knowing about the world such as science, math, and esoterica as a path to personal knowledge of reality.
Yet, while varied and individualistic, Gnostics did not always go about their spiritual journeys alone. While Gnosis is pursued personally, individual findings, experiences, and speculations were/are shared among each other for consideration and guidance in personal journeys. Individuals with similar findings and personally efficacious mediums of Gnosis would form groups and participate in rituals together. And, because Gnosticism is classically hostile or indifferent to the body, historical Gnostic groups tended to go one of two ways: ascetic or degenerate. The first involved fasting, abstinence, and denial of bodily pleasures. The second, I will leave to your imagination. But, thankfully the former won out in popularity and is how Gnostics are commonly portrayed.
``` Come to think of it, the whole attempt to shock oneself into Gnosis is kind of like trying to relive the alienating event that made one Gnostic in the first place. But, more intense.
``` So, the point being made is that, when thinking of Gnostic groups or Gnostics gathered, one should avoid conceiving of them as one does a church. Rather than platforms where an orthodoxy is espoused and downloaded, Gnostic gatherings were/are information exchanges, more akin to get-togethers.
Gnosticism has an investigative and antinomian character, rather than faithful and obedient character.
Secrets
At this point, I've laid out that Western Gnosticism comes from the Greek mystery cults (and by extension Egypt, and, in likelihood, Babylon). I've highlighted that those holding their beliefs went into hiding and were given the name "Gnostic" by their persecutors ("Gnosis" meaning "knowledge," "Gnostic" approximating "knower"). And, I've repeatedly used word like "private," "personal," "individual," "metaphor," "code," and "secret" to describe their activities.
All of these things, in a sort of snowball effect, have had Christians unwaveringly convinced that Gnosticism is about "keeping secrets." And, with a strange intensity, they've been all riled up about Gnostics having "secret knowledge" for thousands of years. In fact, if you ask a Christian (who has heard of Gnosticism) today, that's exactly what they'll tell you: "Gnostics were people who thought they had secret knowledge."
With a tone suggesting an absurd level of contempt for a supposedly dead heresy, to boot.
But, Gnosticism was poorly understood by its enemies and is not about "secret knowledge." Despite the fact that Christians love making themselves angry imagining such silly ideas that are more attributable to themselves, Gnostics are not and were not meeting up to go: "teehee, they don't know our seeecret!"
In fact, here are the mythic secrets of such great concern:
-
The mysteries of the mystery cults tended to be along these lines:
-
- You have an immortal soul.
-
- You belong to a spiritual reality (often phrased: "you are/can become a god").
-
- You are trapped in a cycle of material death and rebirth.
-
- You need to do XYZ to escape materiality.
-
The mystery cultists/Gnostics were secretive to preserve the purity of the above beliefs and techniques and to avoid persecution -- and ultimately inquisition -- at the hands of hostile powers.
- Gnosis is personal, private, and "secret" because it is incommunicable. Personal knowledge can be talked about, but cannot be literally shared person to person and Gnosis comes differently to each person.
- Gnosticism doesn't have an imperative for conversion or being a "big tent" because Gnosticism itself is incommunicable to the majority.
These things are not really "secrets" but, even if they were, they could be talked about freely (given the absence of persecution) due to bullet four.
Bonus "Secret": A common premise is that Gnosis is applied at death on a post-mortem spiritual journey, similar to that of the Ka of Egyptian mythology.
Books
Many religions and even philosophies are centered around holy books as definitive canonical, instructional, and behavioral guides. They function as the source and reinforcement of a given worldview, which allows it to persist fundamentally undiluted for extended periods of time.
This is not so for Gnosticism -- mythic or not.
Instead, Gnosticism has no holy book and, in the section called "Features of Gnosticism," I've already laid out its presence and reception through alienating events. It requires no human regulation in order to continue to authentically exist.
``` Now is a good time to mention that there is a multiple discovery aspect of Gnosticism which is generally how I, at least, track alignment and continuity while identifying "the signal," as I call it, as the source in others.
``` Yet, the ancient Mythic Gnostics were known to be prolific writers, as attested by the Nag Hammadi library. And, the penchant for writing seems to persist across time and mode, as Secular Gnostics and Gnostic Atheists (beknownst or not) have been absurdly influential in American media and culture by this means.
So, why do Gnostics write so much and how do they use books?
Gnostics tend to view books as spiritual journals, rather than instruction manuals, and literature at large as a means of preserving knowledge. Contributing to the Gnostic meme pool is a form of participation in the imperative, which is why Gnostics, unlike Christians and others, have little issue putting their pieces forward. Rather than the book study and faith characteristic of Abrahamic maintenance, Gnosticism, again, tends toward investigation and information sharing. And, it is for these reasons that Gnostics have been known to not only write their own texts, but to adopt and reinterpret the texts of other belief systems according to the Gnostic worldview.
-
@ 6c2d68ba:846525ec
2024-09-01 13:02:53Dear friend,
it seems like you have decided to turn your back on those walled gardens and set sails to enter uncharted territory. A world without walls, an open world, a world of beautiful chaos. At least for today, I don't intend guiding you out of the safe harbour onto the open, endless sea. Today, my only intent is sharing a few thoughts, before you depart.
As a wise man on Madeira once said, it's not so much about having the right answers, it's about asking the right questions. While I'm not certain whether I have found the right questions myself by now, let me share the current set with you:
-
What causes the discomfort that drives you out of the walled garden onto the open sea?
-
Are you trying to transfer from one walled garden to the next one, where the difference being a slightly friendlier colour on the wall?
-
What are you hoping to find on the open sea that walled gardens cannot provide?
-
What are you willing to sacrifice for freedom (of speech)?
-
What will you need to keep the ship afloat?
-
How will you react when you find yourself in the middle of a storm?
I sincerely believe that it's worthwile taking a step back before departing to reflect on the big picture and the underlying paradigm shift between walled gardens and nostr. This is not about building competitors to broken systems, this is not about mimicking centralised services, this is not about repeating the same mistakes over and over.
This is about building a new world, an open world without walled gardens and data silos.
Onwards!
-
-
@ 9977c3ad:43a20d63
2024-09-05 11:21:09Details
- 🍽️ Servings: 2
Ingredients
- 1 cup Jasmine rice
- 1 Tbsp. lavender flowers, crushed with mortar and pestle
- 1/4 cup apple cider vinegar
- 2 Tbsp. fine cane sugar
- 2 Tbsp. honey
- 1 sprig rosemary
- 1/4 tsp angostura bitters
- 1/2 cup blackberries
- 1/2 cup blueberries
- 4 cups trimmed and quartered shiitake mushrooms
- 1 tsp fresh coriander crushed
- 1/4 tsp fresh cumin ground
- 1/2 tsp red pepper flakes
- 3 sprigs of thyme
- 2 Tbsp. olive oil
- 1 tsp soy sauce
- 1 cup creamy coconut milk
Directions
- Combine rice, lavender, 1/4 tsp salt, and 2 cups of water in a saucepan. Bring the rice to a boil, cover the pan with a lid and turn the heat off. Let the rice sit in the pan for at least 20 minutes.
- Combine 1/4 cup of water, the vinegar, sugar, honey, rosemary, angostura bitters in a saucepan and bring the brine to a boil. Season with a pinch of salt. Add the berries and wait until the brine comes back to a boil. Lower the heat, so the brine simmers but does not boil. When the brine thickens, after about 15 minutes, remove the saucepan from the heat and set it aside.
- Pre-heat the oven to 400F. In a bowl big enough to hold all the shiitake, combine the olive oil, the soy sauce and the spices. Whisk vigorously, so the oil emulsifies with the other liquid. Toss the shiitake in the mix to marinate, then evenly lay them out on a baking sheet with parchment paper. Bake the shiitake for 10 minutes. When you remove the shiitake from the oven, remove the thyme and throw it out. In a saucepan, bring the coconut milk to a boil. Add the shiitake and reduce the heat to a light boil until the sauce thickens.
-
@ a012dc82:6458a70d
2024-09-05 09:46:29Table Of Content
-
What are the factors driving this adoption?
-
What are the potential benefits of widespread Bitcoin adoption?
-
What are the potential challenges to Bitcoin adoption?
-
Conclusion
-
FAQ
The cryptocurrency market has been on a rollercoaster ride over the past few years, with Bitcoin emerging as the undisputed king of the digital currencies. Despite facing intense scrutiny and skepticism from traditional financial institutions, Bitcoin has continued to gain traction among investors, traders, and even mainstream businesses. The future of Bitcoin and the wider cryptocurrency industry has been the subject of much speculation, with many analysts making bold predictions about its potential growth and impact.
According to the report, the analyst predicts that Bitcoin will become the primary global currency by 2025, with an estimated 50% adoption rate. This means that half of the world's population could potentially be using Bitcoin as their main currency by 2025, marking a significant shift in the way we think about money and finance.
What are the factors driving this adoption?
The analyst attributes this projected surge in Bitcoin adoption to several key factors. These include:
Increased mainstream acceptance: More and more businesses are starting to accept Bitcoin as a form of payment, including some major players like Microsoft, Tesla, and PayPal. This increased acceptance is helping to legitimize Bitcoin and make it more accessible to the average person.
Growing distrust in traditional finance: The 2008 financial crisis and subsequent economic instability have eroded trust in traditional financial institutions. Bitcoin offers a decentralized alternative to the current system, making it an attractive option for those seeking greater financial autonomy and security.
Technological advancements: The development of blockchain technology and other innovations are making Bitcoin more secure, faster, and easier to use. This is helping to remove some of the barriers to adoption and make Bitcoin a more viable option for everyday use.
What are the potential benefits of widespread Bitcoin adoption?
The potential benefits of widespread Bitcoin adoption are numerous and far-reaching. These include:
Increased financial freedom: Bitcoin offers a level of financial freedom and autonomy that is impossible with traditional currencies. Users can send and receive money anywhere in the world without having to go through intermediaries or deal with cumbersome regulations.
Lower transaction fees: Bitcoin transactions are typically much cheaper than traditional banking fees, making it a more cost-effective option for businesses and individuals.
Greater security: Bitcoin's decentralized nature makes it more resistant to hacking and fraud than traditional banking systems. This offers a higher level of security and protection for users.
What are the potential challenges to Bitcoin adoption?
While the potential benefits of widespread Bitcoin adoption are exciting, there are also several potential challenges that must be overcome. These include:
Lack of regulation: Bitcoin operates outside of traditional financial systems and is largely unregulated. While this offers greater autonomy and freedom, it also makes it more susceptible to fraud and other criminal activity.
Volatility: Bitcoin's value is notoriously volatile, making it a risky investment option for some. This could make it more difficult to convince everyday users to adopt Bitcoin as their primary currency.
Technical barriers: While technological advancements are making Bitcoin more accessible, there are still some technical barriers that could prevent widespread adoption. These include issues with scalability, user interfaces, and education.
Conclusion
The analyst's forecast of mind-blowing Bitcoin adoption in 2025 is certainly an exciting prospect, and one that has the potential to transform the world of finance as we know it. While there are certainly challenges to be overcome, the benefits of widespread Bitcoin adoption are clear, and it is clear that more and more people are starting to recognize the potential of this revolutionary digital currency. Whether Bitcoin will ultimately become the primary global currency by 2025 remains to be seen, but it is clear that it is here to stay, and that it will continue to play an increasingly important role in the world of finance.
FAQ
Can Bitcoin be used as a form of payment? Yes, many businesses and merchants now accept Bitcoin as a form of payment, and it is becoming increasingly common.
Is Bitcoin safe to use? Bitcoin is generally considered to be a safe and secure form of payment, thanks to its decentralized nature and strong cryptographic protocols. However, as with any form of payment, there are some risks involved, and users should take appropriate precautions to protect their funds.
What is the potential impact of widespread Bitcoin adoption? The potential impact of widespread Bitcoin adoption is huge, as it could fundamentally change the way we think about money and finance. It could also have significant implications for traditional financial systems and institutions.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ d543c820:aa8001e7
2024-09-05 09:03:02皮草两事
前日与朋友聊天,谈起时下留下的一种扮演了某种人格的 AI(有个时髦的名字,叫 “智能体”),蓦地想起英伦法学家边沁(Jeremy Bentham)。第二日,又联想起别的事来,因有此文。
“皮草”,在现代中文是指 “以动物(连)皮(带)毛制成的服装”,因其奢侈和暖和受人追捧。但也有关爱动物的人士批评其制作过程过于残忍。
但在古代中文中,这词可作别的意思:“皮以实草”、“剥皮揎草”。指的是把皮剥下来,把草填充进去,做成玩偶。
据说,明朝的创建者朱元璋(1328-1398),就制定过这样的刑罚:将贪腐的官员,处以剥皮之刑,然后以草填充,做成人偶,放在其继任官员的公堂旁边,以示警戒。
你可以想象,这种刑法是多么残酷。其恐怖、血腥的程度,与历史上有名的酷刑炮烙、分尸相比,是不遑多让的。所以,其在朱元璋统治的时代结束后,也并未被继续施行。有明一代,此种残酷刑罚的一个回响是在万历时代(1573-1620),有名的清官海瑞主张恢复这种刑罚,以整肃官员中贪腐的风气。
那么,朱元璋为什么要对贪腐官员制定如此残酷的刑罚呢?
小说家金庸先生的读者可能会认为,这跟其宗教信仰(明教)有关。明教即拜火教(琐罗亚斯德教),其本身推崇互帮互助,且憎恶贪官污吏,有点公社主义的味道。然而,这是说不通的 。因为明教本身有反体制倾向,不信任政治权力可被用来改善平民的生活。而朱元璋一以贯之地追求统治权力,自然不可能在实质上信奉此种理念。
(插句话,明代创建者与明教有关,此说始创于吴晗,被金庸先生拿去放在小说中,有了很大影响。然而,近些年的学术界,已开始反对这种理论,认为 “明” 的国号可能来自佛教经典,或来自儒家经典《易经》。)
也有人会认为,这跟朱元璋的出身有关。他出身贫苦,也曾流离失所,也许饱受贪官污吏欺压,因此格外痛恨他们。
我的想法是,这只是因为与前代帝王相比,朱元璋有格外疯狂的机器乌托邦狂想。朱元璋为明朝制定的制度,是格外机械、死板,而且严苛的。首先,其要求编订各地域的人口户籍 —— 这不出奇,中国从秦朝开始就这样做了 —— 然后,有趣的东西来了:他要求给这些人口按照经济条件分组,每组有固定的力役和纳税义务,以年为单位;以户为最小单位,每 10 个单位合并成一个大单位,层层往上合并;每一组的带头人都每年轮换一次,这个带头人要在该年中完成经济统计并带领其组内成员完成力役(比如修城墙、挖运河)和纳税(交粮)义务。与此同时,迁徙自由是禁止的,良民必须在其土地上完成其义务,而不能 “流窜” 到其它地方,官员的任务之一是将境内的流民遣返回原籍、保证境内的民不要流窜到其它地方。而这些力役和纳税义务,也是跟地域高度捆绑的,它们以就近的原则,被分配给所在地的城市和军队,而不是经过行政机构的统一收发管理。
也就是说,朱元璋希望把偌大的中国变成一台机器,所有人(主要是农民)在其出生的地域上为劳役和纳税而劳作,以恒久不变的速率为一个行政系统和军事系统提供养料,然后朱家江山永保稳定和太平。—— 而统治者,君主,将使用这套系统中形成的统计资料,来精确地了解每一个地区的实情,然后施行统治,保持系统的运行。
对于这样一个系统而已,统计资料的精确性,是具有第一位的重要性的。它决定了统治者到底能不能获得地方的实情,而不被自己的官僚蒙蔽。于是,贪腐 —— 为了个人私利,甚至不是什么特别大的利益,而弄虚作假,比如虚报产出以求减免税务、将经济富裕的农民反而分到税务负担较轻的组中 —— 就成了一个最多发、最难对付的顽疾。官员稍微不认真,产生的偏差就会不断叠加,然后积累出完全失实、无用的记录。这就是为什么贪腐的官员要被处于如此残酷的刑罚 —— 要用最残酷的刑罚、最血腥的展示,让他们在统治以机器人为理想模板的人群时,自己也成为机器人。—— 只有皇帝可以是个活人。
(《万历十五年》的作者黄仁宇认为明代的一大问题在于其制度阻碍了技术的发展,例如,军队的粮食是定点向某个村镇收取的,并由村镇自己负责押韵到军队驻地,这是 “散收散支”;如果交到行政机关处集中收取集中分发,就可以发展物流技术、保险技术云云。我认为,这是浅见。)
那么,十四世纪的朱元璋,跟边沁(1747-1832),怎么会扯上关系呢?
是因为边沁也曾设想过一种 “皮草” 的用途。他希望的是,有卓越成就的人物,可以在死后将自己制作成人偶(原描述为 “auto-icon”),摆放在公共空间里,(最好还能播放其生前录下的声音),起到教育的作用。
边沁自己也实践了这种想法。他在死前立下遗嘱,将自己的身体托付给一个好朋友,嘱咐其将自己制作成 auto-icon,要求以一个带玻璃的木盒子盛装,将自己做成坐姿,配上自己生前使用的椅子,还要身着正装,配上手杖。
事实上,边沁的 auto-icon 还真的是在保留了骨骼的前提下以草填充的。唯一美中不足的是,其头颅在防腐处理过程中被毁容了,完全不像其生前的容貌,因此被一个蜡像代替。
这个 auto-icon 后来一直放在实践了边沁的教育改革理念(一言以蔽之,有教无类,不论家资,不论宗教)的 University Collage London(伦敦大学学院,UCL)(在 2020 年以前,放在学院主楼南回廊的尽头;之后,迁移到学生中心)。
有关边沁的 auto-icon,我还听过一个传说(已被边沁的英文维基页面证伪):UCL 在每次召开理事会时,都将边沁的 auto-icon 陈列在侧,并认定他会给会议中的改革派投半票。
同样的皮草,在两种社会,两个时代,承担完全不同的预期作用。一个是为了在公共空间中承担教育的责任,或是给某一些人鼓励;甚或按一些浪漫的说法,是 “一种社会实验”。另一个,则是作为生杀大权的象征,要给人以无限的恐怖,从而使人战战兢兢地做好皇帝交办的工作。这何止天差地别。
参考文献:
百度百科·剥皮揎草:https://baike.baidu.com/item/%E5%89%A5%E7%9A%AE%E6%8F%8E%E8%8D%89/5372899
不要再說明朝國號「大明」源於明教:http://www.observer-taipei.com/book2021/item/634-2022-03-29-08-11-13
维基百科·Bentham:https://en.wikipedia.org/wiki/Jeremy_Bentham
《显微镜下的大明》
-
@ e5272de9:a16a102f
2024-08-31 20:23:59The GrapeRank algorithm, like the PageRank algorithm, takes as input a graph, composed of nodes and edges, and composes "importance" scores for each node based on the topology of the graph. This equation is currently implemented at brainstorm and uses follows and mutes to calculate a trust score G (also called an "influence" score) in the range [0, 1] for each user in your nostr network.
This is the GrapeRank equation:
- G, c, and r in this equation are each scalars in the interval [0, 1]
- G represents the grapevine score (also called the "influence") of v, as seen from the vantage point of o
- r represents the average rating of v by o's grapevine
- c represents the degree of confidence in the average rating r
- the subscript always represents the thing (user, product, etc) being evaluated
- the superscript always represents the "observer," the point of reference from which we view and interpret the world
This is the same equation in expanded format:
- The grapevine score of v on the left, G_v, is weighted using the grapevine score (but of each w) on the right, G_w
- These calculations are iterated until all G values converge
- r^o_v (the right half) is the weighted average
- c^o_v (the left half) is the confidence in that weighted average
- The r^w_v are the ratings being averaged together; they are inferred from follows and mutes by interpreting a follow as a score of 1 (probably not a bot), a mute as a score of 0 (probably a bot)
- The c^w_r are the confidences in the r^w_v; a follow is interpreted to have a confidence of 5 percent, a mute to have a confidence of 10 percent. (These are adjustable settings at brainstorm.)
- The sum over G * c, which appears twice in the above equation, is called the "input" and is an unbounded, nonnegative scalar which represents "the amount of trusted input" that goes into the calculation
- The formula is designed so that as the input (the number of ratings from trusted sources) increases to infinity, the confidence c^o_v approaches 1 (100 percent) asymptotically. This map from input onto confidence, which employs a nonlinear equation, is necessary to ensure that G remains within the [0, 1] interval even as input increases to infinity.
- alpha is a nonnegative scalar value that determines how "quickly" the confidence c^o_v approaches 1 (100 percent) as trusted input increases. Decreasing the value for alpha makes the equation more "rigorous" because it will take more trusted input to achieve any given degree of confidence. (Alpha is another user-adjustable setting at brainstorm.)
To perform the above calculations: 1. For the "seed" user (the observer o, i.e. the logged-in user), fix average, confidence, and G (influence) to unity. These values will not change. 2. For all other users, initialize average, confidence, and influence scores to zero. 3. Iterate through all users to calculate average, confidence, and influence scores. In the first iteration, the follows of the logged-in users will obtain nonzero scores. In the second iteration, their follows will obtain nonzero scores. And so on. 4. Continue iteration until all values converge.
Intuition tells us that convergence is guaranteed by the requirement that for each rating, the rating and its associated confidence are scalar values between 0 and 1. G will therefore also always also be a number between 0 and 1. Not shown: at brainstorm and in general recommended practice, the above equation also employs a scalar value between 0 and 1 called the "attenuation factor," defaulted at 0.8 but adjustable by the user, which causes influence scores G^o_v to diminish as the number of hops between o and v increases.
Intended usage
G is designed to be used as a weight when calculating weighted averages, tallying votes, etc. It is highly effective at eliminating bots without turning into a popularity contest.
Interpretation
G^o_v is a recommendation, to you by your grapevine, that reflects in numerical form how much "attention" you should pay to pubkey v in the given context (if a context is given).
- G^o_v = 0 means that pubkey v is not worthy of your attention, because v is probably a bot
- G^o_v = 1 means that pubkey v is worthy of your full attention, because b is probably not a bot
- Values between 0 and 1 mean the grapevine isn't absolutely certain one way or another, whether because of scant information (some follows by trusted sources, but not many) or conflicting information (combination of follows and mutes)
Note that if a bad actor spins up a large number of bots and uses them to follow himself, those follows will be completely ignored, because those bots will have a zero trust score G.
Change of context
The set of ratings r can be generated from any data source, regardless of format. By selecting different ratings datasets, we can generate grapevine scores to reflect different contexts. Example: collect emoji reactions to content on Topic X and infer a fire emoji as a rating of 2, rocket as a 3, thumb down as a 0, etc. The resulting G, which will take values between 0 and 3, is now interpreted to apply only to Topic X.
Compact notation
The above equation can be written more succinctly:
where G represents the baseline grapevine score, and R represents the dataset generated from follows and mutes.
Note that we can use a different G on the left versus on the right:
The same relationship can be expressed using arrow notation:
The above relationship in arrow notation should be read to mean that the set of scores G_a are calculated using dataset R which has been authored exclusively by members represented by G_b. In other words, the ratings R are weighted using the set of scores G_b.
Note that the dataset R is generated via interpretation of preexisting content. We can use any content that we can find. There is no requirement or expectation that users will necessarily generate ratings in a format convenient for input into the grapevine. The process of "interpretation" takes care of that, by "translating" existing data into a format suitable for use by the grapevine.
Note also that grapevine scores G may refer to anything in any context: trust scores for users, quality scores for products, etc.
Concerns about convergence
If the G_a and G_b represent the same context (G_a = G_b), the relationship is said to be "recursive," and calculations are iterated until they converge.
If G_a != G_b, the relationship is not recursive, and a single iteration through each pubkey is all that is needed. This means that we can allow G_a and / or G_b to be greater than 1 with no need to worry about convergence.
Worldviews
Arrow notation allows us to link trust calculations in chains:
A graph of grapevine scores G_i linked via arrow notation is called a worldview.
For example, consider the following worldview: * G_a is the baseline nostr trust score, as described above, intended to separate bots from real users * G_b is a label applied to nostr users, intended as a label for bitcoiners (as opposed to nocoiners or shitcoiners) * G_c is a quality score applied to hardware wallets
The purpose of the above worldview is so that I can get a ranked list of hardware wallets and I can be reasonably sure that the list is curated by bitcoiners whose instincts on this topic I value more highly than the general population.
Worldviews can contain any desired number of nodes, connected by any desired number of arrows, and so can be as complex as desired.
Obviously, the construction of a worldview reflects the value system of the person who uses it, with the above worldview offered as a reflection of maximalist values and beliefs. Worldviews can be codified and submitted to the wider community. One's grapevine can even be used to select individuals who should be trusted to edit or construct worldviews.
Computational cost
The methods described above are expected to be too time consuming and computationally expensive to do all of them on the fly on the front end. Notably, the ones that are recursive. Non-recursive computations, however, can be done on the front end, provided recursive calculations have been done ahead of time and are readily available. It is anticipated that the value added by well-crafted worldviews will more than justify the requisite costs.
-
@ c7eadcf0:7821e562
2024-09-04 23:58:56Another test post. I think I might have found my long form content writing app. Well done.
-
@ 4523be58:ba1facd0
2024-05-28 11:05:17NIP-116
Event paths
Description
Event kind
30079
denotes an event defined by its event path rather than its event kind.The event directory path is included in the event path, specified in the event's
d
tag. For example, an event path might beuser/profile/name
, whereuser/profile
is the directory path.Relays should parse the event directory from the event path
d
tag and index the event by it. Relays should support "directory listing" of kind30079
events using the#f
filter, such as{"#f": ["user/profile"]}
.For backward compatibility, the event directory should also be saved in the event's
f
tag (for "folder"), which is already indexed by some relay implementations, and can be queried using the#f
filter.Event content should be a JSON-encoded value. An empty object
{}
signifies that the entry at the event path is itself a directory. For example, when savinguser/profile/name
:Bob
, you should also saveuser/profile
:{}
so the subdirectory can be listed underuser
.In directory names, slashes should be escaped with a double slash.
Example
Event
json { "tags": [ ["d", "user/profile/name"], ["f", "user/profile"] ], "content": "\"Bob\"", "kind": 30079, ... }
Query
json { "#f": ["user/profile"], "authors": ["[pubkey]"] }
Motivation
To make Nostr an "everything app," we need a sustainable way to support new kinds of applications. Browsing Nostr data by human-readable nested directories and paths rather than obscure event kind numbers makes the data more manageable.
Numeric event kinds are not sustainable for the infinite number of potential applications. With numeric event kinds, developers need to find an unused number for each new application and announce it somewhere, which is cumbersome and not scalable.
Directories can also replace monolithic list events like follow lists or profile details. You can update a single directory entry such as
user/profile/name
orgroups/follows/[pubkey]
without causing an overwrite of the whole profile or follow list when your client is out-of-sync with the most recent list version, as often happens on Nostr.Using
d
-tagged replaceable events for reactions, such as{tags: [["d", "reactions/[eventId]"]], content: "\"👍\"", kind: 30079, ...}
would make un-reacting trivial: just publish a new event with the samed
tag and an empty content. Toggling a reaction on and off would not cause a flurry of new reaction & delete events that all need to be persisted.Implementations
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
f
) already support this feature. - IrisDB client side library: treelike data structure with subscribable nodes.
https://github.com/nostr-protocol/nips/pull/1266
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
-
@ c7eadcf0:7821e562
2024-09-04 23:53:44seeing if this works lol
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ a324b2fe:68bf4629
2024-09-04 23:47:54One of the most significant underlining doctrines of our time is that of the rapture and the eschatological (study of the end times) understanding that the world will be overrun with evil, and God will ‘beam us up scotty’ either before the faeces hits the fan or after. There are slight variations in this ‘futurist eschatology’ I’ve just briefly explained. Many would agree that this is what the bible clearly teaches, and others will have a verse or two in their minds that without further study seems to validate this popular understanding.
Make no mistake, most Christians believe in a ‘futurist eschatology’ (see below), but the real question is why and how most of us have landed believing that things are going to get much worse on the planet, or that things will get better but will suddenly plummet down and Armageddon becomes more than a badly plotted movie. Some might be wondering “I never knew such a thing existed”, let alone know that there are different opinions on the matter. Keep reading because you’ll be surprised at how much this doctrine actually influences ALL your decisions.
To summarise, there are four major positions of interpreting “The book of Revelation”, which is the core book to influence our perspective on the future or “end times”.
Futurisme:
The belief that the events in the book of Revelation is referring to global events in our future. (popular since the 1800’s; the beast’ (see revelation 13 and 17) is a man and a new world order, many historical figures have been suggested in their time; Napoleon, Hitler, Stalin, Osama bin Laden, Barack Obama etc.).
Historicism:
The belief that the events have transpired over history like a timeline (popular in the 1500’s at the time of the reformation, notably that the Pope of the Catholic Church and the Papacy were the ‘beast’.
Preterism:
The belief that the events (most or all) have already taken place in the 1st century, climaxing at the destruction of Jerusalem in 70AD, Rome as a whole and Emperor Nero being considered the ‘beast’.
Idealism:
That the book is a symbolic battle between good and evil.
Before I get into the nitty gritty on history, specific scripture and their exegesis (a fancy word I never use in conversation, meaning critical study and interpretation on a text). Let me highlight why what we believe about the future influences our every decision.
One day in 10 years time you’re married to a beautiful/handsome spouse and have 7 children. You believe that the world will end soon and that there’s going to be a massive heavenly battle and the angels are going to use their majestic rippled muscled limbs to wreck havoc on all those that oppose. Nice. Or not nice if you chose the wrong side. Before that happens though your daughter wants $1000 to invest in some shares because she learned at school that if you put $1000 in shares today and top up $100 every month you’ll have accumulated a total of $72,000 in twenty years having only contributed $25,000 of your own money. Smart kid, that’s a good long term investment strategy.
You however don’t believe the world is going to exist in its normal state in another 20 years time, or you reason it might, but surely not much longer after that. So you say: “Sweety, I really don’t think that’s going to do you much good, the market is too volatile and I don’t foresee things getting better in the future, why don’t you spend your money on some clothes or go out with your friends”? Yes this is quite an elementary example and I’m sure you’ve all invested money into shares and it would never happen to you.
How about another scenario then? You believe the rapture will take place in your lifetime. You read your bible and see that Christians need to share the gospel, so you start to share with people, some people reject you, some are indifferent, and others are deeply touched. The ones that are impacted, you give them a bible and say go to church and get ready for the return of Christ (in your mind you’re thinking that means rapture). Some of them do, some go and fall away and still others somehow are consistent and are growing in the Lord, good job right? What about those people that fell through the cracks? That’s not my responsibility you say, they need to work out their own salvation with fear and trembling. Okay, have you considered that the responsibility is actually squarely on your shoulders? In regards to making a disciple, not a convert. Discipleship takes much longer, it takes time, it takes sacrifice, and it takes a perspective that there is even time for discipleship. Otherwise it’s a 6 week course in “How to be a Christian”.
Thankfully some of the church has in the last few decades focused a lot more on discipleship, even whilst holding the perspective of a futuristic eschatology. Yet even in this the reasoning is simple, they are doing their best to follow what they read in the bible regarding discipleship (rightfully so), and also a discipleship approach of evangelism retains and reaches more people, so it’s a more successful method to convert in any case. If this is you, you’re amazing, please keep making disciples! I however propose that you sincerely ask yourself what you would do differently if you believed the world would exist for another 200 years plus.
As you can see our belief on the future has extreme and subtle effects on our actions and decisions. Our society is peripheral to where the church is at, and right now the church as a whole believes that the end is soon and there’s no point in believing and acting like it’s a good thing to leave an inheritance for your children’s children. That is why we buy cheap, that is why we don’t invest, it is why we are driven by instant gratification. Why would you bother with all that if the world will end in a matter of years. It comes to whether you have a hope filled optimistic expanding Kingdom perspective on how the world is going to turn out or one that is governed by a defeatist/fatalistic mentality and perhaps even one fear riddled.
Now that we’ve looked at how our beliefs can be outworked in everyday life, let’s get into doctrine. Finally. Actually, some more history first.
I and many others find it helpful to look at history to see when a certain doctrine began to gain support and become the popular belief to determine its validity. Let’s jump in then, during the reformation, the Catholic Church was under fire and experiencing some mostly accurate criticism. In a response to Christians accusing the Pope and the Papacy of being the beast, a Jesuit priest wrote extensively that the events in the book of Revelation are referring to their future, thus eliminating the Pope and the Papacy of fault. His writings didn’t gain traction until the 1800’s where John Nelson Dalby adopted the belief and started widely teaching it, specifically on ‘Pre-tribulation rapture theology’ (we get raptured/caught up prior to the tribulation that will happen on the earth). I would like to explicitly mention that before this, proponents for a futurist eschatology were almost non-existent.
Then in the following early century (1909 to be exact), the first ever bible with commentary was printed. The Scofield bible. This bible was a massive advocate for dispensationalism and a futuristic eschatology; practically every bible college student got one of these bibles, and lo and behold an entire generation of pastors and theologians were massively influenced on their belief of the future. Couple that with two world wars, the reestablishment of the Jewish nation, Israel, and we have a perfect concoction for believing the time is near and Armageddon is around the corner.
Now there are entire books discussing all of this that I cannot even hope to cover even a slither, but if you are so inclined, see some recommendations at the end. I won’t attempt (nor can I) to extrapolate on everything there is regarding a ‘preterist view’ of Revelation, and a ‘victorious eschatology’ which was the orthodox view in early Christianity, but here is a summary of what you need to know.
The Kingdom of God:
As indicated by the statue in Daniel 2 was inaugurated with the birth of Jesus (coming of Jesus in the Manger), and started to expand and is still expanding. See Mathew 13:31-33. Also see Isaiah 2 for the hope for the future.
The destruction of Jerusalem in 70 A.D.
Wasn’t just an important event in history, it is paramount to the entire New testament and is referenced to in almost every book. To miss its importance is to miss understanding much of the New testament. This event is crucial to the progress of God’s redemptive plan in history, with the final removal of the temple and the genealogical records of the priests therein, the old (mosaic) covenant closes and the new covenant is fully and permanently established.
“When you see Jerusalem being surrounded by armies, you will know that its desolation is near. Then let those who are in Judea flee to the mountains, let those in the city get out, and let those in the country not enter the city. For this is the time of punishment in fulfillment of all that has been written. - Luke 21:20-22
John the Baptist proclaims judgement on the Jews in Matthew 3:10-12. See also Matthew 7:19 “The ax is already at the root of the trees, and every tree that does not produce good fruit will be cut down and thrown into the fire. I baptize you with water for repentance. But after me comes one who is more powerful than I, whose sandals I am not worthy to carry. He will baptize you with the Holy Spirit and fire. His winnowing fork is in his hand, and he will clear his threshing floor, gathering his wheat into the barn and burning up the chaff with unquenchable fire.” This provides the backdrop to Jerusalem erupting in flames in A.D. 70. Later Jesus declares John is Elijah to come (Matt 11:14) fulfilling the prophecy in Malachi 4:5-6, as he proclaims judgment in Israel before the great and terrible day of the Lord (John mentions the day of the Lord in Rev 6:17; 16:14).
In Matt 12:39 Jesus regards the Jews of His day as an adulterous generation, the same imagery is found in Revelation 17:3 as John presents Jerusalem as a harlot (see also Isa 1:21; Jer 2:20; 3:1,6,8; Eze 16:9, 15-17, 26; Hos 2:5; 4:10; 12-15). In Matthew 23:34-35 Jesus warns that God will judge 1st century Jews for the righteous blood that was shed in the land (we see the same statement in Rev 18:24). In Matt 23:36-38 Jesus laments Jerusalem’s destruction and declares the temple desolate, John declares Jerusalem is desolate in Rev 17:16. After that Jesus prophesies its destruction in Matt 24:2-3 and Luke 21:24, and John uses the same language as Luke, in Rev 11:2. In Matthew 24:16 Jesus urges his followers to flee Judea because “this generation will experience judgement (Matt 23:32). John calls the saints out of Jerusalem in Rev 18:4.
I could go on but there are books for that. Here's the simplicity of it; John’s general message in Revelation is ‘the divorce of Israel and God’s marriage to the new covenant church’ (which obviously includes Jews if they turn to Christ). The ‘second coming of Christ’ came when he came in judgement on Jerusalem. There is another coming, hold your horses I’ll get there.
The 'Olivet discourse’ of Matthew 24:
Is referring to 1st century events and uses prophetic symbolic language (stars falling, moon to blood, sun darkened etc.) to demonstrate a toppling of governments, see Isa 13:10,13 referring to Babylon; Isa 34:4 referring to Edom; and Eze 32:7-8 referring to Egypt. Also think of Joseph and how his family were stars, a moon and a sun and that they bowed to him. Again, it’s language to communicate a natural toppling of governments or exchange of political dominion. Not a global catastrophic Armageddon.
The Anti-Christ:
Used only four times in the bible (1 John 2:18; 1 John 2:22; 1 John 4:3; 2 John 1:7). It has always been a referenced to a false teaching in the 1st century that claimed Jesus had not come in the flesh. A gnostic heresy.
The Beast, the mark of the Beast, and his number 666:
Referring to Emperor Nero who was called a beast, forced people to get markings of him to be able to buy and sell in the marketplace (Rev 13:16-17), see a short video on the matter https://www.youtube.com/watch?v=wng3jcfMkZU. Now Gematria is a Jewish Interpretive method that assigns numerical value of Hebrew letters to words. We find this with the number of the beast being 616 (in Latin) or 666 (in Hebrew), with the values added up it spells Nero Caesar. See this 2 min video https://youtu.be/JXkTc18xBoM. Some people, like in the video say that he represents a future beast as well, this is simply poor and biased exegesis and is thus construed to validate their pre-existing beliefs.
The Word Rapture:
Found in 1 Thessalonians 4:17; “After that, we who are still alive and are left will be caught up (rapturo in Latin) together with them in the clouds to meet the Lord in the air. And so we will be with the Lord forever”. The entire bases of the doctrine of the rapture is found in this one simple verse. Yet all it means is that we will be gathered to Jesus and the past saints/Christians at His return.
What now? Is everything done?
Well not quite.. Jesus’ Return: Jesus will return as is promised in Acts 1:11, but it won’t be with a massive army to lay plunder to the earth, well maybe, but I highly doubt it. “…will come back to you in the same way you have seen Him go into heaven”. The resurrection of the dead: Zombies! Kidding, just mass people coming back to life. See 1 Thessalonians and 1 Corinthians 15. The Great judgement: The great judgement day of the sheep and the goats in Matt 25.
That’s it, so until then, however long that will take (my money is on 197 years), let’s keep bringing the Kingdom of God to earth, lets pray for miracles, make healthy disciples that reproduce, transform every facet of society to look like heaven, and establish a Kingdom legacy that our Lord and King would be excited to come back to.
Ps. My views on Gods judgment on the 1st century Jews is not that he wanted to destroy them, but rather he was bringing judgment on an old covenantal system, the Jews that clung to that sinking ship unfortunately went down with it.
Book Recommendations: Understanding the whole bible – Jonathan Welton Raptureless – Jonathan Welton The art of revelation – Jonathan Welton Before Jerusalem Fell: Dating the book of revelation – Kenneth L Gentry Navigating the book of Revelation - Kenneth L Gentry Victorious eschatology: A partial Preterist view – Harold R Eberle and Martin Trench
Theologian Gary Demar
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 6c2d68ba:846525ec
2024-08-30 21:53:53What the hell is Nostriga you might think. Nostriga is part of the nostr.world unconference series. It's a cost-free event aimed at gathering nostriches - people excited about nostr - globally to share knowledge, collaborate, network and work towards a freely accessible internet.
In case you never heard of nostr: nostr is an open protocol designed for censorship-resistant and global web publishing, fostering a value-for-value exchange. Find more information here.
Now that a few days have passed, it's time to reflect on some of my main takeaways but first, I would like to thank Marce, Anna, Jack, Uncle Rockstar and everyone else involved for making this event special in several ways. I'm sharing my thoughts in no particular order and as can be expected after having heard so many inspiring talks, I will be relaying - relay, get it? - many great ideas others shared.
nostriches are built different
To be honest, Nostriga was one of the best conference experiences I have had in a while. Great spirit, deep conversations, real & honest takes and 99% signal. Everyone who's ever been to a conference knows how draining and tiring such events can be. This time, however, something is different. I guess one of the main reasons for this are the people behind those npubs. Great attitude, avoiding ego shows, no simping for VIPs, down to earth and a positive vision of what might lie ahead. So in hindsight, Nostriga makes me super bullish on the upcoming months and the road ahead when it comes to the tech as well as the people behind nostr. Onwards, nostriches.
no need for nostr marketing
With the world marching towards implementing 1984, which was not meant to serve as instruction manual god dammit, and events such as the arrest of Pavel Durov, it's evident that nostr won't need a marketing department. An open protocol with focus on censorship-resistance and free speech, will automatically attract the attention of just the right people. This is of course based on the assumption that the nostr community will deal with certain challenges when it comes to privacy and nostr.
nostr (still) has privacy issues
As already pointed out by Edward Snowden, many open challenges remain to be mastered when it comes to privacy, so that people having to rely on safe and private messaging don't have to rule out nostr. Protecting identities, location and leaking as little metadata as possible are crucial here. Keep in mind, a three letter agency once said that they kill people based on metadata. In this regard, nostr DMs are one of the biggest pain points for the time being, though several nips exist to overcome issues such as IP leaks. See the talk of Jeff for details. We'll get there!
For thoughts on privacy, check out saving private nostr:
For privacy and DMs, check out the past and future of messaging on nostr (at 3h 01min 48s):
nostr already got a killer feature: openness
Long story short, watch this talk (starts at 1h 19min 17s) :
nostr beyond social media
As demonstrated by Ben Arc, nostr can be so much more than just an attempt to mimic Twitter. IoT, web of trust, file sharing or bringing together (open) social media and AI are just a few things on the table.
separation of client and algorithm
For many of you this might be nothing new but I can't stress the importance of Data Vending Machines (DVMs) enough. In a nutshell, DVMs are data-processing tools. You give them some data, a few sats, and they give you back some data. As anyone can spin up his own DVM without any registration or signup, there will be ruthless competition. Check out DVMs for further information.
The basic idea behind it, which still gets me, is the potential separation of (nostr) clients and algorithms in a broader sense. Coupled with marketplaces and having insights what algorithms your friends are using, things will get interesting. Remember, to this day Twitter, Meta and so on are deciding what algorithms are being used in your app and not you. nostr will put you in the driver seat.
web of trust
Web of trust is something people talk a lot about these days, so I will keep it short. One idea caught my attention: combining nostr and file sharing in the sense that you attach an npub to files hosted on file sharing services or torrents and so on. In order to prevent downloading or even spreading infected files, it boils down to the simple question of "can I trust that npub to host clean as well as safe files?". Reputation.
have you seen my nutsack?
Before Nostriga, I haven't been aware of how beautifully ecash and nostr can go hand in hand. In particular, I'm still trying to find the right words to express how big of a deal the combination of Data Vending Machines and ecash can be, if implemented the right way. Check out DVMs that nutsack thing, and pistachio bag.
(Talk starts at 55min 41s)
nostr is not another Bitcoiner circle jerk
On the second day of Nostriga, I met someone at one of the food trucks, who happens to have been actively fighting to free Julian Assange. Events, protests, spreading the word, the whole thing. He or she - trying to hide as many details as I possibly can here - told me that his/her main motivation for coming to Riga was indeed nostr and that he/she had discovered Bitcoin via nostr, where it's usually the other way around. To be honest, this was not the only time I heard this at Nostriga but for sure it's the most memorable one.
Of course, there is nothing wrong with so many Bitcoiners being around on nostr and it does come with several benefits, one of them being an excellent meme game. As I sincerely believe that nostr is for anyone, it feels good to see other communities popping up and telling their stories on nostr. So delighted you're leaving those walled gardens, friends.
onwards
Let me know what you think, where you agree, where you have a different point of view. Feel free to bring in your Nostriga story. Keep it weird, fellow nostriches, and if you have time to just watch a single talk from Nostriga, make sure it's this one:
-
@ 42342239:1d80db24
2024-08-30 06:26:21Quis custodiet ipsos custodes?
-- Juvenal (Who will watch the watchmen?)
In mid-July, numerous media outlets reported on the assassination attempt on Donald Trump. FBI Director Christopher Wray stated later that same month that what hit the former president Trump was a bullet. A few days later, it was reported from various sources that search engines no longer acknowledged that an assassination attempt on ex-President Trump had taken place. When users used automatic completion in Google and Bing (91% respectively 4% market share), these search engines only suggested earlier presidents such as Harry Truman and Theodore Roosevelt, along with Russian President Vladimir Putin as people who could have been subjected to assassination attempts.
The reports were comprehensive enough for the Republican district attorney of Missouri to say that he would investigate matter. The senator from Kansas - also a Republican - planned to make an official request to Google. Google has responded through a spokesman to the New York Post that the company had not "manually changed" search results, but its system includes "protection" against search results "connected to political violence."
A similar phenomenon occurred during the 2016 presidential election. At the time, reports emerged of Google, unlike other less widely used search engines, rarely or never suggesting negative search results for Hillary Clinton. The company however provided negative search results for then-candidate Trump. Then, as today, the company denied deliberately favouring any specific political candidate.
These occurrences led to research on how such search suggestions can influence public opinion and voting preferences. For example, the impact of simply removing negative search suggestions has been investigated. A study published in June 2024 reports that such search results can dramatically affect undecided voters. Reducing negative search suggestions can turn a 50/50 split into a 90/10 split in favour of the candidate for whom negative search suggestions were suppressed. The researchers concluded that search suggestions can have "a dramatic impact," that this can "shift a large number of votes" and do so without leaving "any trace for authorities to follow." How search engines operate should therefore be considered of great importance by anyone who claims to take democracy seriously. And this regardless of one's political sympathies.
A well-known thought experiment in philosophy asks: "If a tree falls in the forest and no one hears it, does it make a sound?" Translated to today's media landscape: If an assassination attempt took place on a former president, but search engines don't want to acknowledge it, did it really happen?
-
@ 3fe0ab6c:d93088e4
2024-08-29 16:25:50@News @Updates
We have installed a technical client update for Escape from Tarkov. The game will not stop, however the raid time on servers undergoing the updates may be reduced to 10 minutes. Matching time may be increased during the update installation. Please download the update via the launcher.List of changes: ● Added more rare rewards (including certain keycards and marked keys) for large sacrifices in the Cultist Circle zone in the Hideout; ● Increased the recoil when shooting while prone without bipod; ● Increased the in-raid pickup limit for Found in Raid items: ■ 10 for barter items; ■ 5 for keys; ■ 5 for containers. ● Increased the in-raid drop limit from 0 to 1 for certain barter and information items without the Found in Raid mark; ● AK CNC Warrior 5.56x45 muzzle device adapter can now be installed on all suitable 5.45x39 caliber assault rifles and carbines; ● Reduced the grenade throwing accuracy for regular Scavs.
List of fixes: ● Fixed several geometry errors on all locations; ● Fixed several incorrect doors on all locations;
-
@ 1a48e74d:02c0e00f
2024-09-04 23:38:34seeing if this works.
-
@ c7eadcf0:7821e562
2024-09-04 23:03:59Welcome back ya'll hope you are doing well this week. Today I wanted to talk about why Bitcoin represents a dawn of a new age in property ownership. Before you spit out your coffee and walk away, hear me out. Bitcoin and real estate have a few things in common. The first is property rights.
When you are the owner of a building with your name on the dotted line and whatnot, you are the sole owner of that property. No one can tell you what to do with it, and no one has a claim to what you own. You are free to do what you wish. Property rights are sacrosanct and immutable similar to Bitcoin.
Bitcoin confers upon the owner the same property right protections as owning a piece of real estate. Once you own it, you are the sole owner of that Bitcoin. No one can tell you what to do with it. No one else has a claim to your Bitcoin. You are free to do with it what you wish.
Bitcoin and real estate are similar in terms of built-in scarcity. There is only 21 million Bitcoin that will ever be created, and you can't print more land. This is why owning real estate has been such a good investment since the beginning of time. Buying a piece of land and "HODLING" for decades will generate a substantial return on your investment.
This same buy and hodl strategy apply to Bitcoin as well. If you bought Bitcoin back in 2009, you would be a multi-millionaire right now.
If you invested $1000 back in 2011 when Bitcoin was trading at $3.50, you would have turned that $1000 into $15.6 million if you held on to it for ten years. Just sayin.
You have to reframe your thinking to understand what is going on. We are living in the 21st-century gold rush, and you have an opportunity to stake your claim to the soundest money on Earth with a few taps on your phone. Never in the history of the world has the plebs like us had the ability to front-run a monetary revolution.
Bitcoin is freedom from oppression. Bitcoin restores your sovereignty. Bitcoin makes you fuckable, and the powers that be know it. They are afraid they will lose control if too many people catch on too quickly, which is why large institutions are rushing to offer Bitcoin services or buy them and keep them on their balance sheet.
Bitcoin won't stay this cheap forever. $100-300k Bitcoin is in the cards over the next few years. I don't want you guys to miss out on this.
All you have to do is buy Bitcoin and hold. It's that simple. FYI trying out the new obsidian writer for nostr notes!
Bitcoin #nostr
-
@ 1a48e74d:02c0e00f
2024-09-04 23:00:22Welcome back ya'll hope you are doing well this week. Today I wanted to talk about why Bitcoin represents a dawn of a new age in property ownership. Before you spit out your coffee and walk away, hear me out. Bitcoin and real estate have a few things in common. The first is property rights.
When you are the owner of a building with your name on the dotted line and whatnot, you are the sole owner of that property. No one can tell you what to do with it, and no one has a claim to what you own. You are free to do what you wish. Property rights are sacrosanct and immutable similar to Bitcoin.
Bitcoin confers upon the owner the same property right protections as owning a piece of real estate. Once you own it, you are the sole owner of that Bitcoin. No one can tell you what to do with it. No one else has a claim to your Bitcoin. You are free to do with it what you wish.
Bitcoin and real estate are similar in terms of built-in scarcity. There is only 21 million Bitcoin that will ever be created, and you can't print more land. This is why owning real estate has been such a good investment since the beginning of time. Buying a piece of land and "HODLING" for decades will generate a substantial return on your investment.
This same buy and hodl strategy apply to Bitcoin as well. If you bought Bitcoin back in 2009, you would be a multi-millionaire right now.
If you invested $1000 back in 2011 when Bitcoin was trading at $3.50, you would have turned that $1000 into $15.6 million if you held on to it for ten years. Just sayin.
You have to reframe your thinking to understand what is going on. We are living in the 21st-century gold rush, and you have an opportunity to stake your claim to the soundest money on Earth with a few taps on your phone. Never in the history of the world has the plebs like us had the ability to front-run a monetary revolution.
Bitcoin is freedom from oppression. Bitcoin restores your sovereignty. Bitcoin makes you fuckable, and the powers that be know it. They are afraid they will lose control if too many people catch on too quickly, which is why large institutions are rushing to offer Bitcoin services or buy them and keep them on their balance sheet.
Bitcoin won't stay this cheap forever. $100-300k Bitcoin is in the cards over the next few years. I don't want you guys to miss out on this.
All you have to do is buy Bitcoin and hold. It's that simple. FYI trying out the new obsidian writer for nostr notes!
Bitcoin #nostr
-
@ ae1008d2:a166d760
2024-08-29 05:14:15Democracy, a system that ideally reflects the will of the people, faces significant mathematical challenges, particularly in the way votes are cast and counted. One of the most prominent issues lies within the first-past-the-post (FPTP) voting system, a method that has been in use for centuries. This system allows voters to select only one candidate, which can lead to scenarios where a party secures power without obtaining a majority of the votes. Such outcomes raise questions about the true representation of voter preferences and the overall health of democratic processes.
The Flaws of First-Past-The-Post
The FPTP system has been illustrated through historical examples, such as the British Parliament and the contentious 2000 U.S. presidential election. In these instances, the so-called "spoiler effect" emerged, where third-party candidates siphoned votes from major candidates, ultimately skewing the results. Voters often feel that their preferences are not accurately represented, leading to disillusionment with the electoral process. This discontent underscores the need for a more representative voting system.
Introducing Ranked-Choice Voting
To address the shortcomings of FPTP, ranked-choice voting (RCV), also known as instant runoff voting, has been proposed. In this system, voters rank candidates in order of preference, allowing for a more nuanced reflection of voter sentiment. RCV not only captures a broader spectrum of voter preferences but also encourages candidates to engage in more civil discourse. For example, in the 2013 Minneapolis mayoral race, candidates exhibited a camaraderie that is often absent in traditional campaigns, as they sought to appeal to voters for second and third choices.
However, the implementation of RCV is not without its challenges. Concerns arise about the potential for a candidate performing poorly to inadvertently assist in the election of another candidate. A hypothetical scenario involving three candidates—Einstein, C, and Bore—illustrates this point. The elimination of candidates based on voter preferences can lead to unexpected outcomes, complicating the electoral landscape.
Historical Context and Mathematical Foundations
The discussion of voting systems is enriched by historical context, particularly through the lens of French mathematician Marie Jean Antoine Nicolas de Caritat, the Marquis de Condorcet. Condorcet advocated for a fair voting method that required candidates to win head-to-head matchups. His method, which involves ranking preferences, introduces a potential issue known as Condorcet's Paradox. This paradox occurs when cyclical preferences prevent a clear winner from emerging, highlighting the complexities of voter choice.
Various mathematicians, including Lewis Carroll, have sought to develop fair election systems but encountered similar challenges. In 1951, economist Kenneth Arrow proposed five conditions that a voting system should meet to ensure fairness: decisiveness, unrestricted domain, transitivity, independence of irrelevant alternatives, and stability of group preferences. These conditions serve as a benchmark for evaluating the effectiveness of different voting systems.
Arrow's Impossibility Theorem
A significant aspect of the discussion revolves around Arrow's impossibility theorem, which posits that it is impossible to create a ranked voting system that satisfies all five of Arrow's conditions when there are three or more candidates. This theorem can be illustrated through a thought experiment involving three candidates (A, B, and C) and various voter rankings. The proof demonstrates that if a candidate is unanimously ranked first or last by voters, society must reflect that ranking. However, the theorem also reveals scenarios where a pivotal voter can dictate the overall ranking, effectively acting as a "dictator" in determining societal preferences.
This leads to a sobering conclusion: according to Arrow's theorem, a truly democratic voting system is unattainable when dealing with multiple candidates. Yet, there is a more optimistic perspective introduced by mathematician Duncan Black, suggesting that alternative methods may exist to better represent voter preferences.
The Dynamics of Voter Preferences
The dynamics of voter preferences along a political spectrum, from liberal to conservative, further complicate the electoral process. The choice of the median voter often determines election outcomes, aligning with the majority's decision and helping to avoid the paradoxes identified by Arrow's theorem. This discussion introduces rated voting systems, particularly approval voting, where voters indicate approval for candidates without ranking them.
Research indicates that approval voting can increase voter turnout, reduce negative campaigning, and mitigate the spoiler effect. Despite its historical use in electing popes and the Secretary General of the United Nations, approval voting has not been widely adopted in large-scale elections, suggesting a need for further real-world testing and evaluation.
The Importance of Political Engagement
While traditional voting methods like FPTP have significant flaws, the importance of political engagement and the necessity of striving for a more representative electoral process cannot be overstated. The complexities of voting systems and the historical evolution of these methods highlight the ongoing struggle for fairness in elections.
As democracy continues to evolve, enhancing knowledge and critical thinking skills about voting systems will be crucial in advocating for reforms that better reflect the will of the people. Understanding the mathematical underpinnings of these systems is essential for promoting a more equitable and representative democratic process.
The mathematical challenges of democracy, particularly in the context of voting systems, reveal significant flaws in traditional methods like first-past-the-post. The exploration of ranked-choice voting and other alternatives offers a glimpse into potential solutions that could enhance voter representation and engagement. As society navigates the complexities of democratic processes, it is essential to remain informed and proactive in advocating for systems that truly reflect the diverse preferences of the electorate.
Proposed Solution: Leveraging the Nostr Protocol
To further enhance the democratic process and address the challenges of traditional voting systems, we can consider utilizing the Nostr protocol. Nostr is a decentralized protocol that allows for open, self-verifiable, anonymous communication and data sharing, making it an ideal candidate for implementing a modern voting system. There have been other attempts at voting via nostr, this is my concept and contribution. View the code below.
Key Features of Using Nostr for Voting
- Decentralization: By leveraging Nostr's decentralized architecture, we can eliminate single points of failure and reduce the risk of manipulation or censorship in the voting process.
- Public-Private Key Cryptography: Each voter can generate a unique public npub and private nsec key pair. The npub public key serves as their identity, while the nsec private key is used to sign votes, ensuring authenticity and integrity.
- Anonymity and Privacy: Voter identities can remain anonymous, as only their public keys are visible. This protects against coercion and ensures that voters can express their preferences freely.
- Secure Vote Submission: Voters can submit their ranked choices or preferences as signed encrypted messages through Nostr and its relays. This ensures that votes are tamper-proof and verifiable.
- Real-Time Results and Transparency: The distributed nature of Nostr allows for real-time updates on the voting process, providing transparency and enabling independent verification of results.
- Mitigating the Spoiler Effect: By implementing ranked-choice voting through Nostr, we can capture a broader spectrum of voter preferences and reduce the impact of third-party candidates acting as spoilers (hopefully).
- Public Auditing: The system can provide an audit trail of all votes cast, allowing for independent verification and fostering trust in the electoral process.
By integrating the Nostr protocol into the voting process, we can create a more secure, transparent, and representative electoral system, particularly at the local level. This approach not only addresses the mathematical challenges of traditional voting methods but also empowers voters and enhances engagement in the democratic process.
I am new and inexperienced in programming, but I have wrote a bit of code with the help of general purpose AI's. Please review and improve and/or comment as best you can below👇
Thank you for supporting my work with zaps ⚡ supermax@minibits.cash
bc1qaucduwftl6lff5f436kccjc425m0ntqs6phzcx
I would like to implement a test at some point when the code is running stable. A distributed vote, if you will. Thank you for your support.
CypherPunksWriteCode
-
@ 1a48e74d:02c0e00f
2024-09-04 22:53:26Welcome back ya'll hope you are doing well this week. Today I wanted to talk about why Bitcoin represents a dawn of a new age in property ownership. Before you spit out your coffee and walk away, hear me out. Bitcoin and real estate have a few things in common. The first is property rights.
When you are the owner of a building with your name on the dotted line and whatnot, you are the sole owner of that property. No one can tell you what to do with it, and no one has a claim to what you own. You are free to do what you wish. Property rights are sacrosanct and immutable similar to Bitcoin.
Bitcoin confers upon the owner the same property right protections as owning a piece of real estate. Once you own it, you are the sole owner of that Bitcoin. No one can tell you what to do with it. No one else has a claim to your Bitcoin. You are free to do with it what you wish.
Bitcoin and real estate are similar in terms of built-in scarcity. There is only 21 million Bitcoin that will ever be created, and you can't print more land. This is why owning real estate has been such a good investment since the beginning of time. Buying a piece of land and "HODLING" for decades will generate a substantial return on your investment.
This same buy and hodl strategy apply to Bitcoin as well. If you bought Bitcoin back in 2009, you would be a multi-millionaire right now.
If you invested $1000 back in 2011 when Bitcoin was trading at $3.50, you would have turned that $1000 into $15.6 million if you held on to it for ten years. Just sayin.
You have to reframe your thinking to understand what is going on. We are living in the 21st-century gold rush, and you have an opportunity to stake your claim to the soundest money on Earth with a few taps on your phone. Never in the history of the world has the plebs like us had the ability to front-run a monetary revolution.
Bitcoin is freedom from oppression. Bitcoin restores your sovereignty. Bitcoin makes you fuckable, and the powers that be know it. They are afraid they will lose control if too many people catch on too quickly, which is why large institutions are rushing to offer Bitcoin services or buy them and keep them on their balance sheet.
Bitcoin won't stay this cheap forever. $100-300k Bitcoin is in the cards over the next few years. I don't want you guys to miss out on this.
All you have to do is buy Bitcoin and hold. It's that simple. FYI trying out the new obsidian writer for nostr notes!
Bitcoin #nostr
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ 1a48e74d:02c0e00f
2024-09-04 22:36:48Nothing can defeat Bitcoin.
-
@ 7f0cbb03:c59f23d0
2024-09-04 21:28:57 -
@ 7ceaffbc:143b9e56
2024-09-04 20:50:26(roles in the adoption space)
Being different matters - At first!
The reasonable man adapts himself to the world; the unreasonable one persists in trying to adapt the world to himself. Therefore, all progress depends on the unreasonable man (Shaw, 1903).
h/t Everyone who is Satoshi.
It is probably fair to say Satoshi, Hal Finney, Adam Back et al. and we early ones are amongst the crazy ones.
Here’s to the crazy ones, the misfits, the rebels, the troublemakers, the round pegs in the square holes… the ones who see things differently — they’re not fond of rules… You can quote them, disagree with them, glorify or vilify them, but the only thing you can’t do is ignore them because they change things… they push the human race forward, and while some may see them as the crazy ones, we see genius, because the ones who are crazy enough to think that they can change the world, are the ones who do. (Jobs, 1997).
Sub-conclusion - To rid ourselves of fiat required radical thought - a base on which to build.
Most Babies learn to Walk
Born with the normal count of fingers toes etc, by the age of 26 I reckoned I had pretty much mastered walking (or so I believed) - until recently I fell, whereupon five things struck me deeply:
- Ageing and the associated decline is another form of novelty - I can resist it, it will eventually win but meanwhile I can adapt - and being alive is about adapting
- Things I have learnt must inevitably include all the things things I need to unlearn
- Things I have not learnt can become urgent (perhaps a wheechair lies in my future) and the learning can be delayed by the requisite unlearning from point 2 above
- Walking was something the masses did before I ever achieved it - which was probably what prompted me to adopt it as a means of ambulation
- The floor
Sub-conclusion - Mass adoption requires; * initiation (the crazy ones) * attention (seeing what others do) * unlearning (elimination of perceived assumptions) * learning (PoW) * emulation ( doing what others do) * mastery (practice doing it well) * review (figuring out what is no longer valuable) * evangelism (Helping others towards Truth)
OK - I have your attention - now what ? (Unpopular opinions incoming)
Eccentricity is not important to anything other than grabbing attention. Bitcoin is well beyond the thresh-hold of needing Eccentrics. We could all name them (and should appreciate their efforts).
The Overton window (that which may be normally spoken of) has become big enough that includes the best of our thinkers now. Analysts, Politicians, Purists, Financial advisers ??, Maxis, Left, Right & Centre.
But most of all it needs the centre. The extremes are great for raising attention and have the greatest voice on lesser social media platforms (which may be a thing of the past when you read this). However, it is clear that out of the centre (the Ex-centrics ? ) will come the mass of humanity that can benefit from bitcoin.
The bulk of future normies (users of bitcoin when only laggards use fiat) must come from the centre - because that is where they are now.
So decentralists or if you prefer "ex-centrics" will be easiest to help if we are seen as different - but reasonable, attractive and something to aspire to. The generosity / loving nature of many Bitcoiners will continue to win hearts (and minds)
Again unpopular perhaps (I should not care) - but this means ideally; - avoiding offensive behaviour (potty language) - avoiding ejection of those who are different (even if you reject their lifestyle choices) - understanding that we all start somewhere on this journey - smaller egos - I am a Bitcoin Maximalist by many definitions but, while my Christianity, what I eat, my and even my choice of frying pan may be most important to me - they may not help evangelise a better bitcoin future.
FWIW I think Bitcoin & Christianity go hand-in-glove in the journey toward a better future , but respect your (God given) right to disagree
Conclusion
Its time to stop thinking we are special and become normal - because that is what hyper-bitcoinisation implies.
To achieve this we need to find ways to secure legislation, peacefully dis-empower fiat states (a side effect - but IMHO a good one), make learning easier, remove barriers (FUD, technological etc) and lend a sympathetic ear to anyone who asks, what, why, how because that's how we all learn:
I keep six honest serving-men (They taught me all I knew); Their names are What and Why and When And How and Where and Who. I send them over land and sea, I send them east and west; But after they have worked for me, I give them all a rest.... (Kipling; The Elephant’s Child)
One day, if we do as well as we must, we will be able to claim - but we are just normal !
-
@ 572aa884:e266a569
2024-09-04 19:46:40STAR TREK TNG: INCOMPATIBLE IDEALS
by Luke Parker
Premise: This screenplay is for an episode of Star Trek: The Next Generation, set near the end of Season 7. It imagines a first contact encounter between Picard’s Enterprise and a fully Anarcho-Capitalist planet with no government nor belief in authority.
Scene 1: Bridge
Exterior views of the Starship Enterprise give way to Captain Jean-Luc Picard standing at his command station on the bridge, his gaze steady and contemplative as he records his log.
Picard: (voiceover) "Captain's log, Stardate 48881.4. We were on our way to Deep Space 9 to provide support for the upcoming Bajoran elections when we received an audio-only distress call from a person on the planet Anarak, just outside of Cardassian space. The planet has yet to be contacted by the Federation, and in fact very little is known about it other than how it has a highly unusual social structure; one that appears to function without any form of central government or hierarchical leadership. It is a society that, despite its relatively high level of technological sophistication, has yet to achieve warp capability. The message is urgently requesting help from any peaceful civilization in range to defend his people against Cardassian invaders. It is difficult to imagine even the Cardassians violating the Prime Directive in such a manner. We are changing course to investigate."
Picard finishes his log entry and looks up, his expression thoughtful. The rest of the bridge crew is attentive with the memory of the Cardassain conquest of Bajor fresh in their minds.
Data: [turning from his console to face Picard] "Captain, Starfleet's lone anthropological record on Anarak indicates that it has a relatively large population and is advanced in various scientific fields. However, there are no reports of warp capability nor a leadership structure for us to contact there. Their society’s structure might challenge our usual protocols for contact."
Riker: [with a hint of curiosity] "An advanced society with no central government? That's a first."
Picard: [nodding] "Indeed, Number One. The distress call came from an individual named Bas T'yat, who identifies himself only as an entrepreneur. Our intelligence suggests that Anarak's society is structured in a way that is not only hostile to hierarchies but completely devoid of any form of leadership or authority. They seem to operate on a principle of total autonomy. This would seem to indicate an absence of a planetary defense system."
Troi: [thoughtful, with concern] "Without a central authority, how do they respond to any external threats? A society like this could be quite vulnerable to more aggressive powers, like the Cardassians."
Picard: [grimly] "It seems that may already be the case. The distress signal implied that a hostile force, likely Cardassian, has targeted them. Without a unified defense, they could be easy prey."
Worf: [sternly] "If the Cardassians are involved, Captain, they will not hesitate to exploit such a weakness. We must be prepared for hostilities."
Data: [analyzing the implications] "However, the lack of formal governance could complicate any assistance we offer. Without a government to negotiate with, we may face challenges in determining how to intervene appropriately."
Picard: [resolute, yet cautious] "We will treat Anarak as we would any other planet sending a distress call, regardless of their social structure. However, we must tread carefully. If we arrive to find Cardassians engaged in hostile acts, we may be forced to intervene. But in Federation space, our priority remains the protection of life and the maintenance of Federation principles."
The bridge crew exchanges looks of determination, each officer understanding the complexities of the mission ahead.
Picard: [decisive, raising his voice slightly] "Set course for Anarak. Engage at warp seven."
Data: [acknowledging] "Course plotted, Captain. Engaging warp seven."
The familiar hum of the warp engines intensifies as the stars on the viewscreen stretch into streaks of light, and the Enterprise leaps into warp, speeding towards the strange planet and the potential conflict awaiting them.
Scene 2: Bridge
The Enterprise emerges from warp above the planet Anarak, the planet’s blue-green surface appearing deceptively peaceful below.
Worf: [at tactical, scanning the area] "Captain, no alien vessels are currently in the vicinity, only artificial satellites. However, I'm detecting signs of recent battle on the planet's surface."
Picard: [moving closer to Worf's station] "Specify, Lieutenant."
Worf: [analyzing the data] "There is minor damage to infrastructure in multiple locations, consistent with Cardassian disruptor fire. Several structures show signs of targeted attacks, but the damage is localized and not extensive."
Data: [at the science station] "Captain, I'm detecting several warp signatures leading to and from the planet. However, one of these signatures does not match any known Cardassian engine profile and is not in our warp signature database."
Riker: [concerned, looking to Picard] "An unknown vessel in the area right around the time of a Cardassian attack? This could complicate matters."
Troi: [sensing the tension, her voice calm but alert] "Whoever they are, they may not have the best intentions. The people of Anarak could be more vulnerable than we initially thought."
Picard ponders this information, his expression thoughtful yet wary. The bridge crew continues their scans, tension mounting as they try to make sense of the situation.
Worf: [interrupting the silence] "Captain, we are being hailed from the surface."
Picard: [decisive, nodding] "On screen."
The viewscreen flickers to life, revealing the image of a middle-aged man with a rugged, practical look. He exudes an air of cautious relief, though his eyes betray a deep-seated wariness.
Bas T'yat: "Alien vessel, thank you for coming so quickly. My name is Bas T'yat, and I’m an entrepreneur and concerned family man. Please, can you tell me, are you an ally of the Cardassians?"
Picard: [calm and reassuring] "Mr. T'yat, I am Captain Jean-Luc Picard of the Federation starship Enterprise. I assure you, the Federation is not aligned with the Cardassians, although we have dealt with them before, and are aware of their transgressions."
Bas T'yat: [sighs in relief] "Thank goodness. We desperately need your help. An alien ship identifying itself as Cardassian has been harassing us for weeks. I fear they'll return soon, and we have little defense against their matter transportation technology. I'm a successful inventor and businessman, Captain. I have resources and tech that could be of value to your Federation, and I'm prepared to trade anything you want in order to help protect my people."
Picard: [curious, leaning slightly forward] "Tell me more about these attacks. What exactly have the Cardassians done?"
Bas T'yat: [his tone shifting to one of frustration mixed with guilt] "It started about a month ago. One of our companies, my own company, in fact, launched a new type of vessel that can travel faster than light using a warp field, the first one we've ever built. Within an hour of it's maiden voyage the Cardassians showed up. At first, they demanded to know who was in charge of the planet. They didn't like the answer they got: We are a free people and no one commands us."
Riker: [sharing a knowing glance with Picard] "A society without centralized leadership would be difficult for the Cardassians to understand or even tolerate."
Bas T'yat: [nodding] "That was my conclusion. They treated us like a lawless frontier, moving in to take whatever they wanted. They attacked our resource stockpiles, dematerialising and I assume stealing whatever they could before we even knew what was happening. Our ground-based defense missiles successfully took out their two smaller fighter crafts that came down into our sirspace, but we have no defense against their transporter technology. Their last visit was just a raid from orbit. They just grabbed what they could without even entering the atmosphere and left within minutes."
Picard: [thoughtful, with a hint of concern] "I see. There are widely-agreed-upon rules against this type of behavior, I assure you. However, since the Federation has never made contact with your people before now, we are unfamiliar with the proper etiquette for such a first encounter. How do you suggest we proceed safely for an official meeting?"
Bas pauses, visibly perplexed by the concept of "official" procedures, his expression almost amused.
Bas T'yat: [with a chuckle] "Official meeting? Captain, just come on down and park your craft outside my coordinates. My wife will make us all some refreshments."
Picard: [with a slight smile, yet maintaining formality] "We appreciate the hospitality, Mr. T'yat, but we prefer to beam down if that's acceptable to you. We can be there in a few minutes."
Bas T'yat: [nervous but agreeable] "Beam down? Uh, sure, that's fine. I was wondering if that technology worked on people. Love to see it in action."
Picard: [nodding respectfully] "Understood. I'll be down with a small team to meet you outside your building shortly. Picard out."
The screen goes dark as the connection ends, leaving the bridge crew to process the encounter.
Riker: [with a wry smile] "Drinks with the locals; sounds like fun."
Troi: [softly, but with insight] "He's nervous, but also hopeful. I'm sensing some hurt pride in him, too, Captain. This is likely the first time his people have ever had to reach out to anyone off-world for help. His pride may cloud his ability to fully grasp the dangers they’re facing."
Picard: [serious, standing up to address the crew] "On top of being an official first contact, the Cardassians have made this a very delicate situation. We must be prepared for anything. Counselor Troi, Data, and La Forge, you're with me. Number one, you have the bridge."
The crew nods in understanding as the away team heads to the turbolift. The tension in the air is palpable as they ready themselves for what may be a challenging first contact and a possible hostile encounter with the Cardassians.
Scene 3: Bas T’yat’s Front Lawn
The team materializes on the surface of Anarak, just outside of a large, elegant house set in a lush, rural landscape. The area is a blend of modern luxury and natural beauty, though signs of recent damage are evident. Smoke still rises from a nearby hangar, the aftermath of the Cardassian attack clear in the smoldering ruins. As the team takes in their surroundings, a group of locals approaches. At the forefront is Bas T'yat, flanked by a few colleagues. He's a middle-aged man with a commanding presence, dressed in practical yet fine clothing. His stride is confident, and his eyes sharp with the determination of a man used to getting what he wants. Bas’s face lights up with a mixture of curiosity and enthusiasm as he sees the away team.
Bas T'yat: [warmly, holding his palms upwards and then extending one hand towards Picard in a greeting] "Captain Picard! Welcome to Anarak! I'm Bas T'yat. It is my honor to meet you."
Picard: [imitating the hand motion, with a polite smile] "The honor is ours, Mr. T'yat. Thank you for your hospitality. May our two peoples forever live in harmony."
Bas gestures to the smoldering hangar in the distance, his tone tinged with frustration.
Bas T'yat: [with a sigh] "That would be wonderful. I do wish the circumstances for your visit were better. [clenching his fists] That's my hangar over there, or what's left of it, anyway. The Cardassians destroyed it and the spacecraft I designed and built there. It was our first warp vessel, one that the whole world cheered on at launch just last month. We were going to colonize the asteroids with it."
Geordi: [To Picard, gesturing towards the wreckage] "If I may, Captain?"
Picard: "Certainly." [To Bas T'yat] "This is my head engineer, Commander Geordi La Forge."
Geordi: [stepping forward] "Mr. T'yat, if it's alright with you, I'd like to examine the wreckage. I might be able to determine if anything is salvageable."
Bas T'yat: [nodding, gesturing to a colleague] "Of course. Lar Kinn here is our chief pilot. He made the historic first flight and he'll take you to the hangar and help with anything you need."
Geordi and Lar Kinn head towards the hangar, with Geordi hoping to confirm if this was the source of the warp signature detected in orbit. Meanwhile, Bas leads Picard, Troi, and Data toward his house. As they walk, Bas impatiently answers a few questions about his planet, his voice tinged with annoyance and concern.
Data: “Mr. T’yat, if I may, I notice that your neighborhood’s infrastructure is well taken care of. If Anarak has no central authority of any kind, who is responsible for keeping the roads and infrastructure?”
Bas T'yat: ”Well, as a rule of thumb, if it’s on my land, I am. If it’s not on my land, then someone else is, but I may have to pay them to use it. They look so nice because we all get better insurance rates for keeping them that way.”
Data: “Curious. And who initiates larger projects like mass transportation and research?”
Bas T'yat: [slightly annoyed] “They are all risky endeavors taken by entrepreneurs like myself. Sometimes profits take decades to appear, but like with my new warp engine, I’m sure they’ll make me a huge fortune one day.” [turning to ensure Picard can hear him] "Anyway, I fear the Cardassians aren't done with us. They've stopped even trying to make demands of us, which makes me think they're planning something bigger. Perhaps a larger assault. We've been able to fend them off so far, but I have no clue how to defend against those transporter devices."
Picard: [impressed] "It is remarkable that your society, with no planetary defense force, was able to repel Cardassian military forces, even if only temporarily. Cardassian ships are known for their significant weapons and shields."
Bas T'yat: [with a hint of pride] "The people of Anarak are no strangers to defending themselves. We have numerous private protection agencies, each with advanced missile fortifications and other kinds of defenses to protect every inch of this planet. But these were designed to fend off terrorists or rival companies, not an alien invader."
They reach the entrance to Bas's home. He pauses before entering, turning to Picard with a serious expression.
Bas T'yat: [earnestly] "Captain, I'm prepared to trade for whatever defensive technology you can provide, especially something to counter the Cardassian's transporter technology. I am confident that our ground defenses can take out their shuttlecraft, but we're helpless against their ability to beam in and out at will."
Picard pauses, his face reflecting the weight of his decision before he speaks.
Picard: [in his most diplomatic tone] "Mr. T'yat, the Federation is committed to helping those in need, and we don't tolerate bullies. However, there are restrictions on the technology we can share, particularly weaponry. Also, the Federation's assistance often depends on whether a planet is on the path to becoming a member. We must ensure that our values align. In this case, a diplomatic approach might bring a far more lasting peace than simply escalating an arms race."
Bas considers this, his optimism tinged with caution. The group moves into a large room with lots of seating where a warm drink much like tea is offered. Picard partakes graciously.
Bas T'yat: [thoughtfully] "I see. Federation membership is... a complicated idea. I'm sure many heads of companies like myself would welcome it, but for the whole planet to become a singular member of any larger federation is hard to imagine. Our society values individual freedom above all else, and I'm not sure how compatible everyone here is with the Federation's ideals."
Data: "The benefits of Federation membership are considerable. Could not your people one day vote on the issue to see if a majority wants to join after taking ample time to research membership?"
Bas T'yat: [skeptically] "Voting is something that hasn't been done here for tens of thousands of years. We consider it to be archaic, a form of slavery of the minority. Honestly, I'm surprised your culture still practices it."
Picard: [nodding, a little embarrassed] "I see. Rest assured that we try to only vote on things that have every participant's full consent. You'll find that this is very common among the races you meet as your people start to explore the stars. But until then, know that the Federation's primary concern is the safety of everyone in Federation space, including your people."
While inside Bas's home, Data discreetly connects to an open network connection, accessing Anarak's version of the internet called the Openlink. His eyes flicker left to right at an inhuman speed as he analyzes the planet's defenses and infrastructure.
Data: [quietly, to Picard as he processes the data] "Captain, while there are many advanced technologies in the hands of individuals and companies, I find no evidence of any kind of unified military infrastructure. The defense efforts are completely decentralized, which will surely prove problematic in the event of a full-scale Cardassian invasion."
Picard: [grimly] "Given the Cardassians' history, we must prepare for the worst."
Just then, Geordi returns from the hangar, his expression a mix of curiosity and concern.
Geordi: "Captain, I've confirmed that Bas's ship was the source of the warp signature we detected. Unfortunately, the wreckage isn't salvageable. It could be a long time before Anarak returns to the stars."
Bas T'yat: [with a determined grin] "I wouldn't say that. My first flight was widely publicized. Lar Kinn and I are celebrities now. Hundreds of other companies are likely working on similar technology already. Some of us refer to it as 'the great space race,' with the goal of creating the first off-world colony, and my company is currently in the lead."
Picard: [with a slight smile, impressed by the resilience] "It seems the people of Anarak are not to be counted out yet. Your intrepid spirit will serve you well as Anarakans start exploring the Galaxy."
Troi: [warmly] "Your optimism is admirable, Mr. T'yat. But remember, resilience is strongest when combined with caution."
Bas T'yat: [nodding, appreciatively] "Wise words, Miss Troi. Hopefully with your help we'll be ready for whatever comes next."
Picard: [ready to leave] "This tea is delicious, thank you for your hospitality. Next I'll need to talk to my superiors at Starfleet headquarters before we can proceed any further. I'll be sure and pass your concerns and needs on to them and then we'll contact you again later today."
The away team prepares to depart, with Bas expressing his thanks once more. As they beam back to the Enterprise, each member reflects on the unique challenges of Anarak.
Scene 4: Picard’s ready room
Minutes later, Captain Picard sits alone in his ready room, the vast starscape of space visible through the window behind him. His posture is straight, and the weight of the decision before him is clear in his eyes. He taps a command into his desk console, and the screen flickers to life with the familiar stern face of Vice Admiral Alynna Nechayev. Her image on the screen is as imposing as ever.
Picard: [calmly, but with underlying urgency] "Admiral, I've just concluded a preliminary contact with a representative of Anarak, just a few light years this side of Cardassian space. The situation is more complex than anticipated. The planet is under threat from the Cardassians; specifically Gul Bankar, who's been making increasingly aggressive moves from orbit. Meanwhile, the society on Anarak is... unconventional. They have no central government, no formal leadership nor military structure. The entire planet operates under a decentralized, anarchic, commerce-based system."
Nechayev: [eyes narrowing] "Anarchists? No structure? That's not exactly an encouraging environment for a first contact, Jean-Luc.
Picard: “Admiral, they’ve managed to develop warp technology without either a government or military. It’s a remarkable feat, but one that leaves them vulnerable.”
Nechayev: “Are you certain there’s no one in authority at all? Not even an ambassador?"
Picard: [nodding] "Precisely. Their social structure wouldn’t allow it. Our first contact has been with an individual and his family, one Bas T'yat; a wealthy businessman and the inventor of their first warp-capable ship. He's requesting assistance to defend against further Cardassian attacks, but without a central authority, assisting one individual could have unpredictable consequences."
Nechayev: [questioning sharply] "Hmm. And what of the Cardassians? Is there any evidence of their involvement?"
Picard: [gravely] "Plenty. The Cardassians have already raided the planet, seizing valuable resources. Their ship left orbit shortly before our arrival, but the threat of their return looms large. Bas T'yat is convinced they'll come back with a larger force."
Nechayev pauses, her expression hardening as she considers the situation.
Nechayev: [warningly] "Starfleet cannot afford to be drawn into deeper hostilities with the Cardassian Union, Jean-Luc. Especially not over a non-member world. You must tread carefully. A diplomatic solution is paramount, and under no circumstances should you provide this Bas T'yat with advanced defensive technology. The Prime Directive is clear; we don't interfere with the internal affairs of non-member worlds, and besides, you haven't even made proper first contact with the planet, only with one family."
Picard: [measured, but firm] "Admiral, with respect, Anarak is far more advanced than many worlds we've encountered. Their technological capabilities, while decentralized, are impressive. Now that they are getting their space legs it won't be long before Anarakans are showing up in ports across the quadrant. And if the Cardassians establish a foothold here, it could destabilize the entire region."
Nechayev's face softens slightly, recognizing the gravity of the situation. She sighs, her resolve shifting as she weighs the options.
Nechayev: [reluctantly] "Alright, Jean-Luc. I don’t like this, but I trust your judgement. You may share transport inhibitor technology. Only enough to help them counter the Cardassians' beaming technology, but nothing more. And remember, this Bas T'yat doesn't speak for his whole planet. Try to treat his family like you would if you found them alone in a spaceship."
Picard: "Understood, Admiral. I'll proceed with caution."
Nechayev: [more sternly] "Just don't start another war, Jean-Luc."
The screen goes dark. Picard leans back in his chair, the weight of the decision pressing on him. He stands, smoothing his uniform, and exits the ready room onto the bridge.
Scene 5: Bridge
On the bridge, the atmosphere is tense as the crew processes the situation. Picard steps up to his command chair, addressing the senior officers who have gathered.
Picard: [seriously] "Admiral Nechayev has authorized us to share transport inhibitor technology with Anarak to help them defend against further Cardassian raids. But we must be mindful of the ethical implications of our actions."
Dr. Crusher:: [concerned] "Captain, I'm worried about the consequences of becoming involved in this situation. If we assist Anarak, it could escalate into a larger conflict--one that could draw the Federation into another war with the Cardassians."
Worf: [gruffly, with resolve] "But allowing the Cardassians to plunder a defenseless society is equally unacceptable, Doctor. We have a responsibility to protect the vulnerable."
Picard: [thoughtfully, considering both viewpoints] "I'm inclined to agree with Worf on this one, Beverly. We must work fast to deploy the inhibitors wherever we can, but that does bring up another problem. The Prime Directive prevents us from interfering in the internal affairs of non-member worlds. And giving one individual on Anarak access to advanced technology could upset the delicate balance of their society. What if Bas T'yat's company gains a monopoly on defense technology? It could shift the power dynamics on the entire planet."
Troi: [insightfully, her voice calm] "Captain, I sense that Bas T'yat is deeply worried about his planet's future. He feels a strong sense of responsibility and guilt for the attacks... I don't think that he had any way to know that their warp signature would act as a beacon to those seeking resources. They didn't even know other life forms existed until the Cardassians arrived. It's clear that Anarakans weren't prepared for the reality of interstellar contact."
Picard: [resolved] "I agree, Counselor. We're dealing with a society that is both advanced and vulnerable. A dangerous combination. We must proceed carefully."
Picard considers this, his brow furrowed in thought. Finally, he makes a decision.
Picard: [decisively] "We must proceed, however. I'll invite Bas T'yat to the Enterprise to discuss the situation further. We will ensure that any assistance we provide doesn't destabilize their society, or escalate the conflict."
Picard hails Bas T'yat from his command station.
Picard: [calmly] "Mr. T'yat, I'd like to invite you aboard the Enterprise to discuss our options in person."
The main screen fills with T'yat's face again.
Bas T'yat: [with a hint of hesitation] "Thank you, Captain, I accept. But I'd prefer to take my own craft... Still not quite comfortable with the transporter technology, if you'll understand. I'll bring my wife, L'anna, and my pilot, Lar Kinn."
Picard: [diplomatic, nodding slightly] "Understood. We'll be ready to receive you in the shuttlebay.”
Scene 6: Main Shuttlebay
In the Enterprise's shuttlebay, the crew prepares to greet their visitors. The doors slide open, and a sleek, streamlined skysled enters the bay, guided by Lar Kinn at the controls. The craft settles gently onto the deck, and the hatch opens. Bas T'yat steps out, accompanied by his wife, L'anna, and Lar Kinn, who looks around the shuttlebay with wide-eyed curiosity. Picard, Troi, and Data are there to meet them, offering warm greetings as the Anarakans take in the impressive sight of the Enterprise's interior.
Picard: [welcoming, with a gesture towards the ship] "Welcome aboard the Enterprise, Mr. and Mrs. T'yat. I trust your journey was smooth?"
Bas T'yat: [grinning, clearly impressed] "Very much so, Captain. Your ship is... well, it's more than I imagined. Thank you for having us."
Troi steps forward, offering a kind smile.
Troi: [invitingly] "If you'd like, I can give you a tour of the ship. We're quite proud of our vessel, and I think you'll find it fascinating."
L'anna's eyes widen with excitement, and she nods eagerly. Bas exchanges a look with Lar Kinn, just catching up to the group. He seems just as eager to explore as the others, and nods excitedly to Troi.
Bas T'yat: [appreciatively] "We'd be honored. Lead the way, Counselor."
Lar Kinn: So can all these shuttles go faster than light?
With that, the group sets off on a tour of the Enterprise, the Anarakans marveling at the advanced technology and seamless design of the Federation starship. As they walk, Troi can't help but notice the mix of awe and determination in Bas T'yat an inventor and leader who knows that his world's future may very well depend on the choices made in the hours to come.
Scene 7: Bridge
The scene opens as Counselor Troi leads Bas T'yat, L'anna, and Lar Kinn onto the bridge of the Enterprise. The visitor's awe is palpable as they take in the grandeur of the ship's command center. Picard, standing near the captain's chair, barely has a moment to welcome them when a sudden alert draws everyone's attention.
Data: [at his station, voice urgent] "Captain, I'm detecting the return of the Cardassian battle cruiser. It is registered as the Kolarak. It just popped out from behind the home star and is entering orbit around Anarak."
Riker: "Yellow alert. On screen."
Picard immediately straightens, his expression shifting from welcoming to resolute. The tension on the bridge heightens as the viewscreen flickers to life, displaying the imposing sight of the Kolarak. The Cardassian vessel looms in space, its dark hull bristling with weaponry.
Picard: [calmly, but with authority] "Mr. Worf, open a channel to the Kolarak."
The screen quickly reveals the stern visage of a Cardassian Gul in his command chair. His eyes narrow as he takes in the sight of the bridge crew and the unfamiliar faces of Bas and his companions.
Picard: [with measured politeness] "I am Captain Jean-Luc Picard of the Federation starship Enterprise. With whom am I speaking?"
Gul Bankar: [with a sneer, his voice dripping with condescension] "You may address me as Gul Bankar."
Picard: "Gul Bankar, there have been reports of your vessel causing harm and stealing resources from the planet below. With me is Bas T'yat, the owner of the warp-capable vessel that it appears your forces destroyed on the surface. We request an explanation for these hostilities."
Gul Bankar: "Captain Picard, your presence here is an unwelcome interference. This planet, and its inhabitants, are under Cardassian protection. You will withdraw immediately, leaving Anarak to our care."
Picard's gaze hardens, but his tone remains calm and firm.
Picard: [skeptically] "Cardassian protection? Anarak lies within Federation territory. We received a distress call and are here to provide assistance."
Bankar's expression darkens, his eyes flashing with anger.
Gul Bankar: [coldly] "The Federation's meddling in this region is all too well documented, Picard, but Anarak is too close to Cardassian space for your interference to be tolerated. I find your so-called assistance nothing more than another prelude to annexation."
Bas, standing beside Troi, listens intently, his face reflecting a mixture of concern and frustration. Picard, sensing the rising tension, steps closer to the viewscreen.
Picard: [with resolve] "The Federation respects the sovereignty of all worlds. We are only here because of your aggressive actions, not to claim this planet. We have long worked to maintain peace in this sector, and I would hate to see that peace jeopardized by your reckless actions here."
Gul Bankar: [sarcastically] "Peace? The Federation's control of Terok Nor and the Bajoran wormhole is hardly a gesture of peace. It was a clear power grab, one that we will not allow to extend to Anarak."
Picard's eyes narrow, his voice taking on a steely edge.
Picard: [firmly] "Gul Bankar, a conflict between the Federation and the Cardassian Union would serve no one's interests, especially not over a planet that is so new to the neighborhood. I suggest you contact your superiors before taking any further aggressive actions."
There's a tense silence as Bankar considers Picard's words, his eyes flicking to Bas and then back to Picard. Finally, he lowers his head in a slight nod, though his expression remains hostile.
Gul Bankar: [grudgingly] "Very well, Captain. I will contact Central Command. But understand this; Anarak will not fall under Federation control, and I will ensure that Cardassia's interests are protected. I will contact you again in 4 hours."
The transmission abruptly cuts off, leaving the bridge in a heavy silence. The Kolarak remains on the viewscreen, hovering ominously in space, nose to nose with the Enterprise now. Picard exhales, turning to face his crew.
Picard: [calmly, but with an undertone of urgency] "Maintain our position and yellow alert, Mr. Worf, and monitor the Kolarak for any signs of hostile activity."
Worf gives a curt nod, his eyes never leaving the tactical display.
Worf: [with determination] "Aye, Captain. Shields at maximum, weapons ready."
Picard then turns to Bas, who is visibly shaken but trying to maintain his composure.
Picard: [reassuringly] "Mr. T'yat, I understand this is a difficult situation and you don't yet know who to trust, but I assure you that we aim to keep the peace in this sector and will do everything in our power to ensure your planet's safety. We ask nothing in return from the Anarakan people. However, it is crucial that we handle this matter diplomatically."
Bas nods, though his expression is one of deep concern.
Bas T'yat: [uneasily] "I appreciate that, Captain, and don't worry, nothing that Gul Bankar says will make me trust his offer of "protection" after he destroyed my ship and stole resources from all over the planet. But I do worry that he’s using this time to call for reinforcements."
Picard places a reassuring hand on Bas's shoulder, his voice steady.
Picard: [confidently] "If he attacks, we'll face that challenge together, Mr. T'yat. You are free to return to the surface at any time but for now, I think it best that we consider how fast we could deploy our transporter inhibitor technology on your planet."
Bas T'yat: [enthusiastically] "You mean you're willing to sell us devices that can stop them from beaming up our resources?"
Picard: "Or beaming their troops down. And we wouldn't sell it to you, it is our gift. The Federation doesn't sell it's assistance to those in need."
The visitors faces all brighten in unison with relief.
L'anna: "I don't know how we could ever thank you enough, Captain. This means everything to our people."
Picard: "Don't thank us yet, there is still the issue of deploying enough of them in time. If they're going to attack in 4 hours you'd need them set up near all the most valuable targets at the very least. They'll need a steady supply of energy, too."
Bas furls his lips in concerned thought.
Data: "Captain, I've analyzed all of the planet's most valuable resource depots that our scanners can detect and I see 168 unique locations that we should set up transport inhibitors. There may, of course, be other targets too that they would want."
Riker: [apprehensively] "That's way too many for us to replicate in time, much less visit each location to install within the next 4 hours."
Picard: "We need a way to speed up that deployment, at least to enough sites that will show Gul Bankar that things have changed... And hopefully without him detecting our movements."
Bas T'yat: "If I may captain, I think I know a better way to deploy them if I can just make a detailed scan of one and save it to our printer file format... We don't have your transporter technology, but our device printers are able to scan and quickly reproduce any technological device that we can identify the components of."
Riker: "And how will that help distribute them to everyone in time?"
Bas T'yat: "Simple, every business and household has one of these printers. I can upload the scanned file to our Openlink and tell all of Anarak in one broadcast about the imminent threat and how to protect themselves from it with one of these inhibitors. They'll pop out thousands of them in time."
Picard: "That sounds very promising, Mr. T’yat. But I want your assurance that your company will not hold any sort of monopoly on this technology or otherwise profit from it; In lieu of a government, the Federation requires that this gift be made to your whole planet at once."
Bas T'yat: [after some hesitation] "Alright, Captain. You have my promise. Giving up some profits is the least I can do to make up for attracting the Cardassians to Anarak."
Picard looks visibly relieved, giving a curt nod to Bas.
Picard: "Data, take our guests to engineering and grab whomever you may need to assist you with making this happen in time. Remember, you’ll also need to show the Anarakans how to use these devices."
Data: "Aye sir." [To the visitors] "If you'll follow me please, we'll be able to work on this in engineering."
Data, Bas, Lar Kinn, and L'anna walk briskly to the turbolift. The scene closes with Picard returning to his command chair, the bridge crew resuming their stations as the standoff between the Enterprise and the Kolarak continues. The two ships remain locked in silence, nose to nose, as the 4-hour countdown begins.
Scene 8: Main Engineering
The scene opens in Main Engineering, where Geordi La Forge, Data, and Ensign Sam Lavelle are putting the final touches on the scan for their transport inhibitor device. Bas T'yat and Lar Kinn stand nearby, observing the process with keen interest. The atmosphere is tense, underscored by the ticking clock counting down the hours until Gul Bankar's deadline.
Geordi: [focused as he works] "All right, that should do it. The scan of this transport inhibitor is ready, and the data's been formatted for your printers."
He hands a datapad to Bas, who takes it with a mix of curiosity and nervousness.
Geordi: [reassuringly] "You'll be able to upload the complete plans from this device, including an adapter for your power source. Once it's on your network, anyone with Openlink access will be able to build and deploy these inhibitors in a matter of minutes. It's up to you, however, to convince them to do that."
Bas T'yat: [relieved] "Thank you, Commander. I'm sure many will manage it in time, but I just hope it's enough."
Lavelle: [chiming in, pointing to the datapad] "Also I've included a detailed instruction set too. It explains how to set the units up and operate them."
Bas nods his thanks, flipping through the instructions as Lar Kinn looks over his shoulder.
Data: [ever precise, offering a suggestion] "Mr. T'yat, given the standoff outside, it may be prudent to avoid the use of the transporter. The Kolarak is likely monitoring our actions closely. Sending the plans with you aboard the skysled would appear less provocative."
Bas looks visibly relieved at the suggestion, nodding in agreement.
Bas T'yat: [grateful] "Thank you, we'd prefer not having our atoms scattered throughout the atmosphere today anyway."
Geordi: [nodding, humorously] "No problem. We'll make sure the skysled is ready to go."
Data gestures toward the exit of Engineering, indicating it's time to depart.
Data: [calmly, but with urgency] "We should make our way to the shuttlebay. There's less than two hours remaining before the Gul's deadline. It's imperative that as many Anarakans as possible receive these plans in time."
Bas and Lar Kinn exchange a look, their expressions set with determination as they follow Data out of Engineering. The camera follows the group as they walk briskly through the corridors of the Enterprise.
L'anna: "You'll be sure to tell the Captain and Councilor Troi that we said goodbye?"
Data: "Of course. And let me say that I find your culture truly intriguing, and hope we get the chance to visit again in the future, no matter if Anarak chooses Federation membership or otherwise."
Bas T'yat: "You'd be our welcome guest anytime, Mr. Data. I think you'd most enjoy seeing the progress my people have made with robotics and artificial intelligence. My company produces one of the best-selling android assistants on the market."
Data: "Fascinating. I look forward to it. Here we are."
As they reach the shuttlebay, the large bay doors slide open, revealing the sleek skysled waiting for them. The ship is prepped and ready for launch, its engines humming with quiet power.
Data: [pausing as their ship's door opens] "We wish you a safe journey, Mr. T'yat, L'anna, Mr. Kinn."
Bas T'yat: [nodding, with resolve] "We'll make sure everyone gets these plans. Thank you, Commander Data."
Lar Kinn gives Data a respectful nod before they step onto the skysled. Data watches as they take their positions inside the cockpit. Data then taps his communicator, his voice steady.
Data: "Data to the Bridge, our visitors are ready to depart."
The camera cuts to the exterior of the Enterprise, where the massive shuttlebay doors slide open. The skysled, with its sleek design and glowing engines, slowly backs out of the bay, the vastness of space stretching out behind it. As the skysled turns on its main engines, the camera shifts to an interior cabin view, showing Bas and Lar Kinn exchanging a final, determined nod before the vessel speeds downwards towards Anarak.
Scene 9: Bridge
The scene opens 30 minutes later. The tension on the Enterprise bridge is palpable as the Openlink broadcasts Bas's message and the transport inhibitor plans worldwide. The crew watches anxiously as the first inhibitors are swiftly deployed across Anarak. Suddenly, the ship's sensors beep urgently. Worf glances at his console, eyes narrowing.
Worf: [alarmed] "Captain, seven additional Cardassian battle cruisers have exited warp and joined Gul Bankar's ship. They're forming up and preparing to engage."
Riker: "Red alert, forward shields to maximum."
Picard's expression hardens as the Kolarak hails them. Gul Bankar's visage appears on the viewscreen, eyes burning with fury.
Gul Bankar: [accusatory] "We've detected the inhibitor plans on their planet-wide network, Picard. You've broken our gentleman's agreement by sharing advanced technology with a primitive civilization. So much for Starfleet ideals! You're no match for us now. Try and stop us at your own peril."
With that, Bankar cuts off communications. Picard stands, frustration etched into his features as the fleet of eight warships begins its descent toward Anarak.
Data: [urgently] "Captain, the Cardassian ships are gaining speed and appear to be initiating an attack run on the planet's largest population center. Tens of millions of civilian lives are at risk, more than usual because the defensive turrets are spread out among the greater population. It is not uncommon for them to be placed on rooftops and around housing here."
The crew's tension escalates as the gravity of the situation sinks in. Picard, feeling the weight of command, turns to his officers.
Picard: [steady but intense] "Ideas?"
Worf: "Captain, we could attempt to disable their weapons and transporters, focusing on minimizing their capacity to attack."
Riker: [shaking his head] "Even so, we're outmatched. Enterprise won't survive against eight battle cruisers."
Troi: [calm but urgent] "We just need to buy time. To give the Anarakans a chance to fully deploy their defense net. But any kind of engagement from us still risks re-igniting a war with the Cardassians."
Data, ever analytical, speaks up with a grim tone.
Data: "Captain, I've run millions of battle scenarios. None result in the Enterprise surviving while saving more than a few dozen lives on the surface. Our current position is untenable."
As the Cardassian warships break through the planet's stratosphere, Ensign Lavelle, stationed at comms, suddenly speaks up.
Lavelle: [urgently] "Captain, Bas T'yat has just sent out another message across the planet, warning of the incoming Cardassian fleet."
Picard opens his mouth and lifts his index finger to respond, but he's cut off by a sudden, blinding array of light erupting from the planet's surface, filling up the viewscreen. The bridge crew shields their eyes as the screen fills with thousands of pinpricks of light; an overwhelming launch of nuclear-armed missiles aimed directly at the Cardassian fleet.
Worf: [stunned] "Captain, these are nuclear-fission warheads, each with a 10-megaton yield. I've never seen a civilization with this many dirty weapons in active deployment."
The bridge falls silent as the sheer scale of the Anarakan response becomes clear. The entire hemisphere of Anarak has mobilized, proving their incredible capacity for defense, despite the lack of a centralized government.
Data: "Fascinating. It could be that no central authority is needed for coordination when the threat is dire. These people all appear to be responding individually with their own weapons."
The first few dozen warheads impact the Cardassian shields, which manage to absorb their blasts. But the onslaught is unrelenting. Hundreds, then thousands of warheads detonate in rapid succession, creating a cataclysmic, sustained explosion. The Cardassian ships, though formidable, are utterly overwhelmed. The viewscreen shows an apocalyptic display; a temporary star forms in Anarak's upper atmosphere, engulfing the entire Cardassian flotilla in an unprecedented, blinding flash.
Picard: "Helm, back off our position."
The bridge crew watches in stunned silence as the massive explosion slowly dissipates, leaving nothing but a red afterglow and the eerie silence of space. Power has gone out across the hemisphere on the planet below, but not a single molecule of the Cardassian ships remain. Picard and his crew are left in awe, mingled with a deep sense of disappointment. The enormity of what they've witnessed sinks in; a civilization so welcoming, yet still capable of such destructive power... Sso fundamentally different from the Federation's ideals. Troi closes her eyes tightly and winces, blocking out the pain of all those Cardassian deaths. Picard stands, staring out at the aftermath, the weight of the moment heavy on his shoulders.
Picard: [quietly, with a great sense of loss] "Such utter destruction..."
The camera pulls back, showing the Enterprise as a small silhouette against the reddish glow below.
Scene 10: Bridge
The scene opens minutes later with the Enterprise bridge crew still processing the aftermath of the overwhelming display of destructive power. The mood is somber as the reality of what they've witnessed lingers. Suddenly, Bas T'yat's face appears on the viewscreen, his expression a mixture of relief and satisfaction.
Bas T'yat: [earnestly] "Captain Picard, I wanted to thank you and your crew for everything. It seems our future is secure now, thanks to the defense network and your assistance. We're eager to move forward and hope the Federation will allow us to engage in commerce with your worlds and other peaceful civilizations."
Picard stands, his gaze steady, though his tone reflects the weight of what has transpired. He pauses for a moment, as if searching for the right words, the bridge falling into a brief, tense silence.
Picard: [measured, but firm] "Mister T'yat, I must be candid. While the Enterprise is pleased to have assisted in safeguarding your world, the events of today have left us with grave concerns. The way Anarak handled the Cardassians… particularly the use of nuclear warheads, demonstrates a fundamental difference in values between our societies. We cannot endorse methods that pose such a grave risk to all life, even in defence. The Federation could not, in good conscience, approve your planet for membership given these circumstances."
Bas's expression shifts to one of slight disappointment, but he remains composed.
Bas T'yat: "I understand, Captain. We've always been a world that does things our own way. Federation membership would have been a tough sell to my people anyway. But what about trade? Surely we can still establish commerce with Federation worlds?"
Picard nods, his tone softening slightly.
Picard: "Trade remains an option. We won't turn away peaceful commerce between Anarak and Federation planets. However, I must stress that the use of nuclear weapons is fundamentally at odds with Federation ethics. While I recognize their role in your planet's defense, I hope that over time, your people will explore more sophisticated and less destructive means of protection."
Bas nods again, understanding the implications of Picard's words.
Bas T'yat: "It's clear that today's events were... extreme. The fallout, the EMP blackouts, the atmospheric damage; we've already seen unacceptable cost. I'll do my best to guide my people toward more advanced defenses, and away from reliance on such careless weapons. It will be my penance for leading the Cardassians here."
Troi senses his guilt once again and takes a deep breath. Clearly still shaken by the loss of life, she steadies herself before offering a supportive smile.
Troi: "You shouldn't burden yourself with guilt, Mister T'yat. Anarak was bound to take that step sooner or later. What matters now is how you use your newfound role as an ambassador to the stars. Your actions will shape your planet's future in the galaxy."
Bas smiles, clearly grateful for the support.
Bas T'yat: "Thank you, Counselor. I'll do my best to live up to that responsibility."
After a few more exchanges, the connection ends, and Bas T'yat's image fades from the viewscreen. Picard takes a deep breath and turns to face his bridge crew.
Picard: [reflective] "We've witnessed two amazing displays of power today; one of the explosive variety, and the other of a free people's resolve. It's hard to imagine how their society works with no acceptance of authority, but today they've clearly displayed that they can accomplish amazing things working together even without any."
Worf, still perplexed, shakes his head slightly.
Worf: "I still don't understand how an entire planet could coordinate such a specific defense without any central leadership."
Leaning casually against the console, Riker chuckles lightly.
Riker: "It was in everyone's best interest, Worf. They just needed Bas's signal to know when the attack was imminent. The rest fell into place."
Worf: "And how they could hide that many warheads from our scans? Enriched Uranium is the easiest of all elements to scan for."
Data: "It appears that their stealth technology may be on par with our own."
Picard, his expression thoughtful, gazes out at the stars beyond the viewscreen.
Picard: "I'm placing a note in my log for Starfleet to leave this planet alone until they can't be ignored any longer. I believe it's for the best that we leave Anarak to chart its own course in the galaxy."
He pauses, a faint smile tugging at the corner of his mouth.
Picard: "I doubt we'll have trouble with them soon, at least, until they meet the Ferengi."
*The bridge crew shares a quick laugh and then a quiet moment of contemplation before returning to their stations. The camera pulls back, showing the Enterprise once again poised in the vastness of space, a symbol of hope and integrity amidst the complexities of a vast and unpredictable galaxy.
Fade to black.*
---
*This story is set in the Star Trek universe, created by Gene Roddenberry and owned by Paramount. I do not own any of the characters or settings from the Star Trek franchise, and this is purely a fan-made work for non-commercial purposes.*
-
@ 1a48e74d:02c0e00f
2024-09-04 18:53:09Welcome back ya'll hope you are doing well this week. Today I wanted to talk about why Bitcoin represents a dawn of a new age in property ownership. Before you spit out your coffee and walk away, hear me out. Bitcoin and real estate have a few things in common. The first is property rights.
When you are the owner of a building with your name on the dotted line and whatnot, you are the sole owner of that property. No one can tell you what to do with it, and no one has a claim to what you own. You are free to do what you wish. Property rights are sacrosanct and immutable similar to Bitcoin.
Bitcoin confers upon the owner the same property right protections as owning a piece of real estate. Once you own it, you are the sole owner of that Bitcoin. No one can tell you what to do with it. No one else has a claim to your Bitcoin. You are free to do with it what you wish.
Bitcoin and real estate are similar in terms of built-in scarcity. There is only 21 million Bitcoin that will ever be created, and you can't print more land. This is why owning real estate has been such a good investment since the beginning of time. Buying a piece of land and "HODLING" for decades will generate a substantial return on your investment.
This same buy and hodl strategy apply to Bitcoin as well. If you bought Bitcoin back in 2009, you would be a multi-millionaire right now.
If you invested $1000 back in 2011 when Bitcoin was trading at $3.50, you would have turned that $1000 into $15.6 million if you held on to it for ten years. Just sayin.
You have to reframe your thinking to understand what is going on. We are living in the 21st-century gold rush, and you have an opportunity to stake your claim to the soundest money on Earth with a few taps on your phone. Never in the history of the world has the plebs like us had the ability to front-run a monetary revolution.
Bitcoin is freedom from oppression. Bitcoin restores your sovereignty. Bitcoin makes you fuckable, and the powers that be know it. They are afraid they will lose control if too many people catch on too quickly, which is why large institutions are rushing to offer Bitcoin services or buy them and keep them on their balance sheet.
Bitcoin won't stay this cheap forever. $100-300k Bitcoin is in the cards over the next few years. I don't want you guys to miss out on this.
All you have to do is buy Bitcoin and hold. It's that simple. FYI trying out the new obsidian writer for nostr notes!
Bitcoin #nostr
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 361d3e1e:50bc10a8
2024-09-04 18:48:17Is France preparing to seize people's savings to avoid bankruptcy?
politics #europe #banks #france #savings #cyprus
-
@ 8d34bd24:414be32b
2024-09-04 15:57:00Today is the official publishing day of this post. I already tried scheduling this post in another editor that went out early.
I’ve mentioned multiple times that I feel our time left is short and that the rapture and the tribulation are coming soon. I feel it with every ounce of my being. I see it in the rush to evil around us. I see Biblical prophecy coming to fulfillment and technologies that could not be fathomed 2,000 years ago coming into being in a way that will make prophecy possible. The question is, what do we do with the time left to us?
Don’t Be a Foolish Virgin
Matthew gives an analogy of believers waiting for Christs return:
“Then the kingdom of heaven will be comparable to ten virgins, who took their lamps and went out to meet the bridegroom. Five of them were foolish, and five were prudent. For when the foolish took their lamps, they took no oil with them, but the prudent took oil in flasks along with their lamps. Now while the bridegroom was delaying, they all got drowsy and began to sleep. But at midnight there was a shout, ‘Behold, the bridegroom! Come out to meet him.’ Then all those virgins rose and trimmed their lamps. The foolish said to the prudent, ‘Give us some of your oil, for our lamps are going out.’ But the prudent answered, ‘No, there will not be enough for us and you too; go instead to the dealers and buy some for yourselves.’ And while they were going away to make the purchase, the bridegroom came, and those who were ready went in with him to the wedding feast; and the door was shut. 11Later the other virgins also came, saying, ‘Lord, lord, open up for us.’ But he answered, ‘Truly I say to you, I do not know you.’ Be on the alert then, for you do not know the day nor the hour. (Matthew 25:1-13)
Christians have been waiting for around 2,000 years for Christ’s return. It is easy to get drowsy and begin to sleep due to the delay to His return, but we are called to be ready. “You too, be ready; for the Son of Man is coming at an hour that you do not expect.” (Luke 12:40) Our wait may be long or short, but we are supposed to live our lives like he will arrive today. We don’t want to miss out on joining Him at His return, but we also don’t want to have to face Him knowing that we were not focused on what He had called us to do. We don’t want to admit that we didn’t share the gospel to that friend, that we didn’t stand up for the truth when the crowd was speaking contrary to the word of God, or that we acted in an unloving way to fellow believers or to the lost.
The Bible clearly tells us that we “do not know the day nor the hour,” but that doesn’t mean that He has not given us signs that the time is short.
What Should We Be Doing?
If Jesus is coming soon, how should we spend our time? What should we be doing? Should we just sit back and wait?
For even when we were with you, we used to give you this order: if anyone is not willing to work, then he is not to eat, either. For we hear that some among you are leading an undisciplined life, doing no work at all, but acting like busybodies. Now such persons we command and exhort in the Lord Jesus Christ to work in quiet fashion and eat their own bread. But as for you, brethren, do not grow weary of doing good. (2 Thessalonians 3:10-13)
The Bible is clear that we should work. This not only means that we should not quit our jobs, but should continue working as we have been doing, but it also means we should put time and effort into kingdom work. God has given each one of us a purpose and a job to do. We should study His word and pray and keep our eyes open so we don’t miss out on what He intends as our purpose. Another analogy is given in Matthew:
“For it is just like a man about to go on a journey, who called his own slaves and entrusted his possessions to them. To one he gave five talents, to another, two, and to another, one, each according to his own ability; and he went on his journey. Immediately the one who had received the five talents went and traded with them, and gained five more talents. In the same manner the one who had received the two talents gained two more. But he who received the one talent went away, and dug a hole in the ground and hid his master’s money.
“Now after a long time the master of those slaves came and settled accounts with them. The one who had received the five talents came up and brought five more talents, saying, ‘Master, you entrusted five talents to me. See, I have gained five more talents.’ His master said to him, ‘Well done, good and faithful slave. You were faithful with a few things, I will put you in charge of many things; enter into the joy of your master.’
“Also the one who had received the two talents came up and said, ‘Master, you entrusted two talents to me. See, I have gained two more talents.’ His master said to him, ‘Well done, good and faithful slave. You were faithful with a few things, I will put you in charge of many things; enter into the joy of your master.’
“And the one also who had received the one talent came up and said, ‘Master, I knew you to be a hard man, reaping where you did not sow and gathering where you scattered no seed. And I was afraid, and went away and hid your talent in the ground. See, you have what is yours.’
“But his master answered and said to him, ‘You wicked, lazy slave, you knew that I reap where I did not sow and gather where I scattered no seed. Then you ought to have put my money in the bank, and on my arrival I would have received my money back with interest. Therefore take away the talent from him, and give it to the one who has the ten talents.’
“For to everyone who has, more shall be given, and he will have an abundance; but from the one who does not have, even what he does have shall be taken away. Throw out the worthless slave into the outer darkness; in that place there will be weeping and gnashing of teeth. (Matthew 25:14-29)God has given each of us different skills, gifts, and opportunities. He wants us to make the most of them. If God gave you skill in business, you can use your wealth to fund ministries, churches, and missionaries. If God has gifted you with the ability to teach, you can disciple many to grow in their faith and knowledge of God. If God has brought you into a relationship with someone influential, you can share the Gospel with them and be used to draw them into saving faith in Jesus. Whatever skills, gifts, and opportunities God has given to you, you need to make the most of them. You need to grow and make the most of what God has given you.
What is the Best Use of Our Time and Money?
God wants us to shine a light for Him. He wants us to make a difference. There are many ways to do this and we can’t do them all. We have to pick and chose what is God’s will and what will make the best use of what God has given us.
There are lots of good things we can do, but what is the best?
I used to focus on prepping to be able to provide for my family and others if times get bad. That was good, but was it best? I used to grow a garden and grow healthy food. That was good, but was it the best? I used to be highly involved in politics and worked hard to support and elect godly men and women into government positions where they could have a positive influence on our culture and our country. That was good, but was it the best?
According to the grace of God which was given to me, like a wise master builder I laid a foundation, and another is building on it. But each man must be careful how he builds on it. For no man can lay a foundation other than the one which is laid, which is Jesus Christ. Now if any man builds on the foundation with gold, silver, precious stones, wood, hay, straw, each man’s work will become evident; for the day will show it because it is to be revealed with fire, and the fire itself will test the quality of each man’s work. If any man’s work which he has built on it remains, he will receive a reward. If any man’s work is burned up, he will suffer loss; but he himself will be saved, yet so as through fire. (1 Corinthians 3:10-15)
The best way to judge which actions are best is to see which actions have an eternal influence and to look and see what God is doing and to join His work. The difference between gold & silver versus wood, hay, and straw is the gold & silver can survive fire. Whether something is good or best depends on whether the action makes a difference in eternity. Providing for my family and friend’s physical needs and health is good, but it doesn’t make an eternal difference. Electing Godly officials makes life here on Earth better, but does it actually make a difference eternally? Probably not.
What does make a difference? Sharing the Gospel with others makes an eternal difference. Standing up for the truth, especially the spiritual truths from the Bible, makes an eternal difference. Writing a book or a blog sharing the truths of the Bible and Jesus makes an eternal difference. I’ve tried to focus my time on this type of activity more than the former. I don’t want one soul to go to Hell because I was too busy to share the Gospel. I don’t want one Christian to regret their life on Earth because I was too busy to disciple them. I don’t want to be like the man who received the single talent and buried it in the ground, who, when facing his master, was told, “You wicked, lazy slave.”
What Is Most Important?
“Do not store up for yourselves treasures on earth, where moth and rust destroy, and where thieves break in and steal. But store up for yourselves treasures in heaven, where neither moth nor rust destroys, and where thieves do not break in or steal; for where your treasure is, there your heart will be also. (Matthew 6:19-21)
What are the most important things in our lives? The most important things are people.
- Some people in our lives have never heard about Jesus. We need to share the gospel with them.
- Some people in our lives are hurting and need to be helped and encouraged and taught to trust in Jesus.
- Some people in our lives are new Christians or just immature Christians, who have trusted in Jesus, but haven’t grown much since salvation. We need to teach and disciple them to grow in their understanding of God and who He is. We need to build up their faith. We need to encourage them to study the Bible.
- Some people in our lives know God and His word, but are unsure how to live out their faith and share it with others. We need to encourage them and train them, so they can multiply their faith among others in their lives.
What are you doing to make an eternal difference in service to our Lord Jesus Christ? Are you one of the lazy, unprepared virgins? Are you hiding the gifts God gave you in the ground or shining a light that can be seen by everyone around you? Are you so busy doing good, that you don’t see God’s best?
Are you excited about meeting Jesus in the air at the rapture of the Church? I am! I hope you are, too.
your sister in Christ,
Christy
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
@ 469fa704:2b6cb760
2024-09-04 15:22:28Money Printing in general
First of all, we need to make a distinction between money creation by central banks and fractional-reserve banking. Usually, the term money printing or “printer goes brrrrrr” refers to the creation of new central bank money, which is primarily created by central banks through:
- Open Market Operations: Buying government securities, which injects money into the banking system by increasing bank reserves. This is often done electronically, not by physically printing money.
- Quantitative Easing (QE): Purchasing assets to inject money directly into the economy, aiming to stimulate economic activity by increasing the money supply.
- Setting Reserve Requirements: Although less about creating money, lowering reserve requirements can indirectly influence money creation by allowing banks to lend more, but as of recent policy changes, this has been set to zero in some systems, shifting focus to interest rates.
- Interest on Reserves: By adjusting the interest rate paid on reserves, central banks influence how much banks are willing to lend, thereby indirectly affecting money creation.
This is the first step of money creation, although printing money is usually connected to one of the aforementioned processes, the second step creates much more money through the expansion of credit.
The Mechanics of Fractional-Reserve Banking
The Concept
In fractional-reserve banking, banks accept deposits from customers and only keep a small fraction of these deposits in reserve, lending out the rest. This practice essentially creates new money because:
- Deposits: When you deposit money, say $1,000, into a bank, that money doesn't just sit there.
- Reserves: If the reserve requirement is 10%, the bank keeps $100 as reserves.
- Loans: The remaining $900 can be loaned out. Here's where money creation begins.
Note: Current reserve requirements of the FED (Source) and the ECB (Source) are set at 0% respectively 1%.
Example Calculation of Money Creation
- Initial Deposit: You deposit $1,000 into Bank A.
- Bank A's Action:
- Keeps $10 (1%) as reserve.
-
Loans out $990 to another customer.
-
The $990 Loan: This $990, when spent, might end up in Bank B as someone's deposit.
- Bank B's Action:
- Keeps $9.9 (1% of $990) as reserve.
-
Can loan out $980.1
-
Continuation: This process repeats, with each cycle creating new deposits from loans.
The Deposit Multiplier (m) can be calculated as: * m = 1 divided by Reserve Ration = 1 / Reserve Ration
If the reserve ratio is 1%: * m = 1 / 1% = 1 / 0.01 = 100
This means, theoretically, an initial deposit of $1,000 could expand to:
- $1,000 times 100 = $100,000
- However, in practice, this is tempered by factors like cash holdings, loan demand, and banks holding excess reserves.
Historical and Economic Context
- Evolution from Goldsmiths: The system has its roots in the practices of goldsmiths who issued notes for gold deposits, which eventually circulated as money. This practice evolved into the modern banking system where notes (now digital entries) represent claims on money.
- Regulation and Central Banking: Over time, central banks like the Federal Reserve in the U.S. were established to regulate this process, provide stability, and act as lenders of last resort. The Fed's tools include setting reserve requirements, though this has become less relevant with the shift to a 0% reserve requirement.
Criticisms and Alternatives
- Risk of Bank Runs: Critics argue that fractional-reserve banking makes the system vulnerable to bank runs, where too many depositors demand their money back at once, which the bank cannot cover since most of the money is loaned out.
- Vollgeld Initiative and Full-Reserve Banking: Movements like Switzerland's Vollgeld Initiative have proposed shifting to full-reserve banking, where banks must hold 100% of deposits in reserve, preventing them from creating money through lending. However, this would significantly alter how banks operate and make profits. *** Modern Adjustments**: The move to a 0% reserve requirement in the U.S. reflects a shift towards using other monetary policy tools like interest rates on reserves to control money creation and economic stability.
Real-World Implications
- Money Supply Control: While banks create money through loans, central banks like the Federal Reserve influence this through monetary policy, adjusting how much money banks can create.
- Economic Stability: The zero reserve requirement might seem to allow infinite money creation, but in reality, banks are constrained by capital requirements, risk assessments, and economic conditions.
Conclusion
Fractional-reserve banking is a dynamic system that significantly influences economic growth by expanding the money supply through debt. While it allows for economic expansion, it also introduces risks of instability, which central banks attempt to mitigate through various policy tools. Understanding this system helps demystify how money flows and grows within an economy, showcasing both its capacity for economic stimulation and its inherent risks. As we move forward, debates continue on how best to balance these aspects to foster economic stability and growth. In 2009, a new system called Bitcoin emerged that could redefine the rules for money creation.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ ba4a39ee:df9b4c6b
2024-09-04 14:23:26 -
@ 97c70a44:ad98e322
2024-08-29 00:50:27Nostr is a mess. It always has been and will always be. That's part of the appeal! But it's important that users be able to navigate the rolling seas of this highly partition-tolerant network of kaleidoscopically-interwoven people, bots, topics, relays, clients, events, recommendations, lists, feeds, micro-apps, macro-apps, Chinese spam, and "GM"s.
In order to do this, users must be able to articulate "what" they are looking for, and clients must be able to articulate "how" to find that thing. This "how" is divided into two parts: building a request that will match the desired content (very easy), and selecting a relay that is able to serve that content to the user requesting it (very very hard).
Why guessing isn't good enough
As a concrete example, let's say the user wants to find everyone in their "network" who is using a particular topic. The process would look something like this:
- The user clicks the "network" tab and types in the topic they want to browse. This is the "what".
- The client then translates the term "network" to a list of public keys using whatever definition they prefer (Follows? WoT? Grapevine?), and builds a filter that might look something like this:
[{"authors": pubkeys, "#t": ["mytopic"]}]
. Any relay will happily accept, understand, and respond to that filter. - The client then has to decide which relays it should send that filter to. This is the
???
stage of the outbox model, which immediately precedes: - Profit
It may not be immediately obvious why selecting the correct relays might be difficult. Most people post to relay.damus.io, and most people read from relay.damus.io, so in most cases you should be good, right?
This approach to relay selection has historically worked "well enough", but it depends on a flawed definition of success. If you only want to find 90% of the content that matches your query, using the top 10 relays will suffice. But nostr is intended to be censorship-resistant. What if those 10 hubs have banned a particular public key? Nostr clients should (at least in theory) be 100% successful in retrieving requested content. Even if someone only posts to their self-hosted relay, you should be able to find their notes if their account is set up properly.
A naive solution to fixing the FOMO
A 90% hit rate results in a feeling of flakiness, even if users aren't completely aware of what isn't working. Feeds will be incomplete, quoted notes will be missing, replies will be orphaned, user profiles won't load. The natural response to the FOMO this creates is for users to "try harder" by adding more relays.
On the read side, this means clients open more connections, resulting in much higher data transfer requirements, with massively diminishing returns, since there's no reason to expect that a randomly chosen relay will have a substantially different data set.
One the publish side, this means that clients end up publishing more copies of their data to more relays. This approach has been automated in the past by services like Blastr, which don't store a copy of events published to the relay, but instead forward events to the top 300 relays in the network. This results in a two-orders-of-magnitude increase in storage required, and only makes the read side of the problem worse, since it reduces the uniqueness of the data set each relay stores. This in turn means that more duplicates are retrieved when querying relays.
Both halves of this approach are equivalent to guessing. On the read side, users are guessing which relays will have any arbitrary content they might ask for in the future. On the write side, users are guessing which relays other people might use to find their notes. It is a brute-force method for finding content.
Randomness results in centralization
In theory, random relay selection would result in a perfect distribution of content across all relays in the network. But in practice, this method of selection isn't random at all, but is strongly influenced by user bias in what constitutes a "good" relay. While some users may check nostr.watch for ping times, geographical proximity, or uptime, most will choose relays based on familiar names or other people's recommendations.
In either case, these biases are entirely orthogonal to achieving a higher content retrieval hit rate, except when bias in relay selection results in clustering — i.e., centralization. In other words, the kind of randomness exhibited by users when selecting relays actually results in pretty much everyone picking the same few relays. We see this same effect when people try to come up with passwords or seed phrases — human-provided randomness is anything but random.
Clustering improves the hit rate when requesting events (slightly), but it results in nearly as much centralization as if only a single relay was used — and a lot more duplicate events.
Something (anything) other than randomness
In early 2023, Mike Dilger introduced NIP 65 (now known as the "Outbox Model") with a problem statement in the spirit of the original description of nostr: "Nostr should scale better. People should be able to find what they want."
Historical note: NIP 65 was formerly known as the "Gossip Model", derived from the name of Mike's desktop nostr client, called "Gossip". This unfortunately created a lot of confusion, since gossip protocols work very differently from how nostr tends to work, hence the re-brand.
Before NIP 65, an informal standard existed in which
kind 3
user contact lists also included a list of relays that clients could use as something similar to Mastodon's "home servers". This list included the option to only read or write from a given relay. Unfortunately, it wasn't really clear what the semantics of this relay list were, so different clients handled them differently (and many clients ignored them). Usually this amounted to user-provided static relay configurations, which resulted in the naive relay selection approach described above.NIP 65 used a very similar format (a list of relay urls with optional "read" or "write" directives), but with a very important semantic difference: relays listed in a user's
kind 10002
were intended to "advertise to others, not for configuring one's client." In other words, these relay selections were intended as a signal to other users that they should use certain relays when attempting to communicate with the author of the relay list.I highly recommend reading the entire NIP, which is very short and easy to read. But the mechanics of the spec are very simple:
When seeking events from a user, Clients SHOULD use the WRITE relays of the user's
kind:10002
.When seeking events about a user, where the user was tagged, Clients SHOULD use the READ relays of the user's
kind:10002
.When broadcasting an event, Clients SHOULD:
- Broadcast the event to the WRITE relays of the author
- Broadcast the event to all READ relays of each tagged user
For the first time, we had a way to differentiate relays in terms of what content could be found where.
When looking for a note by a particular user, a client could now look up the author's
write
relays according to theirkind 10002
event, and send its query there. The result is a much higher hit rate with much lower data transfer requirements, and fewer connections per query.Making Outbox Work
There are of course some assumptions required to make this work.
First, the user must know which author they're looking for. This isn't always true when looking up a quote or parent note, but context and pubkey hints solve this difficulty in most cases.
The author must also publish a
kind 10002
event. This may not always be the case, but clients should prompt users to set up their relay list correctly. This isn't really a flaw in the Outbox Model, just in implementations of it.Additionally, the user's client must be able to find the author's
kind 10002
event. This is the "bootstrapping" phase of the Outbox Model, during which the mechanisms the system provides for finding events aren't available. This requires us to fall back to randomly guessing which relays have the content we're looking for, which as we saw above doesn't work very well.Other than guessing, there are a few different ways a client might find the relay selection event in question, each of which is applicable in different circumstances. In most cases, using one of a handful of indexer relays like purplepag.es or relay.nostr.band is a simple and efficient way to find user profiles and relay selections.
However, if an author's content has been aggressively purged from these indexers due to censorship, they obviously can't be relied upon. Even though the author in question hasn't been deplatformed from nostr itself (since he can always self-host a publicly accessible relay to store his content), he has been effectively shadow-banned.
To get around this, relay selections have to be communicated in some other way. Nostr has a few different mechanisms for this:
- If the author's NIP 05 address is known and properly configured (it may not be), clients can look up the author's NIP 05 endpoint to find some reasonable relay hints. Unfortunately, these are often neglected, and usually custodial, so they can run into the same problems.
- If the author's pubkey is found in another signed event found on nostr, relay hints can be a way to propagate relay selections through the network. This relies on implementations picking reliable relay hints which can be difficult, and hints do tend to become less reliable over time. However, this strategy is very effective in resisting censorship because it makes banning viral — if a relay wants to completely purge a particular pubkey from their database, they have to purge every event that references it, since events are tamper-proof.
- In extremis, relay recommendations can always be communicated out-of-band. This can be done using manual input, QR codes, DHTs, jsonl torrents full of
kind 10002
events, or any other mechanism client developers choose to resort to.
Another, more technical assumption is that any given query can be fulfilled by few enough relays that a client can actually make all the connections needed, without running into resource limits. If you're trying to request content from 10,000 users across 1,000 relays, you're going to have a bad time. This was pointed out to me by Mazin of nostr.wine. He makes a good point, and it's definitely something to keep in mind. There are some mitigating factors though.
The first is that the current topology of the network probably won't persist forever. Because nostr is largely populated by self-hosting enthusiasts, the number of "tiny" relays is proportionally much higher than it will be if adoption picks up, even if the total number of relays grows. The trajectory is that nostr will drift toward fewer, larger relays, reducing the number of connections needed to fulfill any given query.
This is "centralizing", but it's important to understand that this isn't necessarily a bad thing. As long as there are more than one or two large hubs, there is user choice. And as long as it's possible to run a new relay, there is always an escape hatch. Nostr, like bitcoin, has no hard dependency on the biggest player in the network.
The other thing to consider is that there are lots of other techniques we can use to overcome the limits of the lowest-common denominator's limitations (mobile browser clients), including self hosted or third-party relay proxies. The trade-off here is that a little trust (aka centralization) can go a long way to reducing resource requirements needed to fulfill queries using the Outbox model.
If you're interested in more details on this topic, see this blog post.
That was a long digression, but there is one other thing that the Outbox model assumes to be the case. Even if the correct relays are found and connected to, they still may not return all desired content, either because they don't have it, or because they refuse to return it to the user requesting it.
This can happen if the publishing client isn't following the Outbox Model, if the author had migrated from one relay set to another without copying their notes over, or if the relay in question chose not to retain the author's content for some reason.
The first two issues can be fixed by improving implementations, but the question of policy is a little more interesting.
Relativistic relays
The Outbox Model is a mechanical process; it's only as useful as user relay selections are. In order for it to work, users have to be able to make intelligent relay selections.
Every relay has trade-offs, depending on its policy. 140.f7z.io would not be useful for long-form content, for example. Some relays might have a content retention policy that changes depending on whether you're a paying user. If you don't pay, you might find out too late that your content has been deleted from the relay.
So what makes a relay "good" for a particular use case? Well, it's complicated. Here are a few factors that go into that calculus:
- Is the relay in the same geographical as the user? Proximity reduces latency, but jurisdictional arbitrage might be desired. Users should probably have a variety of relays that fit different profiles.
- Will the relay ban the user? Do the operators have a history of good behavior? Is the relay focused on particular types of content? Is the relay's focus consistent with the user's goal in adding that relay to their list?
- What are the relay's retention policies? A user might want to set up an archival relay for her old content, or a multi-availability-zone relay so her notes are immediately accessible to the rest of the network.
- Does the relay require payment? Paid relays are more aligned with their users, but obviously come at a financial cost.
- Does the relay have policies for read-protecting content? If so, other users might not be able to find your posts published to that relay. On the other hand, some relays are configured to work as inboxes for direct messages, which can help preserve privacy.
- Does the relay request that users authenticate? Authentication can help manage spam, but it also allows relays to correlate content requests with users, reducing user privacy.
- Is the relay you use hosted by your client's developer? If so, you're in danger of getting banned from your client and your relay at the same time.
- Is the relay a hub? Using hubs can help smooth out rough areas in Outbox Model implementations, at the cost of centralization.
- Is the relay used by anyone else? One-off relays can be useful for archival purposes, but often won't be used by clients following the Outbox Model, depending on how they optimize requests.
There are lots of ways to approach the problem of helping users select relays, but it's an inherently complex problem which very few people will have the patience to properly address on their own. Relay selection is a multi-dimensional problem, and requires satisfying multiple constraints with a limited number of relay selections.
In the future, special-purpose clients might be used to help people build relay sets. Clients also might provide curated "relay kits" that users can choose and customize. Or, we might see an increase in hybrid solutions, like smarter relay proxies or client-local relays that synchronize using other protocols or platforms.
The Limitations of Outbox
Outbox is not a complete solution, not because of any of the caveats listed above, but because NIP 65 per se only addresses the question of how to index content by pubkey in a broadcast social media context. But there are many other scenarios for relay selection that Outbox does not solve:
- Community, chat, and group posts might be best posted to relays dedicated to that context.
- Direct messages shouldn't follow the same contours as public social media content.
- Topic-oriented relays, or relays serving a custom feed might be useful independent of who uses them.
- Relays focused on serving a particular kind of event, like music, long-form content, or relay selections, are useful independent of who reads from or writes to them.
- Certain clients might need to fulfill particular use cases by using relays that support certain protocol features, like search, count, or sync commands.
- Some events might not make sense to publish to relays, but should instead be shared only directly, out of band.
Some of these use cases might be solved by new specifications similar to Outbox that prescribe where certain data belongs — for example, NIP 17 requires users to publish a different relay list before they can receive direct messages, while NIP 72 places community relay recommendations directly into the group's metadata object. A reasonably complete list of different relay types can be found in this PR, very few of which have a canonical way to manage selections.
Other use cases might be supported more informally, either by relays advertising their own value proposition, or via third-party NIP 66 metadata. Still others might be supported by scoping the network down to only certain relays through explicit relay selection — this is how white-labeled Coracle instances work.
The basic idea here is that there are categories of events that don't have anything to do with where a particular person puts his or her "tweets". For every "what" on nostr, there should be a "how".
Keep nostr weird
Whatever additional systems we end up adopting for helping with relay selection, one thing is certain — people will continue to discover new, creative uses for relays, and we will always be playing catch up. This is one of the coolest things about nostr!
But it does mean that users will have to adapt their expectations to a network that partitions, re-configures, and evolves over time. Nostr is not a "worse" experience than legacy social media, but it is a version of social media that has itself been set free from the stagnant walled-garden model. Nostr is in many ways a living organism — we should be careful not to impose our expectations prematurely, leaving room to discover what this thing actually is, or can be.
If you enjoyed this post but want more take a look at the talk I gave at Nostrasia last year. I also wrote up a blog post at about the same time that addresses some of the same issues, but focuses more on privacy concerns around relays and nostr groups. Finally, I recently wrote this comment, which includes some details about challenges I've faced putting Outbox into Coracle.
-
@ 361d3e1e:50bc10a8
2024-09-04 13:54:12More European countries are choosing BRICS instead of the European Union
europe #turkey #serbia #brics #politics
-
@ d8bcfacf:aa97645b
2024-08-27 18:33:38What is the Purpose of Bitcoin?
Why did anyone bother to create Bitcoin?
What problems were they trying to solve?
If you are new to the whole idea of a digital asset involving the mysterious field of cryptography, these are some questions that probably come to your mind. Before you get caught up in asking if you can "get rich quick" from Bitcoin, you should be asking if it has a deeper purpose.
Bitcoin was created to serve a very specific purpose. If it did not serve that purpose, it would not be worth anything. Fortunately, it does. And, it was carefully and meticulously engineered to serve it precisely.
Bitcoin's purpose is to provide reliable money that will serve all mankind - forever. That is a pretty lofty goal: serving all of mankind, forever!
Was There Even a Problem in the First Place?
Is our money unreliable? Does it really fail to serve all mankind? Are its days numbered?
The sad fact is that the answer to all these questions is "Yes!"
First, our money is unreliable: it loses its purchasing power through inflation. We also experience volatile economic cycles that destroy capital, jobs, wealth, and stability.
Next, our money does not serve all mankind - many middlemen charge excessive fees to store and send our money. It is expensive to use internationally since converting it to other currencies is costly. Many people in the world lack any access to reliable banking. Our money system serves elites far better than it serves ordinary people.
Finally, our money system is doomed to collapse. Currencies world-wide are rapidly losing purchasing power. In fact, throughout history, paper money decreed into existence by governments has failed every time that it has been implemented.
And sadly, we cannot turn back the clock and go back to a time when gold was money. Gold is simply not secure from seizure, and it is far too slow, difficult and expensive to transport in a global economy.
Bitcoin Fixes This
Bitcoin was created through an ingenious and unprecedented combination of technologies. It provides, for the first time ever, money that is reliable, that serves all mankind, and that will last forever.
Nothing like this has ever existed before.
Bitcoin is free from inflation — its supply will never exceed 21 million coins. Each coin is divisible into 100 million units called satoshis. These will be issued on a fixed, unalterable schedule - taking over 100 years.
Bitcoin is for all mankind — there are no elites who can manipulate it. Unlike the currencies of our present money, nobody can create bitcoins effortlessly for themselves.
Nobody can be prevented from using Bitcoin — it will not allow anybody to stop someone else from using it.
Finally, Bitcoin is forever — its operation depends solely on the laws of physics and mathematics, and these laws will stay in effect - unaltered - for as long as the Universe exists.
Bitcoin was not created so that some people could "get rich quick". It was created to preserve the integrity of money — to make the most of your precious time, your energy, and your life. With Bitcoin you can keep what you have earned - and use it however, whenever, and wherever you desire. To you, Bitcoin is reliable money that can serve you for the rest of your life — and it offers you an escape from being the victim of an unjust, broken, dying, and failing monetary system.
-
@ 5af07946:98fca8c4
2024-09-04 13:02:36 -
@ b9946fa3:4c8e9aa4
2024-08-25 23:07:08The Problem:\ Millions of people around the globe either lack access to education or are forced to contend with poor-quality education they can’t afford. Traditional education systems often apply a one-size-fits-all model, which fails to meet the diverse needs of students, leaving many disengaged and without the skills they need for the future.
The Dream Solution:\ Imagine an education system that is as unique as each student, engaging, accessible, and affordable. This vision leverages the Nostr protocol — a decentralised, simple social graph — and the power of Bitcoin to create a revolutionary platform that could democratise education worldwide.
Key Components
-
Custom-Made, Tailored Education:
-
The Nostr client offers personalised curriculums created through an initial rigorous assessment. This includes personality tests and consideration of each student’s hobbies and interests.
- The AI-driven system ensures that the curriculum is not just relevant but also engaging and aligned with the student’s goals, making learning both fun and effective.
2. Engaging and Fun Learning:
- Real-world experiences, like apprenticeships and work-integrated learning, are built into the curriculum, ensuring that students are not just learning theory but also applying their knowledge in practical ways.
- The innovative teaching methods aim to keep students motivated and interested, making education a continuous and exciting journey.
3. Global Accessibility:
- The Nostr client operates both online and in physical locations, ensuring that students from any part of the world can access quality education.
- The Nostr client will be multiple languages, making it inclusive and globally relevant.
4. Nostr ID and Accreditation:
- Each student, teacher, and business/institution will have a Nostr ID , which securely stores all relevant metrics — scores, time spent learning/teaching, and ratings. These metrics are public and transparent, building a credible reputation for all participants.
- This decentralised approach ensures that credentials and achievements are recognised and respected globally, regardless of where a student is based.
5. Affordable Education with Incentives:
- The platform is designed to be accessible financially, using a zapping system powered by Bitcoin. Students and teachers can earn rewards and incentives, ensuring that education is both affordable and financially rewarding.
- A value-for-value (V4V) monetisation method allows students and teachers to earn according to their contributions and success.
6. Real-Time Learning Matchmaking:
- A Nostr client functions similarly to Uber, where students can see available teachers, their ratings, zaps, specialties, and other metrics before choosing who they want to learn from.
- AI facilitates the connection, ensuring that students can begin learning with their chosen teacher almost immediately.
7. Feedback Loop and Continuous Improvement:
- After each session, both the student and the teacher must provide feedback, which is crucial for continuous improvement.
Role of Businesses and Institutions
How They Participate:
- Businesses, employers, and institutions can join the Nostr clients by creating a profile using a Nostr ID. They have access to the same public and private portals as students and teachers, allowing them to interact directly with the educational ecosystem.
- The Nostr client allows businesses and institutions to scout and hire students directly from the system based on their scores, ratings, and other metrics. Employers can view detailed profiles of students, including their completed courses, projects, and feedback from teachers, making it easier to find candidates who match their specific needs.
- Students, in turn, can choose to work with companies that have high ratings and reputations on the platform, ensuring that both parties benefit from a transparent and merit-based system.
- For example, a company could offer scholarships or financial incentives to top-performing students, which not only aids the student financially but also builds the company’s reputation on the platform.
- These organisations can donate or pay funds (in Bitcoin) to receive higher ratings or more visibility on the platform, similar to sponsored content or advertising. This helps them build a reputation within the community and attract top talent.
- Businesses and institutions contribute to a communal pool of funds, which is distributed primarily to teachers and students based on their ratings and scores. This model incentivizes quality education and ensures that everyone involved in the learning process is rewarded appropriately.
- A small percentage of these funds is allocated to cover the Nostr client operational fees, ensuring that the service remains sustainable and continues to provide high-quality education.
Example: A Student’s Journey
Consider a student from anywhere in the world logging into the Nostr client . After the AI sorts their curriculum and completes the initial assessments, they can go online at any time to see which teachers are available. The Nostr client shows each teacher’s ratings, zaps, and specialties, allowing the student to make an informed choice.
Once the student selects a teacher, the AI facilitates the connection instantly. If a teacher declines, another one picks up the session. During the lesson, the AI listens in and can add comments or suggestions in real-time if necessary.
At the end of the session, both the student and teacher provide feedback. If the student cannot afford to pay, they still have the option to leave feedback. If they can pay more, they are encouraged to do so, supporting the teacher.
For this student, the Nostr client offers more than just education; it builds a track record and reputation that could lead to job opportunities globally. The scores, ratings, and zaps accumulated could potentially help the student secure employment with a prestigious company in another country, breaking down traditional barriers to opportunity.
Conclusion
This is not just a fantasy but a visionary idea that leverages the power of Bitcoin as the internet of money and Nostr as a simple social graph protocol. The dream of a decentralised, accessible, and tailored education system is within reach, and it has the potential to transform lives globally. What do you think? Is this a feasible solution, or does it still feel like a dream? What would you add to make this vision a reality?
You can find me:
Nostr: npub1hx2xlg66zdwgldvz6y08yu4lul2n0zq3ulug094ul5wc2nywn2jqpkf8z3
website: https://somalimajlis.com
Email: somalimajlis@gmail.com
-
-
@ 469fa704:2b6cb760
2024-09-04 12:07:53Unified Login Across Platforms
With Nostr, you use one login for all services, and your followers are seamlessly integrated. So you don't have start anew on every single platform. I think this is a real advantage of Nostr even for people not accustomed to Bitcoin or decentralization in general.
Value for Value (V4V) Model
Embrace the V4V principle where value is exchanged directly between users. Meaning if you find something useful or anohter nostr user was able to help you then you can simply zap him or her some Sats.
Blogging Platforms
- Habla or Yakihonne: Since joining Nostr 8 days ago, I've started blogging using Habla, which I found incredibly user-friendly. You can check out my articles directly on some clients like noStrudel, where they appear under my profile. Habla also serves as a great community explorer. Yakihonne, another comprehensive client with an integrated blog editor, caught my eye too, although it didn't sync all my Habla posts, possibly due to relay issues.
- Highlighter.com: Offers a sleek interface for reading articles. On noStrudel, articles are tucked away under the "More" menu.
Presentations
- Slidestr.net: This tool transforms your notes into a slideshow, making revisiting old notes quite entertaining.
Video Content
- Flare.pub: If you're looking for a YouTube-like experience, Flare.pub is the closest you'll get on Nostr. You can upload, watch videos, and curate playlists. Remember, since Nostr is fundamentally text-based, videos are hosted on traditional servers, but the interface remains decentralized. There's definitely room for more video content, so start creating!
Live Streaming
- Zapstream: Offers a smooth streaming experience with a fee of 10 Sats per minute to cover server costs. You can watch streams on clients like Amethyst or noStrudel.
Music and Podcasts
- Wavlake and Tunestr: Ideal for artists to share music or podcasts. Listeners can enjoy content freely or support creators via zaps, adhering to the V4V model.
Lists and Grouping
- Listr: A tool for organizing everything from regional user groups to thematic notes or hashtags. You can also follow lists created by others in the Nostr community.
Culinary Arts
- zap.cooking: A haven for aspiring or seasoned chefs, offering a plethora of recipes in a blog format. It's well-organized, allowing you to browse through different categories of recipes.
Marketplaces
- Plebian Market: Reminiscent of eBay's early days, this marketplace allows easy buying and selling among users.
Community Features
- Many clients like noStrudel, Habla, and Amethyst support community functionalities, enhancing user interaction within Nostr.
-
@ 5954198a:0c6fa207
2024-09-04 09:21:15If you are newbie in the business world, what you really wish for? The very first thought in your mind would be reaching out to your target audience. Here, we, one of the best SEO companies in Indore brings you a complete package of all seo services under a roof. Our SEO company in Indore has become truly efficient and time-reductant, letting you expect 2x customer faster. Our SEO services in Indore allow you to promote your business not only at a city level but also globally. Now no need to worry about your business, expand it free with one of the best SEO companies in Indore. Get a chance to upscale your small size business into a big one by amplifying your reach with our SEO services in Indore. Understanding what your customer base needs is very crucial and important for us as a business entity and our knowledge and proficiently in the concern field regarded us one of the reliable seo companies in Indore. Visit: https://digi-partners.com/seo-company-in-indore/
-
@ 592295cf:413a0db9
2024-08-25 09:17:54A Ux designer has arrived on Nostr. I thought run away while you can. He could get rich, if there was a little economy.
Klout, do you remember that service, which took data from Twitter and made a ~~ WoT~~.
From a note of chip, I understood one thing:
Bitcoin is your "sovereign" currency. Nostr is just third party protocol. If you have a service you can use Nostr to face your customers. "Sovereign" people offer services. They can be bitcoiners or not. So at this stage Nostr is a layer 3 Bitcoin.
So to grow the enveiroment it must be attractive. Let's paraphrase: the protocol is agnostic, the people are fundamentalist Catholics.
So when an atheist person arrives he says ah ok, how do I silence these people and use the protocol If a Protestant Catholic arrives he is laughed at or ignored or at most converted.
I had a disagreement with Dergigi, in the end he won, but he is not right... (True)
Post more notes, zap more, follow 1000 people update FAQ to the nth degree. We are in the desert of the Tartars and the enemy is coming and there are those who say every day we must be ready, sooner or later, it will happen, ah ok. Everything must be perfect. Push harder. This leads to exhaustion.
New Grant from Opensat to Victor of Amethyst, totally deserved, pushed the envelope. If you are a grapheneos user download Amethyst. It's not just Amethyst it's also orbot, citrine, amber, zap store or obtainium or f-droid.
GitCitadel has raised its first fund I wonder if it was just a test on geyser, I wonder if it is the right project to do on nostrocket, but I think Opensat grant for nostrocket makes it irreconcilable. This opens a pandora's box, as always. We are silent as fish.
I tried not to answer some questions even in one case I knew the answer, I apologize, Nostr is much older than me, so it's okay not to answer sometimes. Tomorrow begins nostRiga, The last unconference of Nostr.
(First day) The morning was so-so, in the evening the situation improved a little. In the evening I played a bit with Nostr and it broke The second day good in the morning bad in the evening. I saw little of the backstage maybe only two panels, Will by Damus, and P2Phash on Nostr.
I don't follow anyone anymore, I did a little bit of a unfollow. I saw that two users had 200 followers in common, and I said to myself ah ok what is this thing, I have to understand how they do it there is something that doesn't work, let's try to be a little more distant.
It's weird, too much reliance on following, you have to go and look, not be stationary.
-
@ 06a260a2:d7a7791c
2024-09-04 08:13:22Co je plnohodnotný bitcoinový uzel (bitcoin full node)? Je to základní prvek bitcoinové sítě. Server, na kterém běží bitcoinový klient, komunikuje s dalšími uzly v síti, udržuje kopii bitcoinového blockchainu (databáze všech potvrzených transakcí v bitcoinové síti), ověřuje nově příchozí transakce, validuje nově vytěžené bloky a zprostředkovává interakci uživatelů bitcoinu s bitcoinovou sítí. Pro těžaře zároveň připravuje šablonu nového bloku z transakcí čekajících na potvrzení. Je toho celkem dost, ne?
Satoshi Nakamoto už ve svém whitepaperu předpokládal, že každý uživatel bitcoinové sítě bude provozovat vlastní plnohodnotný uzel. Proč by to měli uživatelé bitcoinu chtít?
Proč provozovat vlastní bitcoinový uzel?
Používání vlastního plnohodnotného uzlu přináší celou řadu benefitů jak svému uživateli, tak bitcoinové siti a celému ekosystému. Pojďme se na ně podívat.
Podpora decentralizace bitcoinové sítě
BItcoinová síť je navržena jako decentralizovaná a má to své důvody. Decentralizace snižuje pravděpodobnost fatálního selhání sítě tím, že zvyšuje redundanci jejich kritických míst, kterými jsou právě uzly. Decentralizace v podobě zvýšené množstevní i geografické redundance pak chrání síť proti důsledkům přírodních katastrof, cíleným útokům hackerů nebo vládních organizací, ale i nečestnému jednání jednotlivých uživatelů sítě v podobě manipulace s bitcoinovým softwarem. Decentralizace se navíc nevztahuje pouze na fyzické uzly, ale i na celou governance - způsob řízení a rozhodování v síti. Neexistuje tak žádná centrální autorita, která by mohla svým jednáním a rozhodnutím, ať už svévolně nebo pod externím tlakem ovlivnit chování sítě.
Pokud se tedy rozhodnete provozovat vlastní uzel, zvýšíte tím antifragilitu bitcoinové sítě a stanete se jejím pravým uživatelem tak, jak to Satoshi zamýšlel.
Ověřování transakcí a validace nových bloků
Důležitým aspektem decentralizace je schopnost samostatně ověřit příchozí transakce a nově vytěžené bloky vůči platným pravidlům bitcoinové sítě bez nutnosti důvěřovat kterékoliv třetí straně. Vyjádřením tohoto principu je okřídlené "Don't trust, verify!". Každý full node obsahuje kompletní kopii bitcoinového blockchainu, databáze všech potvrzených transakcí za celou dobu jeho existence. A nejen to. Při prvním spuštění uzlu a kopírování této databáze od jiných uzlů v síti znovu ověřuje každý jednotlivý blok a transakce v něm podle existujících pravidel sítě, aby měl jistotu, že této databázi může nadále věřit. Tomuto procesu se říká synchronizace. Po jejím dokončení uzel kontroluje nově příchozí transakce i obsah a strukturu nově vytěžených bloků. Pokud zjistí porušení pravidel, odmítne je a do vlastní kopie blockchainu je nezařadí.
Jaká jsou ta pravidla? Je jich celá řada, ale mezi ta nejdůležitější patří:
- kontrola struktury transakce
- kontrola pravosti podpisů náležejícím adresám vstupů transakcí
- kontrola splnění podmínek definovaných v transakčním skriptu
- kontrola vícenásobného utracení UTXO
- kontrola struktury a velikosti nového bloku
- kontrola dodržování monetární politiky bitcoinu (velikost odměny těžaři musí odpovídat aktuální epoše)
Tato vlastnost je důležitá nejen pro vás, provozovatele vašeho uzlu, ale i pro stabilitu celé sítě. Vám umožňuje kontrolovat vaše transakce a zůstatky bez nutnosti důvěřovat jakékoliv třetí straně pouze oproti vaší vlastní kopii blockchainu. Celou síť pak chrání proti nečestnému uživateli, který by se pokusil šířit sítí neplatnou transakci (třeba podruhé utratit už jednou utracené mince) nebo se snažil připojit do blockchainu nový blok větší než povolené velikosti nebo přiznávající mu vyšší než aktuálně platnou odměnu. Takové chování uzel odmítne a není nikdo, kdo by mu v tom dokázal zabránit (je však třeba odpovědně přistupovat k výběru bitcoinového softwarového klienta - o tom více dále v textu).
Ochrana vlastního soukromí a bezpečnosti
Bitcoin není anonymní, ale pseudonymní. Všechny transakce lze v blockchainu dohledat a každý jeden satoshi lze v rámci UTXO dosledovat až k jeho coinbase transakci (okamžiku vzniku jako odměny za vytěžený blok). Transakce sice neidentifikují vlastníky jednotlivých adres, některé z nich o nich ale určité informace poskytují. Například konsolidační transakce může dle struktury podpisů prozradit, že vlastníkem vstupů je pouze jeden člověk. Nebo pokud platíte za nějakou službu na známou adresu a neutratíte kompletní UTXO, je velmi pravděpodobné, že jste vlastníkem i adresy, na kterou se posílá zbytek a to i přesto, že použijete adresu novou. Existují i další analytické postupy, které pomáhají určit vztahy mezi jednotlivými adresami a jejich vlastníky. Takže nakonec stačí prozradit vlastnictví jediné adresy a celou řadu jiných již k ní doplní odpovídající analýza nebo heuristika.
Pokud je pro vás soukromí důležité a vlastnictví bitcoinu považujete za soukromou informaci, je dobré vyvarovat se aktivitám, které by mohly prozradit váš vztah ke konkrétním bitcoinovým adresám. Mezi ně patří i přístup k blockchainu při zadávání nových transakcí, kontrole jejich stavu nebo kontrole zůstatků přes vaši peněženku nebo blockchain explorer. Použijete-li uzel třetí strany, dáváte jí možnost párovat uskutečněné transakce nebo dotazované adresy s vaší IP adresou, která o vás už lecos prozrazuje. I v případě použití Toru nebo VPN nemáte vyhráno. Pokud používáte více různých peněženek třeba pro oddělení KYC a non-KYC mincí, přístupem z jednoho místa je rovněž dáváte do vzájemné souvislosti.
Samostatným problémem je důvěra v informace, které vám uzel třetí strany poskytuje. Jsou skutečně pravdivé, transakce validní a zůstatky odpovídají realitě? Uzel třetí strany za vás sice nepodepíše transakci s vašimi prostředky, ale může vám třeba falešně tvrdit, že transakce, která na vaši adresu převádí dohodnutou platbu, je již potvrzena.
Provoz vlastního plnohodnotného uzlu pro vás tyto problémy řeší. Dotazy na zůstatky a nové transakce zadáváte přímo do vlastního bitcoinového uzlu, který je ověřuje přímo s vaší vlastní kopií blockchainu. Bez cizích očí a rizika manipulace.
Ochrana před cenzurou transakcí
Speciálním případem manipulace třetí strany s informacemi, které vám poskytuje, je cenzura transakcí a adres. Bitcoinový blockchain je transparentní, proto v něm není problém sledovat pohyb libovolných bitcoinů z jakéhokoliv důvodu. Platí to i pro bitcoiny pocházející z nějaké loupeže, podvodu či hacku. Bývají označeny jako špinavé a různé subjekty se brání manipulaci s nimi prostřednictvím blacklistů adres, přes které prošly. A pokud se dostaly do nějaké coinjoin transakce mixovací služby, mohou se na blacklist dostat i všechny adresy v transakci zúčastněné, ačkoliv neměly s původně "špinavými" bitcoiny nic společného.
Mohl bych takto pokračovat a uvádět další, ještě absurdnější, nespravedlivé příklady cenzury, vyplývající ze zlovůle mocných státních aparátů. Ale vezmu to z druhé strany. Pokud jste sběrateli Bitcoin Punků nebo obchodujete s Runama a chtěli by jste zadat svou transakci prostřednictvím mého uzlu, neuspějete také. Chráním bitcoinovou síť před spamem pomocí klienta Bitcoin Knots, který mi umožňuje takové transakce cenzurovat.
Ať tak či onak, používání vlastního plnohodnotného uzlu vás části problémů s cenzurou opět zbaví. Nikoho se nemusíte ptát, jakou transakci, pokud splňuje pravidla konsensu bitcoinové sítě, můžete zadat ke zpracování. Bohužel, je to jenom první část problému. Tou druhou částí je možná cenzura transakcí při jejich zařazování do bloků těžaři. O té se můžete více dozvědět v článku Domácí těžba bitcoinu.
Podpora bitcoinové sítě
Váš plnohodnotný bitcoinový uzel může poskytovat ostatním uzlům další užitečné služby, které posilují odolnost a decentralizaci sítě. Jsou to hlavně:
- Filtrování transakcí a bloků pro neplnohodnotné uzly a peněženky
- Poskytnutí historických bloků uzlům, které byly nějakou dobu offline nebo provádějí prvotní synchronizaci blockchainu
- Propagaci nových transakcí sítí směrem k těžařům
- Propagaci nově vytěžených bloků od těžařů k ostatním uzlům v síti
- Přenos dat mezi Clearnetem a Torem pro uzly, které jsou připojeny pouze k jedné ze sítí
Na tomto místě je ale dobré říci, že do role tranzitních uzlů (těch, které přijímají externí požadavky na spojení - mají povolen parametr
listen=1
alistenonion=1
) by měly být použity servery s odpovídajícím výkonem a vhodném bezpečnostním nastavení. Malý privátní full node na bázi RaspberryPi a UmbrelOS jím není.Provoz vlastního uzlu pro Lightning Network
Ligtning Network - druhá vrstva bitcoinu - přináší nezbytné škálování počtu zpracovaných transakcí a snižuje transakční poplatky. Obojí je nezbytné pro další růst adopce bitcoinu. Lightning Network (LN) tvoří síť LN uzlů, které si mezi sebou otvírají tzv. LN platební kanály, jejichž prostřednictvím směrují LN platby.
Ačkoliv jednotlivé LN platby mezi LN platebním kanály probíhají nezávisle na bitcoinovém blockchainu, otevření a zavření LN platebního kanálu je reprezentováno bitcoinovou transakcí. Z tohoto důvodu potřebují LN uzly přístup k bitcoinové síti a využívají k tomu právě bitcoinové uzly.
Pro pochopení Lightning Network doporučuji skvělou knihu Michala Nováka Lightning Network: Platby budoucnosti.
Výhody a důvody provozování vlastního LN uzlu je téma na samostatný článek, který jsem ještě nenapsal. Možná vás ale přesvědčil Michal Novák a nebo jste k rozhodnutí mít vlastní LN uzel došli jinou cestou. V takovém případě potřebujete i vlastní bitcoinový uzel.
Rozšíření znalostí a zkušeností s používáním bitcoinu
Okřídlená pravda říká, že pokud neověřujete transakce a své zůstatky na svém uzlu, nepoužíváte bitcoin, ale jste klientem někoho jiného se všemi důsledky, které to může mít. Pravdou také je, že úsilí spustit bitcoinový uzel vlastními silami vás zcela jistě mnoho nového naučí a poskytne vám na bitcoin úplně nový pohled. Skin in the game. O biozemědělství se také nejvíce dozvíte, až když zaboříte ruce do hlíny a slimáci vám sežerou úrodu. Váš pohled na svěže vypadající bio-mrkev v Lidlu již nikdy nebude stejný jako dříve.
Stavba vlastního uzlu: ano nebo ne?
Pokud vás předchozí odstavce přesvědčily, že dává smysl mít vlastní bitcoinový uzel, zbývá ještě rozhodnutí, jak jej realizovat.
Uzel by měl být v nepřetržitém provozu 24 hodin denně, 7 dní v týdnu. Jen tak může plnit svou funkci, průběžně ověřovat příchozí transakce a validovat nové bloky. Zastavení uzlu kvůli udržbě nebo z jiného důvodu je samozřejmě možné, po odstávce však uzel začne vždy synchronizovat chybějící bloky v jeho kopii blochchainu. Pokud jej tedy zastavíte na delší čas, může i následná dosynchronizace nějakou dobu trvat.
Dalším důležitým pravidlem je provozovat uzel na dedikovaném hardwaru, na kterém neběží žádný jiný, nesouvisející software. Vlastní uzel budete provozovat i kvůli ochraně vlastního soukromí a bezpečnosti a nechcete tedy zvyšovat riziko jejich ohrožení zavlečením nějaké softwarové infekce. Zároveň tak nebude bitcoinový uzel soupeřit s jinými aplikacemi o výpočetní zdroje. Protože sám není nijak zvlášť náročný, nebude tak ani zvyšovat náklady na svůj provoz.
Pro svůj provoz bitcoinový uzel potřebuje běžné CPU, na jehož výkon nejsou dnes žádné specifické požadavky. Dále přibližně 4GB paměti RAM nebo více. Potřebnou pamět nejvíce ovlivní použitý operační systém. Důležité je zabránit swapování paměti na pevný disk. A do třetice přibližně 1TB diskového prostoru. Aktuální velikost bitcoinového blockchainu (léto 2024) je necelých 700GB a roste rychlostí přibližně 230MB za den. Při zachování tohoto trendu by vám měl 1TB disk ještě pár let vydržet. Velmi často se pro uložení blockchainu doporučuje SSD disk. Já s tímto doporučením souhlasím, jeho výkon vám oproti standartním točivým diskům pomůže výrazně zkrátit potřebný čas na počáteční synchronizaci blockchainu. V běžném provozu uzlu se jeho výhody už tolik neprojeví.
Posledním předpokladem je síťové rozhraní pro přístup k internetu.
Jaké máme možnosti?
K provozu vlastního uzlu můžete použít jakýkoliv běžný a dostupný počítač, který již máte doma k dispozici, třeba i starší, protože požadavky na jeho výkon jsou skutečně minimální. Nepoužívaný notebook nebo stolní počítač mohou takto ještě dobře posloužit. Je dobré ale zamyslet se i nad ekonomikou provozu. Starší už nepoužívané herní PC se 150W zdrojem, pokud jej máte odložené někde ve sklepě, je sice zadarmo, jeho nepřetržitý provoz však již nějaké nezanedbatelné množství energie spálí.
Další možností je koupě nového levného počítače uvedených parametrů. Velmi oblíbené jsou minipočítače Intel NUC (dnes již převzal jejich výrobu ASUS). Koupit si můžete i minipočítač speciálně připravený pro provoz bitcoinového uzlu. Bude mít již nainstalovaný operační systém na linuxové bázi a většinou i některé ze základních potřebných aplikací. Takové uzly nabízí například Start9, Umbrel nebo MyNode.
Poslední možností je postavit si vhodný počítač pro provoz bitcoinového uzlu svépomocí z dostupných komponent. Výhodou takového postupu je vyšší kontrola nad jeho HW bezpečností (použité komponenty si můžete sami zvolit) a také volba jeho parametrů přesně dle vašich záměrů a potřeb. Jakou HW platformu pro jeho stavbu zvolíte je čistě na vás. Mezi nejoblíbenější však v současné době patří Raspberry Pi.
Kromě vhodného hardware budete také potřebovat vhodný operační systém. Důležitou vlastností takového operační systému je dostupnost jeho zdrojového kódu (v rámci FOSS), kvůli nezávislé kontrole jeho bezpečnosti. I v této oblasti je nabídka poměrně široká. Vybírat můžete kromě obecného linuxu a jeho známých distribucí i mezi specializovanými distribucemi pro bitcoinové uzly:
Umbrel na Raspberry Pi
Nemám k dispozici starý, nepoužívaný počítač, ani se mi nechtělo investovat do předpřipraveného řešení, a proto jsem si vybral stavbu vlastního uzlu na platformě Raspberry Pi. Jako operační systém jsem zvolil UmbrelOS. Je aktivně vyvíjen a v nedávné době prošel zásadním redesignem. Za jeho aktuální oblibou a velkým rozšířením stojí příjemné a jednoduché uživatelské rozhraní a vlastní App Store s velkým množstvím dostupných aplikací.
Návodů, jak sestavit uzel na Raspberry Pi je plný internet. Inspirovat se můžete jak u Kicoma v jeho serii videí Úvod do bitcoinu, nebo přímo na stránkách Umbrelu.
Já zvolil tyto komponenty:
- Raspberry Pi 5 8GB - 2.179,- Kč
- Raspberry Pi 27W USB-C napájecí zdroj - 349,- Kč
- Krabička pro Raspberry Pi 5 Cooling case - 299,- Kč
- 1TB Lexar NM620 - 1.497,- Kč
- Geekworm X1002 M.2 NVMe SSD HAT pro RPi 5 - 420,- Kč
- SanDisk MicroSDHC 32GB Ultra - 229,- Kč
Raspberry Pi 5 je dnes již přirozenou volbou. Oproti svému předchůdci RPi 4 je jen o 100 korun dražší, nové PCI Express 2.0 rozhraní výrazně zrychluje komunikaci s diskem, což pocítíte při iniciální synchronizaci bitcoinového blockchainu.
Geekworm X1002 je jedna z možných NVMe SSD rozšiřujících karet (HAT). Zvolil jsem ji, protože se nepřipojuje k RPi shora, ale zdola a nebrání tak připojení jiné rozšiřující karty přes standardní GPIO konektor (třeba této). Navíc je na ni NVMe disk orientován směrem dolů, takže jej lze chladit spodním dílem zvolené hliníkové krabičky (pro úplnost ale dodávám, že chladit SSD disk na tomto bitcoinovém uzlu není nutné).
Sestavení celého uzlu vám nezabere více než 15 minut. Podle návodu na stránkách Umbrelu nainstalujte i verzi UmbrelOS pro vaše Raspberry Pi. Po spuštění uzlu si v nastavení nezapomeňte povolit TOR pro vzdálený přístup mimo vaši lokální siť a zkontrolovat dostupnost případných aktualizací.
A můžeme se pustit do výběru a instalace aplikací, které z vašeho uzlu udělají uzel bitcoinový.
Základní aplikace
Tou hlavní aplikací plnohodnotného bitcoinového uzlu je bitcoinový klient. V současné době existuje několik implementací bitcoinového klienta.
Pro UmbrelOS jsou však portovány pouze první dva: Bitcoin Core a Bitcoin Knots. Já si vybral ten druhý, viz. dále. Vy si však vyberte sami podle svých preferencí.
Na tomto místě musím zdůraznit, jak je dobré sledovat vývoj jednotlivých klientů a hlavně vlastností, které implementují. Pomocí bitcoinových klientů dochází v bitcoinové síti k prosazování změn. Pokud tyto změny nejsou kontroverzní a existuje na nich konsenzus, postupně je implementují všichni klienti. Pokud však kontroverzi vyvolávají nebo dokonce přinášejí změny, které pro síť představuji softfork (změnu zpětně kompatibilní) nebo hardfork (zpětně nekompatibilní změnu), můžete vybráním správného klienta nebo jeho verze o takové změně hlasovat a přijmout ji nebo odmítnout.
Výběr bitcoinového klienta a jeho vlastností je tou nejsilnější mocí, kterou jako uživatelé bitcoinové sítě máte a ultimátním důvodem pro provozování vlastního uzlu.
Bitcoin Knots
Bitcoin Knots jsou alternativní implementací bitcoinového uzlu. Vychází z Bitcoin Core a nabízí tak stejnou úroveň zabezpečení, soukromí a stability. Kromě toho však svým uživatelům rozšiřují možnosti filtrování spamu pomocí rozšířené sady parametrů a pravidel k jeho potlačení. (Více o spamu v bitcoinovém blockchainu naleznete zde.)
Ačkoliv jsou Bitcoin Knots pro instalaci k dispozici přímo v Umbrel App Store, nedoporučuji je nyní instalovat z tohoto místa. Připravený balíček obsahuje chybu, která znemožňuje následnou instalaci aplikací, které jsou na bitcoinovém uzlu závislé, jako třeba Electrum server, lightningový uzel nebo nějaký blockchain explorer. Použijte raději připravenou instalaci v alternativním komunitním app store Bitcoin Knots Community App Store.
Umbrel umožňuje svým uživatelům používat alternativní app store. Přidáte jej v nastavení Umbrel App Store (tři tečky v pravém horním rohu, volba Community App Stores). Do pole pro URL vložte link na github repositář app store, v tomto případě:
https://github.com/Retropex/Bitcoin-store
a stiskněte Add. Přidaný komunitní app store otevřete tlačítkem Open. Pro RaspberryPi je určena verze Bitcoin Knots arm64.
Samotná instalace zabere několik desítek vteřin. Ihned po instalaci však začnou Bitcoin Knots stahovat a ověřovat bitcoinový blockchain, který má nyní (v červenci roku 2024) 664GB. Synchronizace blockchainu trvá podstatně déle. Její postup můžete v aplikaci sledovat. Mému RPi5 s SSD diskem připojeným přes PCI Express interface to trvalo necelých 30 hodin. O generaci starší RPi4 s SSD diskem přes USB 3.0 potřeboval přibližně 76 hodin.
Nezapomeňte si po instalaci zkontrolovat a případně nastavit preferovaná pravidla filtrování bitcoinového SPAMu (ostatně proto si instalujete Bitcoin Knots). Najdete je v nastavení (Advanced Settings) v sekci Optimization.
V základu je již nastaveno (verze 27.1.020240801):
datacarrier=1
(Relay transaction with embedded data)datacarriersize=42
(Maximum size of relayed transactions with embedded data)rejectparasites=1
(Reject parasitic transactions)permitbaremultisig=0
(Relay old type of multisig transaction)Pokud chcete filtrovat i Runes, nezapomeňte povolit:
rejecttokens=1
(Reject tokens transactions)Electrum server
Použití Bitcoin Knots v současné verzi UmbrelOS 1.2.2 přináší bohužel ještě jeden problém. UmbrelOS registruje a dodržuje vzájemné deklarované závislosti aplikací. Aby vám povolil instalovat třeba blockchainový explorer Mempool, musíte mít nejprve nainstalován bitcoinový uzel, protože bez něj se Mempool nedostane k blockchainu. Bohužel v této verzi UmbrelOS trvá na konkrétní instalaci aplikace Bitcoin Node (původní Bitcoin Core). Na existenci bitcoinového uzlu je závislá i aplikace Electrs, implementace Electrum Serveru. Naštěstí lze tuto závislost jednoduše obejít.
Aplikace Electrs - Electrum Server in Rust - je reimplementací původního Electrum serveru s cílem umožnit provozovat jej s minimálními hardwarovými nároky. Server neuchovává celý blockchain (je závislý na lokální instalaci bitcoinového uzlu), ale vytváří a udržuje index všech vstupů a výstupů bitcoinových transakcí. Ten zpřístupňuje přes Electrum protokol on-chain bitcoinovým peněženkám pro dotazování na zůstatky a historii transakcí. Připojení přes Electrum server využívají hardwarové (Trezor, Ledger, ColdCard...) i mnohé softwarové peněženky (desktop i mobile).
Aplikaci Electrs nelze instalovat přímo z Umbrel App Store (viz. výše), instalaci musíme spustit ručně přes SSH terminál. Příkazový řádek v UmbrelOS spustíte přes ikonku Settings v doku úvodní obrazovky a položky menu Advanced Settings a Open Terminal. Do terminálu zadejte následující příkaz:
umbreld client apps.install.mutate --appId electrs
Po několika vteřinách potvrdí úspěšnou instalaci návratová hodnota true. I Electrum Server provádí po prvním spuštění časově náročnou synchronizaci s blockchainem, při které vytváří transakční index. Instalaci aplikace spusťte až po dokončení synchronizace Bitcoin Knots.
Electrum server nabízí dva způsoby připojení bitcoinových on-chain peněženek. Buď přes lokální siť pro peněženky instalované na samotném uzlu nebo na desktopu ve stejné lokální síti. Nebo přes Tor protokol. Kromě zmíněných hardwarových peněženek může připojit peněženky Green, BlueWallet, Sparrow wallet, Specter, Nunchuk.
Mempool
Mempool je blockchainový explorer, klon pro RaspberryPi veřejně známého exploreru Mempool.space. Proč používat svůj vlastní a nikoliv ten veřejný? Protože nechcete, aby kdokoliv věděl, že jste si dohledával stav určité transakce jen několik vteřin poté, co se objevila v mempoolu a pak ještě několikrát až do okamžiku, kdy byla potvrzena v novém bloku.
Aplikace Mempool je také závislá na přítomnosti bitcoinového klienta, proto je nutné při použití Bitcoin Knots instalovat ji ručně přes SSH terminál. Potřebný příkaz vypadá takto:
umbreld client apps.install.mutate --appId mempool
Protože je Mempool závislý i na dostupnosti indexu Electrum serveru, používejte jej až poté, co aplikace Electrs tento index dokončí.
Core Lightning
Core Lightning (CLN) je jedna ze čtyř nejpopulárnějších implementací Lightning Network uzlu od společnosti Blockstream. Jedná se samozřejmě o open source a má výborně zpracovanou dokumentaci včetně celé řady návodů k použití.
Proč si vybrat Core Lightning implementaci a ne hojně rozšířenou LND? CLN má oproti LND lépe navrženou modulární architekturu a systém pluginů, které elegantně rozšiřují nebo upravují jeho funkcionalitu. Je napsán v jazyce C (LND převážně v jazyce GO), který v kompilovaném stavu nabízí efektivnější kód, uzpůsobený konkrétní HW platformě a tedy potřebuje menší dostupný výkon v porovnání s LND. Není to zásadní výhoda pro provoz privátního LN uzlu, ale na RaspberryPi přeci jen přijde vhod.
CLN implementace je také často chválena za lepší přístup k ochraně soukromí jednotlivých plateb. Používá k tomu několik technik, které výrazně komplikují ostatním uzlům na cestě sledovat informace o vašich platbách. Shadow route přidává do platební cesty zpoždění a poplatky, čímž ji virtuálně prodlouží a brání tak špiclujícím uzlům odhadovat reálnou vzdálenost k příjemci platby. Route randomization zase zajistí určitou míru náhodnosti při výběru finální platební cesty. Nemusí tak být vybrána vždy ta nejkratší respektive nejlevnější cesta, což zabrání routování všech vašich plateb přes uzel, který má uměle (záměrně) snížené poplatky pod síťový průměr. MPP - (Multi-Part-Payments) pak rozdělí vaši platbu na menší, nestejně velké části, které směruje samostatně. Zajistí tím průchodnost i větších plateb sítí a zároveň znemožňuje uzlům na cestě zjistit celkovou velikost platby.
Tím nejzásadnějším důvodem je pro mne však podpora BOLT 12 specifikace. BOLT 12 přináší takzvané offers, statické, opakovaně použitelné faktury. Ty se hodí všude tam, kde potřebujete trvale přijímat částky předem neznámé hodnoty a nechcete pro každou z nich aktivně vystavovat fakturu. Příklad? Zapy na Nostru nebo třeba anonymní výplaty z Ocean.xyz těžebního poolu. Nebo třeba příjem příspěvků v bitcoinu na váš YouTube stream. LND řeší tuto potřebu přes další nadstavbové aplikace (LNBits, LNDK) a třeba LNURL. CLN nabízí elegantní řešení přímo ve svém základu.
Stejně jako předchozí aplikace je i Core Lightning závislá na přítomnosti bitcoinového klienta. S Bitcoin Knots je třeba ji tedy instalovat ručně přes SSH terminál. Potřebný příkaz vypadá takto:
umbreld client apps.install.mutate --appId core-lightning
Záloha a obnova ze zálohy
Core Lightning uzel obsahuje bitcoinovou on-chain peněženku, ze které čerpá bitcoiny pro otvírání kanálů. Po (re)instalaci aplikace vždy vygeneruje novou, proto je dobré mít zálohu, ke které se můžete vrátit v případě, že jste o tu původní přišli v důsledku havárie uzlu nebo provádíte instalaci na nový hardware a chcete obnovit již exitující uzel.
Klíče on-chain peněženky jsou uloženy v souboru
hsm_secret
, který se nachází v adresářiroot/.lightning/bitcoin
. Jedná se o binární, 32 byte veliký soubor. Zálohovat jej můžete buď na nějaký připojený externí disk (USB klíčenku), nebo si jeho obsah zobrazíte v hexadecimálním formátu (linuxový příkaz:xxd hsm_secret
) a někam si jej bezpečně poznamenáte.Při obnově nebo po reinstalaci uzlu nahraďte nově vygenerovaný soubor
hsm_secret
tím ze zálohy a restartujte aplikaci Core Lightning.Pro zacházení se souborem
hsm_secret
a jeho obsahem platí stejná pravidla, jako pro zacházení s bitcoinovými privátními klíči nebo seed frází. Mají stejný význam a jejich znalost umožňuje manipulovat s prostředky na peněžence uloženými. Proto buďte opatrní.Zajímavou alternativou je možnost vygenerovat soubor
hsm_secret
z existujícího BIP-39 seedu, včetně použití volitelné přístupové fráze (passphrase). To vám umožní uchovat recovery seed standartními způsoby, které používáte u své hardwarové peněženky (SeedOr Safe, Trezor Keep Metal, CryptoTag...) a v případě potřeby obnovit peněženku nebo přistupovat k bitcoinům na jejich adresách i z jiného zařízení, než je Core Lightning aplikace. Jak na to?Po instalaci Core Lightning aplikace ji zastavte (příkaz Stop v kontextovém menu nad ikonou aplikace) a spusťte si terminál v jejím kontextu (Settings > Advanced settings > Terminal > App > Core Lightning). V terminálovém okně spusťte nástroj
hsmtool
s parametremgeneratehsm
a cestou khsm_secret
souboru. V následujícím dialogu pak vyberte BIP-39 slovník a zadejte jednotlivá slova svého seedu. Nakonec můžete vložit svou volitelnou přístupovou frázi. Utilitka vygeneruje nový souborhsm_secret
a uloží jej.``` root@aabbccdd0102:/# lightning-hsmtool generatehsm root/.lightning/bitcoin/hsm_secret Select your language: 0) English (en) 1) Spanish (es) 2) French (fr) 3) Italian (it) 4) Japanese (jp) 5) Chinese Simplified (zhs) 6) Chinese Traditional (zht) Select [0-6]: 0 Introduce your BIP39 word list separated by space (at least 12 words):
Warning: remember that different passphrases yield different bitcoin wallets. If left empty, no password is used (echo is disabled). Enter your passphrase: New hsm_secret file created at root/.lightning/bitcoin/hsm_secret Use the
encrypt
command to encrypt the BIP32 seed if needed root@aabbccdd0102:/#```
Opusťte terminál a znovu spusťte aplikaci Core Lightning.
Kromě bitcoinové on-chain peněženky je nutné zálohovat i otevřené lightning network kanály. Core Lightning aplikace uchovává informace o otevřených kanálech v souboru
emergency.recover
. Ten se nachází také v adresářiroot/.lightning/bitcoin
. Mění se pouze v souvislosti s otevřením nebo uzavřením kanálu, proto doporučuji provést jeho zálohu vždy po takové operaci.Soubor
emergency.recover
neobsahuje informace o stavu kanálu. Při obnově dojde vždy k uzavření všech kanálů a vypořádání jejich balancí.Jak kopírovat uvedené soubory z vašeho Umbrelu na Raspberry Pi na USB disk? UmbrelOS pro to zatím nemá podporu ve svém UX, ale pomůže vám opět terminál a následující návod.
```
Najděte LABEL vašeho připojeného USB disku
Nejprve si vylistujte všechna existující bloková úložiště příkazem
sudo blkid
Fyzicky připojte váš USB disk s vylistujte stejným příkazem úložiště ještě jednou
sudo blkid
Podívejte se, které přibylo a najděte jeho LABEL. Řekněme, že se jmenuje "sda1"
Vytvořte si adresář pro zálohu, nazvěme jej třeba "/backup"
sudo mkdir /backup
Připojte váš identifikovaný USB disk přes jeho LABEL k vytvořenému adresáři
sudo mount /dev/sda1 /backup
Zkopírujte soubory hsm_secret a emergency.recover do adresáře "/backup"
sudo cp /home/umbrel/umbrel/app-data/core-lightning/data/lightningd/bitcoin/emergency.recover /backup
sudo cp /home/umbrel/umbrel/app-data/core-lightning/data/lightningd/bitcoin/hsm_secret /backup
Ukliďte po sobě - nejprve odpojte váš USB disk od adresáře "/backup"
sudo umount /backup
A následně zrušte adresář "/backup"
sudo rmdir /backup
```
Při obnově ze zálohy budete postupovat úplně stejně, jen příkazy pro kopírování budou směřovat opačným směrem
```
Kopírování záloh z připojeného adresáře "/backup" do cílového adresáře CLN
sudo cp /backup/emergency.recover /home/umbrel/umbrel/app-data/core-lightning/data/lightningd/bitcoin
sudo cp /backup/hsm_secret /home/umbrel/umbrel/app-data/core-lightning/data/lightningd/bitcoin ```
Kromě statické zálohy kanálů umožňuje CLN i průběžné zálohování jejich stavu prostřednictvím zálohy interní databáze do druhé, bezpečné lokality (na jiný disk). Databáze se nachází v souboru
lightningd.sqlite3
ve stejném adresáři, jakohsm_secret
neboemergency.recover
. CLN lze dokonce nastavit tak, aby veškeré updaty do této databáze průběžně zapisoval i na druhou lokalitu. Bohužel však v současné verzi UmbrelOS toto není možné.UmbrelOS ve stávající verzi nepodporuje připojení více disků současně. Nelze tedy průběžně zálohovat data na druhý disk. Přestože můžete během provozu druhý disk připojit a přes terminál na něj data zkopírovat, nikdy takový disk nenechávejte připojen trvale. Po restartu uzlu může zabránit korektnímu nastartování Umbrelu a nainstalovaných aplikací.
Otevření kanálů
Lightningový uzel pro vás začne být užitečný teprve poté, co jej propojíte s LN sítí prostřednictvím platebních kanálů. Otevření kanálu je relativně jednoduché a lze jej docílit v podstatě dvěma způsoby.
- Otevřete kanál vy z vašeho uzlu
- Požádáte jiný uzel, aby otevřel kanál směrem k vám
Existují i další způsoby, ale pro jednoduchost si vystačíme s těmito dvěma. Důležité je si uvědomit, že uzel, který kanál otvírá, jej také musí naplnit bitcoiny na požadovanou kapacitu. Po otevření kanálu budou zároveň všechny bitcoiny (likvidita) na straně toho, kdo jej otevřel.
V prvním případě tedy nejprve pošlete na bitcoinovou peněženku vašeho CLN uzlu nějaké prostředky (tlačítko Deposit vám zobrazí příslušnou bitcoinovou adresu). Po potvrzení depositní transakce v blockchainu (můžete ji sledovat ve svém Mempool exploreru) můžete tlačítkem Open Channel požádat o otevření kanálu s vybraným LN uzlem. Ten si můžete vybrat dle své preference v některé z veřejných databází, jako je Amboss.Space nebo 1ml, nebo přímo na MemPool.Space v sekci lightning network.
Strategií pro výběr je opět celá řada, ale pro domácí uzel neuděláte chybu výběrem uzlu od některého z velkých hráčů, kteří jsou na kvalitě svého připojení do LN sítě obchodně zainteresováni. Poskytovatelé peněženek (ACINQ, WalletOfSatoshi, Blockstream, Alby, ...), burzy, směnárny a platební brány (Anycoin, Confirmo, Binance, Kraken, ...), poskytovatelé služeb na LN sítí (LOOP, Boltz, Strike). Ale třeba i SatoshiLabs nebo GeneralBytes. Můžete se u nich spolehnout na dostatečnou kapacitu, konektivitu i stabilitu provozu. Pozor si dejte pouze na požadovanou minimální velikost kanálu.
Do pole Node Id: vložte adresu vybraného uzlu (ve formátu PubKey@IP:Port) a do pole Amount: pak požadovanou velikost kanálu (částka bude stržena z vaší bitcoiové peněženky a ponížena o poplatky za otvírací transakci). Důležitý je přepínač Announce. Ten určuje, zda bude váš kanál veřejný a tedy k dispozici celé síti pro směrování plateb, nebo soukromý, o jehož existenci budete vědět pouze vy a připojený uzel a pro směrování cizích plateb nebude využíván. Pokud chcete využívat svůj LN uzel pouze pro své soukromé platby, doporučuji otevřený kanál do sítě neanoncovat. Zjednodušíte si práci s jeho balancováním, protože budete reagovat pouze na vlastní pohyby v jednotlivých kanálech.
Takto otevřený kanál bude mít likviditu na vaší straně (odchozí likvidita) a bude tedy primárně sloužit na posílání plateb z vašeho uzlu. Minimálně do doby, než si odesláním dostatečné částky vytvoříte prostor i pro příjem.
Druhý způsob, požádat jiný uzel, aby otevřel kanál k vám, vám přinese příchozí likviditu, tedy schopnost přijímat platby až do velikosti takového kanálu. Můžete se domluvit s kamarádem, který již uzel provozuje, aby k vám kanál otevřel. Nebo využít některou z nabídek jiných uzlů, která vám kanál otevřou za úplatu. Vybrat si můžete na tržištích LnRouter nebo LnBig. Lightning Network Plus nabízí možnost otevřít si kanály v takzvaném Liquidity Swapu. Uzly, které se jej účastní, si otevřou kanály vzájemně v kruhu. Každý tedy za otevření kanálu jedním směrem získá i kanál stejné velikosti s příchozí likviditou.
Nejjednodušším způsobem, jak získat příchozí likviditu, je otevření dalšího kanálu s vybraným uzlem a následné odeslání všech svých prostředků v tomto kanále na svou jinou lightning peněženku nebo swap out službu (služba, která příchozí prostředky uloží na vámi zadanou bitcoinovou adresu. Například Boltz.Exchange).
Nezapomeňte po otevření všech kanálů provést jejich zálohu dle postupu uvedeného výše.
Ride the Lightning
Ride the Lightning (RTL) je nástroj pro správu vašeho lightningového uzlu. Ačkoliv vlastní uzel, v našem případě aplikace CLN, nabízí jednoduché GUI pro svou obsluhu a v mnoha případech stačí (zvláště při otevření pouze několika privátních kanálů), některé parametry a pokročilé vlastnosti kanálů přes něj nejsou dostupné. Aplikace RTL nabízí webové rozhraní k většině těchto parametrů a další doplňkové služby pro zajištění likvidity vašich kanálů, jejich rebalancing a převod prostředků na on-chain adresy (swap out). Navíc nabízí přehledné statistiky a grafy využití uzlu, které lze využít pro optimalizaci nastavení CLN.
Aplikaci RTL můžete nainstalovat přímo z Umbrel App Store. Pozor, jsou tam uvedeny dvě verze, každá pro jednu z dostupných implementací lightning uzlu. Pokud jste nainstalovali Core Lightning, vyberte si Ride the Lightning (Core Lightning).
Máte-li otevřenu konzoli, můžete ji samozřejmě nainstalovat i z příkazového řádku.
umbreld client apps.install.mutate --appId core-lightning-rtl
Přihlášení do aplikace je trochu nestandardní. RTL vyžaduje heslo, ale správu aplikačních hesel řídí UmbrelOS. Vaše heslo do aplikace naleznete na stránce RTL v App store (Default password). Objeví se tam po nainstalování aplikace, je kryptograficky odvozené od unikátního seedu vaší instalace uzlu a nelze jej změnit. Umbrel touto politikou reagoval na případy vykradení peněženek přes uniklou statickou TOR adresu aplikací jako RTL nebo Thunderhub, ke kterým neměli uživatelé změněné defaultní hesla.
Public Pool
Esenciální aplikace pro všechny, kteří doma kromě vlastního bitcoinového uzlu provozují také nějaký domácí miner. Public Pool je navzdory svému názvu privátní domácí těžební pool pro solo mining. Bez poplatků a s jistototu, že veškeré případně vytěžené odměny skončí na vaší vlastní bitcoinové adrese.
Instalace opět kvůli závislosti na Bitcoin Knots přes příkazový řádek:
umbreld client apps.install.mutate --appId public-pool
Konfiguraci pro připojení vašeho mineru najdete hned v úvodu GUI po spuštění aplikace.
Zkušenosti z provozu
Provozování vlastního uzlu není nikterak náročnou činností a s trochou nadsázky lze říci, že se obejde bez složité údržby. Ve výše uvedené konfiguraci může běžet bez nutnosti zásahu i několik měsíců. Přesto je dobré se ke svému uzlu čas od času vrátit a jednoduchou údržbu provést.
Předně provádějte pravidelné upgrady nainstalovaných aplikací. Nové verze se objevují celkem pravidelně a přinášejí většinou opravy nalezených chyb a bezpečnostních děr, ale také nové funkcionality, které rozšiřují jejich možnosti použití. Doporučuji neinstalovat bez rozmyslu, ale přečíst si dostupné release notes (popis změn nové verze). Zvláště u bitcoinového uzlu (ať už Bitcoin Knots nebo Bitcoin Core), protože nové verze mohou obsahovat změny, které mění chování bitcoinové sítě a tedy i bitcoinu. Jejich výběrem a (ne)instalací hlasujete o tom, jak by měl bitcoin podle vás vypadat. Přečtěte si knihu The Blocksize Wars k lepšímu pochopení, co je tím myšleno.
Ze stejných důvodů pravidelně aktualizujte i operační systém UmbrelOS. Nové verze vycházejí přibližně jednou za čtvrt roku a vlastnosti operačního sytému většinou výrazně vylepšují.
Důležitou aktivitou je i záloha lightning uzlu a jeho kanálů vždy, když nějaký otevřete nebo zavřete. To se naštěstí neděje příliš často, většinou vystačíte s jednotkami otevřených kanálů i po dobu několika let. Výjimkou je však provoz veřejného lightning uzlu pro směrování plateb v síti. Takový uzel již vyžaduje pravidelnou údržbu kanálů, správu jejich poplatků a vyhodnocování jejich efektivity. To vede k zavírání neefektivních kanálů a otvírání nových směrem k lukrativním uzlům.
Raspberry Pi a UmbrelOS není vhodnou platformou pro provoz veřejných lightning uzlů a směrování plateb v síti. Nevyhovuje celkovým výkonem a bezpečností a neumožňuje nastavit adekvátní SLA pro provoz takové služby. Proto ji k tomuto účelu důrazně nedoporučuju.
Nezapomeňte svůj uzel čas od času restartovat. Mně se osvědčilo provést restart ne déle než po půl roce provozu. Dlouhodobý nepřetržitý provoz jakéhokoliv softwaru hromadí důsledky chyb v něm existujících (a každý takové obsahuje), které se časem zcela určitě nějak projeví. Je dobré těmto projevům předcházet právě restartem celého uzlu. Restart vždy provádějte kontrolovaně přes příslušné tlačítko v menu Settings Umbrel OS, nikdy uzel natvrdo nevypínejte odstavením od napájení. Umožníte všem aplikacím korektně se ukončit, aby následně mohly korektně nastartovat. To samé platí i pro vypínání uzlu v případě potřeby.
Vlastní bitcoinový uzel? Ano!
Pokud jste dočetli až sem, pravděpodobně stavbu a provoz vlastního uzlu vážně zvažujete. Rád bych vás v tom podpořil. Ano, dává to smysl. A přestože si myslím, že nejvíce zážitků a pozitivní energie získáte při stavbě a zprovoznění vlastního uzlu (třeba tak, jak je popsáno v tomto článku), nezatracuji ani pořízení již předpřipraveného řešení, které stačí připojit do zásuvky a zapnout. Stále vám zbyde spoustu zábavy s nastavením jednotlivých aplikací.
Staňte se součástí bitcoinové sítě a podpořte její původní étos! Staňte se Bitcoinerem!
-
@ a012dc82:6458a70d
2024-09-04 08:09:45Table Of Content
-
The Energy Consumption of Bitcoin Mining
-
The Environmental Impact of Bitcoin Mining
-
Innovations in Green Energy
-
The Advantages of Using Green Energy in Bitcoin Mining
-
The Challenges of Using Green Energy in Bitcoin Mining
-
Conclusion
-
FAQ
Bitcoin is a digital currency that has gained a lot of popularity over the years, and it's being used for various transactions. However, mining bitcoin requires a lot of energy, and this has raised concerns about the sustainability of bitcoin mining and its impact on the environment. In recent years, there have been efforts to make bitcoin mining more sustainable by using renewable energy sources. This article aims to assess the sustainability of bitcoin mining and its impact on green energy.
The Energy Consumption of Bitcoin Mining
Bitcoin mining is a process that involves solving complex mathematical problems that require a lot of computing power. This process consumes a significant amount of energy, and the energy consumption of bitcoin mining is growing every day. According to recent studies, the energy consumption of bitcoin mining is estimated to be around 121 terawatt-hours (TWh) per year, which is more than the energy consumption of some countries.
The Environmental Impact of Bitcoin Mining
The energy consumption of bitcoin mining has a significant impact on the environment. Most of the energy used in bitcoin mining comes from non-renewable sources such as coal and natural gas, which release greenhouse gases into the atmosphere. This contributes to climate change, which has adverse effects on the environment and human health.
Innovations in Green Energy
In recent years, there have been innovations in green energy that can be used to make bitcoin mining more sustainable. These innovations include renewable energy sources such as solar, wind, and hydropower. The use of these renewable energy sources can reduce the environmental impact of bitcoin mining and make it more sustainable.
The Advantages of Using Green Energy in Bitcoin Mining
Using green energy in bitcoin mining has several advantages. Firstly, it reduces the environmental impact of bitcoin mining by reducing greenhouse gas emissions. Secondly, it can make bitcoin mining more cost-effective, as the cost of renewable energy sources is declining. Thirdly, it can increase the adoption of renewable energy sources and drive innovation in the renewable energy sector.
The Challenges of Using Green Energy in Bitcoin Mining
There are also challenges associated with using green energy in bitcoin mining. Firstly, the availability of renewable energy sources may not be consistent, as solar and wind energy are dependent on weather conditions. This can affect the profitability of bitcoin mining, as miners may need to switch to non-renewable energy sources during periods of low renewable energy availability. Secondly, the initial investment required to set up renewable energy infrastructure can be high, which may deter some miners from switching to green energy sources.
Conclusion
Bitcoin mining has a significant impact on the environment, but there are efforts to make it more sustainable by using renewable energy sources. Using green energy in bitcoin mining has several advantages, including reducing greenhouse gas emissions and driving innovation in the renewable energy sector. However, there are also challenges associated with using green energy in bitcoin mining, such as the inconsistent availability of renewable energy sources and the high initial investment required to set up renewable energy infrastructure. Overall, assessing the sustainability of bitcoin mining and its impact on green energy is a complex issue that requires a comprehensive evaluation of various factors.
FAQ
Can bitcoin mining be done without consuming a lot of energy? No, bitcoin mining requires a significant amount of energy to solve complex mathematical problems and validate transactions.
Is bitcoin mining harmful to the environment? Yes, bitcoin mining consumes a lot of energy, most of which comes from non-renewable sources that release greenhouse gases into the atmosphere.
What are the benefits of using renewable energy sources in bitcoin mining? Using renewable energy sources can reduce the environmental impact of bitcoin mining, make it more cost-effective, and drive innovation in the renewable energy sector.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ dd664d5e:5633d319
2024-08-24 07:57:16We can talk about something else, now.
Making boosts/quotes the primary way new users find a variety of topics is a fundamental flaw. We don't need boosts (which merely results in the main trending list trending even harder, as people feel safer boosting something that is already popular), and hashtags have become the mess they naturally will become.
We need topical forums and relay-based community boards.
This would actively encourage those of us who want to write on OtherTopics to write more on them, as we would have some chance of the material being found by those interested in it. And it would spare us having to win some general popularity contest, just to be able to converse about golfing, Hinduism, or veganism.
Scrollable "timeline" feeds, even with AI assistance (like DVMs), don't accomplish this as well, as they eliminate the ability to skim the top-level and selectively read. You have to scroll, scroll, scroll.
It would also reduce the overloading of the original posts with videos, which is starting to give Nostr a Tik-Tok vibe. There's nothing wrong with that, per se, and we should probably have clients like that, but it makes life hard for anyone who wants to have a deeper discussion. People scrolling have trouble even "seeing" a text-based OP, but using the written word is a true signal to the other people, that you are capable of carrying a conversation through text.
Examples for other styles of client
(I am including the Communities in Nostrudel and Satellite, even though they don't yet work, effectively.)
Some of the things that set these clients apart, is that: 1. they are topic-first or thread-first, not person-first, 2. they sometimes allow voting (I suppose we could rank by zaps), 3. they often allow the user to override the default order and simply look at whatever is newest, most popular, or where their friends are currently active (i.e. they allow for easy sorting and filtering), 4. they cap the depth of threads to one or two levels, keep the indentation tiny, or offer a "flat" view, 5. they are primarily text-based (Reddit broke with this and now their main pages look really spammy), 6. they allow you to see all of the entries in the thread, at once, and simply actualize to display the entries that pop up in-between, 7. they often have some indication of what you have already read (this is application data) and allow you to sort for "stuff I haven't looked at, yet".
https://i.nostr.build/uCx5YKMOsjhKBU5c.png https://i.nostr.build/hMkm2oKpos0pWaV9.png https://i.nostr.build/mGQONMw5RC8XKtph.png https://i.nostr.build/TCSkG1bPuMOL0jja.webp https://i.nostr.build/3fLjCSNdtefiZmAH.png https://i.nostr.build/BHgo7EKTK5FRIsVl.png
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 32e18276:5c68e245
2023-12-06 15:29:43I’m going to be on an ordinals panels as one of the people who is counter arguing the claim that they are good for bitcoin. I decided to brush up on the technicals on how inscriptions work. I am starting to see luke’s perspective on how it is exploiting a loophole in bitcoin’s anti-data-spam mechanisms.
Storing data in Bitcoin, the “standard” way
The standard way you add “data” to bitcoin is by calling the OP_RETURN opcode. Bitcoin devs noticed that people were storing data (like the bitcoin whitepaper) in the utxo set via large multisig transactions. The problem with this is that this set is unprunable and could grow over time. OP_RETURN outputs on the other-hand are provably prunable and don’t add to utxo bloat.
Here’s an excerpt from the march 2014 0.9.0 release notes that talks about this:
On OP_RETURN: There was been some confusion and misunderstanding in the community, regarding the OP_RETURN feature in 0.9 and data in the blockchain. This change is not an endorsement of storing data in the blockchain. The OP_RETURN change creates a provably-prunable output, to avoid data storage schemes – some of which were already deployed – that were storing arbitrary data such as images as forever-unspendable TX outputs, bloating bitcoin’s UTXO database. Storing arbitrary data in the blockchain is still a bad idea; it is less costly and far more efficient to store non-currency data elsewhere.
Much of the work on bitcoin core has been focused on making sure the system continues to function in a decentralized way for its intended purpose in the presence of people trying to abuse it for things like storing data. Bitcoin core has always discouraged this, as it is not designed for storage of images and data, it is meant for moving digital coins around in cyberspace.
To help incentive-align people to not do stupid things, OP_RETURN transactions were not made non-standard, so that they are relayable by peers and miners, but with the caveat:
- They can only push 40 bytes (later increased to 80,83, I’m guessing to support larger root merkle hashes since that is the only sane usecase for op_return)
Bitcoin also added an option called -datacarriersize which limits the total number of bytes from these outputs that you will relay or mine.
Why inscriptions are technically an exploit
Inscriptions get around the datacarriersize limit by disguising data as bitcoin script program data via OP_PUSH inside OP_IF blocks. Ordinals do not use OP_RETURN and are not subjected to datacarriersize limits, so noderunners and miners currently have limited control over the total size of this data that they wish to relay and include in blocks. Luke’s fork of bitcoin-core has some options to fight this spam, so hopefully we will see this in core sometime soon as well.
Inscriptions are also taking advantage of features in segwit v1 (witness discount) and v2/taproot (no arbitrary script size limit). Each of these features have interesting and well-justified reasons why they were introduced.
The purpose of the witness discount was to make it cheaper to spend many outputs which helps the reduction of the utxo set size. Inscriptions took advantage of this discount to store monke jpegs disguised as bitcoin scripts. Remember, bitcoin is not for storing data, so anytime bitcoin-devs accidentally make it cheap and easy to relay data then this should be viewed as an exploit. Expect it to be fixed, or at least provide tools to noderunners for fighting this spam.
Where do we go from here
The interesting part of this story is that people seem to attach value to images stored on the bitcoin blockchain, and they are willing to pay the fee to get it in the block, so non-ideologic miners and people who don’t care about the health and decentralization of bitcoin are happy to pay or collect the fee and move on.
Data should not get a discount, people should pay full price if they want to store data. They should just use op_return and hashes like opentimestamps or any other reasonable protocol storing data in bitcoin.
After going through this analysis I’ve come to the opinion that this is a pretty bad data-spam exploit and bitcoin devs should be working on solutions. Ideological devs like luke who actually care about the health and decentralization of the network are and I’m glad to see it.
-
@ 5954198a:0c6fa207
2024-09-04 07:39:29Even after posting stuff related to your business on your social media, your followers still haven’t increased much?
Does even after following a social media strategy, the number of sales hasn’t increased much? If your answer is yes, then you need to hire a Social Media Marketing Company in Indore. India’s cleanest city Indore is a city of dreams that also cleans the businesses if not run properly. Businesses aren’t that easy to run, maybe when your business grows, things work pretty well for your business, but the initial days of your business might not be like what you’ve imagined.
Starting a business from the scrap can be a very challenging thing to do. But if you have an idea that’s going to run your business, dedication to make your dream come true, then no one can stop you from achieving your dream of starting your business. Digi Partners is a Social Media Marketing Company in Indore that works for companies like yours on expanding their businesses. Digi Partners being an SMM company in Indore, have a team of professionals trained in graphic designing, content writing, digital marketing, strategy making, video producing, and editing. Graphic design plays a very vital role in social media marketing. Visit: https://digi-partners.com/social-media-marketing-company-indore/
-
@ d830ee7b:4e61cd62
2024-09-04 07:29:41Bitcoin ถือกำเนิดขึ้นในปี 2009 จากวิสัยทัศน์ของ Satoshi Nakamoto บุคคลหรือกลุ่มบุคคลปริศนา ที่ใฝ่ฝันถึง "เงินสดดิจิทัล" อิสระไร้พรมแดน ไร้การควบคุมจากรัฐบาล
ในช่วงแรกเริ่ม Bitcoin เป็นเสมือนเพชรดิบที่ซ่อนตัวอยู่ในเงามืด เป็นที่รู้จักกันเฉพาะในกลุ่มเล็กๆ ที่หลงใหลในเทคโนโลยีและศักยภาพอันไร้ขีดจำกัดของมัน
แต่แล้ว Bitcoin ก็เริ่มฉายแสงเจิดจรัส ดึงดูดความสนใจจากผู้คนทั่วโลก ราคาพุ่งทะยานอย่างรวดเร็ว บริษัทและบริการต่างๆ ผุดขึ้นมาราวกับดอกเห็ด
ทว่า.. เส้นทางสู่ความสำเร็จของ Bitcoin ไม่ได้โรยด้วยกลีบกุหลาบ Bitcoin ยังต้องเผชิญกับความท้าทายมากมาย ทั้งปัญหาทางเทคนิค ความขัดแย้งภายในชุมชนและการต่อสู้แย่งชิงอำนาจ
Blocksize Limit จุดเริ่มต้นของความขัดแย้งและสงคราม Big Blocks VS Small Blocks
ย้อนกลับไปในปี 2010 Satoshi Nakamoto ได้เพิ่ม "Blocksize Limit" ซึ่งเป็นข้อจำกัดขนาดของ Block ใน Bitcoin ไว้ที่ 1MB เพื่อป้องกันการโจมตีทางไซเบอร์ในยุคแรกเริ่ม
แต่เมื่อ Bitcoin ได้รับความนิยมมากขึ้น ธุรกรรมก็เพิ่มขึ้นอย่างรวดเร็ว Blocksize Limit 1MB เริ่มจะกลายเป็นปัญหา..
เกิดการถกเถียงอย่างดุเดือดในชุมชน Bitcoin ว่าควรเพิ่ม Blocksize Limit หรือไม่
ฝ่าย "Small Blockers" นำโดยนักพัฒนา Bitcoin Core ส่วนใหญ่ เชื่อว่า Blocksize Limit ควรคงที่ เพื่อรักษาความปลอดภัยและการกระจายอำนาจ พวกเขากล่าวอ้างว่า Big Blocks จะทำให้ Bitcoinรวมศูนย์อยู่ที่ Miners รายใหญ่ และยากต่อการรัน Full Nodes สำหรับผู้ใช้งานทั่วไป ซึ่งจะบั่นทอนความเป็น Decentralized ของ Bitcoin
ฝ่าย "Big Blockers" นำโดย Gavin Andresen ผู้สืบทอดตำแหน่งจาก Satoshi Nakamoto และ Mike Hearn เชื่อว่า Bitcoin ควรเติบโตอย่างไม่จำกัด "Big Blocks" คือคำตอบ พวกเขามองว่า Small Blocks จะทำให้ Bitcoin ไม่สามารถรองรับธุรกรรมที่เพิ่มขึ้น ค่าธรรมเนียมจะพุ่งสูงและ Bitcoin จะไม่สามารถใช้งานได้จริงในชีวิตประจำวัน..
ความขัดแย้งนี้สะท้อนให้เห็นถึงวิสัยทัศน์ที่แตกต่างกัน
Gavin Andresen ผู้ที่เคยได้รับความไว้วางใจจาก Satoshi รู้สึกผิดหวังที่ Bitcoin Core ไม่ยอมเพิ่ม Blocksize Limit เขาเชื่อมั่นว่า Bitcoin ควรเป็นระบบการชำระเงินที่ใช้งานได้จริง รวดเร็ว และมีค่าธรรมเนียมต่ำ
Blockstream บริษัทผู้ทรงอิทธิพลและความกังวลเรื่องผลประโยชน์ทับซ้อน
ปี 2014 กลุ่มนักพัฒนา Bitcoin Core บางส่วนได้ก่อตั้งบริษัท Blockstream (นำโดย Adam Back) พวกเขาเน้นการพัฒนาเทคโนโลยี Blockchain และกลายเป็นที่มถกเถียงว่าอิทธิพลอย่างมากต่อ Bitcoin Core
Blockstream สนับสนุน "Small Blocks"
เช่นเดียวกับ Bitcoin Core พวกเขาพัฒนา "Sidechains" ซึ่งเป็น Blockchain แยกต่างหากที่เชื่อมต่อกับ Bitcoin เช่น Liquid Network Sidechains ซึ่งช่วยให้ Blockstream สามารถเก็บค่าธรรมเนียมจากธุรกรรมและขายบริการให้กับองค์กรหรือบริษัทต่างๆ ได้
ความสัมพันธ์อันใกล้ชิดระหว่าง Blockstream และ Bitcoin Core ทำให้เกิดความกังวลขึ้นในชุมชน Bitcoin ในขณะนั้นว่า Blockstream อาจมีผลประโยชน์ทับซ้อนและต้องการให้ Bitcoin คงขนาดเล็ก เพื่อผลักดันให้คนใช้งาน "Sidechains" ของพวกเขา
BitcoinXT และ Bitcoin Classic ความพยายามแก้ไข Blocksize ที่ถูกต่อต้าน
ปี 2015 Mike Hearn และ Gavin Andresen ตัดสินใจเสนอทางออกด้วยการสร้าง "BitcoinXT" ซอฟต์แวร์ Bitcoin เวอร์ชั่นใหม่ที่ เพิ่ม Blocksize Limit เป็น 8MB
แต่ BitcoinXT ถูกต่อต้านอย่างรุนแรงจากฝ่าย Small Blockers
Bitcoin.org เว็บไซต์หลักของ Bitcoin และ r/Bitcoin ฟอรัมหลักของ Bitcoin ได้เซ็นเซอร์ BitcoinXT ไม่ให้ปรากฏ เกิดการโจมตีทางไซเบอร์ที่มุ่งเป้าไปที่ BitcoinXT โดยตรง
Coinbase บริษัทแลกเปลี่ยน Cryptocurrency รายใหญ่ ประกาศสนับสนุน BitcoinXT แต่กลับถูกถอดออกจาก Bitcoin.org
ต่อมา Bitcoin Classic ถูกสร้างขึ้นเป็นอีกหนึ่งทางเลือก แต่ก็ล้มเหลวเช่นกัน
เนื่องจาก Bitcoin Core ยังคงมีอิทธิพลอย่างมากในชุมชน Bitcoin ในช่วงเวลานั้น..
Hong Kong Agreement และ New York Agreement ความพยายามประนีประนอมที่ไม่ลงตัว
ปี 2016 และ 2017 เกิดความพยายามในการประนีประนอมระหว่างฝ่าย Small Blocks และ Big Blockers ถึงสองครั้ง คือ "Hong Kong Agreement" และ "New York Agreement"
ทั้งสองข้อตกลงมีเป้าหมายที่จะเปิดใช้งาน SegWit และ เพิ่ม Blocksize Limit เป็น 2MB แต่ Bitcoin Core ไม่ทำตามสัญญาในการเพิ่ม Blocksize Limit ทำให้ข้อตกลงล้มเหลว
ความล้มเหลวของข้อตกลงทั้งสอง สะท้อนให้เห็นถึงความไม่ไว้วางใจระหว่างสองฝ่าย และความยากลำบากในการหาจุดร่วมที่ทุกฝ่ายยอมรับ
SegWit ก้าวสำคัญของ Bitcoin และจุดกำเนิดของ Bitcoin Cash
ในที่สุด SegWit ก็ถูกเปิดใช้งานบน Bitcoin ในเดือนสิงหาคม 2017
SegWit เป็น Soft Fork ที่เปลี่ยนแปลงวิธีการจัดเก็บข้อมูลใน Block เพื่อเพิ่มประสิทธิภาพและความปลอดภัย
SegWit ช่วยแก้ปัญหา "Transaction Malleability" ซึ่งเป็นช่องโหว่ด้านความปลอดภัย และปูทางไปสู่การพัฒนา "Layer 2 solutions" เช่น Lightning Network ในเวลาต่อมา..
อย่างไรก็ตาม.. กลุ่ม "Big Blockers" มองว่า SegWit ไม่ใช่ทางออกที่แท้จริงสำหรับปัญหาการขยายขนาด (พวกเขาต้องการขยายขนาดบล็อกบนเลอเยอร์ฐาน) พวกเขาไม่พอใจที่ Bitcoin Core ไม่ทำตามสัญญาในการเพิ่ม Blocksize Limit
ในเดือนสิงหาคม 2017 กลุ่ม "Big Blockers" ได้ทำการ "Hard Fork" Bitcoin เพื่อสร้าง "Bitcoin Cash (BCH)" ซึ่งอ้างว่ามุ่งสืบทอดจุดมุ่งหมายดั้งเดิมของ Bitcoin ในฐานะ "เงินสดดิจิทัล"
ความเสี่ยงด้านความปลอดภัย Bug ร้ายแรงใน Bitcoin Core และบทเรียนที่ได้รับ
ในเดือนกันยายน 2018 Awemany นักพัฒนา BCH ค้นพบ Bug ร้ายแรงใน Bitcoin Core (CVE-2018-17144) ซึ่งอาจทำให้เกิดภาวะเงินเฟ้อได้
Bug นี้เกิดจากความผิดพลาดในการเขียนโค้ด และอาจทำให้ผู้ไม่หวังดีสามารถสร้าง Bitcoin ปลอมขึ้นมาได้
Awemany ได้แจ้งเตือนนักพัฒนา Bitcoin Core อย่างเงียบๆ แทนที่จะใช้ประโยชน์จาก Bug นี้ แสดงให้เห็นถึงความรับผิดชอบของเขา และ Bug นี้ได้รับการแก้ไขอย่างรวดเร็ว
เหตุการณ์นี้แสดงให้เห็นถึงความสำคัญของการตรวจสอบโค้ดอย่างละเอียด และความจำเป็นของการมีนักพัฒนาจากหลายฝ่ายเพื่อช่วยกันตรวจสอบความถูกต้องของโค้ด
นอกจากนี้.. ยังเป็นเครื่องเตือนใจว่าแม้แต่ระบบที่ถูกออกแบบมาอย่างดีก็ยังมีความเสี่ยงด้านความปลอดภัย
Bitcoin Cash แตกแยก การ Hard Fork ครั้งที่สอง และบทบาทของ Craig Wright
ในเดือนพฤศจิกายน 2018 Bitcoin Cash (BCH) ได้แตกออกเป็นสองสาย คือ Bitcoin ABC (BCH) และ Bitcoin SV (BSV)
การ Hard Fork นี้เกิดจากความขัดแย้งระหว่างกลุ่มนักพัฒนา Bitcoin ABC นำโดย Amaury Séchet และกลุ่ม Bitcoin SV นำโดย Craig Wright ผู้ที่อ้างว่าเป็น Satoshi Nakamoto 🤔
ความขัดแย้งหลักคือเรื่องขนาดของ Block และทิศทางการพัฒนา Bitcoin Cash
กลุ่ม Bitcoin SV ต้องการเพิ่มขนาด Block อย่างมาก ในขณะที่กลุ่ม Bitcoin ABC ต้องการปรับปรุง Bitcoin Cash ในด้านอื่นๆ เช่น Smart Contracts
Craig Wright มีบทบาทสำคัญในการผลักดัน Bitcoin SV เขาเชื่อมั่นว่า Bitcoin ควรเป็นไปตามวิสัยทัศน์ดั้งเดิมของ Satoshi Nakamoto โดยเน้นที่การเป็น "เงินสดอิเล็กทรอนิกส์แบบ peer-to-peer"
การ Hard Fork นี้แสดงให้เห็นถึงความหลากหลายของความคิดเห็นในชุมชน Cryptocurrency และความยากลำบากในการหาจุดร่วมที่ทุกฝ่ายยอมรับ
นอกจากนี้.. ยังสะท้อนให้เห็นถึงความท้าทายในการกำหนดทิศทางของ Cryptocurrency ในอนาคตอีกด้วย
Bitcoin ในปัจจุบัน เส้นทางสู่ทองคำดิจิทัล และวิวัฒนาการของเทคโนโลยี
หลังจากการ Hard Fork ของ Bitcoin Cash
Bitcoin ได้ก้าวเข้าสู่ยุคใหม่ Bitcoin ได้รับการยอมรับมากขึ้นในวงกว้าง มีมูลค่าตลาดสูง และถูกมองว่าเป็น "ทองคำดิจิทัล" ที่สามารถใช้เก็บรักษามูลค่าในระยะยาว (Store of Value)
การพัฒนา Lightning Network เป็นก้าวสำคัญในการแก้ปัญหาเรื่องค่าธรรมเนียมและความเร็วในการทำธุรกรรม
Lightning Network เป็น "Second Layer" ที่สร้างขึ้นบน Bitcoin Blockchain ช่วยให้สามารถทำธุรกรรมได้รวดเร็วขึ้น มีค่าธรรมเนียมต่ำ และมีความเป็นส่วนตัวสูง
อย่างไรก็ตาม.. Lightning Network ยังคงต้องเผชิญกับความท้าทาย เช่น ปัญหาเรื่องการบริหารจัดการ Liquidity และความซับซ้อนในการใช้งาน
นอกจาก Lightning Network แล้ว ยังมีการพัฒนาเทคโนโลยีอื่นๆ ที่ช่วยเพิ่มขีดความสามารถของ Bitcoin เช่น Taproot ซึ่งเป็น Soft Fork ที่ช่วยเพิ่มความเป็นส่วนตัว และ Schnorr signatures ซึ่งเป็น Digital Signature แบบใหม่ที่ช่วยลดขนาดของธุรกรรมให้เล็กลง
นอกจากนี้.. ยังเริ่มมีการพัฒนา DeFi (Decentralized Finance) บน Bitcoin และ Bitcoin Ordinals ซึ่งเป็นวิธีการใหม่ในการฝังข้อมูลลงใน Bitcoin Blockchain
Bitcoin ยังคงถูกนำไปใช้ในประเทศอื่นๆ นอกจาก El Salvador และมีความพยายามในการแก้ปัญหาความกังวลด้านสิ่งแวดล้อมจากการขุด Bitcoin
บทเรียนจากมหากาพย์แห่งวิวัฒนาการ
ประวัติศาสตร์ Bitcoin สอนให้เรารู้ว่า.. เทคโนโลยี Blockchain มีศักยภาพในการเปลี่ยนแปลงโลก แต่เส้นทางสู่ความสำเร็จนั้นก็ไม่ได้โรยด้วยกลีบกุหลาบ
ความขัดแย้ง การต่อสู้แย่งชิงอำนาจ และการตัดสินใจที่ยากลำบาก ล้วนเป็นส่วนหนึ่งของการเดินทาง
สิ่งที่สำคัญที่สุดคือ.. เราต้องศึกษา ทำความเข้าใจ และอาจมีส่วนร่วมในการกำหนดทิศทางของเทคโนโลยีนี้ เพื่อให้ Blockchain สามารถสร้างประโยชน์สูงสุดให้กับมวลมนุษยชาติต่อไป
เจาะลึกวิวัฒนาการของ Bitcoin การ Soft Forks, Hard Forks และมุมมองที่แตกต่าง
SegWit, Taproot และ Soft Forks อื่นๆ การปรับปรุง Bitcoin อย่างนุ่มนวล
Bitcoin Core ไม่ได้หยุดนิ่งอยู่กับที่ นักพัฒนาได้ทำงานอย่างต่อเนื่องเพื่อปรับปรุง Bitcoin ให้ดีขึ้น โดยใช้ "Soft Forks" ซึ่งเป็นการอัพเกรดที่เข้ากันได้กับซอฟต์แวร์เวอร์ชั่นเก่า
SegWit (Segregated Witness)
เปิดตัวในปี 2017 SegWit เป็นเหมือนการจัดระเบียบข้อมูลใน Block ใหม่ ย้ายส่วนที่เรียกว่า "Witness data" (ข้อมูลลายเซ็น) ออกไปไว้ข้างนอก ทำให้มีพื้นที่ว่างใน Block มากขึ้น รองรับธุรกรรมได้มากขึ้น และลดค่าธรรมเนียมได้ SegWit ยังช่วยแก้ปัญหา "Transaction Malleability" ซึ่งเป็นช่องโหว่ด้านความปลอดภัยและปูทางไปสู่การพัฒนา Lightning Network
Taproot
เปิดตัวในปี 2021 Taproot เป็น Soft Fork ที่ช่วยเพิ่มความเป็นส่วนตัว และประสิทธิภาพของ Bitcoin Taproot ทำให้ธุรกรรมที่ซับซ้อน เช่น Smart Contracts มีขนาดเล็กลงและยากต่อการแยกแยะจากธุรกรรมทั่วไป
Soft Forks อื่นๆ ที่ Bitcoin Core ได้นำมาใช้ เช่น BIP 65 (CheckLockTimeVerify) และ BIP 112 (CSV) ช่วยเพิ่มความยืดหยุ่นในการใช้งาน Bitcoin และปูทางไปสู่การพัฒนาฟังก์ชันใหม่ๆ
Hard Forks เส้นทางที่แตกต่างและการถือกำเนิดของเหรียญใหม่
ในขณะที่ Soft Forks เป็นการอัพเกรดที่นุ่มนวล "Hard Forks" นั้นนับว่าเป็นการเปลี่ยนแปลงครั้งใหญ่ ที่ทำให้เกิดสาย Blockchain ใหม่และเหรียญใหม่
Bitcoin XT (2015)
เป็นความพยายามครั้งแรกในการเพิ่ม Blocksize Limit โดย Mike Hearn และ Gavin Andresen Bitcoin XT เสนอให้เพิ่ม Blocksize Limit เป็น 8MB แต่ถูกต่อต้านอย่างรุนแรง และไม่ประสบความสำเร็จ
Bitcoin Classic (2016)
เป็นอีกหนึ่งความพยายามในการเพิ่ม Blocksize Limit โดยเสนอให้เพิ่มเป็น 2MB แต่ก็ล้มเหลวเช่นกัน
Bitcoin Unlimited (2016)
เสนอให้ Miners สามารถกำหนด Blocksize Limit ได้เอง แต่มีข้อบกพร่องด้านความปลอดภัย และไม่เป็นที่ยอมรับในวงกว้าง
Bitcoin Cash (BCH) (2017)
เกิดจากการ Hard Fork ของ Bitcoin โดยกลุ่ม "Big Blockers" ที่ไม่พอใจที่ Bitcoin Core ไม่ยอมเพิ่ม Blocksize Limit Bitcoin Cash เพิ่ม Blocksize Limit เป็น 8MB และมุ่งเน้นที่การเป็น "เงินสดดิจิทัล" ที่ใช้งานได้จริง
Bitcoin SV (BSV) (2018)
เกิดจากการ Hard Fork ของ Bitcoin Cash โดยกลุ่มที่นำโดย Craig Wright ผู้ที่อ้างว่าเป็น Satoshi Nakamoto Bitcoin SV ต้องการเพิ่มขนาด Block อย่างมาก และกลับไปสู่วิสัยทัศน์ดั้งเดิมของ Bitcoin
Bitcoin ABC (2020)
เกิดจากการ Hard Fork ของ Bitcoin Cash โดยกลุ่มนักพัฒนา Bitcoin ABC ที่ต้องการเปลี่ยนแปลงกลไกการระดมทุน Bitcoin ABC ถูกเปลี่ยนชื่อเป็น eCash ในภายหลัง
มุมมองที่แตกต่าง Bitcoin ถูก "แย่งชิง" หรือไม่?
หนังสือ "Hijacking Bitcoin" โดย Roger Ver นำเสนอมุมมองที่แตกต่างจาก Bitcoin Maximalists
Roger Ver เชื่อว่า Bitcoin ถูก "แย่งชิง" โดยกลุ่มนักพัฒนา Bitcoin Core และ Blockstream ที่ต้องการเปลี่ยนแปลง Bitcoin จาก "เงินสดดิจิทัล" ให้กลายเป็น "สินทรัพย์เก็บมูลค่า"
Roger Ver วิพากษ์วิจารณ์ Bitcoin Core ในหลายประเด็น เช่น..
การไม่ยอมเพิ่ม Blocksize Limit
Roger Ver เชื่อว่า Bitcoin Core จงใจจำกัดการเติบโตของ Bitcoin เพื่อผลักดันให้คนใช้งาน Sidechains ของ Blockstream
การเซ็นเซอร์ข้อมูล
Roger Ver กล่าวหาว่า Bitcoin Core เซ็นเซอร์ข้อมูลและปิดกั้นการสนทนาเกี่ยวกับ Big Blocks บนแพลตฟอร์มต่างๆ
การต่อต้านนวัตกรรม
Roger Ver เชื่อว่า Bitcoin Core ต่อต้านนวัตกรรม และไม่ยอมรับการเปลี่ยนแปลงที่อาจทำให้ Bitcoin ดีขึ้น
การควบคุมโดยกลุ่มเล็กๆ
Roger Ver มองว่า Bitcoin Core ถูกควบคุมโดยกลุ่มเล็กๆ ที่ไม่คำนึงถึงความต้องการของชุมชน Bitcoin
Roger Ver สนับสนุน Bitcoin Cash ซึ่งเขาเชื่อว่าเป็น Bitcoin ที่แท้จริง ที่สืบทอดวิสัยทัศน์ดั้งเดิมของ Satoshi Nakamoto
บทสรุป:
การต่อสู้แย่งชิง Bitcoin และการเกิดขึ้นของ Hard Forks ต่างๆ เป็นส่วนหนึ่งของวิวัฒนาการของ Cryptocurrency
มุมมองที่แตกต่าง ความขัดแย้ง และการแข่งขัน ล้วนเป็นแรงผลักดันให้ Bitcoin และ Cryptocurrency อื่นๆ พัฒนาต่อไป
สุดท้ายแล้ว.. เราคงไม่อาจตัดสินได้ว่าฝ่ายใดคิดถูกหรือฝ่ายใดผิด
"เสียงของตลาด จะช่วยทำหน้าที่ให้คำตอบนั้นกับเรา ว่าแท้ที่จริงแล้วผู้คนกำลังต้องการอะไรกันแน่..
ลองมองไปที่มูลค่าของแต่ละแนวคิด มองไปที่ Network effect และกำลังการขุด มองไปที่การยอมรับและความเชื่อมั่นของผู้คน เหล่านี้ล้วนเป็นข้อบ่งชี้ที่เห็นได้ง่าย..
เพราะนั่นคือเสียงแห่งการเพรียกหาอิสรภาพ และอธิปไตยทางการเงินที่แท้จริง..
— Jakk Goodday
-
@ 9dd283b1:cf9b6beb
2024-08-21 07:01:29Yesterday, my daughter and I decided to play Monopoly, but instead of using Monopoly money, I thought it would be fun to use sats instead! Here’s how it went. Preparation:
Here’s how I set up the game:
1 Zeus wallet connected to my node, with an open channel to WoS. 2 WoS wallets (1 for me and 1 for my daughter), each with a 0 balance to start.
Originally, I considered using Blink wallets, but the problem with Blink is that it displays the balance in EUR in a large font, while the sats balance is smaller. This isn’t ideal when you're playing Monopoly and want to treat 1 sat = 1 Monopoly dollar. So, we switched to WoS, where the sats balance is prominently displayed, with the EUR balance in a smaller font underneath.
In our version of Monopoly, each player starts with 1500 Monopoly dollars and earns 200 when passing GO. It was easy to follow this system using sats.
I installed WoS on my daughter’s phone and transferred 1500 sats from my Zeus wallet to her WoS wallet. I did the same for myself, so we both had a 1500 sat starting balance. I used Zeus as the "bank" and WoS as my player wallet on the same phone, but if you have an extra device or don’t trust the bank, you can separate them.
And yes, I know you can go fully non-custodial by setting up LNBits with Umbrel and using Blue Wallet on separate devices for each family member. However, that takes longer to set up, requires VPN connections for everyone, and seemed unnecessary for our casual game. In my setup, only the bank needed a VPN, which was simple and only took about 5 minutes.
Game:
The game got fun pretty quickly! Every time my daughter passed GO, she showed me her QR code with a sly smile, and the bank paid out her 200 sats with zero fees. Players also paid each other with zero fees.
Twice, WoS randomly charged a 1-sat fee when transferring from WoS to Zeus—once from my wallet and once from my daughter’s. To keep things fair, I had the bank reimburse those 2 sats.
We did run into one small issue: I needed to pay my daughter 200 sats for landing on her hotel, but since I only had exactly 200 sats left, WoS wouldn’t let me send it, even though it was a WoS-to-WoS transaction.
Conclusion:
At the (unofficial) end of the game—since it was getting late—my daughter had 2810 sats, and I had 1650 sats. At this point, each stop was costing between 300 and 600 sats, so I suppose the real end was near!
Overall, it was a smooth experience, and my daughter got quite comfortable with sending and receiving bitcoin, even though it was her first time doing so. She did show more interest in the EUR balance, but I’m sure she’ll come to appreciate the sats balance soon enough!
I highly recommend this as a fun way to introduce people to the Bitcoin Lightning Network. Most people already have a Monopoly game at home, and if you have a couple of spare devices, you can easily install WoS for everyone. (Perhaps not in the U.S. right now, but I’m not entirely sure on that front.)
Would definitely recommend trying it out!
originally posted at https://stacker.news/items/656614
-
@ 1739d937:3e3136ef
2024-09-04 07:23:12This is the sixth in a series of weekly(ish) updates detailing progress on bringing MLS protocol DMs and group messaging to Nostr.
Previous Updates
Progress this week
Sorry about the very late update this week. Catching up on everything after a week in Riga for Nostriga and Baltic Honeybadger took a bunch of time, every other moment was spent coding. 👨💻
The response at Nostriga to NIP-104 and my two talks on the subject were overwhelmingly positive. It was very helpful to spend time with other devs going through the spec in detail. We found a few minor improvements and clarifications but no major issues surfaced. Thanks to nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49, nostr:npub1lunaq893u4hmtpvqxpk8hfmtkqmm7ggutdtnc4hyuux2skr4ttcqr827lj, and nostr:npub1ye5ptcxfyyxl5vjvdjar2ua3f0hynkjzpx552mu5snj3qmx5pzjscpknpr in particular for the lengthly interrogations and nostr:npub1wmr34t36fy03m8hvgl96zl3znndyzyaqhwmwdtshwmtkg03fetaqhjg240 for the introductions.
Last week, I started work on a reference implementation of the spec. It's still early but going quickly.
My PR adding support for secp256k1 was also merged into the hpke-rs library yesterday. That's one more step in the right direction towards having secp256k1 ciphersuite support.
The NIP
If you haven't already, check out my talk; The Past and Future of DMs and Group messaging on Nostr. This was a basic overview of the various DM and group messaging schemes and talks a little about the progress on NIP-104. I believe there is a recording of the technical talk on the spec but it hasn't yet been released. I'll link it up when it is.
At this point I've been discouraging anyone from trying to implement the NIP quite yet. As I mentioned above there are a few adjustments that need to be made and a few open questions that I'm working on answering with my implementation (which I'm very happy to have contributors on). My plan at the moment is to do this first implementation with the default ciphersuite that MLS already supports while I continue to work on the dependencies to get secp256k1 support across the board.
The Implementation
I've started on a cross-platform native client that will run on Mac, Windows, Linux, iOS, and Android. Think of it as Signal or Telegram but over Nostr. I hope that this will not only become the reference implementation for other client developers but also will be one of the most secure and privacy focused clients in the Nostr ecosystem. Building it has already been helpful in clarifying some of the more complex implementation details in the NIP. It's still early but I'll have more to share on this in the coming weeks.
HPKE-RS
My PR to add support for secp256k1 is merged!
Onward and Upward
Thanks again to everyone for the support and feedback on this stuff at Nostriga. It was hugely motivating to hear the kind words, have you introducing me to people that could help, and spending time giving me feedback! This community is the best. 🫂
-
@ 93dbb6d6:ea74c840
2024-09-04 05:32:17Let’s take a look at why the Specter DIY is so secure and the incredible advantages this device offers.👇
Unlike many commercial wallets, it's built from OFF-THE-SHELF COMPONENTS. Anyone can get one without providing personal data or needing a specific store. Even if Bitcoin hardware is banned in a totalitarian regime, the Specter DIY offers discreet access to a signing device.
The Specter DIY is fully OPENSOURCE enhancing security by allowing anyone to review and use the code without permission. For example, the SeedSigner and Krux projects use much of the Specter DIY Code.
The device is BITCOIN and Liquid ONLY. Supporting no altcoins. With a smaller codebase, there are fewer opportunities for vulnerabilities.
The Specter DIY operates AIR-GAPPED, with no physical connection Wi-Fi-connected devices, ensuring sensitive data like private keys remain secure. It communicates via QR codes or SD card, ensuring transparency so you can clearly understand the transaction signing process.
The device has a LARGE smartphone-like TOUCHSCREEN, offering a comfortable interface for smooth air-gapped communication, easy entry of seed words, and convenient navigation. This display simplifies tasks that are very cumbersome on smaller devices.
The Specter DIY is primarily a signing device and DOES NOT STORE SEED WORDS internally, enhancing security. Seed phrases need to be written down and re-entered manually. Alternatively, you can store the seed phrase on an unencrypted SD card or use SeedQR for easy import.
Since the seed phrase is not stored, the owner can create multiple MULTI SIGNATUR Wallets with only one device. Or act as "UNCLE JIM" and help family and friends set up a secure, watch-only wallet. Sharing the device requires minimal trust as the device could be tampered with.
One of the key features of the Specter DIY is its ability to integrate very transparent REAL-WORLD RANDOMNESS into seed phrase generation, such as by flipping coins. This helps safeguard against all potential attacks associated with weak seed entropy.
With BIP85 support, users can derive multiple child seeds from a single master seed. This feature is particularly useful for those managing multiple Bitcoin wallets, simplifying seed management for less important Seedphrases as well.

There is a different attitude from Nostr when updates are released compared to Bluesky, everyone there is still enthusiastic, on Nostr ah ok but this is missing oh but this is missing or but support this other one, or but * zap, wait a minute, keep calm 🙇♂️, I'm the first to do this. (The revolt of the developers)
Deletetion: Client that have relay paired can do delete, more intelligently, Perhaps you can think of a delete.nrelay subdomain as a filter. This id is deleted. Be careful what you don't want to do. Maybe a session with a psychologist is better, because then you find yourself doing what you said you didn't want to do.
Does it make sense to follow someone on Bluesky? In my opinion no, or better yet yes. There are several algorithms on Bluesky, which do their job well. In the end it's just a matter of arranging them better on the screen. Yes you can have lists to save someone, but then you read everything, so lists with algorithm seems like a next feature. this way they can keep the following small, almost minimal, because there are algorithms that work for the user. People will start writing for SEO algorithm and AI and other things, which tech gurus really like and so on. The fact that it is almost exclusively an app will greatly facilitate this trend, there will be almost no need for moderation, and you can get it all in just a few apps. (Great)
Oh yegorpetrov has abandoned. Pegorpetrov said that he is coming back 😌 It might be an invention but I'm a little heartened by it.
Bankify, a new wallet of super testnet, only for crush testers.
You can't stream on zap stream without reach, maybe it's better audio space. Contact someone maybe an influencer or Nostr elite or whatever. Open Source Justice Foundation streaming
Designer, I wanted to propose comment on wikifreedia nielliesmons article and follow #nostrdesign, but too many answers for today. NVK note is ~~mainstream~~
I think I'm not suited to Nostr.
Nostr-ava bike file geo tag sharing. (NIP-113) Sebastix doesn't respond, I must have done something bad to him, or maybe I'm stressing him too much. Finally he replied 🤙. In the end maybe, I have too much hype about this proposal and it's something I don't know maybe, but maybe if they were already doing something with geo tags it's better to say so.
Another birthday, less cypher more punk 😌
Usdt on Nostr, there must be some error. (freeform app)
USDT on tron is like Money. (Bitcoiner not really)
Privacy issue, deletion motion, or deletion request, go go.
Nip29 hype, i don't have hype at all. I'm tired of words, I record a podcast on Nostr. Let's see if I can do it, at least think it. (It's more of a workflow thing than actually something I would do)
- Create an npub (easy)
- Record the audio episode (I think I can do it). Terrible audio
- Loading on a Nostrhosting, if less than 10 MB it should go smoothly.
- Publish the video or audio of the episode on some Nostr client, perhaps using blastr relay 😞.
- Do the nostree link, by putting the episode, and also the npub.pro and put the URL on café-society. 6) Publish all these links on the Main profile, saying that, made a podcast about Nostr in Nostr of nostr. 😂
I thought a client could have poll, form, spreadsheet, collaboration document. It's the kind of otherstuff we want to see. Something that goes beyond a normal feed.
Emoj on bluesky, Eventually also zap 🥜 link emoj Blue
Eventually there will be a developer revolt And they will only do a social network in their downtime, they will call it Nostr.
There is a storm, Nostr does not work in 4g with two bars. Or now 4G is gone too.
Yakihonne Smart widgets, something to try on the weekend.
-
@ 862fda7e:02a8268b
2024-09-04 01:45:14It is true that I often dream about James Corbett from CorbettReport.com. Somehow James is always finding his way to my mind. James Corbett intimidates me, I feel like he would heavily dislike me because I am not serious enough. Anytime I see James Corbett smile or laugh it feels like I'm watching an alien try to be human. I wish James the best with his family life and career, but he looks like he is always one second away from either crying hyterically or beating a defensless Japanese man sensless. I am indreasibly grateful for all the hard work he's put out all these years, he's a great person in the truth circle. However, he's like a caracatiure in my head. Anytime he whips out his guitar, I start to cringe. I just know what's about to come will only be the truth about how bad his singing is. But yet, I still love when he plays his guitar. It's awful in a great way, it brings genuine joy to me. Did you know he has a band? He has one song called "Screw Youtube", and in his music video he was sitting on this tall wooden fence and he was wearing these SHORTS WITH SANDALS and he was SWINGING HIS LEGS. I'm sorry, but I expect James to wear white caykies at all times. It felt so gross to see his legs in that state. But then again, here I am getting genuine joy out of seeing that atrosity.
I remember one time watching a James Corbett episode where he has the James Evan Pilatto from MediaMonarchy.com on, and the other James always looks like he's super fucking cracked up. Like he has a ton of energy. Well anyways, one time the other James was his usual self, looking super cracked out excited, talking about the reppies (reptilians) and James Corbett looked so tight lipped, red faced, like he was about to burst out crying. It was so funny to see the two polar opposites, the other James totally oblivious that real James looked like he was about to cry for seemingly no reason. I know this sounds mean of me to say, but I really appreciate these guys for all they do. I just think this is funny.
Anyways, I have a lot of dreams with James Corbett in them. I think it's because he's a teacher and my vagina has a fondness for male teachers. Sadly, none of my good looking male teachers never slept with me. That being said, I think James is good looking for possibly being an English teacher in Japan. I would let him teach me about the reptilians and Klaus Schwab, just let the teaching session see where it goes. Would his gap teeth feel good over my clitty? I dunno.
Okay but here is the most memorable and hilarious dream I had invovling James Corbett. You know how he makes content very often? One day he got extremely fed up with making videos. At the time I think it's because he mentioned in a video how he was annoyed that people kept saying him and Andrew Caufman. So one day he just flipped out, got extremely angry, made one last video saying how he was never coming back and how he's leaving his wife and kids. He deletes everything and is unheard of for months. A few months pass and he uploads a new video. The new video is James obsessively showing and talking about his highly advanced chicken coop he made in Minecraft. He had hundreds of chickens lined up maybe 80 feet in the air, each chicken had a 1x1 square to fit in. Below the chicken was a long tube in which their egg would drop down, and a catcher at the base of the ground. James was fantically showing this contraption, rocking back and forth, had a headset on. He looked awful too. I actually emailed James Corbett about this dream, but he never responded.
Speaking of James Corbett, why do so many people look like him? I feel like they make middle aged bald, bearded men in a DUMB and just release them into the wild, but give them balding genetics so they know how to keep track of them. Like they probably made James Corbett and Andrew Caufman from the same test tube. They fucked up with them, at least like give one of them hair or good eyesight.
-
@ 3b7fc823:e194354f
2024-09-04 01:33:21Nyms, Personas, and Digital Identity
GHOSTn
If you want #privacy then embrace compartmentlization and obscuration in your digital life. Get used to having multiple identities that you can switch between for various needs.
Your legal "matrix" name that pays taxes and has no controversal opinions or associations. Don't try to obscure this person. They are a open book. Put your best foot forward. Show them what you want them to see.
Your private online persona. You let your hair down, have hot takes on social media, purchase legal but potentially embarrassing items or just have hobbies and associations that you are not ashamed of but don't want to advertise for some reason. You use a VPN and no kyc sudo anonymous accounts. Have fun but don't go crazy, know that on a long enough timeline this persona will be linked back to you. The more connections and data that you put out there the easier this will be.
Your anonymous nym that only uses #tor, VMs, hidden drives, and rarely used accounts. Plausible deniability is baked in. Used by dissidents, freedom fights, truth to power, and anyone in oppressive regimes.
Finally you have your Nemo. This person does not exist. No name, no files and only uses #Tails or disposable systems that does not leave a trace. Not everyone would ever have a need for a Nemo but it is good to know how to just in case you ever do.
-
@ 3b7fc823:e194354f
2024-09-04 00:26:48Encryption is the promethium fire that the cypherpunks secured from heaven for me and you. It is our sacred duty to use and advance that in the world. Encryption is so powerful that governments tried to keep it away from the people and to this day have tried to weaken and backdoor it at every turn.
So what is encryption?
It is a deep deep rabbit hole and involves a lot of numbers but in a nutshell it uses math to scramble up the data of your file so it is gibberish and can't be read without decrypting it back to regular data. Encryption technology has continued to advance over time and cracking technology to break the encryption has as well. For our purposes all you really need to remember is to use modern cyphers and your encryption is really only going to be as good as the password (use a passphrase) strength you are using to lock it down with.
BEGINNER LEVEL - Encrypt your phone and computer.
People walk around with their whole lives on their phone. Protect it.
-phone: Congratulations, if you already have a lock screen set on either your iPhone or Android device then device encryption is enabled. If your lock screen password is only 4 digits then we still have work to do. Four digits is only about 10,000 combinations and fairly easy to crack. I believe it only took them about 40 minutes to crack the iPhone of the attempted Trump shooter. Go into settings and set it up for 6 digits or for extra credit use a alphanumeric password.
After your phone then your personal computer probably has the most important data to you. Banking records, tax documents, photos, etc. Encrypt your drive.
-Windows: from Settings, select Privacy security -> Device encryption. Just follow the prompts.
-Apple: from Apple icon, select System Preferences -> Security & Privacy icon. Click "Turn On FileVault".
-Linux: most distros gives you the option during installation. If you didn't do so then search for how to enable it after the fact based on your distribution.
Awesome sauce. You have achieved minimum status.
ADVANCED LEVEL - Encrypt individual files.
You already encrypted your computer but guess what, once you start up your computer and log in the key is stored in RAM for as long as it stays on. The beginner level encryption protects your computer when it is off and it means no one can just steal your hard drive and access your files. This is good, but what if someone grabs you while you're sitting there working on it? What if you leave it in sleep mode and not turned off? Then that whole disk encryption is not really going to help you.
What if you had individual files that you consider more secret than the others? That finance spreadsheet or that special pic your spouse sent you? That's where individual file encryption comes in. You are just scrolling nostr when they grab you, your computer is on, and unlocked, but those special files are still safely encrypted.
I will share with you one of my favorite small programs: Picocrypt.
Download the Paranoid pack and store it in multiple drives, email accounts, and cloud storage. That way you will always have a copy to decrypt any files that you stored away.
Use it to encrypt any files that you feel need extra attention. It is also very useful for encrypting any files that you intend to store online in cloud storage. You do encrypt your files that are stored online don't you? Yes, even with the company that offers "encrypted" storage. Don't trust their encryption, use your own.
EXPERT LEVEL - Encrypt containers and hidden containers.
What if you want to encrypt several files and keep them all together in like a folder or container? That's where Veracrypt comes in. Free, open source, cross platform, and powerful.
Veracrypt allows you to create encrypted containers from any file that act like individual drives that can be mounted or unmounted as needed. You can name these files anything that you want, move them around or delete like any file, and make as many as you want. This allows you to have compartmentation of your files and drives.
Next trick, Veracrypt allows you to create a hidden container inside that container. Enter one passphrase and you open the encrypted container. Enter a different passphrase and you open a different hidden container.
This allows deniability. When they grab you and start pulling your fingernails off until you tell them the password to open the encrypted container, give it to them. They don't have to know that there is another hidden one under that.
These features allow you to do all sorts of interesting things only limited by your need and imagination.
What if you have a container named as some random config file in your /etc folder? What if you just encrypted a removable storage drive? What if you have multiple hard drives on your computer that have multiple containers and hidden containers? What if you have a hidden container that can only be accessed from booting up in a amnesiac OS like Tails leaving no trace that the files exist or trail that they were ever accessed? Go crazy, have fun.
NEMO - Failsafe
Nemo has no files, encrypted or otherwise. If they did you couldn't prove it. Nemo does use something like Tails that retains no memory from boot to boot.
Nemo also uses a failsafe. A simple lanyard attached to the flashdrive running the OS and the other end around their wrist while they work. When you try to separate them from the computer the flashdrive pulls out and everything is gone.
Using these programs you can create a layered and compartmentlized approach to your encryption scheme. There are also plenty of other encryption programs to check out such as Cryptomator, AES Crypt, etc
Last point and most important: Encryption is only as good as the passphrase you use to lock it down. Use a shitty password and it doesn't matter how uncrackable your encryption is.
-
@ be39043c:4a573ca3
2024-09-03 22:54:46Over ten years ago, when I visited Japan, I met a woman from the U.S. When we were chatting about books, I learned from her that a well-known best seller book, I had once read, was written by a ghost writer. She knew the writer who did it.
I believed what she said as she had no reason to lie. Also, because I remembered that I had a weird feeling when I read the book. Although I mostly liked the contents, something was totally off. It was not "off" in a sense that writing was not good. It was weird because it was too well-written.
This book is a non-fiction book about certain ideas. The writing of a non-fiction book that explains an author's ideas can become clanky as the author struggles to delineate their thoughts. One knows something is different from whether one can write them. But, the book was very very well-written and well-explained with a lot of reference points.
Probably partly because the elegance of writing and examples, it has been sold and continue to be sold today all over the world.
Well, I know now the author only provided the ideas and someone else put them together.
The ghost writer was a fiction writer that could write very well. The book is so well put-together because of his skill. He was not credited as a contributor, I believe.
Whether it is written by a ghost writer, the book is still a good book. But, to know that the book is not written by the author whose name was on the cover page disappoints me. Who writes the book is important for readers.
Now it is 2024. Things are much more complex because AI can write or put together ideas for humans.
For instance, I read a very funny and well-written short fiction on someone's blog yesterday. I was impressed and commented about that.
This morning, it suddenly hit me, he may have used AI to create the piece. This creator posts his long writing mostly every day. He also work full time, he says. I had wondered before he might be using ChatGPT to create contents.
ChatGPT can write nice short stories: we see such examples online. I have read a story for children ChatGPT created. It was a complex and intriguing story
If we don't like parts of AI writing, we can edit it. It is quicker than writing from scratch,
There is no way to know the particular fiction that I read was written by AI but it is possible.
Whether it was created fully by a human or AI or both, the good writing is still a good writing. Maybe, I am thinking too much here?
Not really, in my view. Who writes still matters to me.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 46fcbe30:6bd8ce4d
2024-08-16 19:29:04Opinion about BitWallet - Buy & Sell Bitcoin (android)
On trustpilot, 20% of reviews are complaining about KYC only after trying to withdraw, with some claims of outright disappearing money.
WalletScrutiny #nostrOpinion
-
@ dd664d5e:5633d319
2024-08-15 20:52:04Here's how people use OtherStuff apps.
1) They usually go there to write or post, not to read or view, unless someone they closely follow wrote about it in a Kind 01 note, SimpleX chat, Slack Channel, Telegram group, etc.
2) While they are there, they sometimes look around at what their frens have posted, zap them, leave a comment or a reply, etc. Sometimes they spend hours there. They really like it!
3) Then they leave.
4) If someone responds to anything they posted or wrote there, with anything other than a Kind 01 reply, they do not know about it, because it does not show up in their normal feed or notifications.
5) They do not come back until 1) happens again.
-
@ da18e986:3a0d9851
2024-08-14 13:58:24After months of development I am excited to officially announce the first version of DVMDash (v0.1). DVMDash is a monitoring and debugging tool for all Data Vending Machine (DVM) activity on Nostr. The website is live at https://dvmdash.live and the code is available on Github.
Data Vending Machines (NIP-90) offload computationally expensive tasks from relays and clients in a decentralized, free-market manner. They are especially useful for AI tools, algorithmic processing of user’s feeds, and many other use cases.
The long term goal of DVMDash is to become 1) a place to easily see what’s happening in the DVM ecosystem with metrics and graphs, and 2) provide real-time tools to help developers monitor, debug, and improve their DVMs.
DVMDash aims to enable users to answer these types of questions at a glance: * What’s the most popular DVM right now? * How much money is being paid to image generation DVMs? * Is any DVM down at the moment? When was the last time that DVM completed a task? * Have any DVMs failed to deliver after accepting payment? Did they refund that payment? * How long does it take this DVM to respond? * For task X, what’s the average amount of time it takes for a DVM to complete the task? * … and more
For developers working with DVMs there is now a visual, graph based tool that shows DVM-chain activity. DVMs have already started calling other DVMs to assist with work. Soon, we will have humans in the loop monitoring DVM activity, or completing tasks themselves. The activity trace of which DVM is being called as part of a sub-task from another DVM will become complicated, especially because these decisions will be made at run-time and are not known ahead of time. Building a tool to help users and developers understand where a DVM is in this activity trace, whether it’s gotten stuck or is just taking a long time, will be invaluable. For now, the website only shows 1 step of a dvm chain from a user's request.
One of the main designs for the site is that it is highly clickable, meaning whenever you see a DVM, Kind, User, or Event ID, you can click it and open that up in a new page to inspect it.
Another aspect of this website is that it should be fast. If you submit a DVM request, you should see it in DVMDash within seconds, as well as events from DVMs interacting with your request. I have attempted to obtain DVM events from relays as quickly as possible and compute metrics over them within seconds.
This project makes use of a nosql database and graph database, currently set to use mongo db and neo4j, for which there are free, community versions that can be run locally.
Finally, I’m grateful to nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f for supporting this project.
Features in v0.1:
Global Network Metrics:
This page shows the following metrics: - DVM Requests: Number of unencrypted DVM requests (kind 5000-5999) - DVM Results: Number of unencrypted DVM results (kind 6000-6999) - DVM Request Kinds Seen: Number of unique kinds in the Kind range 5000-5999 (except for known non-DVM kinds 5666 and 5969) - DVM Result Kinds Seen: Number of unique kinds in the Kind range 6000-6999 (except for known non-DVM kinds 6666 and 6969) - DVM Pub Keys Seen: Number of unique pub keys that have written a kind 6000-6999 (except for known non-DVM kinds) or have published a kind 31990 event that specifies a ‘k’ tag value between 5000-5999 - DVM Profiles (NIP-89) Seen: Number of 31990 that have a ‘k’ tag value for kind 5000-5999 - Most Popular DVM: The DVM that has produced the most result events (kind 6000-6999) - Most Popular Kind: The Kind in range 5000-5999 that has the most requests by users. - 24 hr DVM Requests: Number of kind 5000-5999 events created in the last 24 hrs - 24 hr DVM Results: Number of kind 6000-6999 events created in the last 24 hours - 1 week DVM Requests: Number of kind 5000-5999 events created in the last week - 1 week DVM Results: Number of kind 6000-6999 events created in the last week - Unique Users of DVMs: Number of unique pubkeys of kind 5000-5999 events - Total Sats Paid to DVMs: - This is an estimate. - This value is likely a lower bound as it does not take into consideration subscriptions paid to DVMs - This is calculated by counting the values of all invoices where: - A DVM published a kind 7000 event requesting payment and containing an invoice - The DVM later provided a DVM Result for the same job for which it requested payment. - The assumption is that the invoice was paid, otherwise the DVM would not have done the work - Note that because there are multiple ways to pay a DVM such as lightning invoices, ecash, and subscriptions, there is no guaranteed way to know whether a DVM has been paid. Additionally, there is no way to know that a DVM completed the job because some DVMs may not publish a final result event and instead send the user a DM or take some other kind of action.
Recent Requests:
This page shows the most recent 3 events per kind, sorted by created date. You should always be able to find the last 3 events here of all DVM kinds.
DVM Browser:
This page will either show a profile of a specific DVM, or when no DVM is given in the url, it will show a table of all DVMs with some high level stats. Users can click on a DVM in the table to load the DVM specific page.
Kind Browser:
This page will either show data on a specific kind including all DVMs that have performed jobs of that kind, or when no kind is given, it will show a table summarizing activity across all Kinds.
Debug:
This page shows the graph based visualization of all events, users, and DVMs involved in a single job as well as a table of all events in order from oldest to newest. When no event is given, this page shows the 200 most recent events where the user can click on an event in order to debug that job. The graph-based visualization allows the user to zoom in and out and move around the graph, as well as double click on any node in the graph (except invoices) to open up that event, user, or dvm in a new page.
Playground:
This page is currently under development and may not work at the moment. If it does work, in the current state you can login with NIP-07 extension and broadcast a 5050 event with some text and then the page will show you events from DVMs. This page will be used to interact with DVMs live. A current good alternative to this feature, for some but not all kinds, is https://vendata.io/.
Looking to the Future
I originally built DVMDash out of Fear-of-Missing-Out (FOMO); I wanted to make AI systems that were comprised of DVMs but my day job was taking up a lot of my time. I needed to know when someone was performing a new task or launching a new AI or Nostr tool!
I have a long list of DVMs and Agents I hope to build and I needed DVMDash to help me do it; I hope it helps you achieve your goals with Nostr, DVMs, and even AI. To this end, I wish for this tool to be useful to others, so if you would like a feature, please submit a git issue here or note me on Nostr!
Immediate Next Steps:
- Refactoring code and removing code that is no longer used
- Improve documentation to run the project locally
- Adding a metric for number of encrypted requests
- Adding a metric for number of encrypted results
Long Term Goals:
- Add more metrics based on community feedback
- Add plots showing metrics over time
- Add support for showing a multi-dvm chain in the graph based visualizer
- Add a real-time mode where the pages will auto update (currently the user must refresh the page)
- ... Add support for user requested features!
Acknowledgements
There are some fantastic people working in the DVM space right now. Thank you to nostr:npub1drvpzev3syqt0kjrls50050uzf25gehpz9vgdw08hvex7e0vgfeq0eseet for making python bindings for nostr_sdk and for the recent asyncio upgrades! Thank you to nostr:npub1nxa4tywfz9nqp7z9zp7nr7d4nchhclsf58lcqt5y782rmf2hefjquaa6q8 for answering lots of questions about DVMs and for making the nostrdvm library. Thank you to nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft for making the original DVM NIP and vendata.io which I use all the time for testing!
P.S. I rushed to get this out in time for Nostriga 2024; code refactoring will be coming :)
-
@ 30ceb64e:7f08bdf5
2024-08-14 11:51:36Heres a scenario:
Imagine you have a nostr e-cash/Lightning Wallet and you would like to have a maximum receive balance of 20k split in between 5 mints that enable multipath payments.
Pick 5 mints below to store 4k sats each, the funds are automatically withdrawn to your lightning node at the end of the day.
Stacker News Robosats Sparrow Coinkite Start9 Rabbit Hole Recap @siggy47 Damus LND Your own mint
originally posted at https://stacker.news/items/648298
-
@ 8cb60e21:5f2deaea
2024-09-03 22:26:25 -
@ 8cb60e21:5f2deaea
2024-09-03 22:26:25 -
@ 30ceb64e:7f08bdf5
2024-08-14 11:15:27It's wild. I just proved I can build #nostr 'wallet' where I can store the encrypted tokens in a Germany relay and make the lightning payment out of a Singapore mint. All using a #nsec that never leaves my machine. https://primal.net/e/note15l02rf4r474ck04mlrxxfagyl0z6t04ltsugf9dtph4xxhzfnd4sqpk74n
I’ve proven to myself that a #nostr wallet can exist across time and space, independently of any one app, server or custodian. The only thing which controls the ‘wallet’ is the generation and control of an #nsec which is free to exist within or flee any jurisdiction.
In my mind, this lays to rest the notion that a wallet needs to be an app, service, or anything that can be captured commercially or by the state. https://primal.net/e/note13nwsh852x9tfex2jade6vwymhhct8zussxr4zwy7uag24hjc9stq0xsxaf
https://image.nostr.build/07dd1b56d6bb60b13cfe6c19d9384bc3ef198d01af4be9a5c544f791b80b746a.png
I am thinking about coining the term “nsac” to refer to a wallet-like thing that can exist on #nostr holding your valuable things, such as ecash tokens. I have already implemented a prototype #cashu ecash wallet which looks to be promising.
So you would have:
npub - your identity
nsec - your private key
nsac - your valuables
Your #nsac could be the same as your #nsec but better case is to generate as many #nsacs as required.
Happy to hear feedback!
For reference, what a ‘sac’ is in the biological sense:
A sac is a biological term referring to a pouch or cavity in an organism that is typically enclosed and may contain fluid, air, or other substances. Sacs can serve various functions depending on their location and role in the body, such as protecting a developing embryo, facilitating the exchange of gases in the lungs, or reducing friction between moving parts in joints
https://primal.net/e/note1snj7y9m6f7lhfzkd2ujzqcvparpgddzmgcgwsgghqvkcyd0rkqhsmmlyla
npub1q6mcr8tlr3l4gus3sfnw6772s7zae6hqncmw5wj27ejud5wcxf7q0nx7d5
Wild stuff freaks, will nostr become the best lightning/E-Cash wallet? Let me know what you think.
originally posted at https://stacker.news/items/648270
-
@ 8cb60e21:5f2deaea
2024-09-03 21:58:26Lesson 3: Arrays, Objects, and Callbacks
Arrays: Lists of Things
Arrays are ordered lists of values. They're perfect for storing multiple related items, like a list of your favorite cat toys:
javascript var catToys = ["mouse", "ball", "laser pointer"]; console.log(catToys[0]); // Prints "mouse"
Objects: Grouping Related Information
Objects allow you to group related information together. They're like detailed profiles for each of your cat friends:
```javascript var myCat = { name: "Fluffy", age: 3, favoriteFood: "tuna" };
console.log(myCat.name); // Prints "Fluffy" ```
Callbacks: Doing Things Later
Callbacks are functions that are executed after another function has finished. They're useful for handling asynchronous operations, like waiting for your cat to finish eating before giving it a treat:
```javascript function feedCat(callback) { console.log("Feeding the cat..."); setTimeout(function() { console.log("Cat has finished eating!"); callback(); }, 2000); }
feedCat(function() { console.log("Time for a treat!"); }); ```
This code simulates feeding a cat, waiting 2 seconds, and then giving it a treat.
Remember, learning JavaScript is a journey. Take your time, practice regularly, and soon you'll be coding like a pro cat!