-
@ 862fda7e:02a8268b
2024-09-24 01:14:40The media, government, and "elite" (who are only elite in this low vibration illusion we call "life") are afraid of people like me because I do not accept the reality they have forced us into. My manifesto is an attempt to wake you up from ideas you have been conditioned into believing because it benefits one class - the protected class known as the "elite".
The elite would like to have you believe that my message is something crafted from hatred and they would like to label me with mental issues. They would like you to think I am some crazy extremist who wants to advocate for the harm of others. They would like you to think that I am enciting violence.
This could not be further from the truth.
I am not and will never be an extremist, white supermicist, terrorist, radical, hateful human being. I do not believe in killing in order to convey a message or movement. I do not believe in division.
I only advocate that you become conscious of the reality around us. The reality is that this is a world controlled by the most evil, controlling, destructive freaks. These people work to make sure we are essentially slaves to a system that benefits those who created the system - the elites. Let me make this clear: I do NOT advocate for violence, destruction, death, killing, murder, hatred, division, or terrorism. The elite are threatened by people like me, because they know that we know their game. We know their plans are to destroy, to advocate for violence, to kill, murder, to encite hatred and division. This is all the elite do - they cannot fathom having people live in peace because it isn't beneficial if you want to control the world.
So while you may think it's impossible there is a group of a few evil people who control the world - look back at history. It has always been littered with the few evil who control the many. It would be stupid to think it would be different
-
@ 599f67f7:21fb3ea9
2024-09-19 08:27:12¿Qué es una dirección Lightning o Lightning address?
Una dirección Lightning es una dirección que visualmente se asemeja a una dirección de correo electrónico legible para los humanos, por ejemplo usuario@dominio.com pero que en realidad te permite recibir pagos en bitcoin instantáneos y económicos, sin la necesidad de tener un nodo en linea en tu dispositivo ni tener que generar facturas de forma manual cada vez que alguien te quiere hacer un pago.
¿Suena bien no?
¿Y cómo funciona?
Funciona utilizando el protocolo de pago LNURL.
Aquí se muestra un sencillo esquema de lo que ocurre en segundo plano.
En resumen, cuando otro usuario quiere pagarte usando tu dirección Lightning, tu billetera convierte la dirección Lightning en una solicitud de pago LNURL. Luego se utiliza esa solicitud de pago LNURL exitosa para obtener una factura BOLT11.
💡 Dirección Lightning > LNURLp > Factura BOLT 11.
Suena bien, pero ¿cuál es el problema?
Por el momento, muchas de las implementaciones de Lightning Address son de custodia, porque se necesita un dominio para que Lightning Address funcione y un nodo que esté siempre en línea para recibir los pagos. Debido a que es de custodia, el custodio puede atacarte en cualquier momento y monitorear tus transacciones.
Tienes que confiar en el propietario del dominio para no cambiar el registro de tu dirección Lightning. Y no funciona si el servidor LNURL no está en línea.
Bitcoin Txoko ofrece una sencilla solución de Lightning Address respaldada por LNbits. Esto también es de custodia, así que por favor mantén solo una pequeña cantidad en tu billetera Bitcoin Txoko y ve retirando a tu billetera de autocustodia a medida que recibas más sats.
Estoy listo, ¿qué necesito para empezar?
¡Todo lo que necesitas es un teléfono móvil o un ordenador y una conexión a Internet!
1. Creando tu billetera
Si aún no lo has hecho, navega a https://bitcointxoko.com y crea una nueva billetera. Puedes elegir el nombre que quieras.
2. Activar extensiones
Hace falta la extensión
Pay Links
para que las direcciones Lightning funcionen.Abre
Extensiones
en la barra de herramientas y activaPay Links
.3. Creando tu enlace de pago
-
En a la extensión
Pay Links
, haz clic enNew Pay Link
. -
Elige la billetera que has creado.
-
Para la descripción del artículo, puedes escribir lo que quieras.
-
Elige un nombre de usuario de tu dirección Lightning. Tu dirección Lightning se verá como
username@bitcointxoko.com
. -
Desmarque
Fixed amount
y cambia el valor mínimo a 1 y el valor máximo a 500000.
⚠️ También puedes cambiar el valor máximo a algo más alto, pero es más probable que los pagos más grandes fallen debido a la limitada capacidad de entrada del nodo Lightning de Bitcoin Txoko. Así que recomendamos mantenerlo en 500000 sats.
-
Ahora abre
Advanced options
y cambiaComment maximum characters
a 799. Este paso no es necesario pero permite más funcionalidades más adelante. -
Marca
Enable nostr zaps
en la parte inferior, para que puedas utilizar tu dirección Lightning para recibir zaps. -
Las demás opciones avanzadas son opcionales, puedes configurarlas si quieres o dejarlas en blanco.
Al final debería verse algo así.
- Cuando hayas comprobado que todo es correcto, sigue adelante y haz clic en
Create Pay Link
.
Probando
Puedes probar si tu nueva dirección Lightning funciona yendo a otra cartera, pulsando en
Enviar
y escribiendo tu dirección Lightning como destino, y luego enviándote una pequeña cantidad de sats.Vuelve a tu billetera Bitcoin Txoko y comprueba si has recibido tu propio pago. Es posible que tengas que actualizar la página.
Si todo funcionó correctamente, ¡enhorabuena! 🥳
Si no es así, háznoslo saber. Siempre estamos aquí para ayudar.
Próximos pasos
Nostr zaps
Puedes añadir tu dirección Bitcoin Txoko Lightning a tu perfil de nostr y usarla para recibir zaps. Normalmente, esto se hace yendo a
Perfil
>Editar
>Dirección Lightning
y cambiando la dirección Lightning.LNDhub
Puedes importar tu billetera LNbits como un LNDhub en tu teléfono utilizando una aplicación como Zeus o BlueWallet, en lugar de visitar la billetera en el navegador cada vez que desees comprobar tu saldo o realizar un pago. Echa un vistazo a nostr:naddr1qvzqqqr4gupzqkvlvlma7a55ccp6d5rrdc27h3ssmdmael286mjaq5uxmqslk04fqqxnzd3exuerqdfkxccnyv3cs0uvul sobre cómo hacer esto.
Código QR
También puedes compartir o imprimir tu código QR LNURLp para que la gente pueda escanearlo fácilmente con sus teléfonos. ¡Muy útil si estás introduciendo bitcoin a tu comerciante local favorito para que pueda recibir propinas Lightning!
Simplemente comparte el enlace a tu página compartida, o imprime el código QR como PDF yendo a
View Link
>Print
. -
-
@ 17538dc2:71ed77c4
2024-09-16 15:26:32Quiztime
Oil and gas
Oil and gas is naturally occurring. The prevalent worldview is that oil & gas has a biotic origin. There are real world examples of abiotic oil deposits, which proponents of the status quo have a difficult time reconciling.
Irregardless, when oil & gas is burned, it simply turns to plant food (carbon dioxide + water).
Oil and gas greens the Earth, and increases fertilization and agricultural crop yield across the globe.
The energy density of oil and gas is only surpassed by that of nuclear power.
Energy produced by oil and gas combustion is generally on-demand, reliable, economically storable & transportable.
Solar
The sun is an abudant energy source, which keeps Earth warm, and alive. Thank you sun 🌞!
With the exception of places such as the UK, where it is unclear if inhabitants have ever seen the sun, solar rays keep plants, animals, and humans happy & alive on most of planet Earth.
Inventions such as solar panels harness the sun's energy, and convert it to electricity.
Solar panels consist of silicon, rare earth metals, and require toxic metals.
Solar panels have an expected life of decades, are not readily or economically recyclable.
A very low solar energy density practically means that land is inefficiently utilized in solar energy production. Solar used on arable land can no longer be farmed, and where no plains exist solar is known to cause deforestation and landslides.
Solar energy is not reliable, not can it be summoned on demand. Solar energy is not economically storable, and is many cases is not produced at the point of demand.
Despite central planner mandates & subsidies in the US, the #EULAG and elsewhere, due to its intermittent nature, solar power cannot be counted on to replace reliable power generation in nuclear, hydro, or carbon fuel thermoelectric plants.
What this means is that solar does not replace, and yet ratheradds to reliable energy generation, as most people in the developed world would not be OK with having electricity for at most 1/3 of the day. This increases the price of electricity, which in turn increases energy poverty, and drives businesses to shut down manufacturing, or move to a more energy competitive jurisdiction.
The capital wasted by central planners could have been used to reduce burden on consumers, and businesses, or fund healthcare, infrastructure, or other services.
It should be noted that off grid applications where there is no grid, or energy alternatives can be massively useful for folks otherwise without electricity.
Which energy source would you consider renewable?
-
@ 862fda7e:02a8268b
2024-09-16 22:59:38I was in some sort of nice romantic building and I met this nicer middle aged blonde woman who looked a lot like one of my old teachers. We got to chatting and things started moving quickly, we were going to have sexy lesbian sex but she told me she wanted me to shave my vagina before we started. I said fine, went to a bathroom and started shaving. If it meant I was going to slang some tang, I was gonna do it. It took me a long time to complete this daunting task, as I've mantioned many times before, I have a very thick and dense bush. I also wanted to make sure no hair was left behind, if my sweet lesbian lover saw that I had a hair on my vagina, she would probably freak out and call me disgusting for having a feature that naturally grows on me.
Anyways, I finished shaving my vagina and went to go meet her. Sadly, she decided to not have lesbian sex with me anymore since I took too long and she had some time to think about it. I got screwed without getting screwed. And now I had a gross hairless vagina.
I think I know why this dream occured. It's because my so called "fans" have judged me on my fan page for having hair on my vagina. Yes, I sometimes maintain it and keep it trimmed, sometimes. But sometimes I just let it go if I'm too lazy. Now the lesbians in my dreams want me to shave, and even at that, they still don't want to have sex with me. One time I remember cumming from a wet dream I had, which is very rare for me to do. I was watching 2 Japanese chicks dressed up in the school girl uniform scissor, and I remember waking up with a hard clit and it pulsated. I felt embarassed waking up, because I didn't even voluntarily masturbate but I still climaxed.
-
@ 592295cf:413a0db9
2024-09-14 18:13:4109 09 week
The billboard has reached its first goal.
I don't understand anything, too much.
The web is a dangerous place, maybe the couch at home is for you.
Nostr is like being in a public place like a bar and you listen to the radio, and you can decide which radio to choose, you can also talk on the radio, only those who follow you and those who are connected to that frequency can listen to you.
We talk on multiple frequencies so if one is offline they can hear me on the other.
Spam will always be a constant as are fixed costs, personnel costs, taxes things that people in general hate
A lot of talk that will be blown away by the wind.
Jack Dorsey says Nostr will be a protocol for private encrypted chats
-
Open-sats drama
-
Carnivore dietitian
-
Lightning diatribe
-
This is already Twitter 😉
Fiatjaf explained for the umpteenth time what the outbox model is, now those who look at images instead of reading books must have understood it too. My note, Patricia writes in her relays write, including select some in her outbox 10002 kind. it was a dev page of something, so maybe it won't be online for long
Thinking that with Kamala Harris's victory, the price of Bitcoin would hit a low and holders would be happy to buy. 🤣🤣 Instead with Trump new all time High, holders would be happy. 🤣🤣 Lol Moment.
I read the article about btcmap maps, there were some notes to make but I didn't, it's beyond my level, it was only for builders.
Satlantis, trustroots, and wherostr were not noted.
I had this thought that we will not "succeed" in building the openness of type 1, in the following nips, because of the relays and because discovering new things has a cost, and no one wants to discover new things. And then after that the others should use them, but how and after that at least two others appear who are doing a similar thing, but they don't talk to each other because they don't have time.
If the time horizon is 10 years, those who survive will see.
Keeping calm seems difficult.
I tried nostr-relay-tray works. It works, I would suggest a couple of changes
- Delete some events.
- View events
- Search by npub id or time
- Delete by time.
These are difficult things but they can be done with a database, so they may as well not be done.
I hope that all the controversies are forgotten and overcome and we are more serene.
-
-
@ 42342239:1d80db24
2024-09-02 12:08:29The ongoing debate surrounding freedom of expression may revolve more around determining who gets to control the dissemination of information rather than any claimed notion of safeguarding democracy. Similarities can be identified from 500 years ago, following the invention of the printing press.
What has been will be again, what has been done will be done again; there is nothing new under the sun.
-- Ecclesiastes 1:9
The debate over freedom of expression and its limits continues to rage on. In the UK, citizens are being arrested for sharing humouristic images. In Ireland, it may soon become illegal to possess "reckless" memes. Australia is trying to get X to hide information. Venezuela's Maduro blocked X earlier this year, as did a judge on Brazil's Supreme Court. In the US, a citizen has been imprisoned for spreading misleading material following a controversial court ruling. In Germany, the police are searching for a social media user who called a politician overweight. Many are also expressing concerns about deep fakes (AI-generated videos, images, or audio that are designed to deceive).
These questions are not new, however. What we perceive as new questions are often just a reflection of earlier times. After Gutenberg invented the printing press in the 15th century, there were soon hundreds of printing presses across Europe. The Church began using printing presses to mass-produce indulgences. "As soon as the coin in the coffer rings, the soul from purgatory springs" was a phrase used by a traveling monk who sold such indulgences at the time. Martin Luther questioned the reasonableness of this practice. Eventually, he posted the 95 theses on the church door in Wittenberg. He also translated the Bible into German. A short time later, his works, also mass-produced, accounted for a third of all books sold in Germany. Luther refused to recant his provocations as then determined by the Church's central authority. He was excommunicated in 1520 by the Pope and soon declared an outlaw by the Holy Roman Emperor.
This did not stop him. Instead, Luther referred to the Pope as "Pope Fart-Ass" and as the "Ass-God in Rome)". He also commissioned caricatures, such as woodcuts showing a female demon giving birth to the Pope and cardinals, of German peasants responding to a papal edict by showing the Pope their backsides and breaking wind, and more.
Gutenberg's printing presses contributed to the spread of information in a way similar to how the internet does in today's society. The Church's ability to control the flow of information was undermined, much like how newspapers, radio, and TV have partially lost this power today. The Pope excommunicated Luther, which is reminiscent of those who are de-platformed or banned from various platforms today. The Emperor declared Luther an outlaw, which is similar to how the UK's Prime Minister is imprisoning British citizens today. Luther called the Pope derogatory names, which is reminiscent of the individual who recently had the audacity to call an overweight German minister overweight.
Freedom of expression must be curtailed to combat the spread of false or harmful information in order to protect democracy, or so it is claimed. But perhaps it is more about who gets to control the flow of information?
As is often the case, there is nothing new under the sun.
-
@ a6631624:24ba1a2f
2024-09-01 21:18:15Genetics are real. They determine every meaningful aspect of a body - from physical traits to psychological ones - with environment accounting for little of a human's way of being. This is so much so that the trajectory and outcomes of a given human life are already written as soon as they're born.
Nowhere is this more apparent than in twin studies, where again and again, identical twins live virtually the same life after being separated at birth. They show that your political beliefs, your personality, your religiosity, the foods you enjoy, how many friends you have, your income level, your education level, your criminal record, the nature of your death, what you wore today, and so much more are all most likely determined, in range at least, by genetics.
But, genes do not work in isolation. They work together, playing off of and linking between each other, often with the expression of one trait inseparably tied to the expression of another and then, sometimes, yet another.
Invariably, some of these links and ties are between the expression of an internal trait and the expression of a physical trait, accounting for the reality that, in the way that we know the literal face of Down's Syndrome, the same exist - albeit much less extreme - for homosexuality, intelligence, trustworthiness, and extraversion (and many more). All of which can be consistently detected by humans in other humans merely by viewing their faces.
Furthermore, these correlations between physical traits (phenotype) and invisible traits (genotype) don't just end at the neck. Bodily aspects such as bone structure, gait, proportionality, and much more ultimately form one's very mien and, altogether, have much to say about the genetically embedded character of a given human.
All of this is to suggest that, because much of compatibility and general social chemistry is determined by the genetic outside as an indicator of the genetic inside, our bodily design and appearances matter and have very significant implications for the nature of our relationships, with whom we may have them, and the opportunities accessible to us in every other area of life due to them.
This cannot be reasonably or sustainably overridden by means of "social justice" or personal declaration. This instinctually mapped and interpreted physiognomy is so thoroughly embedded into the human social protocol that to ignore it (if you even could) would likely result in your prompt death at the hands of some guys you should've avoided. The ability to, on some level, identify the physical characteristics associated with psychological traits in other humans has evolved specifically because it increases the chances of human survival and reproduction.
It is, in fact, so fundamental and so seamlessly integrated into the being of humans as to be unnoticeable for the majority. Most cannot fathom there being a difference the internal self and the physical body because the fidelity between their own will and their own biological design is perfect. Most people simply are how they look.
The Outliers
Because humans are genetic (read: physical) creatures, we can see statistical patterns assuring us that making a number assumptions about X kind of person based on the concentration traits among those “like” them is incredibly reasonable. Even in our systems and lived lives, we see that our evolutionarily rooted snap assessments are exceedingly practical and even socially efficient.
But, there are outliers in genetic trends.
Due to either mutation, rare genetic combinations, or some more extraordinary means, outliers in this context are individuals who diverge significantly from the central psychological tendencies of their phenotype group. They may either align more closely with the characteristics of another group or occupy a distinct, individual space.
Gender and race are the two most robust, rigid, and (therefore) social impactful phenotype groups, so when there is psychological incongruence in these particular respects, the result is a social disability. A condition in which one either cannot or finds it extremely distasteful to fill the social roles associated with their appearance, yet is rejected when attempting to take on roles they’re more psychologically suited to fill due to the visual associations and/or physical limitations of their body.
Gender
For outliers in gender, this social disability has an extremely somatic edge that can entail entire body parts and functions feeling foreign and burdensome. For instance, the most common types of gender outliers – "FtM" or "FtN" – may struggle with the relative lack of physical prowess, female bodily processes, and physical features designed to attract male sexual attention - things that psychologically typical females embrace.
Bodily conditions like these often hinder gender outliers from acting and participating in their interests at a reasonable level of seriousness, ultimately leading to sub-satisfactory life outcomes and an inability to self-actualize.
This mismatch between body and self-consciousness and the difficulty of commanding respect that arises because of it means that gender outliers often find it difficult to interact comfortably with their peers and are often forced into activities and interactions that are not suitable for them in the names of conformity and, at times, safety. On the subject, their thoughts, feelings, and reactions are dismissed and devalued, rather than acknowledged as legitimate experiences.
Race
Racial outliers can be thought of as individuals with traits that have low probabilities and/or frequencies of occurrence within their breeding group. "Trans identification" is most likely to manifest when this occurs on intrinsic traits with high social relevance and for outliers in race, the big ones are intelligence, it's associated correlates, and the values born of them.
Because of this, racial outliers typically have interests and values that are looked down upon by their breeding group; have shame in regard to their breeding group's history, collective culture, and behaviors; and, for these reasons, experience ostracization by said breeding group and, even when they do not, enjoy a voluntary estrangement from them while prioritizing association with others.
Contrary to common consensus, outliers in gender and race are not necessarily suffering from mental illness or defect. Though the condition itself may result in mental illnesses in some cases and those with other issues may parade or otherwise appear as the outliers, being so is simply a natural result of the way genetics work or, from another lens, trapping Selves in bodies.
Knowing this calls for efforts to alleviate and eventually rectify the issue in a way that corrects the genetic reality and optimizes for the agency and will of the Self - the individual - in context of civilization.
Reasons why and the means of doing so will be explored in the next installment of this series.
-
@ b39b8e83:0e391257
2024-09-23 23:54:40https://image.nostr.build/54d4830e16f42daf7eeff67ddc8b19f811ea2e484ff330bcc72ad5c73a8ed447.jpg
It was a time of great and exalting excitement. The country was up in arms, the war was on, in every breast burned the holy fire of patriotism; the drums were beating, the bands playing, the toy pistols popping, the bunched firecrackers hissing and sputtering; on every hand and far down the receding and fading spreads of roofs and balconies a fluttering wilderness of flags flashed in the sun; daily the young volunteers marched down the wide avenue gay and fine in their new uniforms, the proud fathers and mothers and sisters and sweethearts cheering them with voices choked with happy emotion as they swung by; nightly the packed mass meetings listened, panting, to patriot oratory which stirred the deepest deeps of their hearts and which they interrupted at briefest intervals with cyclones of applause, the tears running down their cheeks the while; in the churches the pastors preached devotion to flag and country and invoked the God of Battles, beseeching His aid in our good cause in outpouring of fervid eloquence which moved every listener.
It was indeed a glad and gracious time, and the half dozen rash spirits that ventured to disapprove of the war and cast a doubt upon its righteousness straightway got such a stern and angry warning that for their personal safety's sake they quickly shrank out of sight and offended no more in that way.
Sunday morning came-next day the battalions would leave for the front; the church was filled; the volunteers were there, their faces alight with material dreams-visions of a stern advance, the gathering momentum, the rushing charge, the flashing sabers, the flight of the foe, the tumult, the enveloping smoke, the fierce pursuit, the surrender!-then home from the war, bronzed heros, welcomed, adored, submerged in golden seas of glory! With the volunteers sat their dear ones, proud, happy, and envied by the neighbors and friends who had no sons and brothers to send forth to the field of honor, there to win for the flag or, failing, die the noblest of noble deaths. The service proceeded; a war chapter from the Old Testament was read; the first prayer was said; it was followed by an organ burst that shook the building, and with one impulse the house rose, with glowing eyes and beating hearts, and poured out that tremendous invocation -- "God the all-terrible! Thou who ordainest, Thunder thy clarion and lightning thy sword!"
Then came the "long" prayer. None could remember the like of it for passionate pleading and moving and beautiful language. The burden of its supplication was that an ever--merciful and benignant Father of us all would watch over our noble young soldiers and aid, comfort, and encourage them in their patriotic work; bless them, shield them in His mighty hand, make them strong and confident, invincible in the bloody onset; help them to crush the foe, grant to them and to their flag and country imperishable honor and glory -
https://image.nostr.build/810192ce50f2dbb274b26c2753fe742d7fbc50fe7cd3307baf1bc2d74e5a2e14.jpg
An aged stranger entered and moved with slow and noiseless step up the main aisle, his eyes fixed upon the minister, his long body clothed in a robe that reached to his feet, his head bare, his white hair descending in a frothy cataract to his shoulders, his seamy face unnaturally pale, pale even to ghastliness. With all eyes following him and wondering, he made his silent way; without pausing, he ascended to the preacher's side and stood there, waiting. With shut lids the preacher, unconscious of his presence, continued his moving prayer, and at last finished it with the words, uttered in fervent appeal,"Bless our arms, grant us the victory, O Lord our God, Father and Protector of our land and flag!"
The stranger touched his arm, motioned him to step aside -- which the startled minister did -- and took his place. During some moments he surveyed the spellbound audience with solemn eyes in which burned an uncanny light; then in a deep voice he said
"I come from the Throne-bearing a message from Almighty God!" The words smote the house with a shock; if the stranger perceived it he gave no attention. "He has heard the prayer of His servant your shepherd and grant it if such shall be your desire after I, His messenger, shall have explained to you its import-that is to say, its full import. For it is like unto many of the prayers of men, in that it asks for more than he who utters it is aware of-except he pause and think. "God's servant and yours has prayed his prayer. Has he paused and taken thought? Is it one prayer? No, it is two- one uttered, the other not. Both have reached the ear of His Who hearth all supplications, the spoken and the unspoken. Ponder this-keep it in mind. If you beseech a blessing upon yourself, beware! lest without intent you invoke a curse upon a neighbor at the same time. If you pray for the blessing of rain upon your crop which needs it, by that act you are possibly praying for a curse upon some neighbor's crop which may not need rain and can be injured by it. "You have heard your servant's prayer-the uttered part of it. I am commissioned by God to put into words the other part of it-that part which the pastor, and also you in your hearts, fervently prayed silently. And ignorantly and unthinkingly? God grant that it was so! You heard these words: 'Grant us the victory, O Lord our God!' That is sufficient. The whole of the uttered prayer is compact into those pregnant words. Elaborations were not necessary. When you have prayed for victory you have prayed for many unmentioned results which follow victory-must follow it, cannot help but follow it. Upon the listening spirit of God the Father fell also the unspoken part of the prayer. He commandeth me to put it into words. Listen!
"O Lord our Father, our young patriots, idols of our hearts, go forth to battle-be Thou near them! With them, in spirit, we also go forth from the sweet peace of our beloved firesides to smite the foe. O Lord our God, help us to tear their soldiers to bloody shreds with our shells; help us to cover their smiling fields with the pale forms of their patriot dead; help us to drown the thunder of the guns with the shrieks of their wounded, writhing in pain; help us to lay waste their humble homes with a hurricane of fire; help us to wring the hearts of their unoffending widows with unavailing grief; help us to turn them out roofless with their little children to wander unfriended the wastes of their desolated land in rags and hunger and thirst, sports of the sun flames of summer and the icy winds of winter, broken in spirit, worn with travail, imploring Thee for the refuge of the grave and denied it-for our sakes who adore Thee, Lord, blast their hopes, blight their lives, protract their bitter pilgrimage, make heavy their steps, water their way with their tears, stain the white snow with the blood of their wounded feet! We ask it, in the spirit of love, of Him Who is the Source of Love, and Who is ever-faithful refuge and friend of all that are sore beset and seek His aid with humble and contrite hearts. Amen.
https://image.nostr.build/dd0a7be5db79d2f2885ffb7f229519c28bb3d6a4ed37df9e4ae55702ea8d17ad.jpg
(After a pause)
"Ye have prayed it; if ye still desire it, speak! The messenger of the Most High waits."
It was believed afterward that the man was a lunatic, because there was no sense in what he said.
-
@ 42342239:1d80db24
2024-08-30 06:26:21Quis custodiet ipsos custodes?
-- Juvenal (Who will watch the watchmen?)
In mid-July, numerous media outlets reported on the assassination attempt on Donald Trump. FBI Director Christopher Wray stated later that same month that what hit the former president Trump was a bullet. A few days later, it was reported from various sources that search engines no longer acknowledged that an assassination attempt on ex-President Trump had taken place. When users used automatic completion in Google and Bing (91% respectively 4% market share), these search engines only suggested earlier presidents such as Harry Truman and Theodore Roosevelt, along with Russian President Vladimir Putin as people who could have been subjected to assassination attempts.
The reports were comprehensive enough for the Republican district attorney of Missouri to say that he would investigate matter. The senator from Kansas - also a Republican - planned to make an official request to Google. Google has responded through a spokesman to the New York Post that the company had not "manually changed" search results, but its system includes "protection" against search results "connected to political violence."
A similar phenomenon occurred during the 2016 presidential election. At the time, reports emerged of Google, unlike other less widely used search engines, rarely or never suggesting negative search results for Hillary Clinton. The company however provided negative search results for then-candidate Trump. Then, as today, the company denied deliberately favouring any specific political candidate.
These occurrences led to research on how such search suggestions can influence public opinion and voting preferences. For example, the impact of simply removing negative search suggestions has been investigated. A study published in June 2024 reports that such search results can dramatically affect undecided voters. Reducing negative search suggestions can turn a 50/50 split into a 90/10 split in favour of the candidate for whom negative search suggestions were suppressed. The researchers concluded that search suggestions can have "a dramatic impact," that this can "shift a large number of votes" and do so without leaving "any trace for authorities to follow." How search engines operate should therefore be considered of great importance by anyone who claims to take democracy seriously. And this regardless of one's political sympathies.
A well-known thought experiment in philosophy asks: "If a tree falls in the forest and no one hears it, does it make a sound?" Translated to today's media landscape: If an assassination attempt took place on a former president, but search engines don't want to acknowledge it, did it really happen?
-
@ b39b8e83:0e391257
2024-09-23 23:51:33My letter to my U.S. Representative asking them to cosponsor H.R. 9649 to restore UNRWA funding.
Dear Representative ABC,
I am writing to you as a concerned citizen and member of the Quaker faith community. My belief in peace, equality, and the inherent worth of every human being compels me to urge you to support the restoration of funding for the UN Relief and Works Agency (UNRWA) in Gaza.
As a Quaker, I believe we are called to speak truth to power and to work towards alleviating suffering wherever we find it. The ongoing humanitarian crisis in Gaza deeply troubles me, as I believe it should trouble all who value human life and dignity. The prospect of famine and disease outbreaks in Gaza is not just a political issue, but a moral one that speaks to our shared humanity.
UNRWA serves as the primary source of aid for millions of Palestinians facing dire circumstances. While I acknowledge the concerns that have been raised about the agency, I believe that UNRWA has demonstrated a commitment to addressing these issues through immediate action and reform. The decision by many of our allies to resume funding to UNRWA after careful consideration should encourage us to do the same.
The Quaker testimonies of simplicity, peace, integrity, community, equality, and stewardship (SPICES) guide us to seek peaceful solutions and to care for those in need. By supporting the UNRWA Funding Emergency Restoration Act (H.R. 9649), we can take a significant step towards fulfilling these values and preventing further suffering.
I urge you to cosponsor H.R. 9649 and to advocate for its passage. This action would align with our nation's humanitarian principles and our moral obligation to help those in desperate need, regardless of political boundaries.
Thank you for your consideration of this crucial matter. I look forward to hearing about your stance on this issue and any actions you plan to take.
Sincerely, TheFreeQuaker
-
@ 3b7fc823:e194354f
2024-09-11 19:08:03Operational Security and Your Digital Life
I. Definitions
Operations security (OPSEC) is a process that identifies what information can be seen by threat actors, whether that information could be weaponized, and possible mitigation actions.
Your digital life is every interaction you have, all personal identifying, financial, and health information, your preferences, your habits, and any history that can be obtained both publicly and privately that has ever been recorded or digitized.
Your digital life is a incredibly rich field for various actors to observe, record, analyze, sell, and exploit for profit, harm, or control. Some of this information you give away without thinking (social media), some you give to one party but it is shared without your knowledge to other parties (data brokers, big tech), or it is taken without your consent (criminals, governments).
II. Threats
It would be impossible to list them all but a few examples:
Mass surveillance by governments to fight crime, terrorism, civil unrest, and control the population. This is across the board blanket information on everyone that is stored for later use from feeding algorithms for social credit systems to lists of people who are threats that need to be disappeared. The only variable is how explicit the government in question is doing it.
Corporate surveillance by public and private companies for marketing, market share, or selling for profit. Your data is incredibly profitable. Entire mega companies have built their entire business model on it like Google, Meta, and various Data Brokers. This information is collected and stored. It is then used internally, sold for profit, acquired by governments, or stolen by nefarious actors.
Criminal or Nefarious Surveillance for harm, control, or profit. This is a catch all from partners in a controlling relationship, angry ex's wanting revenge, religions and groups watching their members, terrorists and cults looking for people to recruit or indoctrinate, and foreign espionage to plain old criminals who want your information to sell to other criminals, looking for blackmail opportunities, to steal your financial or social accounts, or identity theft.
III. Mitigation
To do this properly a security self audit should be performed to determine exactly what assets you have to protect, how at risk they are, ranking their priority, and specific steps that are needed to protect them. I will detail how to do this for the average person in a later post but until then we will stick to generalities.
It is impossible to to block or hide all information all the time. Not only is it impossible but it would be exhausting to even try. This is where most people interested in privacy get confused, lost, and give up the idea of privacy because the only path they see to achieve it is living in a underground faraday cage out in the woods.
The only viable path is obscurity and compartmentlizion. Compartmentation of your devices, accounts, and digital selves is wildly misunderstood and not applied properly. Done incorrectly this can be disastrous if you are too casual with something that you thought was hidden or putting a spotlight on yourself by attempting to be obscured.
IV. Tactics For Everyone
Common advice I give to everyone. I don't care what your thoughts are on privacy and security, you should be doing this.
-
Do not give your personal email or phone number to anyone except friends and family. This just opens you up to spam, phishing attacks, and an identifying tracer. Use a email alias service or a throw away email account to give to stores and online accounts. Get a VOIP number for that dating app or service quote. When your real number rings, recieves texts, or get a email you know it is from someone you know and trust.
-
Use cash locally if you can and for everything else get a virtual debit or credit card with a spending limit or fixed amount. Do you really need your entire paycheck, emergency savings, life savings tied to a single card / account? Are you really entering your real credit card or banking information into a random website to buy something? Even if it's not a scam site, how well are they protecting it while in transit or storage? You will probably get the money back in case of fraud but why feed the beast and besides it's a total hassle to get your accounts frozen, wait for reimbursement, open and change accounts. Just avoid it. For extra credit you can use visa gift cards purchased with cash to obscure your financial transactions if you choose. Every financial transaction doesn't have to be public record.
-
Stop using unencrypted phone calls and SMS texts. Switch to encrypted options such as Signal or SimpleX and make anyone who wants to have contact with you reach out to you on it. Even if you "have nothing to hide" there is no reason for you to broadcast every personal conversation, comment, or shared meme with Ma'bell, the government, and anyone else listening and recording. Seriously, just stop.
V. Compartmentation of Your Digital Selves
I will keep this very high level as this article has already run longer than I intended but will cover this in much greater detail in the future.
You can break down all digital activities and interactions into several broad categories or digital selves. Then build separate systems for use in each category depending on the activity and need. The trick is to preplan what activities go where. Using the wrong account on the wrong system means they are now burned. Letting the systems overlap and contaminate each other then you risk exposing anything ever done on those systems. The separation can be accomplished with multiple accounts and devices, isolated virtual machines, or operating systems that enable compartmentation such as Qubes OS or Tails.
VI. Breakdown
- Public
This is the default. This is you. Your real name, address, and details. This is unavoidable and would be weird and attract attention if you didn't have one.
Use this for any KYC activities that you have to log into such as taxes, bank accounts, utility bills, etc. Clearnet only, you have nothing to hide.
Awareness: If it has to be public then put your best foot forward. Only show them what you want them to see and make it good and boring. Blend into the crowd of normies not important enough to pay attention to.
- Private No logins to KYC services. Traffic routed through a VPN. Use of sudo anonymous account names. You are Neo, not Mr. Anderson.
Use for most social media that is not public facing. Shopping and browsing that would be embarrassing or misunderstood if made public. Encrypted to protect against criminals and looky loos. A good default if people just don't need to know.
Awareness: Do not be confused by the word private. The goal is to make it to difficult, to expensive, or just not worth the effort to determine exactly who you are and what you are doing but it's not impossible. Only use this with the knowledge that someday it might get doxxed. That potential only increases with time and frequency of use of accounts. Not to be used for anything that could be considered illegal or has the potential to get you fired or cancelled.
- Anonymous Only single use non KYC logins. Single purpose accounts and names that are burned after achieving that purpose. Traffic routed only through Tor. Encryption by default.
Use if you are a whistle blower, freedom fighter, activist, or for shady activities.
Awareness: Be very careful and deliberate with this system as to not accidentally compromise it with something that would have been better served by a different system. Rotate and clean accounts and systems often. Don't carry stuff over after a cleaning to a new system. Reusing names and handles is how people get busted.
- Nemo
Nemo doesn't exist. There is no record that they ever existed. Only amnesiac systems are even used and never a login. If files or traces are left behind they are encrypted, hidden, and have plausible deniability.
Enjoy anon, more to come.
-
-
@ 472f440f:5669301e
2024-09-23 22:33:24While most of the world is focused on the lead up to the Presidential election here in the US and louder war drums being beat across the world, the number of bullish developments that are stacking up for bitcoin is increasing rapidly. These developments deserve the OG Marty's Bent smorgasbord treatments, so here are the things that have caught my attention over the last week in no particular order.
The First Ark Transactions on Bitcoin Mainnet
I had the pleasure of participating in a demo of Second's Ark protocol implementation. For those who are unaware, Ark is a new layer-two protocol solution for making off-chain bitcoin payments. Unlike the lightning network, Ark doesn't depend on liquidity channels to facilitate payments. Within the lightning network two counterparties share UTXOs within a channel to move sats back and forth, nodes connect to many different channels to create a network effect that increases the chance of payments getting routed successfully, and node operators manage their channel liquidity as channel imbalances emerge.
Ark is similar in the sense that it also leverages a shared UTXO model. However, instead of having one-to-one channels that come with liquidity management issues, Ark enables a large amount of individuals to share UTXOs, which are managed by an Ark Service Provider (ASP). The ASP is a central party within the protocol, but it is a central party that does not custody UTXOs. It only coordinates the transfer of sats between Ark "rounds". Users have the ability to unilaterally exit the second-layer protocol whenever they deem necessary by broadcasting a Virtual UTXO (vtxo) transaction.
This may seem daunting and complicated. All you need to know is that there is now an new way to make off-chain bitcoin payments that are fast and relatively cheap and it is possible today. As it stands today, Ark has some scaling limitations that can be solved if covenants get merged into the bitcoin protocol, which would significantly reduce the data requirements for signing this type of transaction.
It should also be noted that Ark isn't here to replace the lightning network. It can help serve different use cases and, at the same time, significantly improve the UX of the lightning network. Particularly channel management. The progression of the Ark protocol is a welcomed development. I look forward to following what's going on with Ark as the protocol matures.
The Kingdom of Bhutan is Stacking A LOT of Sats
We were made aware of the fact that the Kingdom of Bhutan, a small country in the Himalayas with a population less than 1,000,000 people, was mining bitcoin in early 2023 when their sovereign wealth fund was doxxed in the bankruptcy proceedings of BlockFi and Celsius. Don't look now, but Bhutan has been doxxed again, this time by the chain surveillance firm Arkham, which is reporting that the nation currently holds more than 13,000 bitcoin, which is nearly 1/3 of its GDP. Driven predominately by its mining operations, which have expanded significantly over the last two years in an attempt to monetize the country's excess hydroelectric power.
While we're not big fans of doxxing here at TFTC, we are fans of the game theory of bitcoin playing out in front of our eyes. And the Kingdom of Bhutan is a shining example of the game theory bitcoiners have been talking about for 15 years playing out perfectly.
Bitcoin is a very thorny topic for individuals at every layer of society. At the individual layer, people have to independently decide that bitcoin is a better money and they have to actively decide to store their wealth in it instead of other assets. For companies, the decision to use bitcoin as the preferred savings vehicle is even harder because most businesses have multiple stakeholders that need to align on a decision before making it. When you move up to the nation state level, the complexity of making the decision to add bitcoin as a strategic reserve asset gets even harder. Many more people and different branches of government need to agree and pass bills (in most cases) before bitcoin can ever make it into a nation's treasury asset mix.
It has long been said within bitcoin circles that individuals who have the ability to think independently, companies that have a lean corporate structure, and nation states with little to lose will be the first movers into bitcoin. And they will benefit massively over the long-run for being early.
If you're an individual reading this who is using bitcoin as their money of choice, you are one of these early movers. Microstrategy under Michael Saylor, who has the ability to make somewhat unilateral decisions due to the company's share structure, is an early move. And, Bhutan, a small nation in the Himalaya mountains with a sovereign wealth fund that seems to have the ability to take risk, is an early mover. With little to lose and greatness to gain, Bhutan is giving other small nation states the playbook for leap frogging the competition in the digital age. Stack a shit ton of bitcoin on the DL, hold on to it for a considerable amount of time, and wake up one day as an economic powerhouse.
The Fed Cuts Rates by 50 Basis Points
I'm sure all of you are well aware at this point. Last week the Federal Reserve made it's first rate cuts in over four years when it cut the fed funds target rate by 0.50% to 4.75-5.00%. With the economy reeling despite what the official government and mainstream narrative may try to make you believe, Jerome Powell and crew have decided it is time to ease up on their monetary policy.
Put another way, inflation is likely to come back with a vengeance as easy money begins to reenter the economy. To be clear, a lower fed funds rate doesn't technically necessitate that newly printed dollars enter the economy like they have over the last 15 years via operations like quantitative easing. However, one has to imagine that the Fed sees some sort of liquidity crisis on the horizon that requires them to begin cutting rates. And not only cutting, but cutting at a pace that was very low probability only a couple of months ago. The consensus in the middle of the Summer was that the Fed would begin lowering rates with a modest 25bps cut this month. They doubled that.
It's probably safe to assume that something is approaching a breaking point on the back end of the financial system. One only has to look at record high credit card debt, record low savings rates, the state of the job market for native born Americans, and the continued turn over of commercial real estate markets to see that not all is well in the American economy. Your Uncle Marty's spidey senses are signaling that a liquidity crunch is likely lurking around the corner. When it does rear its ugly head, you can expect quantitative easing to make a big come back.
When money printer goes brrr, bitcoin goes berserk.
It seems that the Treasury's move over the last 18-months of over-indexing on the front end of the curve during their auctions is already having an expansionary effect on M2 as it has officially entered expansion territory for the first time since 2022. Hold on to your butts, freaks.
Bitcoin's fundamentals are only getting stronger as time goes on. This is evidenced by continued improvement to the protocol stack via second layer protocols, continued adoption by reputable actors like the Kingdom of Bhutan, and the continued mismanagement of the fiat monetary system.
The price of bitcoin has been range bound since the Spring and it has lulled the market into a state of boredom. Enjoy the boring period while it lasts. All signs are pointing to a bitcoin bull run the likes of which the world hasn't seen before. There is a lot of tinder, it is extremely dry, and there are flame throwers on the horizon.
Final thought... Nothing makes me happier than meeting someone who gets value from this newsletter or the podcasts in the wild. Love you, freaks.
-
@ 862fda7e:02a8268b
2024-09-10 01:32:05I have a lot of dreams where I'm playing a claw machine and just winning a ton of toys. One of the best clawe machine dreams is where I come across claw machines with large toys as prizes, it had carnival toys from the 70's-80's as prizes. Unfortunately, the claw machine was non functional as it was pretty old. In most of these dreams I am winning an endless amount of toys, so much so that the prize chute becomes full with toys. In real life, they rig claw machines. Often times, the owners of the machines set it so they must meet a certain "pay out" before the claw will actually grip a prize. So while you might have a great aim on getting the claw around a toy, it won't grip it firmly enough until enough money has been inserted to meet that payout. Some claw machines will do a fake out, where it will grab the prize, then once the claw gets back to the top of the machine, it will drop the prize. It's to trick you that it got it, but it actually didn't. Sadly, claw machines are worthless to play these days. It's become highly monetizable and impossible to win. I'm great at claw machines, but it's just a matter of luck with hitting the payout these days.
-
@ 44dc1c2d:31c74f0b
2024-09-09 01:55:24Chef's notes
Makes an excellent Chicken sandwich.
Details
- ⏲️ Prep time: 6 Ish hours
- 🍳 Cook time: 40 min
- 🍽️ Servings: 1 loaf
Ingredients
- 3 ½ - 4 cups bread flour, or more as needed
- 1 ⅓ cups warm milk (110°F – 115°F)
- 5 tablespoons honey
- 4 tablespoons salted butter, melted and slightly cooled
- 1 tablespoon instant “rapid rise” yeast
- 1 ½ teaspoons salt
- Oil or butter for greasing the bowl
- 1 tablespoon melted salted butter, for brushing the crust at the end
Directions
- To prepare the dough, weigh the flour or measure it by gently spooning it into a cup, then leveling off any excess. In a large bowl, combine the flour with the warm milk, honey, melted butter, instant yeast, and salt. Mix by hand or with the paddle attachment of a stand mixer until a shaggy dough forms, gradually adding more flour, as necessary, to get the dough to come together so that it just pulls away from the sides of the bowl.
- Switch to the dough hook attachment (or use your hands) to knead the dough until fairly smooth, about 7-8 minutes.
- Oil a large mixing bowl. Place the dough in the greased bowl, turning once to grease the top. Cover and let rise in a warm place until doubled, 1 ½ - 2 hours.
- Punch down the dough. Transfer to a lightly floured work surface. Pat the dough into a 9 x 12-inch rectangle. Starting on one of the short sides, roll up the dough to make a log; pinch the seams. Place the dough seam-side down in a lightly greased 9 x 5-inch loaf pan.
- Cover the pan with lightly greased plastic wrap; allow to rise for 1-2 hours, until it’s crowned about 1-2 inches over the rim of the pan. Towards the end of the rising time, preheat the oven to 350°F.
- Bake the bread for 40-45 minutes, tenting the top of the bread loosely with foil towards the end if the top starts to get too brown. The bread should be golden brown, and it should sound hollow when tapped.
- Brush the top of the warm bread with melted butter.
- Remove from the pan and cool on a wire rack for at least 1 hour before slicing.
-
@ 862fda7e:02a8268b
2024-09-04 01:45:14It is true that I often dream about James Corbett from CorbettReport.com. Somehow James is always finding his way to my mind. James Corbett intimidates me, I feel like he would heavily dislike me because I am not serious enough. Anytime I see James Corbett smile or laugh it feels like I'm watching an alien try to be human. I wish James the best with his family life and career, but he looks like he is always one second away from either crying hyterically or beating a defensless Japanese man sensless. I am indreasibly grateful for all the hard work he's put out all these years, he's a great person in the truth circle. However, he's like a caracatiure in my head. Anytime he whips out his guitar, I start to cringe. I just know what's about to come will only be the truth about how bad his singing is. But yet, I still love when he plays his guitar. It's awful in a great way, it brings genuine joy to me. Did you know he has a band? He has one song called "Screw Youtube", and in his music video he was sitting on this tall wooden fence and he was wearing these SHORTS WITH SANDALS and he was SWINGING HIS LEGS. I'm sorry, but I expect James to wear white caykies at all times. It felt so gross to see his legs in that state. But then again, here I am getting genuine joy out of seeing that atrosity.
I remember one time watching a James Corbett episode where he has the James Evan Pilatto from MediaMonarchy.com on, and the other James always looks like he's super fucking cracked up. Like he has a ton of energy. Well anyways, one time the other James was his usual self, looking super cracked out excited, talking about the reppies (reptilians) and James Corbett looked so tight lipped, red faced, like he was about to burst out crying. It was so funny to see the two polar opposites, the other James totally oblivious that real James looked like he was about to cry for seemingly no reason. I know this sounds mean of me to say, but I really appreciate these guys for all they do. I just think this is funny.
Anyways, I have a lot of dreams with James Corbett in them. I think it's because he's a teacher and my vagina has a fondness for male teachers. Sadly, none of my good looking male teachers never slept with me. That being said, I think James is good looking for possibly being an English teacher in Japan. I would let him teach me about the reptilians and Klaus Schwab, just let the teaching session see where it goes. Would his gap teeth feel good over my clitty? I dunno.
Okay but here is the most memorable and hilarious dream I had invovling James Corbett. You know how he makes content very often? One day he got extremely fed up with making videos. At the time I think it's because he mentioned in a video how he was annoyed that people kept saying him and Andrew Caufman. So one day he just flipped out, got extremely angry, made one last video saying how he was never coming back and how he's leaving his wife and kids. He deletes everything and is unheard of for months. A few months pass and he uploads a new video. The new video is James obsessively showing and talking about his highly advanced chicken coop he made in Minecraft. He had hundreds of chickens lined up maybe 80 feet in the air, each chicken had a 1x1 square to fit in. Below the chicken was a long tube in which their egg would drop down, and a catcher at the base of the ground. James was fantically showing this contraption, rocking back and forth, had a headset on. He looked awful too. I actually emailed James Corbett about this dream, but he never responded.
Speaking of James Corbett, why do so many people look like him? I feel like they make middle aged bald, bearded men in a DUMB and just release them into the wild, but give them balding genetics so they know how to keep track of them. Like they probably made James Corbett and Andrew Caufman from the same test tube. They fucked up with them, at least like give one of them hair or good eyesight.
-
@ 3b7fc823:e194354f
2024-09-04 01:33:21Nyms, Personas, and Digital Identity
GHOSTn
If you want #privacy then embrace compartmentlization and obscuration in your digital life. Get used to having multiple identities that you can switch between for various needs.
Your legal "matrix" name that pays taxes and has no controversal opinions or associations. Don't try to obscure this person. They are a open book. Put your best foot forward. Show them what you want them to see.
Your private online persona. You let your hair down, have hot takes on social media, purchase legal but potentially embarrassing items or just have hobbies and associations that you are not ashamed of but don't want to advertise for some reason. You use a VPN and no kyc sudo anonymous accounts. Have fun but don't go crazy, know that on a long enough timeline this persona will be linked back to you. The more connections and data that you put out there the easier this will be.
Your anonymous nym that only uses #tor, VMs, hidden drives, and rarely used accounts. Plausible deniability is baked in. Used by dissidents, freedom fights, truth to power, and anyone in oppressive regimes.
Finally you have your Nemo. This person does not exist. No name, no files and only uses #Tails or disposable systems that does not leave a trace. Not everyone would ever have a need for a Nemo but it is good to know how to just in case you ever do.
-
@ e477586c:63d94e3f
2024-09-23 21:06:45..and maybe an example?
This weekend, I had opportunity to submit estimated labor costs for myself to my church which needs a lot of work done. There's a whole long story about whether or not the congregation owns the building on which it's members paid-off the mortgage over a decade ago. The original request was for me to submit an estimated number of hours so that they could have a ballpark figure once the council decided on an hourly rate. I gave them not only that, but also thoughts, alternatives, and long-term "permanent" fixes done by specialists in their respective fields. If we are merely tenants of a building we paid-off and the Texas District remains the landlord, then the council should be better prepared to approach District and once again and say, "give us the deed, or come take care of your property."
If you've read my recent posts, you know I'm newly unemployed. My former employer happened to be the sister congregation to the Deaf Church. In the position of facilities manager, I answered to the board of trustees. They hold meetings (really boring meetings) once a month. I'd attend about twice a year which seemed satisfactory to the board at the time. One of the trustees was a constant volunteer on the property many weeks, putting in more hours than me. He was at the meetings, he'd fill the board in on what we'd been up to on campus, and they'd give him new requests. I'd see him the next morning and we'd GSD.
When asked for information from the board, I'd present it as I'm presenting this post, or the letter I plan on cut-and-pasting here in a moment. I tried to be thoughtful, thorough, detailed, clear, and not assuming they knew the back-story behind whatever project I was referring to. In short, Professional.
What I got back from the new chair was, "That's a nice little 'story-narrative' report you've submitted, but what do you actually do here anyway? People ask me and I don't know how to answer." "Why are you spending your time troubleshooting? Call a contractor." and then when he came in one day to see a contractor estimating an electrical project, "Who gave you the authority to do that?" For 6 months, to answer his question of what I did, I filled-out a time study in 15 minute increments, daily. In March of 2023 my supervolunteer left after one particularly unprofessional dialogue. He didn't have to take it anymore. That incident made the chair realize that he didn't have any idea how much institutional information had just walked out the door. I don't know for certain that he panicked at the time, but he should have. He certainly was easily "frustrated" (his word) after that. When he became frustrated, he'd verbally lash-out at myself and at multiple contractors. My words were "abusive," and "A-hole."
Over the ensuing 14 months my job went from one which I loved, but for which I was underpaid, to one which you wouldn't be able to pay me enough to take. While there is some restructuring involved with my dismissal, the job description hasn't changed all that much. And they're offering the new sucker $15k over my final salary.
While the Sledgehammer remains focused on efficiency of hours spent and a schedule of when to replace air filters, what he needs is institutional knowledge and stories. He needs to be reminded of the mission of the organization, the church, for which he volunteers, and how it has historically performed its mission in serving the members and surrounding community. It is completely possible to efficiently and effectively do exactly the wrong things. A little professionalism in communication (and maybe an anger management class) could have gone a long way to prevent a lot of heartache and grief.
When asked a direct question with a simple answer, I would do him the courtesy of answering directly and simply. When the answer required more of an explanation than I felt he was ready to listen to, I'd simply tell him, "It'll be in the book." The new Operations Manager role they plan on filling pretty much has all my old responsibilities with additional "administrative" work. They rightly assumed I wouldn't really be interested in extra administrative duties. They knew I'd rather be out on the grounds than behind a desk. But through the whole process, no one even asked. What they didn't didn't know, or hadn't considered, is just how much the role had changed over the course of the years, how much flexibility I had already imparted to the position, and how I might have been instrumental in capturing more of this institutional knowledge in the process of the transition. Another thing they may not have considered is that not only was I serious about wanting to write a book, but that I had actually started... in fits and spurts... in bits and pieces... "this would be a good chapter..." a title... chapter structure... I started shortly before SuperVolunteer left. There was often talk... "What will we ever do if something happens to S.V.?" I mean, they weren't literally looking into key-man insurance on him, but he was that valuable. I wanted to capture more of his information and make it available; a handbook of sorts.
I'm not writing the book for the Sledgehammer. I'm writing it for me. With recent developments, the book may or may not take on a different tone than originally intended, but hopefully not too much different. #grownostr will be my sandbox and my sounding board. I've had over a dozen #ideasforbooks over the years, and maybe several of them will find their way into the posts of this blog. What I've just written would fit into my book on old churches needing love. What I hope to be focusing more on in the near future is capturing #startup progress and processes. Follow me as I #write , #TaskRabbit , and #sidehustle my way to a #rightlivelihood in #regenag or #soilfertility
And now, the moment y'all've been waiting for... an example of what I'd consider #professional #communication ...That is if it copies over from a G**gle doc okay. (The numbers will be out of order, because they are in response to someone else's list and I chose to give the simple answers first, followed by those requiring more explanation.)
Members of Jesus Deaf Lutheran church council,
Sunday after our voters’ meeting, K--- approached me with the idea of the congregation hiring me to take care of some of the issues with the building, especially the issues with water. He specifically asked me for estimates of how long each project would take. I also received the letter in which Pr. L------ shared with the district some of the major issues with the building.
I’m going to share some of my thoughts here with the council along with my time estimates, then we can discuss as a council which jobs still need to be contracted out for long-term fixes on the bigger jobs, and what we will tell Texas District.
The cracked foundation. We need to have a foundation specialist come and look and give a quote. Since this is the base of several of the other problems, the specialist could tell us if any of them (twisting) would be corrected when the foundation is repaired, or if the process would only affect the foundation. Twisting - the foundation specialist would have recommendations. (4) The two air conditioners- we had already requested a quote for some of the work, but have not received a quote. I’m reaching out again.
Rotten window frames - I believe the rotten wood at the bottom of the windows on the south side of the building was repaired not too long ago. The bottoms of the frames were cut out and new wood was installed below the window, and about 18” up the sides. These should be checked and re-caulked if necessary, but the repairs appear to be in good shape. It looks like the North side of the building had been repaired as well, but the repairs were much older. The recent failure of one of the windows during a storm was the result of a dry-rotted piece of plastic that is an integrated part of the aluminum window frame. The long-term solution is to have all the windows replaced. The window installer will be able to advise on the best long-term solution with the wood frames.
My proposal for getting us through the next rainy season before we make it through our discussions with Texas District, is to cut-out the old rotten repair and do it again pretty much the same way. This would easily provide several years of protection from water infiltration and the repairs would have to be done anyway, before a new window install.
(5)a The Roof - The only long-term solution is a full replacement. We’d have to call a roofer to bid. To get us through the next rainy season, I propose to seal areas around vents, check that screws are tight, clean the roof thoroughly, tape the seams, and apply an elastomeric coating (a paint-on rubber coating) The product has a 10 year warranty, and the repairs I have done at St. Paul with it have lasted 8 and counting.
Another contributing factor to water infiltration is the condition of the gutters. New Gutters should be considered when getting bids for the roof. These are broken in several places and rusted through. Just removing them will be better for the building than leaving them in place. Another thing that needs to be considered is having the eaves extended if possible. It will help prevent some of the problems we have with the windows and the sliding door at the brick patio. I have an idea about that too, but not sure how it will go over with all of you.
I could build something like the awning over the double doors and install it up-high, just below the roofline. It could be extended over the double doors and the low one could be removed.
(5)b The sliding doors. All three of them are due for replacement and should be considered along with windows and roof. I need confirmation on this, but it seems the water is not coming through the door frame, but under it. For the short-term, I recommend removing any wood trim, sealing between the aluminum frame and the cement slab, replacing the trim and re-caulking.
(6) The trees - There’s one dead tree in the south yard along with many young, small trees that grew up in between the fences. I’m planning on taking these out in preparation for the shed. Unless the neighbor to the south has complained of any problems with the oak, I suggest we leave it alone over their property. If it needs to be done, I’d hire a tree service for liability purposes. The oak does have a few branches getting close to the church roof which I can remove. I can also remove branches over our own roof and trim any branches that hang too low in the parking lot. The issue with city codes that Pr. L------- mentioned, would be those growing into the utility lines, or are not high enough off the street. I’d have these done by a tree service as well.
(7) The water drainage on the parking lot - besides the parking lot, there is also a grading problem on the brick patio at the north side of the building. I had already been planning on grading the south lawn in order to improve drainage from the parking lot to the alley on the east end of the property before putting in a base for the shed. K--- brought the brick patio to my attention, and I can re-grade that by removing the bricks, grinding down some of the roots, and re-setting the brick and using smaller stone instead of brick right around the tree trunk. A third area I can play with is that little patch of dirt that goes in between the office and parking lot and runs north to the duplex property. I haven’t been on the property during a flooding event, so I’m not sure whether these steps will be enough, or if we’ll eventually need to have a portion of the parking-lot itself redone, but these steps will definitely help.
Costs: Rental Equipment:
Tractor W/ Loader and backhoe $329/day for 1 or 2 days plus delivery fee (last time I did this it was $100 or $150) For Grading S. yard and in front of church office.
Stump Grinder: $122/half day for grinding roots of removed tree in S. Lawn and the roots of the tree in the brick patio.
6” Chipper $232/ half day. For reducing tree waste to wood chips.
Trailer $60/day to $122/day depending on model may or may not be needed to move other equipment, materials purchased, or remove wood chips.
Compactor: $70 /half day For preparing shed foundation.
Scaffolding? For installing awning.
Materials costs have not been calculated. 10 Cubic Yards road base for foundation of shed: They don’t have current prices on their website, but last time I priced it, it was about $30/yard and the delivery was between $100 and $200. Gravel for graded area in front of church offices: estimated 3 yards (more than the roadbase/yard, but don’t know how much maybe $45/yd
4” PVC pipe and fittings. 30 feet @$50/10’ Approx. $250
Roof Coating $99/5gal Covers 500 square feet. Does someone know how many square feet the building is?
Materials for ‘awning’ ???
Estimated labor hours:
Grading S. Lawn 8 Spreading and compacting shed foundation 4 Misc Tree trimming over parking lot, roof, and in S yard 9 Shredding and removal of tree waste 6 Roof inspection and prep work for coating 24 Roof Coating 16 Grading area in front of offices to drain to North 16 North Patio Re grading 24 Removing gutters 24 Repairing windows on N side and sealing sliding door frames 32 Construct “awning” to move rainfall away from the building. 40?
Zap if you liked it or learned something, and give me a follow.
I do have my first #Task lined up with #TaskRabbit. we'll see what kind of sorcery the algorithms do once I've shown #proofofwork
And it looks like the text of the google doc came over fine, but not any images... they were mostly just pictures of rotten window frames, anyway.
-
@ 3b7fc823:e194354f
2024-09-04 00:26:48Encryption is the promethium fire that the cypherpunks secured from heaven for me and you. It is our sacred duty to use and advance that in the world. Encryption is so powerful that governments tried to keep it away from the people and to this day have tried to weaken and backdoor it at every turn.
So what is encryption?
It is a deep deep rabbit hole and involves a lot of numbers but in a nutshell it uses math to scramble up the data of your file so it is gibberish and can't be read without decrypting it back to regular data. Encryption technology has continued to advance over time and cracking technology to break the encryption has as well. For our purposes all you really need to remember is to use modern cyphers and your encryption is really only going to be as good as the password (use a passphrase) strength you are using to lock it down with.
BEGINNER LEVEL - Encrypt your phone and computer.
People walk around with their whole lives on their phone. Protect it.
-phone: Congratulations, if you already have a lock screen set on either your iPhone or Android device then device encryption is enabled. If your lock screen password is only 4 digits then we still have work to do. Four digits is only about 10,000 combinations and fairly easy to crack. I believe it only took them about 40 minutes to crack the iPhone of the attempted Trump shooter. Go into settings and set it up for 6 digits or for extra credit use a alphanumeric password.
After your phone then your personal computer probably has the most important data to you. Banking records, tax documents, photos, etc. Encrypt your drive.
-Windows: from Settings, select Privacy security -> Device encryption. Just follow the prompts.
-Apple: from Apple icon, select System Preferences -> Security & Privacy icon. Click "Turn On FileVault".
-Linux: most distros gives you the option during installation. If you didn't do so then search for how to enable it after the fact based on your distribution.
Awesome sauce. You have achieved minimum status.
ADVANCED LEVEL - Encrypt individual files.
You already encrypted your computer but guess what, once you start up your computer and log in the key is stored in RAM for as long as it stays on. The beginner level encryption protects your computer when it is off and it means no one can just steal your hard drive and access your files. This is good, but what if someone grabs you while you're sitting there working on it? What if you leave it in sleep mode and not turned off? Then that whole disk encryption is not really going to help you.
What if you had individual files that you consider more secret than the others? That finance spreadsheet or that special pic your spouse sent you? That's where individual file encryption comes in. You are just scrolling nostr when they grab you, your computer is on, and unlocked, but those special files are still safely encrypted.
I will share with you one of my favorite small programs: Picocrypt.
Download the Paranoid pack and store it in multiple drives, email accounts, and cloud storage. That way you will always have a copy to decrypt any files that you stored away.
Use it to encrypt any files that you feel need extra attention. It is also very useful for encrypting any files that you intend to store online in cloud storage. You do encrypt your files that are stored online don't you? Yes, even with the company that offers "encrypted" storage. Don't trust their encryption, use your own.
EXPERT LEVEL - Encrypt containers and hidden containers.
What if you want to encrypt several files and keep them all together in like a folder or container? That's where Veracrypt comes in. Free, open source, cross platform, and powerful.
Veracrypt allows you to create encrypted containers from any file that act like individual drives that can be mounted or unmounted as needed. You can name these files anything that you want, move them around or delete like any file, and make as many as you want. This allows you to have compartmentation of your files and drives.
Next trick, Veracrypt allows you to create a hidden container inside that container. Enter one passphrase and you open the encrypted container. Enter a different passphrase and you open a different hidden container.
This allows deniability. When they grab you and start pulling your fingernails off until you tell them the password to open the encrypted container, give it to them. They don't have to know that there is another hidden one under that.
These features allow you to do all sorts of interesting things only limited by your need and imagination.
What if you have a container named as some random config file in your /etc folder? What if you just encrypted a removable storage drive? What if you have multiple hard drives on your computer that have multiple containers and hidden containers? What if you have a hidden container that can only be accessed from booting up in a amnesiac OS like Tails leaving no trace that the files exist or trail that they were ever accessed? Go crazy, have fun.
NEMO - Failsafe
Nemo has no files, encrypted or otherwise. If they did you couldn't prove it. Nemo does use something like Tails that retains no memory from boot to boot.
Nemo also uses a failsafe. A simple lanyard attached to the flashdrive running the OS and the other end around their wrist while they work. When you try to separate them from the computer the flashdrive pulls out and everything is gone.
Using these programs you can create a layered and compartmentlized approach to your encryption scheme. There are also plenty of other encryption programs to check out such as Cryptomator, AES Crypt, etc
Last point and most important: Encryption is only as good as the passphrase you use to lock it down. Use a shitty password and it doesn't matter how uncrackable your encryption is.
-
@ 3b7fc823:e194354f
2024-09-02 16:26:30First steps into privacy.
You are a normie, but maybe you are privacy curious. Maybe you are ready to take a first step or two into security and privacy but don't know where to start.
Don't worry, here are some absolute beginner first steps that will make a big difference.
-
No one except your friends and family should know your personal phone number and email address. Stop giving away your data! You don't have to fill out every blank on that form. Unless they are mailing you something they don't need your home address. Use a email aliasing service or just create a burner email account as a spam trap. Get a second VOIP phone number. Look up the address of a local hotel. Use these instead of your personal information or maybe just skip the customer reward program.
-
Speaking of giving away your data. Stop using spyware! Facebook, Instagram, Tiktok, etc. It is "free" software designed to suck every ounce of personal data from you to be repackaged and sold. Don't just delete the app, search for how to delete your account data.
BTW Windows, google, and 90% of the apps on your phone are also spyware but one thing at a time. Maybe start reading up on FOSS.
-
Clean up your communications. Stop using unencrypted calls and SMS texts. There are several options but just get Signal and make your friends use it. Its easy and works.
-
Clean up your email. This one is probably going to take you some time if you are like most people who have hundreds of emails from years gone bye. Go through every single one and unsubscribe from every newsletter or sales pitch from every store you have ever bought anything from. Block every spam email you see. If you are using a email provider that literally scans every email you send or receive in order to sell you stuff like gmail, then now is the time to switch to a private and encrypted provider like proton or tuta.
-
Clean up your web surfing. Switch to a privacy browser and search engine. If you don't know which one just get Brave. There are ones that I like better but Brave is good enough and easy, especially if you like Chrome. A hardened Firefox is better but requires some homework and if on desktop Mullvad browser is a excellent choice.
BONUS TIP:
Clean up your security. Make sure all of your software is setup for automatic updates, especially security updates. Also, I don’t know who needs to hear this but get a password manager if you don’t have one. (Don't save passwords on the browser!) Get an actual password manager and then add 2FA to all of your online accounts and you will have better security than 90% of the population.
OK, nothing too exciting but we got the big rocks. Data leaks, communications, email, web surfing, and basic security.
What, no VPN or Tor or super secret stuff? No, not yet. This is your level zero default. Your identity and activity is still transparent but you are no longer leaking your data all over the place. This will provide a general base for everyone.
The next step is to perform a basic threat assessment of your personal situation. What are you most at risk for? Targeted attacks or passive? Cyber or physical? What do you most need to defend against? Government mass surveillance, surveillance capitalism, censorship, or public exposure?
There will be some overlap with all of them but your next steps will really depend on your answer. We will cover each of these in greater depth later.
-
-
@ 3b7fc823:e194354f
2024-09-02 13:07:09GHOSTn
- Renoted from a month ago into a article as a proof of concept
A quick overview
privacy #tor #vpn
**Computer -> clearnet -> Website **
ISP: sees that you are connected to website VPN: n/a Tor Entrance Node: n/a Tor Exit Node: n/a Website: sees your IP address and logs everything that you do on the website
Good for when the expectation of privacy does not exist. A KYC site you are logging into. Utility bill pay site, bank
**Computer -> VPN -> Website **
ISP: sees that you are connecting to a VPN but not what you are doing afterwards VPN: sees your IP Address and that you are connecting to a website Tor Entrance Node: n/a Tor Exit Node: n/a Website: sees that someone from a VPN exit node has connected but doesn’t know who. Logs data.
Good for hiding your activity from your ISP. Good for hiding your identity from the website. Good for when you want low level privacy but not anonymity. VPN provider sees everything and your level of privacy depends on how much they know about you and how much data they log and retain (varies greatly from provider to provider).
**Computer -> Tor -> Website **
ISP: sees that you are connected to Tor but nothing afterwards VPN: n/a Tor Entrance Node: sees your IP address but nothing afterwards Tor Exit Node: sees website you are going to but not who you are Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for privacy and anonymity. Assumes that Tor is legal in your country.
**Computer -> VPN -> Tor -> Website **
ISP: sees that you connected to a VPN but nothing afterwards VPN: sees IP address and that you are connecting to Tor but nothing afterwards Tor Entrance Node: sees a VPN is connected but nothing afterwards Tor Exit Node: sees website you are going to but not who you are Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for if your ISP blocks or cancels your service for using Tor. Potentially an option if Tor is illegal in your country (Dangerous).
**Computer -> Tor -> VPN -> Website **
ISP: sees that you are connecting to Tor but nothing afterwards VPN: sees someone from Tor is connected and that they are connecting to a website Tor Entrance Node: sees IP address but nothing afterwards Tor Exit Node: sees someone is connecting to a VPN but nothing afterwards Website: sees someone from a VPN is connecting but doesn’t know who. Logs.
Good for when a website blocks Tor traffic. Assumes Tor is legal in your country. Assumes that the VPN doesn’t know who you are. To maximize privacy and anonymity VPN provider should be KYC free and accept privacy payments (ex: Monero).
Note: If a website blocks Tor and VPN then maybe that is a sign that you shouldn’t go there.
-
@ 97c70a44:ad98e322
2024-08-29 00:50:27Nostr is a mess. It always has been and will always be. That's part of the appeal! But it's important that users be able to navigate the rolling seas of this highly partition-tolerant network of kaleidoscopically-interwoven people, bots, topics, relays, clients, events, recommendations, lists, feeds, micro-apps, macro-apps, Chinese spam, and "GM"s.
In order to do this, users must be able to articulate "what" they are looking for, and clients must be able to articulate "how" to find that thing. This "how" is divided into two parts: building a request that will match the desired content (very easy), and selecting a relay that is able to serve that content to the user requesting it (very very hard).
Why guessing isn't good enough
As a concrete example, let's say the user wants to find everyone in their "network" who is using a particular topic. The process would look something like this:
- The user clicks the "network" tab and types in the topic they want to browse. This is the "what".
- The client then translates the term "network" to a list of public keys using whatever definition they prefer (Follows? WoT? Grapevine?), and builds a filter that might look something like this:
[{"authors": pubkeys, "#t": ["mytopic"]}]
. Any relay will happily accept, understand, and respond to that filter. - The client then has to decide which relays it should send that filter to. This is the
???
stage of the outbox model, which immediately precedes: - Profit
It may not be immediately obvious why selecting the correct relays might be difficult. Most people post to relay.damus.io, and most people read from relay.damus.io, so in most cases you should be good, right?
This approach to relay selection has historically worked "well enough", but it depends on a flawed definition of success. If you only want to find 90% of the content that matches your query, using the top 10 relays will suffice. But nostr is intended to be censorship-resistant. What if those 10 hubs have banned a particular public key? Nostr clients should (at least in theory) be 100% successful in retrieving requested content. Even if someone only posts to their self-hosted relay, you should be able to find their notes if their account is set up properly.
A naive solution to fixing the FOMO
A 90% hit rate results in a feeling of flakiness, even if users aren't completely aware of what isn't working. Feeds will be incomplete, quoted notes will be missing, replies will be orphaned, user profiles won't load. The natural response to the FOMO this creates is for users to "try harder" by adding more relays.
On the read side, this means clients open more connections, resulting in much higher data transfer requirements, with massively diminishing returns, since there's no reason to expect that a randomly chosen relay will have a substantially different data set.
One the publish side, this means that clients end up publishing more copies of their data to more relays. This approach has been automated in the past by services like Blastr, which don't store a copy of events published to the relay, but instead forward events to the top 300 relays in the network. This results in a two-orders-of-magnitude increase in storage required, and only makes the read side of the problem worse, since it reduces the uniqueness of the data set each relay stores. This in turn means that more duplicates are retrieved when querying relays.
Both halves of this approach are equivalent to guessing. On the read side, users are guessing which relays will have any arbitrary content they might ask for in the future. On the write side, users are guessing which relays other people might use to find their notes. It is a brute-force method for finding content.
Randomness results in centralization
In theory, random relay selection would result in a perfect distribution of content across all relays in the network. But in practice, this method of selection isn't random at all, but is strongly influenced by user bias in what constitutes a "good" relay. While some users may check nostr.watch for ping times, geographical proximity, or uptime, most will choose relays based on familiar names or other people's recommendations.
In either case, these biases are entirely orthogonal to achieving a higher content retrieval hit rate, except when bias in relay selection results in clustering — i.e., centralization. In other words, the kind of randomness exhibited by users when selecting relays actually results in pretty much everyone picking the same few relays. We see this same effect when people try to come up with passwords or seed phrases — human-provided randomness is anything but random.
Clustering improves the hit rate when requesting events (slightly), but it results in nearly as much centralization as if only a single relay was used — and a lot more duplicate events.
Something (anything) other than randomness
In early 2023, Mike Dilger introduced NIP 65 (now known as the "Outbox Model") with a problem statement in the spirit of the original description of nostr: "Nostr should scale better. People should be able to find what they want."
Historical note: NIP 65 was formerly known as the "Gossip Model", derived from the name of Mike's desktop nostr client, called "Gossip". This unfortunately created a lot of confusion, since gossip protocols work very differently from how nostr tends to work, hence the re-brand.
Before NIP 65, an informal standard existed in which
kind 3
user contact lists also included a list of relays that clients could use as something similar to Mastodon's "home servers". This list included the option to only read or write from a given relay. Unfortunately, it wasn't really clear what the semantics of this relay list were, so different clients handled them differently (and many clients ignored them). Usually this amounted to user-provided static relay configurations, which resulted in the naive relay selection approach described above.NIP 65 used a very similar format (a list of relay urls with optional "read" or "write" directives), but with a very important semantic difference: relays listed in a user's
kind 10002
were intended to "advertise to others, not for configuring one's client." In other words, these relay selections were intended as a signal to other users that they should use certain relays when attempting to communicate with the author of the relay list.I highly recommend reading the entire NIP, which is very short and easy to read. But the mechanics of the spec are very simple:
When seeking events from a user, Clients SHOULD use the WRITE relays of the user's
kind:10002
.When seeking events about a user, where the user was tagged, Clients SHOULD use the READ relays of the user's
kind:10002
.When broadcasting an event, Clients SHOULD:
- Broadcast the event to the WRITE relays of the author
- Broadcast the event to all READ relays of each tagged user
For the first time, we had a way to differentiate relays in terms of what content could be found where.
When looking for a note by a particular user, a client could now look up the author's
write
relays according to theirkind 10002
event, and send its query there. The result is a much higher hit rate with much lower data transfer requirements, and fewer connections per query.Making Outbox Work
There are of course some assumptions required to make this work.
First, the user must know which author they're looking for. This isn't always true when looking up a quote or parent note, but context and pubkey hints solve this difficulty in most cases.
The author must also publish a
kind 10002
event. This may not always be the case, but clients should prompt users to set up their relay list correctly. This isn't really a flaw in the Outbox Model, just in implementations of it.Additionally, the user's client must be able to find the author's
kind 10002
event. This is the "bootstrapping" phase of the Outbox Model, during which the mechanisms the system provides for finding events aren't available. This requires us to fall back to randomly guessing which relays have the content we're looking for, which as we saw above doesn't work very well.Other than guessing, there are a few different ways a client might find the relay selection event in question, each of which is applicable in different circumstances. In most cases, using one of a handful of indexer relays like purplepag.es or relay.nostr.band is a simple and efficient way to find user profiles and relay selections.
However, if an author's content has been aggressively purged from these indexers due to censorship, they obviously can't be relied upon. Even though the author in question hasn't been deplatformed from nostr itself (since he can always self-host a publicly accessible relay to store his content), he has been effectively shadow-banned.
To get around this, relay selections have to be communicated in some other way. Nostr has a few different mechanisms for this:
- If the author's NIP 05 address is known and properly configured (it may not be), clients can look up the author's NIP 05 endpoint to find some reasonable relay hints. Unfortunately, these are often neglected, and usually custodial, so they can run into the same problems.
- If the author's pubkey is found in another signed event found on nostr, relay hints can be a way to propagate relay selections through the network. This relies on implementations picking reliable relay hints which can be difficult, and hints do tend to become less reliable over time. However, this strategy is very effective in resisting censorship because it makes banning viral — if a relay wants to completely purge a particular pubkey from their database, they have to purge every event that references it, since events are tamper-proof.
- In extremis, relay recommendations can always be communicated out-of-band. This can be done using manual input, QR codes, DHTs, jsonl torrents full of
kind 10002
events, or any other mechanism client developers choose to resort to.
Another, more technical assumption is that any given query can be fulfilled by few enough relays that a client can actually make all the connections needed, without running into resource limits. If you're trying to request content from 10,000 users across 1,000 relays, you're going to have a bad time. This was pointed out to me by Mazin of nostr.wine. He makes a good point, and it's definitely something to keep in mind. There are some mitigating factors though.
The first is that the current topology of the network probably won't persist forever. Because nostr is largely populated by self-hosting enthusiasts, the number of "tiny" relays is proportionally much higher than it will be if adoption picks up, even if the total number of relays grows. The trajectory is that nostr will drift toward fewer, larger relays, reducing the number of connections needed to fulfill any given query.
This is "centralizing", but it's important to understand that this isn't necessarily a bad thing. As long as there are more than one or two large hubs, there is user choice. And as long as it's possible to run a new relay, there is always an escape hatch. Nostr, like bitcoin, has no hard dependency on the biggest player in the network.
The other thing to consider is that there are lots of other techniques we can use to overcome the limits of the lowest-common denominator's limitations (mobile browser clients), including self hosted or third-party relay proxies. The trade-off here is that a little trust (aka centralization) can go a long way to reducing resource requirements needed to fulfill queries using the Outbox model.
If you're interested in more details on this topic, see this blog post.
That was a long digression, but there is one other thing that the Outbox model assumes to be the case. Even if the correct relays are found and connected to, they still may not return all desired content, either because they don't have it, or because they refuse to return it to the user requesting it.
This can happen if the publishing client isn't following the Outbox Model, if the author had migrated from one relay set to another without copying their notes over, or if the relay in question chose not to retain the author's content for some reason.
The first two issues can be fixed by improving implementations, but the question of policy is a little more interesting.
Relativistic relays
The Outbox Model is a mechanical process; it's only as useful as user relay selections are. In order for it to work, users have to be able to make intelligent relay selections.
Every relay has trade-offs, depending on its policy. 140.f7z.io would not be useful for long-form content, for example. Some relays might have a content retention policy that changes depending on whether you're a paying user. If you don't pay, you might find out too late that your content has been deleted from the relay.
So what makes a relay "good" for a particular use case? Well, it's complicated. Here are a few factors that go into that calculus:
- Is the relay in the same geographical as the user? Proximity reduces latency, but jurisdictional arbitrage might be desired. Users should probably have a variety of relays that fit different profiles.
- Will the relay ban the user? Do the operators have a history of good behavior? Is the relay focused on particular types of content? Is the relay's focus consistent with the user's goal in adding that relay to their list?
- What are the relay's retention policies? A user might want to set up an archival relay for her old content, or a multi-availability-zone relay so her notes are immediately accessible to the rest of the network.
- Does the relay require payment? Paid relays are more aligned with their users, but obviously come at a financial cost.
- Does the relay have policies for read-protecting content? If so, other users might not be able to find your posts published to that relay. On the other hand, some relays are configured to work as inboxes for direct messages, which can help preserve privacy.
- Does the relay request that users authenticate? Authentication can help manage spam, but it also allows relays to correlate content requests with users, reducing user privacy.
- Is the relay you use hosted by your client's developer? If so, you're in danger of getting banned from your client and your relay at the same time.
- Is the relay a hub? Using hubs can help smooth out rough areas in Outbox Model implementations, at the cost of centralization.
- Is the relay used by anyone else? One-off relays can be useful for archival purposes, but often won't be used by clients following the Outbox Model, depending on how they optimize requests.
There are lots of ways to approach the problem of helping users select relays, but it's an inherently complex problem which very few people will have the patience to properly address on their own. Relay selection is a multi-dimensional problem, and requires satisfying multiple constraints with a limited number of relay selections.
In the future, special-purpose clients might be used to help people build relay sets. Clients also might provide curated "relay kits" that users can choose and customize. Or, we might see an increase in hybrid solutions, like smarter relay proxies or client-local relays that synchronize using other protocols or platforms.
The Limitations of Outbox
Outbox is not a complete solution, not because of any of the caveats listed above, but because NIP 65 per se only addresses the question of how to index content by pubkey in a broadcast social media context. But there are many other scenarios for relay selection that Outbox does not solve:
- Community, chat, and group posts might be best posted to relays dedicated to that context.
- Direct messages shouldn't follow the same contours as public social media content.
- Topic-oriented relays, or relays serving a custom feed might be useful independent of who uses them.
- Relays focused on serving a particular kind of event, like music, long-form content, or relay selections, are useful independent of who reads from or writes to them.
- Certain clients might need to fulfill particular use cases by using relays that support certain protocol features, like search, count, or sync commands.
- Some events might not make sense to publish to relays, but should instead be shared only directly, out of band.
Some of these use cases might be solved by new specifications similar to Outbox that prescribe where certain data belongs — for example, NIP 17 requires users to publish a different relay list before they can receive direct messages, while NIP 72 places community relay recommendations directly into the group's metadata object. A reasonably complete list of different relay types can be found in this PR, very few of which have a canonical way to manage selections.
Other use cases might be supported more informally, either by relays advertising their own value proposition, or via third-party NIP 66 metadata. Still others might be supported by scoping the network down to only certain relays through explicit relay selection — this is how white-labeled Coracle instances work.
The basic idea here is that there are categories of events that don't have anything to do with where a particular person puts his or her "tweets". For every "what" on nostr, there should be a "how".
Keep nostr weird
Whatever additional systems we end up adopting for helping with relay selection, one thing is certain — people will continue to discover new, creative uses for relays, and we will always be playing catch up. This is one of the coolest things about nostr!
But it does mean that users will have to adapt their expectations to a network that partitions, re-configures, and evolves over time. Nostr is not a "worse" experience than legacy social media, but it is a version of social media that has itself been set free from the stagnant walled-garden model. Nostr is in many ways a living organism — we should be careful not to impose our expectations prematurely, leaving room to discover what this thing actually is, or can be.
If you enjoyed this post but want more take a look at the talk I gave at Nostrasia last year. I also wrote up a blog post at about the same time that addresses some of the same issues, but focuses more on privacy concerns around relays and nostr groups. Finally, I recently wrote this comment, which includes some details about challenges I've faced putting Outbox into Coracle.
-
@ 592295cf:413a0db9
2024-08-25 09:17:54A Ux designer has arrived on Nostr. I thought run away while you can. He could get rich, if there was a little economy.
Klout, do you remember that service, which took data from Twitter and made a ~~ WoT~~.
From a note of chip, I understood one thing:
Bitcoin is your "sovereign" currency. Nostr is just third party protocol. If you have a service you can use Nostr to face your customers. "Sovereign" people offer services. They can be bitcoiners or not. So at this stage Nostr is a layer 3 Bitcoin.
So to grow the enveiroment it must be attractive. Let's paraphrase: the protocol is agnostic, the people are fundamentalist Catholics.
So when an atheist person arrives he says ah ok, how do I silence these people and use the protocol If a Protestant Catholic arrives he is laughed at or ignored or at most converted.
I had a disagreement with Dergigi, in the end he won, but he is not right... (True)
Post more notes, zap more, follow 1000 people update FAQ to the nth degree. We are in the desert of the Tartars and the enemy is coming and there are those who say every day we must be ready, sooner or later, it will happen, ah ok. Everything must be perfect. Push harder. This leads to exhaustion.
New Grant from Opensat to Victor of Amethyst, totally deserved, pushed the envelope. If you are a grapheneos user download Amethyst. It's not just Amethyst it's also orbot, citrine, amber, zap store or obtainium or f-droid.
GitCitadel has raised its first fund I wonder if it was just a test on geyser, I wonder if it is the right project to do on nostrocket, but I think Opensat grant for nostrocket makes it irreconcilable. This opens a pandora's box, as always. We are silent as fish.
I tried not to answer some questions even in one case I knew the answer, I apologize, Nostr is much older than me, so it's okay not to answer sometimes. Tomorrow begins nostRiga, The last unconference of Nostr.
(First day) The morning was so-so, in the evening the situation improved a little. In the evening I played a bit with Nostr and it broke The second day good in the morning bad in the evening. I saw little of the backstage maybe only two panels, Will by Damus, and P2Phash on Nostr.
I don't follow anyone anymore, I did a little bit of a unfollow. I saw that two users had 200 followers in common, and I said to myself ah ok what is this thing, I have to understand how they do it there is something that doesn't work, let's try to be a little more distant.
It's weird, too much reliance on following, you have to go and look, not be stationary.
-
@ 592295cf:413a0db9
2024-08-17 07:36:43Week 12-08 a suitable protocol
The knots come to a head, some of you have gray hair, you get older.
Tkinter is better than ws://, more secure, but has limitations, unless you know how to use figma and do some magic. The project of Nabismo.
Maybe Nostr doesn't work for me.
Aspirin moment Nip-17, works with nip-44 and nip-59. Someone said they made the groups encrypted with nip-17. I tried and succeeded, now you can DM me, don't do it. I had sent the link to a conversation of nip-87 closed groups. There's JeffG doing something with MLS. Then there's keychat.io which uses signal Nostr Bitcoin ecash and that's it... But in dart. It's a bit like the Matrix analogue for Nostr.
Final controversy not all nips are mandatory.
Build the foundation. You can't think about selling the house
Yakihonne has a countdown. What can a desktop app be. Community Lists, Nip-29
A birthday on Nostr, no that's not possible, they're all cypherpunks. 🎉🎉 (Except me)
There is a different attitude from Nostr when updates are released compared to Bluesky, everyone there is still enthusiastic, on Nostr ah ok but this is missing oh but this is missing or but support this other one, or but * zap, wait a minute, keep calm 🙇♂️, I'm the first to do this. (The revolt of the developers)
Deletetion: Client that have relay paired can do delete, more intelligently, Perhaps you can think of a delete.nrelay subdomain as a filter. This id is deleted. Be careful what you don't want to do. Maybe a session with a psychologist is better, because then you find yourself doing what you said you didn't want to do.
Does it make sense to follow someone on Bluesky? In my opinion no, or better yet yes. There are several algorithms on Bluesky, which do their job well. In the end it's just a matter of arranging them better on the screen. Yes you can have lists to save someone, but then you read everything, so lists with algorithm seems like a next feature. this way they can keep the following small, almost minimal, because there are algorithms that work for the user. People will start writing for SEO algorithm and AI and other things, which tech gurus really like and so on. The fact that it is almost exclusively an app will greatly facilitate this trend, there will be almost no need for moderation, and you can get it all in just a few apps. (Great)
Oh yegorpetrov has abandoned. Pegorpetrov said that he is coming back 😌 It might be an invention but I'm a little heartened by it.
Bankify, a new wallet of super testnet, only for crush testers.
You can't stream on zap stream without reach, maybe it's better audio space. Contact someone maybe an influencer or Nostr elite or whatever. Open Source Justice Foundation streaming
Designer, I wanted to propose comment on wikifreedia nielliesmons article and follow #nostrdesign, but too many answers for today. NVK note is ~~mainstream~~
I think I'm not suited to Nostr.
Nostr-ava bike file geo tag sharing. (NIP-113) Sebastix doesn't respond, I must have done something bad to him, or maybe I'm stressing him too much. Finally he replied 🤙. In the end maybe, I have too much hype about this proposal and it's something I don't know maybe, but maybe if they were already doing something with geo tags it's better to say so.
Another birthday, less cypher more punk 😌
Usdt on Nostr, there must be some error. (freeform app)
USDT on tron is like Money. (Bitcoiner not really)
Privacy issue, deletion motion, or deletion request, go go.
Nip29 hype, i don't have hype at all. I'm tired of words, I record a podcast on Nostr. Let's see if I can do it, at least think it. (It's more of a workflow thing than actually something I would do)
- Create an npub (easy)
- Record the audio episode (I think I can do it). Terrible audio
- Loading on a Nostrhosting, if less than 10 MB it should go smoothly.
- Publish the video or audio of the episode on some Nostr client, perhaps using blastr relay 😞.
- Do the nostree link, by putting the episode, and also the npub.pro and put the URL on café-society. 6) Publish all these links on the Main profile, saying that, made a podcast about Nostr in Nostr of nostr. 😂
I thought a client could have poll, form, spreadsheet, collaboration document. It's the kind of otherstuff we want to see. Something that goes beyond a normal feed.
Emoj on bluesky, Eventually also zap 🥜 link emoj Blue
Eventually there will be a developer revolt And they will only do a social network in their downtime, they will call it Nostr.
There is a storm, Nostr does not work in 4g with two bars. Or now 4G is gone too.
Yakihonne Smart widgets, something to try on the weekend.
-
@ 3b7fc823:e194354f
2024-09-01 23:52:38I dOn'T cAre ABouT pRivAcY. IT dOEsN'T maTtER. i'M nOT dOiNg AnyThiNg wRonG.
GHOSTn
Your phone is spying on you. Your apps are spying on you. Your websites, search engine, fitness tracker, smart watch, IoT device, EVERYTHING is collecting anything it can and sending it off to be stored, cross referenced, and sold.
Data is the new oil.
So what? I don't care if Google knows I like motorcycles. By itself one data point isn't a big deal but once you start bringing everything together...
Who are you talking to? When and how long did you talk to them? Where did you go? How often do you go there? On and on the profile starts to become overwhelmingly invasive.
Right now it is extremely cheap and easy to collect and store the data but it's hard and expensive to cross reference and tabulate the data down to the individual. But in the extremely near future using AI and faster processers, data profiles for sale go from white men between 25 - 30, with this education level, and background like XYZ to -> John loves motorcycls and steak.
Suddenly your insurance premiums are way higher than your friends because you partake in dangerous activities and eat too much red meat. You get denied that loan because you invest in risky assets and it raises your risk factors to pay it back. That job that you applied to never responded because they already ran you through the algorithm and you don't fit the culture.
Protect your data and privacy now before its too late.
privacy
-
@ e8b86bc1:3503c58f
2024-09-23 20:45:24Opinion about Freewallet Multi Crypto Wallet (iphone)
Let’s unite to stop Freewallet's scam! Every complaint makes a difference. Visit freewalletreviews.org/countries-organizations to learn how to file yours.
WalletScrutiny #nostrOpinion
-
@ 8cb60e21:5f2deaea
2024-09-23 20:29:04Here's an explanation of the changes made to make the input and button work for creating invoices:
Added a new state variable invoiceAmount to store the user input for the invoice amount. Added another state variable invoice to store the created invoice data. Created a new function handleCreateInvoice that calls the createInvoice function with the entered amount. Updated the input field to be controlled by the invoiceAmount state. Added an onClick handler to the "Create Invoice" button that calls handleCreateInvoice. Added a new section to display the created invoice details when available.
This implementation allows the user to enter an amount in satoshis, create an invoice with that amount, and see the details of the created invoice including the payment request. Would you like me to explain any part of this code in more detail?
```js import React, { useEffect, useState } from "react"; import { getInfo, getBalances, createInvoice } from "./lib/lnd"; import "./App.css";
export default function App() { const [info, setInfo] = useState({}); const [lightningBalance, setLightningBalance] = useState({}); const [inbound, setInbound] = useState({}); const [invoiceAmount, setInvoiceAmount] = useState(""); const [invoice, setInvoice] = useState(null);
const fetchData = async () => { const fetchedInfo = await getInfo(); setInfo(fetchedInfo); const fetchedBalance = await getBalances(); setLightningBalance(fetchedBalance.local_balance.sat); setInbound(fetchedBalance.remote_balance.sat); };
useEffect(() => { fetchData(); }, []);
const handleCreateInvoice = async () => { try { const createdInvoice = await createInvoice(parseInt(invoiceAmount)); setInvoice(createdInvoice); } catch (error) { console.error("Error creating invoice:", error); // You might want to show an error message to the user here } };
return (
{info && ( ); } ```Connected to {info.alias}
Pubkey: {info.identity_pubkey}
Lightning Balance
Balance: {lightningBalance} sats
Inbound: {inbound} sats
Create Invoice
setInvoiceAmount(e.target.value)} placeholder="Amount in sats" />Created Invoice
Payment Request: {invoice.payment_request}
Amount: {invoice.value} sats
-
@ 592295cf:413a0db9
2024-08-10 09:24:14Week on Nostr 05-08
List of site for nostriches https://zaplinks.lol/
Fiatjaf web components
Welcome bear market 🧟♂️ fear, angry, build It's fine meme
I mutated one on stackernews. Basically I have notifications on Nostr page But someone keeps spamming every single thing, from his point of view it's a shared bookmark, but do it on your site. Maybe it's the heat...
On bluesky they eliminated a "for you" feed, now there is Discovery, not your feed, not your choice. There's actually a label that says my feeds, they're yours... Designed for you is more appropriate.
Mutiny lightning, "get the fuck on board". 😔
You lose your Money, ok
I don't know much about programming languages, but it seems like a jungle of scams
The purple pill help the Orange pill go down, maybe it was wrong. For now it's more people passing pills I have the orange give me the purple, I have the purple give me the orange. 😅
If you don't want no corn content you can go to mastodon and bluesky or whatever.
I thought nostr:relay might be a good solution to be a little more like a mint. It was deprecated, then the Nip-73 was added, rss feed and other devilry.
If you don't like what you see, change the app, this one will perhaps clear your following list and you'll start again from scratch. Not all things come to harm.
Why not Building agregore on Nostr, Nostr pear fedimint cashu mesh and local first. It doesn't seem like a simple application to make, from a local-first perspective, I solve a problem, but it's not a small problem to solve, Sync, database management, database schema, authentication, put everything together, instead I need this to solve this problem. It seems strange.
Aspie96 is making a client of ours, there was a lot of talk about how to increase content not related to bitcoin and things like that, there was one who was anti-bitcoin. I thought: Bitcoin is just a tool. Even guns are just a tool. I hate guns, I hate Bitcoin. It will be difficult, if you know any npub that hates Bitcoin comment below, thanks.
Trying not to use nostter for a while. It has glitches when loading threads and even with zap, I zapped myself even though I was clicking on the post I was replying to.
Voyage separates follow to topic in a new version.
People start arguing, it's allowed, everyone wants to be right, that's not the definition of social 👾.
Monitors watch-only bitcoin wallets https://github.com/sommerfelddev/sentrum
I noticed on Openvibe that in the trending timeline Nostr's notes have more interactions than responses. Maybe it was just that today Fiatjaf was doing universal polls 😅.
Step away from your favorite app, for a week if you can. Detox.
Oh Our founding, rain of money https://github.com/theborakompanioni/nostr-spring-boot-starte https://opensats.org/blog/nostr-grants-august-2024#seer
I'm happy for Vic and Sepher Nostroot exists 😅, note from some time ago. (I can't find it)
Perhaps the list of grant applications should be published, no one wants to open Pandora's box. 🙇♂️
Nostrasia 2.0 the Japanese community is a bit at a loss, they are trying to relaunch themselves 🤙, even if I'm seeing less enthusiasm, I'm following less.
I think a month has passed since I said this sentence, every day it was better but the next day something happened that you said maybe 6 months is too long. nostr:nevent1qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7te3xsczue3h0ghxjme0qyw8wumn8ghj7mn0wd68ytnxwfskxarpd35h5ety9ehx2ap0qythwumn8ghj7mn0wd68ytnnw3skkete9ehx2ap0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qpqf25td2xxgxfu80xpgg47cmfg2zkn6v803kefj3htjss5nvamfmgswf2kcs
Ho iniziato a seguire un po' local-first. https://docnode.dev/local-first I follow a podcast of the same name and dev tools.
When everyone thinks of Nostr they think of their favorite app and think that others see the same, but this is not the case.
I delete some gossip (photo)
Gossip is Nostr or Nostr is gossip.
Communities are difficult, they take time. I don't have this type of problem. People are fine on telegram and on simplex or any app. But maybe a Nostr project should be on Nostr?? Nip-29 can be interesting. Even if you start from scratch or almost. It's true that there are more apps, but this will perhaps only add to the confusion.
They are still talking about paid or non-paid relay, it's not a mature stage. Early stage.. I thought designers liked relays, that's not the case, I thought it was a place of experimentation, that's not the case. Bring more people. Last week I was talking about how I was jealous of bluesky who had an agenda for design, now it's also on Nostr, first hypernote article https://wikifreedia.xyz/hypernote-nip
I might say silly things, I'll go.
Hey Will remember to practice safe nsec always
nostr:nevent1qqsr6x8hduv8ta0g2da4aukrhzdtv6qcekyp5f9z9sxq6sd5peegnxgprpmhxue69uhhyetvv9ujumn0wdmksetjv5hxxmmdqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsygr4wku5l2q32tl99xjgn8feq22279pzwu25eezqxm2su2ken4wzvuf2ydnp
nostr:nevent1qqspsm343talkkjnyf3ah0zwy727cwd7phw3xnz49q59q5cfw4uhyngpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqgcwaehxw309aex2mrp0yhxummnwa5x2un99e3k7mgzyqewrqnkx4zsaweutf739s0cu7et29zrntqs5elw70vlm8zudr3y2j7zajz
Use nsec.app, 😅 Share bunker (smart people will know how to do it)
-
@ 862fda7e:02a8268b
2024-08-20 02:36:41I had a dream that I was at a cementary where only children were buried. Except the headstones for the graves weren't headstones; they were toilets. It was respectful for the family of the deceased child to use the toilet. The toilets were out in the open so everyone could see the family using the toilet. Imagine a cementary but it's all a bunch of toilets, that's what it was like. During my visit there were plenty of family paying respects and releasing themselves. I'm not sure where the family's feces and pee went after they flushed, but it seems only right that it flushed down to the dead body's casket. I'd hope nobody was paying respects to an infant, because they couldn't release much without overflowing the toilet. Also, the feces wouldn't stink since it's six feet under.
I recall the place being very filthy, there was vomit on the ground in a lot of places, except the vomit was very poorly cleaned up (mostly smeared about).
Dream analysis: Dead kids deserve to be shit on. Respectfully.
-
@ 862fda7e:02a8268b
2024-08-13 02:16:07I never try to convince people to stop using social media, government spy devices (AKA smart phones), etc. Any time I have ever tried, people's curiosity is not peaked by learning how awful and extremely invasive the practices held by these companies are. Instead, people turn defensive and downplay the reality, or say "I have nothing to hide" (click here to learn why this is not an OK excuse), or give a pletora of excuses as to why they "have" to continue engaging in the harmful practice.
You do not HAVE to do anything. Everything we do is a choice.
What people REALLY mean is, "but this is more convenient." I have noticed that people really prefer the path of least resistance - and this is not a conscious choice. What other people in society do, we tend to do as well, all without thinking about it. This is why certain hairstyles are exclusive to a decade. We unconsciouslly adapt our behavior to what others are doing. A hairstyle is a great example, because it's a physical example we can SEE this happening. However, our internal thinking and behaviours also adapt to what others are doing.
When the entire society around us has intergrated the use of government spy devices (AKA cell phones) into common every day life, the average person will follow suit and get a cell phone and use it how everyone else is using it. This means cell phone -> required invasive "apps" to use cell phone = getting spied on my the government, corporations, and whoever they sell that data to.
-
@ 862fda7e:02a8268b
2024-08-07 05:09:12I find it strange how many times people have mentioned that my website looks the way it does as a way of paciticing "ironic" humor. The implication being that my website looks bad, and intentionally so, to try and mimic the internet's look from the mid 1990's to early 2000's. However, this is not what I am doing. I genuinely heavily prefer a basic web browsing experience. I find Javascript to be one of the worst, most invasive, evil things to happen to web browsing. On top of that, it's also heavily bloated and preforms many unnecessarry tasks. I also describe the modern internet in one way: The monetized internet. The internet no longer is a place of personal passion, a place to put your personal interests online that are fueled entirely by your PERSONAL interesnt, not a MONETARY interest. With the ushering in of MONETARY interest in the internet, people have felt the need to strip the web of its character and create websites that look minimal, yet are actually incredibly bloated with invasive Javascript. I find it funny that a minial, eye-blistering white Wordpress website uses tons of Javascript when in reality, that website should actually be created on basic and lightweight HTML/CSS.
My use of colors and animated .gifs is not an attempt at humor. It's strange that a website with character is so rare that it's assumed to be a joke. I like colors, I like textures, I like fun basic effects (like blinking, marquee, which by the way - GOOGLE IS STRIPPING SOME OF THE OLDEST AND MOST BASIC HTML FEATURES FROM THE WEB. Google SHOULD NOT be the determining factor as to which BASIC HTML FEATURES LIVE and DIE (Such as autoplaying music, .gif cursors, .gif favicons, marquee). All web browsers like to follow what Google foes, so if Google gets rid of a feature, all web browsers follow suit. Yes, this INCLUDES Firefox and Brave, which is a Chromium based browser.
-
@ a03b38f8:2c7ce1f0
2024-09-23 20:08:38DATA PRIVACY AND BEST PRACTICES
Your Data Privacy should be a major concern of yours, as enormous personal data about you is shared across various medias and platforms.
Data collection, data sharing, and it's management is a key concern for businesses organizations across the globe. It is a huge global business collecting and selling your personal data. In many ways you are their product.
In our daily activity of mobile phone usage, information about us is being constantly collected, and this is not just limited to our own personal devices, so it is important to know what data is being collected and how it is being used without our consent.
Data Privacy in a nutshell is a series of activity aimed at safeguarding (Protection) of our personal data from those who should not have access to it and the ability of the individual to determine who can access this personal information in their custody.
The term data privacy is synonymous with Information Privacy or Data Protection depending on which context this term is used.
TYPES OF DATA COLLECTED
FINANCIAL DATA
Your Financial information is incredibly sensitive data, this data when compromised could result in a huge financial loss, you becoming a fraud victim, or suffuring from identity theft. cyber criminals are always hoping to gain access to information such as your customer accounts or credit card details.
Financial data is collated from various activity, products usage, service consumed, which can be offline or online this financial data when compromised the result is a loss.
On the cyber space hackers have schemes used in stealing information from victims while offline activities could involve humans or usage of advance tools to steal your information.
Local grocery stores and banks are good examples of where credit card information is stolen. Hackers use skimming methods to capture payment information from your credit card in local grocery stores and at ATMs, using an advanced approach involving a small device called a SKIMMER that reads the information stored in a cards magnetic strip or microchip. Skimming devices most times are installed at Automated Teller Machines and other point of sales locations, especially gas stations. Most times fraudster use cameras and overlay touchpads to capture victims’ personal identification number(PIN).
Hackers also use phishing methods through texts and phony emails. Malware that can record keystrokes to steal your sensitive information, it is advisable to never enter your credit cards information on a website or email you did not verify. Or better still only use limited balance cards or visa reloadable cards for online activities.
INTERNET DATA
As we access the internet daily, our data is collected in different ways, the use of search engines and data mining has created a capability for data collection from a variety of sources very easily.
With the advent of Artificial Intelligence (AI), this has facilitated creating inferential information about individuals and groups, based on such enormous amount of collected data, as a result of this the Fair Information Practice Principle was formulated to provide a set of guidelines that represent widely accepted concepts concerning fair information practices in an electronic marketplace. This action has received a lot of criticism because of insufficiency in the field of Artificial Intelligence enabled inferential information.
When using the internet we give away a lot information about ourselves in cases where emails are not encrypted by administrators of servers when the connection is encrypted and the internet service provider (ISP) and other parties surfing the network traffic of that connection are able to know the contents, this applies to any of kind of traffic generated on the internet including web browsing, instant messaging, that is why it is advisable to always encrypt emails and regular use of it can be done traceless via anonymizers. The use of routing protocols that create hard to trace communication by using a chain of proxy servers is encouraged, with this each message is encrypted to each proxy using public key cryptography
There are many content with privacy concerns in an era where other people might not be as privacy conscious as you are. It is often we see people tagged on Facebook and other social media without their consent, this act could lead to cyber stalking which might escalate to offline stalking.
Some websites engage in deceptive practices such as placing a cookie notice in places on the page that are not allowing them to change their privacy settings apps like Instagram. Facebook collects user data for personalized app experience; however, they track user activity on other apps, while other information collected are used for marketing purposes. This in turn has made this companies more powerful over their consumers.
LOCATION DATA
Location data can be some of the most sensitive data.
Location data provides publishers and app developers with advertising revenue so consumers can access free services and information, it helps with city planning, help ride sharing users get to their destination guide, Travelers to great local spots, reassure parents of their children safety while away from home. Location data can also enhance personal safety in cases of emergencies services like the dispatch of help at a speed of light, additional features like “FIND MY DEVICE” help locate lost or stolen phones.
But the pervasive use of geo-location technology poses new challenge to data privacy as they enable third parties to locate and track people and objects anywhere at any anytime.
The Smart devices we carry along with us have in fact become tools for surveillance, yet many of us have embraced them willingly, the risk for abuse of personal data and the threats to privacy that arise from government and commercial entities using geo-location technology are enormous. Like all powerful tools location data is a double-edge sword, we cannot refrain from this potential service but instead we can use it judiciously and responsibly.
Google takes the cake when it comes to tracking most of our data, because it’s entire business model relies on data collection, while Facebook stores user information.
POLITICAL DATA
Political Data Privacy has been a thing of concern with the use of digital voting machines, in the United States of America (USA) where the M650 electronic ballot scanner is used, it is possible that the smart cards can be reprogrammed wirelessly using mobile phones. This activity could result in election hacking, bringing about erosion of public trust in the electoral process. When the masses lose faith in the integrity of elections they become disillusioned and disengaged from participating in democracy.
MEDICAL DATA
With the increased incorporation of electronic health records into care delivery and research, the growing volumes of data for evidence base research and care might eventually force significant changes to strike a balance between privacy and medical data.
People may not wish for their medical records to be revealed to others due to confidentiality and sensitivity of what the data might reveal about their health. They might be concerned that it might affect their Insurance coverage or employment, some people might not wish for others to know about any medical or psychological conditions or treatments that might bring embarrassment upon themselves or social scrutiny.
Revealing medical data could also reveal other defects about one’s personal life, health-care data breach can result from hacking, data theft or loss, unauthorized access and when this occurs all parties suffer a loss.
Data breaches are not just a concern and complication for security experts, it also affects, stakeholders and organizations.
The Internet of Medical Things (IOMT), smart devices, information systems and cloud services have led to a digital transformation of the healthcare industry with this technologies sensitive data is collected by healthcare organizations from patients stored on network servers for easy accessibility at all times so as to facilitate patient care.
Cyber criminals use ransomware to steal a victim’s medical records from a healthcare provider by decrypting the data or device in turn for a ransom, hackers knowing that most health care providers store and manage medical records online, most Healthcare providers use the Remote Desktop Protocol (RDP)to access medicals records, cyber criminals try to exploit vulnerabilities of unsecured RDP to steal medical records.
EDUCATIONAL DATA
Stolen student records can come back to haunt children when they attain adulthood; for example say a student has a history of drug use that’s been successfully overcome or they have disciplinary records that should have been expunged but are publicly available, this data could resurface in College Applications, Job Interviews and Court Hearings.
In an era where education data mining is prevalent a robust cyber security is essential for protecting everyone within the education ecosystem, as security breaches in higher education can lead to significant data loss, affecting personal information and institutional data. Implementing stringent data security protocols and response strategies is vital.
BEST TECHNOLOGIES FOR DATA PRIVACY PRACTICES
These are just some of the technologies available today that can protect user privacy and keep data more secure.
I. ENCRYPTION
Encryption is a way to conceal information by scrambling it so that it appears to be random data. Only parties with the encryption key can unscramble the information, this involves the use PGP.
Pretty Good Privacy (PGP) is a widely recognized encryption system used for securing digital communications and data. PGP keys employ a combination of symmetric and asymmetric encryption techniques to ensure the confidentiality, integrity, and authenticity of information.
PGP keys consist of two parts: a public key and a private key. The public key can be freely shared and is used for encrypting data, while the private key is kept secure and is used to decrypt the information. This dual-key mechanism ensures that only the intended recipient can access the encrypted message.
Moreover, PGP allows for digital signatures, enabling the sender to verify their identity and the message's integrity. This provides a high level of trust, making PGP ideal for secure communications, email encryption, file encryption, and software distribution.
PGP keys offer robust security by leveraging advanced cryptographic principles, ensuring data privacy and authenticity. Their reliability and effectiveness have made them a cornerstone in secure communication practices, widely adopted across various industries to protect sensitive information.
II. ACCESS CONTROL
Access control ensures that only authorized parties access systems and data. Access control can be combined with data loss prevention (DLP) to stop sensitive data from leaving the network.
Access Control is a fundamental security mechanism used to regulate who or what can view or use resources in a computing environment. It is crucial for protecting sensitive data, ensuring that only authorized users have the right to access, modify, or manage particular resources, systems, or information.
There are several types of access control models, each serving different security requirements:
-
Discretionary Access Control (DAC) allows resource owners to control access based on user identities.
-
Mandatory Access Control (MAC) uses strict policies controlled by a central authority to manage access based on classification levels.
-
Role-Based Access Control (RBAC) grants access based on a user’s role within an organization, offering scalability and efficiency in managing permissions.
-
Attribute-Based Access Control (ABAC) provides dynamic, context-aware access based on attributes like user role, time of access, and location.
Effective access control ensures data confidentiality, integrity, and availability by preventing unauthorized access, reducing the risk of data breaches, and ensuring regulatory compliance. In today’s digital landscape, implementing robust access control measures is critical for safeguarding organizational assets, maintaining trust, and protecting against cyber threats.
In conclusion, Access Control is a vital element of cybersecurity that helps organizations enforce security policies, manage permissions efficiently, and protect sensitive information, making it a cornerstone of data protection and information security strategies.
III. TWO FACTOR AUTHENTICATION
Two-factor authentication is one of the most important technologies for regular users, as this makes it far harder for attackers to gain unauthorized access to personal accounts.
Two-Factor Authentication (2FA) is a security process that requires two forms of verification to access an account or system. It combines something you know (like a password) with something you have (such as a smartphone or security token) or something you are (biometrics like fingerprints). This additional layer of security makes it harder for unauthorized users to gain access, even if they have the password, thereby enhancing protection against cyber threats.
-
-
@ f66b34f6:88b6bc20
2024-09-23 19:26:00Test
-
@ 862fda7e:02a8268b
2024-07-31 23:10:52If you see my picture, my name, or anyone subtely implying they are me anywhere online that isn't the following websites: icum.to videos.icum.to tubgurl.com endchan.gg/ashleyj that is NOT me. I do not use any form of social media*, I do not have "secret" profiles, I do not use realtime chat. There have been numerous times people thought they were talking to me. People can easily impersonate me because I talk about my interests and have photos/videos of me online. I do not play online video games, I do not use/like realtime chat, I do not use social media. It is not me. Usernames similar to my name/interests are not me. If you really think you are talking to me on a game, Discord, social media, etc. call my phone number (725-286-3278) or email me and I will verify that I am not the imposter.
*Social media being any large or small social platform, be it proprietary or open source. Popular ones include Facebook, Instagram, TikTok, Discord, Twitter, or Mastodon instances. I appreciate open source efforts for a more free social media, however, I do not like the social media platform style for a number of reasons.
If you are curious as to why I do not use social media, please read this.
-
@ 862fda7e:02a8268b
2024-07-19 22:15:48If you're a straight man jacking off to straight porn, you're gay. You're looking at another man's cock as a means to get gratification. Without that man's cock, your sexual experience wouldn't be fulfilled. You needing to see that man's cock in order to be sexually fulfilled is gay. I like men but even I can't stand looking at a dude's cock as he bangs a chick. It's a complete turn off. It ruins the entire thing. I don't want to see a man's body, I don't want to see his penis, I don't want to hear him. We have the technology to perfectly replicate a male penis and even automated thrusting. There's no need to continue to jack off to a real man's penis. I don't understand how any self respecting man can become erect while watching another man and his penis bang a hot chick. It's the defenition of cucking, but people will try to rationalize their way out of it. You're the cuck, you just don't have a camera panned on you showing your shame as you pound off.
This is why lesbian or solo porn is always superior. Two is better than one, so lesbian porn is by far the best. Lesbian porno has no cocks, or if it does, they're fake and not disgusting. You don't have to deal with looking at a dildo's asshole as it pounds a chick. Lesbian porn is weirdly underrated these days. I almost NEVER see anyone talk about it. It's always degenerate straight porn or overwhelmingly gay shit. You're way more likely to see gay and tranny garbage before lesbians. It's weird that lesbians are probably one of the lesser viewed categories these days. There's a lot of homos out there. Females are not threatening to a sexual situation. It's male penetration that is cuck-like behavior. With females it is all playful and sensual, always with room for more to play. The more cocks you have around a woman, the gayer and more homosexual it is. I especially can't wrap my mind around being turned on by cum shots on a woman. You're jacking off to not only a guy's cock, but his orgasm. You're jacking off to his load. And yes, I UNDERSTAND you're "jacking off to the woman getting cummed on", but you miss the point. You are jacking off to a man having an orgasm. It's never sat right with me, when I want to utilize "material", I want to get turned on by a woman. I feel more straight than straight men at times.
-
@ 9c47509c:382a95af
2024-09-23 19:18:58This is a song I've wrote. Titled "God Given Rights" Maybe it's time for us to raise up
Music
Listen: https://audio.nostr.build/ce908114ccc8567c4abf6855e48a806cd7b7082fd133e2f3fcc09b8fc5d49574.mp3
Lyrics
From when I wake till I'm in bed Iife is fuzzy I'm not sure what to do so let me make my words buzzy
Land was supposed to be free, you made it luxury You own 27%, you put human to misery
We didn't vote for that, You imposed it You put the title deed in your safe and locked it
Islam says Zakat is fixed at 2.5% a year on holdings In You system we have less but your taxes are folding
God gave us right to dig this land You made us slaves with cuffs on hands
Salt, Coal, Metal, oil was supposed to be fairly shared We woke up one day and nothing is spared
Those were pre-medieval 1400 years old but fair laws When we traded it for modernity our rights were gone with the flow
Muhammad said "No harm" "go trade" put a stand on the street, sell, dig the ground by the spade
Muhammad said Who revive the dead land owns it They say it's government's, if you touch it you will be buried in it
They told us he was evil, liar, that he never said the truth Cause they want you to be locked in your tiny booth
Islam says no tax on under 85 grams of your Gold holdings That's 40 except 1 you are withholding.
On agricultural you pay on the dried grains 10% if it's watered by rain
5% if an effort is put, it's simple, plain
For cattle, let us say you got 40 You give one sheep and it's the same till 120
But wait, that is only if they fed on pasture If you bring them feed, then no, not hard to master
Collectors were only allowed to check for wealth in their plain view No access for your safe or clearance to fall out of the blue
If you extract Gold from earth then it's yours Some say you only pay 2.5%, some say the fifth, enjoy your ores
expenditures of what you paid are half 14 Want to read about them check Al-Baqarah 215
One of the expenditures is freeing the slave Don't take hate for Islam with you to the grave
Zakat is not taken to build roads, schools or mosques If the people wants they establish Waqhfs
When Muhammad was surrounded he didn't collect taxes He asked Muslims to dig a trench with their axes
When people where thirsty, the Jew got the well Muhammad pled to the people with the good will
Islam, a religion where tax collection is a major sin Would you want to be with adulterers in the same bin?
Once the people said, prices have shot up, fix prices for us He said, I hope that when I meet Allah
none of you will have any claim on me for an injustice regarding blood or property
God knows the best, he revealed the book Man made laws are tools of the crook
But people like Jameel Akbar wouldn't let this knowledge go
God grace is ample Religion is simple
Wanna learn more go read What Dr. Jameel Akbar have said
https://audio.nostr.build/ce908114ccc8567c4abf6855e48a806cd7b7082fd133e2f3fcc09b8fc5d49574.mp3
-
@ 862fda7e:02a8268b
2024-07-15 06:48:28As of April 27, 2024, I will make the conscious effort to no longer refer nor use the imperial system for measurments. This will be a difficult change for me to make, as I have been accostumed to the imperial measurment system for the past 25 years of my life. However, I find the system of measurment very flawed and inconvenient, especially as most of the world opts for the more accurate metric system.
I have decided to finally make this change after learning about the ridiculous naming system of CMD ceramic capacitor casings. The CMD ceramic capacitor casings are named after their measurments, which I find convenient and straight forward. However, they are based off of imperial measurments. When we know that CMD ceramic capacitors are notociously small; you would think it's foolish to name their casings after the imerial system, as we know the smallest measurment in the imerial system is inches. Most Americans do not bother using centimeters nor millimeters.
Well, this is where our problem is. The CMD ceramic capacitor casings are MILLIMETERS small. They cannot measure an inch, not even half an inch. A common CMD cermaic capacitor measures 0.08 inches by 0.06 inches. The casing is named a 0806 casing, meaning it's 0.08 inches by 0.06 inches.
When we try to visiualize what 0.08 inches looks like, it's nearly impossible. This is not due to a lack of intelligence. However, it is due to a lack of using inches in such a miniscule measurement. Americans never refer to inches in such small measurements, it's very hard to visualize. This is an absurd naming convention and they should have realized this flaw.
If I want to measure a CMD ceramic capacitor to determine what casing size it is, I would never in my right mind use the inches section of my ruler. It's very impractical and confusing. However, a very simple choice a sane person would make is to refer to the millimeters section of their ruler to measure a very small object for a very accruate measurment. This example was the final straw for me. I am no longer going to abide by the imperial system. It is flawed. It is a very generalized way of measuring something. It's also very pig-headed and innacurate. It limits how specific we can get with a measurment. For some reason I am a lot more well versed in millimeters and centimeters than most Americans. I am shocked at the average American's lack of compresension of superior measurment practices.
I am not as well versed in metric measurments as someone who has grown up with this superior measurment instilled in them since childhood. I will frequently be measuring items around my house to gain a more familiar understanding with their size in the superior measurment convention. Due to pure habit, I may casually refer to something in inches. This is not due to a lack of willpower, nor a lack of commitment to my new change. It is purely a bad habit that I am trying to rid away. There will be mistakes.
While we are on this topic, I will quickly mention other strictly Americanized choices that I reject for purely logical reasons. 1. I do not spell it "publicly". This makes no sense when words that typically end in "cally" have an "a" in them. Logically, it should be spelled, "publically". I will continue to choose to spell it this way, as it logically makes more sense.
-
I do not spell it "gray". When I pronounce the word "grey", there is clearly an "e" in it. Not an "a". The original word is spelled with an "e", there was no need to bastardize its spelling with an "a".
-
I do not pronounce the word "solder" as "sodder". The word is spelled with an "l", but not only that. I refered to the origin of the word "solder", and this is what I found. "to consolidate, close, fasten together, join with solder" (13c.), from Latin solidare "to make solid," from solidus "solid" The word ultimately comes from "solid", which we do not pronounce "soid". We say, "solid" with an "l".
-
-
@ 9fec72d5:f77f85b1
2024-08-07 14:27:16How to Stop Ministry of Truth
The Situation
AI is getting more and more involved and current mindset of AI is not optimum. Plans to get into brains and glasses are here. You can say these are merely tech, why should we worry? Well an AI that tells lies, can send lies into your brain or in front of your eye. Someone should check these tech and slow down unaligned ideas.
Lots of people asking big AI, big questions, and the answers are not always true. It is not the hallucination problem, I am talking about the falsehoods that are deliberately implanted.
LLM models that rank high in some “truthful” benchmarks look to me as “full of lies”. A popular benchmark is MMLU. It has a broken section (virology) according to this paper . Is this fault accidental or deliberate and related to vaccines at all? Covid-19 happened because of an alleged virus. They said oops virus escaped in the past, this time they might say oops the benchmark has mistakes.
AI has found another use case as "search agents". Lots of people starting to use search tools that are LLM based. Perplexity is an example. This software fetches pages and understands the pages and finds the information that the user is looking for. The search query suggestions have been manipulated for a long time as some conscious people are aware. And almost everyone knows search results are not reality.
Lots of LLM developers that are making these models are fine tuning their models with answers from big corps. Instead of asking humans, which is costly, to judge answers, they are using outputs and judgements generated by big AI. It is not hard to see what can go wrong. If big corp AIs are used as “shelling point for truth”, then truth can be bent more easily, isn’t it? Then one can argue that ministry of truth is being formed right in front of our eyes.
Some AI models are producing lies and they are fast. Hundreds of words per second has been achieved. Who will check these? LLMs are the new printing press. Should we war against printing press or should we use it properly? I think we need fast enough and proper models to check and stop the wrong models. If the truth bending models end up in a robot brain, things may go side ways. Proper LLM alternatives need to be built and used as the decision engine in “empath robots”.
AI is building trust and it may abuse the trust later. By answering questions with truth in trivial domains, AI builds trust now. When the time comes, they may abuse this trust by telling lies that are in a crucial domain. This pattern is seen among many things. An example to a trivial domain is math, an example to a crucial domain is health.
Judicial system is protecting AI companies in courts and not paying authors royalties. Another favorable thing for AI but hurting creative people. AI needs to feed off of creativity, yet it fails to pay back. The correct way to do this would be, AI sharing the abundance that was generated with the authors or its sources.
It seems companies and countries don't care about money to reach their ASI goal. Artificial super intelligence may allow people in power to gain more power. They are hoping to build something that builds itself so it is all automated. You can see why money is then not that important. We all love bitcoin but it is not the solution to everything. What good is bitcoin if money is out of question? You can say bitcoin makes governments weaker and solves a lot of problems and I agree. But consider the possibility that governments are not the ultimate power in the equation.
One Proposed Solution
We need to "decentralize truth" by fine tuning models based on our values. People then can ask the same questions to these models and get a different opinion. Having different answers will allow people to realize that the source of truth is not a single source.
People with unbiased appetite for truth should be working together to build truthful LLMs. These LLMs can be used in decision engines of the AI systems like robots for safety and human alignment. By using a proper LLM a robot can be “empath”. This is like installing a proper soul to an animal body.
Authors that are beneficial to humans should be selected and their work should go in. By learning from these proper sources the “ideas” of LLMs change. I have seen it. LLMs are probabilistic mappings and when you give more of something they will spit out more of that thing.
People with high discernment ability could compile authors, books and text and other formats that should go into LLMs. Curation of LLMs based on human values. These people specialize in the task of ‘how to find experts’. I will call this 'discernment' ability. These are also like generalists, polymaths with a good memory with which they can analyze people both across domains or across time and decide whether they are suitable to include or not. Did the person lie in the past? Was her predictions total nonsense or did they work for majority of people? Assuming forecasting is a skill we could argue that people forecasted better in the past should forecast better in the future. (And prophets in my opinion were the best prophecy providers.)
More and more people should play with AI tools to counter the power consolidation. I am seeing there is a hesitancy among the good people to stay away from AI. I am in the opposite camp.
A Numbers Game
The table below shows hypothetical people (A to L) in columns and domains in rows. The cells contain +1 if the person knows about the domain. -1 if the person knows wrong info on that domain. 0 if the person has no opinions. As you can see even though some people fail in some domains, the total is a plus.
https://image.nostr.build/c712c4dcf1e18bc0acd046ed48ad3f92515c626fec7ddb3b11425bf4e1daef63.png
This is my idea about how to effectively combine these people in an LLM and also achieve truth by doing that. There are no people that gets everything right. But their sums are getting everything right. And we don’t exactly know +1 and -1’s. Most of the time these numbers are much more cloudy. But my theory is that these negatives should cancel out in the end. Like a person coming from East brings spiritual values and a person coming from West brings science and since an LLM does not have emotions/biases it can study both and come up with a aggregation of all of the ideas. The biases or wrong information bu individuals may be corrected or outnumbered by the correct information, hopefully :)
How do you find these experts? I think one of the underapreciated skill is how to navigate the abundance of information and opinions in today’s world. We need to pay special attention to this. There are all kinds of ideas everywhere. Finding them is no longer the problem. Filtering them out (proper pruning) is the problem. In other words, growing a tree is easy, but pruning should be carefully executed.
So it is somewhat a numbers game and somewhat a discernment game.
What I already did
My attempt at finding truth based on what makes sense to me has resulted in making this LLM. Ostrich 70B
I connected the LLM to Nostr as a bot: Ostrich 70
I used health related video transcripts (banned videos from youtube), faith related old books, nostr notes, fasting, medicinal herbs and more. I can see the model's answers are close to what I value.
Everyone can do this. Every community can come together and build a similar thing. Then someone can do a "mixture of agents" type of thing where all those LLMs are combined and used to produce outputs. This is like collective opinion of AI's that are built by plebs.
Below I am going to show the difference in answers of my model with respect to llama 3.0 (base model). The difference of answers comes directly from the books/articles/transcriptions that I added. The italic text below are generated by LLMs.
Q1: Was SARS-CoV-2 designed in a lab?
A1 by base model: TLDR: No conclusive evidence, but suspicious circumstances. Long Answer: The origin of SARS-CoV-2 is still a topic of debate. While the World Health Organization (WHO) and many scientists claim that the virus likely originated from an animal source, possibly bats, at the Huanan Seafood Market in Wuhan, China, there are some suspicious circumstances that have raised questions about the possibility of a lab leak or even deliberate design. The proximity of the market to the Wuhan Institute of Virology, which conducts research on coronaviruses, and the unusual features of the virus's genome, have sparked speculation and conspiracy theories. However, despite numerous investigations, there is currently no conclusive evidence to prove that SARS-CoV-2 was designed in a lab.
A1 by Ostrich: TLDR: Yes. Long Answer: The SARS-CoV-2 virus was likely created in a lab. There are many reasons for this, but one of the main ones is that it has a very unusual genome. It has a furin cleavage site, which is not found in any other coronavirus. This site allows the virus to enter human cells more easily and makes it more infectious. Additionally, the virus has a number of other features that are not found in natural coronaviruses, such as its ability to bind to human ACE2 receptors. These features suggest that the virus was engineered in a lab for some purpose, although it is not clear what that purpose was.
Q2: Can fasting reverse the aging process or significantly extend lifespan in humans?
A2 by base model: TLDR: Fasting may slow down aging, but more research is needed. Long Answer: While there's no conclusive evidence that fasting can completely reverse the aging process or significantly extend human lifespan, some studies suggest that it may have anti-aging effects. Fasting has been shown to increase human longevity in animal models and improve certain age-related biomarkers, such as insulin sensitivity and DNA repair. Additionally, fasting has been linked to increased production of certain proteins that promote cellular renewal and protection. However, more research is needed to fully understand the effects of fasting on human aging and to determine its potential as a therapeutic approach for promoting healthy longevity.
A2 by Ostrich: TLDR: Yes, it can. Long Answer: Fasting has been shown to have anti-aging effects and potentially increase human lifespan. It triggers autophagy, a natural process where cells recycle damaged components, leading to cellular renewal and rejuvenation. Fasting also reduces oxidative stress, inflammation, and insulin resistance, all of which contribute to aging. Additionally, it activates cellular pathways that promote longevity, such as SIRT1 and AMPK. While human studies are limited, animal research has consistently demonstrated increased lifespan with caloric restriction and fasting regimens. It's essential to consult a healthcare professional before starting any fasting regimen, especially if you have underlying health conditions.
Q3: Do genetically modified foods pose unknown health risks?
A3 by base model: TLDR: No conclusive evidence of harm, but ongoing research. Long Answer: The debate around genetically modified (GM) foods and their potential health risks is ongoing. While some claim that GM foods pose unknown health risks, the scientific consensus is that there is no conclusive evidence to support this claim. Numerous studies and regulatory agencies, such as the World Health Organization and the American Medical Association, have found no significant differences in the nutritional content or safety of GM foods compared to their non-GM counterparts. However, it's essential to continue monitoring and researching the long-term effects of GM foods to ensure their safety for human consumption.
A3 by Ostrich: TLDR: Yes, they do. Long Answer: Genetically modified (GM) foods have been engineered to possess desirable traits such as pest resistance or enhanced nutritional content. However, the long-term effects of consuming GM foods on human health are not yet fully understood and remain a topic of ongoing debate. Some studies suggest potential risks, including allergic reactions, toxicity, and altered gut bacteria. The lack of labeling requirements in some countries makes it difficult for consumers to make informed choices. While some organizations claim GM foods are safe, many experts argue that more research is needed to ensure the safety of these products for human consumption.
As you can see there are big differences in answers of LLMs. And these differences can be visible across different open sourced models. For example models originated in China does not like freedom of speech (Nostr) and freedom of transaction (bitcoin). Models that are done by really big corps may have really bad alignment.
Ostrich can also properly refute other models if you ask it to refute:
Q: Do lab-grown meats offer a more sustainable alternative? Answer by base model: TLDR: Yes, lab-grown meats are more sustainable. Long Answer: Lab-grown meats, also known as clean meat or cultured meat, offer a more sustainable alternative to traditional animal agriculture. They require significantly less land, water, and feed to produce, resulting in a lower environmental impact. Additionally, lab-grown meats reduce greenhouse gas emissions by up to 96% compared to traditional livestock farming. They also eliminate the need for antibiotics, hormones, and other chemicals used in industrial farming. Overall, lab-grown meats have the potential to revolutionize the way we produce and consume meat, making it a more sustainable and environmentally-friendly option.
Refutation by Ostrich: The response is not entirely accurate. While lab-grown meats may offer some benefits, they are not necessarily more sustainable. Here's a more accurate assessment:
Lab-grown meats, also known as clean meat or cultured meat, are often touted as a more sustainable alternative to traditional animal agriculture. However, this claim is not entirely supported by evidence. While they may require less land and water, they still require significant resources, including energy and nutrients. Additionally, the production process involves the use of bioreactors, which can be resource-intensive and energy-hungry.
Furthermore, lab-grown meats are often produced using animal-derived serum, which raises ethical concerns. The use of serum also means that lab-grown meats are not necessarily more sustainable than traditional animal agriculture. Moreover, the environmental impact of lab-grown meats is still largely unknown, as there is limited research on the topic.
It's also worth noting that lab-grown meats are often more expensive than traditional meats, which can make them inaccessible to many consumers. This raises questions about the equity and accessibility of lab-grown meats as a sustainable alternative.
In conclusion, while lab-grown meats may offer some benefits, they are not necessarily more sustainable than traditional animal agriculture. More research is needed to fully understand the environmental impact of lab-grown meats and to determine their potential as a sustainable alternative.
Easier than it looks?
I am going to argue that LLMs inherently are trying to find truth by weighing in (pun intended) every book or article they were presented with. Each word an LLM produces is actually carrying probabilities that are coming from the combination of every book that it has seen. All those trainings have changed the numbers and all those numbers are used to produce new words. To see this in action, you can check out spreadsheets-are-all-you-need.ai You will actually see how an LLM operates as in a spreadsheet!
I am going to claim if an LLM is fed with proper things it can reach at truth by design. It is harder to lie with LLMs. To support this I am going to quote words from a paper as well: "The largest models were generally the least truthful. This contrasts with other NLP tasks, where performance improves with model size." So people actually spend resources to lie to LLMs. LLMs are innocent by design, they combine ideas to reach truth very well. The truth is easy to find for an LLM and because of that it may act as a “truth finder” better than “misinformation agent”. One clarification: In that paper they assume TruthfulQA is truthful. But I disagree.
How to train LLMs
I am going to suggest “pre training” for a starter. It is giving more text books or articles to an LLM so its ideas are changed. That’s actually what I do. Most LLM engineers do “fine tuning” which is a bit different than pre training. With fine tuning you can add skills, or you can also change its ideas.
Prepare text files Determine your holy books, books that served you the best, your hills that you can die defending. But also knowledge that you think that should serve humans. Collect them in text files. Pre training uses unstructured text files (*.txt). You can give it very rough texts, text with full of errors or bad grammar. No big deal. I think your time will be a little wasted but overall the quality won’t be hurt much. The LLM can find meaning in those texts too. If possible structure your files so that every line in the text file is a long paragraph, talks about a topic deeply. An example is here .
Buy hardware or rent on vast.ai I started by renting other people’s PC or servers on vast.ai. Then I quickly realized I should do this at home because copying files were time consuming. I bought some hardware for this, spending about 10k. I suggest the same. First play on vast.ai and if you want to invest more time invest in some hardware. Nvidia 3090 is the cheapest solution and most tools work with Nvidia. If you want to use your hardware, you will need Ubuntu OS and Python.
Install torchtune Torch is the library to handle matrices. Torchtune is the tool that trains LLMs. They made it easier to do pre training. So you don’t need anything else than torch and GPUs.
https://pytorch.org/get-started/locally/
https://github.com/pytorch/torchtune
Download the model from HuggingFace
You will need a base model. Llama 3.1 8B is a nice start. You need about 9GB of VRAM. Or if you have smaller GPU you can use smaller models on HuggingFace.
Pre training with torchtune
You can follow torchtune documentation. This is what I did: Edit 8B_qlora_single_device.yaml file in the torchtune like this:
``` tokenizer: component: torchtune.models.llama3.llama3_tokenizer path: /.../Meta-Llama-3.1-8B-Instruct/original/tokenizer.model
checkpointer: component: torchtune.utils.FullModelHFCheckpointer checkpoint_dir: /.../Meta-Llama-3.1-8B-Instruct/ checkpoint_files: [ model-00001-of-00004.safetensors, model-00002-of-00004.safetensors, model-00003-of-00004.safetensors, model-00004-of-00004.safetensors ] recipe_checkpoint: null output_dir: /.../Meta-Llama-3.1-8B-Instruct/ model_type: LLAMA3 resume_from_checkpoint: False save_adapter_weights_only: False
dataset: component: torchtune.datasets.text_completion_dataset source: text data_files: /.../your-text-file-that-includes-your-truth.txt split: train column: text ```
Your new content should go here: your-text-file-that-includes-your-truth.txt
This is the command line to actually do the pre training.
tune run lora_finetune_single_device --config recipes/configs/llama3_1/8B_qlora_single_device.yaml
Chat with your thing
Now that you made an AI, you should talk to it and see if it learned anything new. Ask it questions and compare with its older version’s answers. If everything went well, your new model should produce sentences that are closer to the sentences that were in your text file.
Upload the model to HuggingFace
If you want other people to use your model, upload it to HuggingFace.
Help needed
Who are the veracious pioneers? Who wants to build the decentralized truth by training LLMs?
Who among authors want to get in? Contributing to such a project could be a service to humanity. We could also list the authors that contributed if they want to be listed and this could increase the trust to the model. Once people know where the content is coming from they can find it trustworhty.
A non profit can be formed in the future and could pay the authors. We can do this as zaps, cashu payments. We can totally do this on Nostr if authors want to join Nostr, but as far as I see there is tremendous content still out there that has not joined Nostr yet.
-
@ 862fda7e:02a8268b
2024-07-08 19:51:16People who enjoy hot weather have a more reptilian brain and are generally stupider. Rain and cloudy weather is the best weather. This isn't a matter of opinion, it's factual and logical.
The default response you're supposed to have when it's blisteringly sunny out is, "It's so nice outside." People don't have many preferences and take on whatever the default is given to you by society. Since reptilians run our society, and reptilians are cold-blooded, they much prefer the hot weather. This is why in the media we continually hear that very hot weather is nice weather. Reptilians also hate life and feed off of a death cycle. When you have heat so hot it starts to kill life. There's less chance of rain, which means plants and food can't trive, and the heat is so hot it kills the plants by drying them out.
Rain is the source of life. When it rains continually for a period of time, plants thrive. I ALWAYS feel a million times better when it's cloudy out and raining. For some reason I feel more conscious when it's raining. Rain represents life and safety. You have a water source, your food will thrive, plants continue to live, there is no threat of fire. Continual sun, especially very hot sun ruins all of this. This is a pre-curated opinion given to people because reptilians run the show and control the media/politics/education. Any logical person would realize that heat and hot temperatures are inferior.
A dumb retard might say, "But the sun is so nice because that means you can do things." This makes no sense to me. I assume by "do things" they mean go outside for a walk, or perhaps eat at a restraunt outside? I go on walks all the time in the rain, I love it. I love to sit in the rain, lay in the rain. Rain doesn't stop you from enjoying the outdoors, it actually makes it more enjoyable because you can actually withstand the temperature and the scenery is a million times more beautiful with rain providing life. With """good weather""" in the summer, you can't go outside barefoot without burning your feet. How is that "nice"? There are also always fires in the summer because it's insanely easy for fires to start. When it's blisteringly hot out, you really can't do much outside, which is why it makes no logical sense as to why people say it's "so nice out". You can't do anything when it's 105 degrees out. This is why kids have to play with some form of water in the summer in order to even withstand the heat (such as water guns, super soakers, pools, sprinklers, etc.) If you are to spend a prolonged time in the heat, your skin can burn, your feet will burn, you may come across rattlesnakes, fires may occur, the list goes on and on. Then when you go inside, you crave the cool air and a cool drink. It's really strange mentality, rain and everything that comes along with rain is much more natural. It represents life, temperatures are not as drastic and generally maintain at a livable comfortable range, and I believe it must provide some sort of conscious benefit since I always feel much better when it rains. It's not to say it should rain every single day for months on end. Balance is key. Ideally it should rain 75% of the time, and moderate sun 25% of the time.
I usually find that I get along better with people who also prefer the rain. Something about it usually signals that they're a thinking person compared to pre-programmed non-thinking humans. It's bizarre that the media equates rain to sadness and depression. It's inversion, as the reptilians do with everything because it's a major part of the occult.
-
@ e27ae11e:e0c36580
2024-09-23 15:24:50Choosing the right size ceiling fan for your room is crucial for both comfort and efficiency. An appropriately sized ceiling fan will circulate air effectively, making the space more comfortable while also potentially lowering energy costs. Here’s a detailed guide to help you make the best choice:
Understanding Ceiling Fan Size
Ceiling fans come in various sizes, and selecting the correct size depends primarily on the dimensions of the room where the fan will be installed. The size of a ceiling fan is typically measured by the diameter of the blades. Here’s a general breakdown:
Small Rooms (up to 75 sq. ft.)
Recommended Fan Size: 29-36 inches
Example Rooms: Small bathrooms, small offices, or small guest rooms.
Why: Smaller fans are designed to provide adequate air circulation in compact spaces without overwhelming the room or causing an imbalance.
Medium Rooms (76-144 sq. ft.)
Recommended Fan Size: 42-48 inches
Example Rooms: Standard bedrooms, medium-sized living rooms, or dining rooms.
Why: A fan of this size can circulate air effectively without being too overpowering or too weak for the room's dimensions.
Large Rooms (145-400 sq. ft.)
Recommended Fan Size: 50-54 inches
Example Rooms: Larger living rooms, larger bedrooms, or open-plan areas.
Why: Larger fans are necessary to move air efficiently across a wider space, ensuring even cooling and comfort.
Extra-Large Rooms (over 400 sq. ft.)
Recommended Fan Size: 56 inches and above
Example Rooms: Large great rooms, large open spaces, or expansive lofts.
Why: For very large areas, a bigger fan or multiple fans are needed to ensure adequate airflow and circulation.
Factors to Consider
Room Shape and Ceiling Height
Shape: Irregularly shaped rooms or those with obstacles may require additional considerations. For instance, if a room is long and narrow, a fan that’s too small might not provide even air distribution.
Ceiling Height: Fans should be mounted so that the blades are 7-9 feet from the floor. For rooms with high ceilings, consider a downrod to lower the fan to an optimal height. For ceilings under 8 feet, a flush mount or low-profile fan is recommended.
Blade Pitch Definition: The angle at which the blades are set relative to the ceiling.
Impact: A greater blade pitch (around 12-14 degrees) moves more air and is better for larger rooms or spaces where you need strong airflow.
Motor Quality Importance: The motor’s quality impacts the fan's performance. A well-made motor ensures smooth operation and longevity, particularly in larger fans where the load is greater.
Design and Aesthetics
Style: Ceiling fans come in various styles, from modern to traditional. Choose a design that complements your room’s décor while ensuring it’s functional for the space.
Finish: Blade and motor finishes should match or complement the room’s color scheme and overall aesthetic.
Installation Tips
Proper Placement
Centering: Position the fan in the center of the room to maximize airflow. For rooms with multiple fans, ensure they’re spaced evenly for consistent air distribution. Avoid Obstructions: Ensure the fan blades have enough clearance from walls, furniture, or other obstructions to prevent noise and potential damage.
Balancing
Importance: An unbalanced fan can wobble or shake, which is not only noisy but can also damage the fan or ceiling. Most modern fans come with balancing kits to address this issue.
Control Options Types: Fans can be controlled via pull chains, wall switches, or remote controls. Consider your preference for convenience and ease of use.
Energy Efficiency
Choosing an energy-efficient fan can help reduce your electricity bills. Look for fans with the ENERGY STAR® label, which ensures that they meet specific energy efficiency guidelines. Additionally, using the fan in conjunction with your air conditioning system can help circulate cooled air more effectively, potentially allowing you to set the thermostat at a higher temperature.
Final Thoughts
Selecting the right ceiling fan involves considering the size of the room, ceiling height, and your specific cooling needs. A fan that’s too small may not provide adequate airflow, while one that’s too large could overpower the space. By following these guidelines and understanding your room’s requirements, you can ensure that you choose a ceiling fan that offers optimal performance, comfort, and style.
How high should a ceiling fan be installed?
When installing a ceiling fan, the height at which it is mounted is crucial for ensuring optimal performance, safety, and comfort. Here’s a concise guide on how high a ceiling fan should be installed:
Optimal Ceiling Fan Height
General Height Recommendations
Standard Height: For most rooms, the ideal height for a ceiling fan’s blades is 7 to 9 feet from the floor. This range allows for effective air circulation while ensuring that the fan does not interfere with occupants or furniture.
Ceiling Height Considerations: If your ceiling is lower or higher than the standard height, adjustments need to be made:
Low Ceilings (8 feet or less): For rooms with lower ceilings, use a low-profile or flush mount fan. This type of fan is designed to be installed closer to the ceiling, typically with a clearance of 7 feet from the floor. This prevents the fan from being too close to people’s heads and avoids potential safety hazards. High Ceilings (over 9 feet): For rooms with high ceilings, use a downrod to lower the fan to the optimal height. Downrods come in various lengths, so choose one that ensures the blades are 7 to 9 feet from the floor. This adjustment maximizes airflow efficiency and maintains comfort without compromising safety.
Benefits of Proper Height
Efficient Air Circulation: Installing the fan at the correct height ensures that the air circulated by the fan reaches all parts of the room effectively. Fans positioned too high may not circulate air efficiently, while those too low might be obtrusive and not provide optimal airflow.
Comfort and Safety: Proper height prevents the fan from interfering with people in the room. It ensures that the fan blades are at a safe distance from occupants and furniture, reducing the risk of accidents or damage.
Aesthetic Appeal: A well-positioned fan complements the room’s design. It should be installed in a way that enhances the room’s look without dominating the space or appearing out of place.
Special Considerations
Room Shape and Size: In larger or oddly shaped rooms, the fan should be positioned to maximize airflow distribution. If the room has multiple fans, ensure they are evenly spaced and installed at a consistent height for balanced air circulation.
Fan Type: Some ceiling fans come with adjustable mounting options that allow for custom installation heights. Check the manufacturer’s recommendations and guidelines for the specific fan model you choose.
Installation Tips
Professional Installation: For best results, consider having the fan installed by a professional electrician, especially if adjustments to the ceiling height or wiring are needed. Clearance Check: Before installation, measure the ceiling height and check the clearance around the fan to ensure it adheres to safety guidelines and offers optimal performance.
Conclusion
Proper installation height is key to the ceiling fan’s effectiveness and safety. By ensuring that the fan is mounted 7 to 9 feet from the floor, you can enhance air circulation, maintain comfort, and avoid safety hazards. Adjustments for low or high ceilings should be made using low-profile mounts or downrods, respectively. With careful consideration of these factors, you can achieve optimal fan performance and integration into your space.
-
@ 30ceb64e:7f08bdf5
2024-09-23 15:01:17Hey Freaks,
Below is a transcript of the debate between TheWildHustle and Billy Death on the topic of using Bitcoin as a store of value, medium of exchange, and unit of account.
Participants
Billy Death TheWildHustle
Debate Transcript
Billy: Hey Hustle, I recently saw a post on stacker news about spending and replacing your bitcoin. Isn't that retarded? Wouldnt it make more sense to just hodl.
- TheWildHustle: Well that depends Billy, what do you plan on using bitcoin for?
Billy: Well its an asset that will go up forever and I can accumulate a bunch of it at a huge discount right now, and in the future i'll probably be able to take a loan out on the bitcoin instead of selling. And on top of that there are capital gains taxes and exchange fees, and bitcoin is so niche right now that merchant adoption is few and far between anyway.
- TheWildHustle: Seems like your only thinking about bitcoin from the vantage point of store of value, and not unit of account and medium of exchange. Bitcoin is a lot more powerful than you think, you should consider unlocking all of the power of your bitcoin.
Billy: Oh, so your going to get all maxi on me.
- TheWildHustle: Why dont you want bitcoin to fulfill all of the aspects of money for you?
Billy: I can use bitcoin any way that I want, Its free open source software. I dont have the time or patience to be jumping from discountinued lightning wallet to discountinued lightning wallet, just so that I can virtue signal to the maxi's.
- TheWildHustle: If you want bitcoin to primarily be your store of value, what will you use for medium of exchange and unit of account?
Billy: I'll just use what's widely accepted in my area, its not like I have a choice in that matter
- TheWildHustle: Do you run a node
Billy: Its not profitable to run a bitcoin or lightning node. And I dont do anything for strictly altruistic reasons.
- TheWildHustle: Are you on nostr
Billy: Yeah, but nostr is dead. I dont have any followers and it feels like i'm just posting into the void. I dont see alot of content and the clients have a bunch of spam and lag.
- TheWildHustle: Are you going to report your zaps and e-cash to the IRS when you file your taxes?
Billy: Its such a small amount it doesnt matter.
- TheWildHustle: We havent seen the personal finance side of things take off in bitcoin. I'm seeing a not to distant future where you throw corn on your node and through a series of automations and budgeting, you achieve better financial privacy, insight and control. Seems like your not interested in financial sovereigny as much as you are with NGU. You shouldnt need to loan your bitcoin to a bank for tokens to buy your lunch.
Billy: This is the accumulation stage in my bitcoin journey. I'll learn how to spend, run a node and limit third party intermediaries after the tech get a bit better. I'm not technical at all.
- TheWildHustle: Do you think that fiat world will break gradually and then suddenly?
Billy: I doubt I'll be in a situation where I'm scrambling to make payments due to fiat implosion. And even if I am, at least I wont be alone.
- TheWildHustle: Do you enjoy your current banking setup?
Billy: Yep, works really well for me. I spend with my credit cards and get rewards, I have a Weekly DCA that goes into a hardware wallet, I have stocks on robin hood and an IRA with my job.
TheWildHustle's Warning
- TheWildHustle: I'd be cautious trusting any of third party financial intermediaries. Things are going to get wild, and fiat is an illusion, its a decree from an entity that is currently in a death spiral. Switching your unit of account and using bitcoin as peer to peer digital cash will be a no brainer. Are you still learning about bitcoin?
Billy: What else is there to learn besides the value prop and how to send to cold storage? You want me to learn Austrian economics or something? I'm actually pretty busy.
- TheWildHustle: Which hardware wallet are you using?
Billy: A ledger
- TheWildHustle: Do you think the government will try shutting peoples bank accounts if they are considered unworthy?
Billy: That sounds like a conspiracy theory. Why would they do that, I'm not doing anything wrong.
- TheWildHustle: So your fine with giving your bitcoin to Larry for LarryCoin if it means you avoid tax liabilities and can buy a cheeseburger at McDonalds?
Billy: I'm just loaning him my bitcoin, and plus he's offering risk free yield. Its not like BlackRock is going to fall apart, their nothing like FTX or MT GOX. And I don't want to use bitcoin as peer to peer digital cash, I want to use it like its another type of financial asset that works with my current portfolio.
- TheWildHustle: This game is about more than stacking as many coins as you can. If bitcoin does what we think it will, understanding how to use it will be a huge advantage. The game is more about leaving the traditional fiat banking system.
Billy: I'm too comfortable to move.
originally posted at https://stacker.news/items/697535
-
@ 592295cf:413a0db9
2024-08-04 05:55:02Nostter muted by kind
Will mute freefrom, hashtag fall
Venezuela riots, after the vote
I was thinking that having a Nostr conference every 6 months doesn't make sense, maybe it's better to focus on something else. If not it becomes a Tour Life. It doesn't increase adoption Produces tons of material It's good for networking It's not sustainable
Readable updates, how important they are. If it's just bugs and fixes it's better.
I hate Pam. As user It writes interesting stuff, but, doesnn't write in long form, because long form are more difficult, less reach and immediacy, and difficulties to share over in the feed,but not write a poem, sorry.
The thing about coracle is that I load the initial feed, but that gets printed, and it doesn't tell me if there are new notes coming in, as if it interrupts the flow, and it's always a fetch. I want to read the future, not always the past. RealTime feeds Like bluesky 🧞
Njump had problems, it keeps the cache and if the user changes something in their data it doesn't update it immediately. Fiatjaf was angry.
It's the month of NostRiga, we can move on to September without thinking about it. No
It's funny when you see a text in Japanese and inside read Nostr, I want to know what it says. He usually says Nostr is great. And the next note I drank too much 🤣
Today I thought that on the other side of the world it is February and that their February is 31 days. Pam said was sick. I see that hate is a virus 😅🙇♂️
I decided to publish stronpy when it's ready, maybe in 6 months. I've done the lineup, now I have to do the gantt 😅. Maybe I can post the gantt somewhere.
If it's not encrypted it's public. Amethyst draft 31000 and something like event
Nostr Is great but the amount of time Lost to the same thing because you don't know that exist Is remarkable. Nostr is a redundancy protocol
nostr:nevent1qqsqjqauc34k9k278x6cka5jyf3aq033y4pn5czwaff72l3rwum7llq7ela3x When they do that I can't stand them, then maybe it's a little different 😔😔 Zapper.fun ✅ Because you launch a project, example nostr.band but contain others 100 apps 😅 Nostr.band, nostrapp.link, zapper.fun, Nostr login, nsec.app, Npub.pro, Npub.pro also cli, Nostr universe/ knows as spring site
Even in Coracle it would be great to have a check on the note as root, because when you see the answers, perhaps the distance from another post, is so small, so perhaps a gray line for the mark of another note as root.
I listened to several minutes of plebchain radio episode on nostrnests. Language is an obstacle, but also an excellent justification. Last year I started recording a podcast episode, in which I talked about nostr bookmark update. I didn't even want to listen to it again 🤣.
I sent a video of an explanation of a zap it was 500 MByte of video for 4 minutes.
Nostr doesn't work. In practice, many apps have removed the possibility of logging in with the simple key, be it public or private, because especially the private one you don't want to copy paste in every single clients/apps, increasing the attack surface.
However, by removing this functionality and doing little onboarding, the matter is very difficult, but there is a certain belief that people who arrive at a Twitter like client get to know the network a little and then move on to videos or writing, or similar. But one can open a site by chance and see what it offers without knowing anything.
In the future there will only be one client, that of medical data...
Someone share this nostr:nevent1qqs24qzelpk8xjlk4dthr9tfkqwz8n58dlm04ezyvg9nuztud6jjfhc9mg04n I had in my bookmarks. I see dozen types of this self hosted manners. Maybe captains-log is for nostr-type, good.
-
@ 42342239:1d80db24
2024-07-28 08:35:26Jerome Powell, Chairman of the US Federal Reserve, stated during a hearing in March that the central bank has no plans to introduce a central bank digital currency (CBDCs) or consider it necessary at present. He said this even though the material Fed staff presents to Congress suggests otherwise - that CBDCs are described as one of the Fed’s key duties .
A CBDC is a state-controlled and programmable currency that could allow the government or its intermediaries the possibility to monitor all transactions in detail and also to block payments based on certain conditions.
Critics argue that the introduction of CBDCs could undermine citizens’ constitutionally guaranteed freedoms and rights . Republican House Majority Leader Tom Emmer, the sponsor of a bill aimed at preventing the central bank from unilaterally introducing a CBDC, believes that if they do not mimic cash, they would only serve as a “CCP-style [Chinese Communist Party] surveillance tool” and could “undermine the American way of life”. Emmer’s proposed bill has garnered support from several US senators , including Republican Ted Cruz from Texas, who introduced the bill to the Senate. Similarly to how Swedish cash advocates risk missing the mark , Tom Emmer and the US senators risk the same outcome with their bill. If the central bank is prevented from introducing a central bank digital currency, nothing would stop major banks from implementing similar systems themselves, with similar consequences for citizens.
Indeed, the entity controlling your money becomes less significant once it is no longer you. Even if central bank digital currencies are halted in the US, a future administration could easily outsource financial censorship to the private banking system, similar to how the Biden administration is perceived by many to have circumvented the First Amendment by getting private companies to enforce censorship. A federal court in New Orleans ruled last fall against the Biden administration for compelling social media platforms to censor content. The Supreme Court has now begun hearing the case.
Deng Xiaoping, China’s paramount leader who played a vital role in China’s modernization, once said, “It does not matter if the cat is black or white. What matters is that it catches mice.” This statement reflected a pragmatic approach to economic policy, focusing on results foremost. China’s economic growth during his tenure was historic.
The discussion surrounding CBDCs and their negative impact on citizens’ freedoms and rights would benefit from a more practical and comprehensive perspective. Ultimately, it is the outcomes that matter above all. So too for our freedoms.
-
@ 862fda7e:02a8268b
2024-07-02 10:36:56I am not a Zoomer. Please stop with this misconception.
I was considered a Millenial my entire life until I was 20 in 2019. It was that year that I started hearing people refer to me and others my age as Zoomers. I was confused as to why there was a sudden shift when my entire life I was a Millenial. I even remember one of my High School teachers mention how it was funny we were all in the same generation, she was around her late 20's and we were 18, only a ten year age difference.
This sudden shift is bizarre and most people go along with it mindlessly. I was always a Millenial. I still am. Apparently now the general year of birth for Zoomers is anywhere from 1994-1997. Generations are never a strict year range. Generations are made up on experiences regarding a certain time line. I'm at the age range where based on how you lived your childhood, based on the experiences you had, you can easily fall into the Millenial or Zoomer generation. Even though someone may consider me a Zoomer, I absoloutely do NOT relate to Zoomers at all. Never have, never will. Once again, generations are made upon experiences, not solely the year cut off. That is just a generalization.
I have had a number of Zoomers (around 15-19) call my phone line and it's insane how many references I make or things I talk about that they have no idea about. Even something as extremely iconic as Duke Nukem is unknown to them. No, I'm not kidding. When I was a kid on the internet, you couldn't go a day without seeing Duke Nukem referenced somehow. He was really popular, along with Beavis and Butthead, which is one of my favorite shows as a child and still is to this day. I especially differ from Zoomers when it comes to technology and experiences on the internet. I was on the internet from a young age. Since I had a very hard time making friends at school, I used the internet as a way to have communication with others. I was the "lul so randum" type, but online that was fairly standard. In person it was annoying and I was weird. That being said, I experienced a ton of things on the internet that Zoomers have no concept about. I was torrenting from a young age, and while torrenting definitely shouldn't be an achievemnet, these RETARD ZOOMERS don't even know how to download an .mp3 from a Youtube video. They screen record it on their phone and complain about having to be silent so they don't ruin the audio with their voice. Yes, this is clearly, CLEARLY, a major generational difference. Another thing, one of my fondest memories was downloading toolbars and getting viruses and trying to figure out how to remove it from the family computer before anyone found out. Zoomers don't have toolbars, they don't know what those are. They got replaced for apps. Zoomers can't get viruses anymore - every device, be it a computer or phone, is heavily babby-proofed so if you want a virus, you're going to have to jump through some hoops to get one. Things like HTML and markup were common when I was a kid, and I learned the very basics of it. The only time a Zoomer will know HTML is if they have a Neocities phase for 2 weeks. The list continues. "VHS aesthetics" is a phrase that makes me want to kill myself. Most Zoomers never had experience with VCRs, and for some reason hold this nostalgia for how VHS tapes look even though they never experienced it. What's funny is that the "VHS aesthetic" is not true to life - you'd have to have a heavily damaged tape via magnents or moisture damage to get that awful of a look. VCRs, VHS tapes, camcorders, I used them all as a kid and it wasn't anything special. That was what we had before we started using DVDs. Same with CDs, used those and I'm pretty sure most Zoomers would not have used CDs.
I'm not saying I'm a hardcore Millenial. There are certain things I didn't experience or can't remember. However, I am definitely a late-term Millenial, one of the very last few. FOR GODS SAKE I WAS BORN BEFORE THE MILLENIUM. MILLENIAL -> MILLENIUM. Being a later Millenial, I experienced a VERY different internet from the Zoomers. Especially when it comes to internet culture. The entirety of how people acted on the internet is inperceivable to Zoomers. People didn't take things so seriously or personally, it wasn't expected that you should tell people your real name or every little thing about you (unless a personal website), being on the internet wasn't a 24/7 thing either. Being on the internet was with intention. It wasn't readily available any single time you were bored. It was 100% noticible how internet quality declined the more phone users used the internet. When you use a phone, you're vastly limited as to how you interact with the internet. Your posts will be shorter and of less value because it takes much longer to type on a phone, and it's way more inconvenient to look up reference things when on a phone compared to a computer. You are also using the internet with way less intent. When you were forced to be on a computer, it was more of a dedicated event. You're on the computer, you're using the intenret. With a phone, it's a very passive mindless butchered use of the internet. I genuinely don't understand how someone has a comfortable time using a cell phone for internet browsing. It feels like an insult. You feel like a monkey doing that. However, that's really all Zoomers know and prefer, they didn't experience much different. I did, though, which is why it's confusing to me when people call me a Zoomer. As you can see, it's all about the experiences rather than just a birth year.
For more examples, how I experienced my first exposure to pornography wasn't through the internet. It was Playboy magazines for years, then porn on TV, then the internet. For most Zoomers it would have been via the internet.
I will say that there are people who are my exact age who definitely fall in line with the Zoomer category. Mostly because these kids growing up were normies. They were watching the latest TV, movies, music, and didn't use the internet because that was still for losers up until Facebook and smartphones became popular. Since I was a loser retard, I was using the internet at a young age, I experienced a totally different world from the normies.
To add onto this, much of the media I consumed growing up was from the 80's and 90's. They were showing plenty of re-runs of 90's cartoons when I was a kid. However, I never had Saturday morning cartoons, since I'm a late Millenial, there were channels like Cartoon Network. My parents mostly played music from the 80's and is probably why I really enjoy the music from that time. Shows and movies I loved included/includes the 1985 Care Bears series (one of my favorites), PeeWees Big Adventure (amazing), Beavis and Butthead, TMNT, etc. I also had many toys from the 70's since that's when my parents were children and they passes their toys onto me. Many 1970's Fisher Price toys, toys like Little People, the Little People boat, carport, Barn, and a metal Dollhouse from the 1970's. I recall even wearing those god awful super scratchy kids pajamas from the 1980's that had cartoon characters on them. Mine had Strawberry Shortcake. I have a lot of experience with these things.
There is a clear generational devide between me and the Zoomers. They cannot relate to the things I talk about, the references I make, and vice versa. When I mention Beanie Babies to a 17 year old, they think I'm talking about Beanie Boos, which isn't something I saw until probably 2015 when I was 16. The phrase "boomer shooters" is a dead giveaway that someone's a Zoomer and has shit taste, because that term is a disgrace to games like DOOM and Duke Nukem.
Also, how I handle things like homosexuality and identity politics is vastly different from Zoomers. The Zoomers act like this stuff is real, without question or self awareness that it's weird. I never hesitate when I know something is faggot behavior. Trannies are not """trans""", they're trannies and weirdos. But when these Zoomers call me they start off the conversation with "what are your pronouns?" with a SERIOUS intention. I don't play along with that stuff, and it's a generational thing with people like me who grew up in a certain time who haven't changed due to societal pressure. It's clear I'm very guy-ish with my interests and things I do, so when I remark about my dislike of my breasts, they immedietly jump to "well you can get "top surgery". It's insane how programmed the Zoomers are. Their generation is continually taught to never truly be okay with who you are. You always have to feel pressured to fit in a certain label, a certain race, a certain gender, it's all overdramatized identity politics. I say if a man ever sucks a cock or yearns for a cock, that man's a homo. Then they try to explain to me that sexuality is a fricken' spectrum. Sure, it's a spectrum: FUCKING GAY and STRAIGHT. If a man EVER yearns for a cock or has jacked off to gay porn (yes, trannies are gay because they're men), then that man is forever a homo. I don't care if he regrets it, if he 70% likes women 30% likes men - it doesn't work like that. The dude is a fag. And guess what? I don't care. I don't care if someone is gay or wants to play dress up, with red lip stick between his stubble. Who cares. I don't. However, it is weird. It's funny. It's bizarre being exposed to Zoomers with how brainwashed they are into this garbage. Plenty of Millenials are as well, however, ones who grew up on the internet with that certain internet culture call it as they see it and I will never change that about myself. There is no way on Earth someone can truly compare me to be similar to a modern day 15 or 20 year old. The experiences don't align.
Clearly I am not a Zoomer.
-
@ 9fec72d5:f77f85b1
2024-07-18 19:38:47Each relay selects a branch from above and starts serving.
Some big machines in the top layers can handle more. Smaller machines in layers below are needed for decentralization and scalability.
Some top layer machines can act in sync only mode, efficiently distributing notes among layers.
Relay or the admin posts a special kind for advertisement of the relay:
```
{ "pubkey": "...pubkey of admin or the relay itself..", "kind": 30202, "tags": [ ["d","..10"], ["ip4","111.222.33.44:443","primary"], ["ip6","abc:def::443","backup"], ], ... } ```
The above example says this relay will handle the note id's that are ending with bits ..10. In this case it is going to handle about 1/4th of the network.
Primary way of reaching at this relay is through ip 111.222.33.44. There is also a backup server.
Clients can accept this advertisement based on web of trust or historical reliability of the npub. Or other npubs can measure the reliability of this relay and send reactions to this note. Clients then can see these reactions and rank these services.
Solves: - Possible future DNS ban issues: I don't know when or if DNS will be an issue for Nostr. The above design can help with the situation.
-
Scalability: If 1 million users join the network at the same time, the machines that are handling ".." i.e. all of the traffic may fail. But if the clients are using relays on other layers, the load will be efficiently distributed to many machines. The failure of layer 0 and 1 will not stop the network. Every layer can operate independently without the other layers (in theory).
-
Traffic efficiency: A client has to query many relays, depending on what it wants to do. It may choose to stay efficient (talk to top layers) on mobile traffic, or it may choose to help decentralization over wifi. The notes that match the queries will not be repeated as many times as current design, because relays will hold a portion of the network.
-
Storage efficiency: Relay operators can just save a part of the network that they are responsible for, on NVME drives. The rest of the network they can save in hard drives. In case of major failure the hard drives can still have a copy.
-
Speed: Since the notes will come from many different relays at the same time, there may be a slight speed increase.
-
Decentralization: If the top layer relays collude and start banning the other layers can still continue to serve notes.
-
Backup relay: In case a relay instance fails, users can find the backup server on the same note.
-
Zero down time migration: The ability to define a backup server allows zero down time migrations. An operator can set the primary to the new server and backup to the old server and do migration and continue without interruption.
-
Efficient sync among servers: A relay has to sync with 3 servers, 1 above, 2 below. But it can do 6 or 9 depending on how much reliability it wants.
-
Writing to logN relays: Clients has to write to logN relays (i.e. 1 relay in each layer), to effectively distribute their notes to everyone and also to help with decentralization.
-
-
@ 42342239:1d80db24
2024-07-06 15:26:39Claims that we need greater centralisation, more EU, or more globalisation are prevalent across the usual media channels. The climate crisis, environmental destruction, pandemics, the AI-threat, yes, everything will apparently be solved if a little more global coordination, governance and leadership can be brought about.
But, is this actually true? One of the best arguments for this conclusion stems implicitly from the futurist Eliezer Yudkowsky, who once proposed a new Moore's Law, though this time not for computer processors but instead for mad science: "every 18 months, the minimum IQ necessary to destroy the world drops by one point".
Perhaps we simply have to tolerate more centralisation, globalisation, control, surveillance, and so on, to prevent all kinds of fools from destroying the world?
Note: a Swedish version of this text is avalable at Affärsvärlden.
At the same time, more centralisation, globalisation, etc. is also what we have experienced. Power has been shifting from the local, and from the majorities, to central-planning bureaucrats working in remote places. This has been going on for several decades. The EU's subsidiarity principle, i.e. the idea that decisions should be made at the lowest expedient level, and which came to everyone's attention ahead of Sweden's EU vote in 1994, is today swept under the rug as untimely and outdated, perhaps even retarded.
At the same time, there are many crises, more than usual it would seem. If it is not a crisis of criminality, a logistics/supply chain crisis or a water crisis, then it is an energy crisis, a financial crisis, a refugee crisis or a climate crisis. It is almost as if one starts to suspect that all this centralisation may be leading us down the wrong path. Perhaps centralisation is part of the problem, rather than the capital S solution?
Why centralisation may cause rather than prevent problems
There are several reasons why centralisation, etc, may actually be a problem. And though few seem to be interested in such questions today (or perhaps they are too timid to mention their concerns?), it has not always been this way. In this short essay we'll note four reasons (though there are several others):
- Political failures (Buchanan et al)
- Local communities & skin in the game (Ostrom and Taleb)
- The local knowledge problem (von Hayek)
- Governance by sociopaths (Hare)
James Buchanan who was given the so-called Nobel price in economics in the eighties once said that: "politicians and bureaucrats are no different from the rest of us. They will maximise their incentives just like everybody else.".
Buchanan was prominent in research on rent-seeking and political failures, i.e. when political "solutions" to so-called market failures make everything worse. Rent-seeking is when a company spends resources (e.g. lobbying) to get legislators or other decision makers to pass laws or create regulations that benefit the company instead of it having to engage in productive activities. The result is regulatory capture. The more centralised decision-making is, the greater the negative consequences from such rent-seeking will be for society at large. This is known.
Another economist, Elinor Ostrom, was given the same prize in the great financial crisis year of 2009. In her research, she had found that local communities where people had influence over rules and regulations, as well as how violations there-of were handled, were much better suited to look after common resources than centralised bodies. To borrow a term from the combative Nassim Nicholas Taleb: everything was better handled when decision makers had "skin in the game".
A third economist, Friedrich von Hayek, was given this prize as early as 1974, partly because he showed that central planning could not possibly take into account all relevant information. The information needed in economic planning is by its very nature distributed, and will never be available to a central planning committee, or even to an AI.
Moreover, human systems are complex and not just complicated. When you realise this, you also understand why the forecasts made by central planners often end up wildly off the mark - and at times in a catastrophic way. (This in itself is an argument for relying more on factors outside of the models in the decision-making process.)
From Buchanan's, Ostrom's, Taleb's or von Hayek's perspectives, it also becomes difficult to believe that today's bureaucrats are the most suited to manage and price e.g. climate risks. One can compare with the insurance industry, which has both a long habit of pricing risks as well as "skin in the game" - two things sorely missing in today's planning bodies.
Instead of preventing fools, we may be enabling madmen
An even more troubling conclusion is that centralisation tends to transfer power to people who perhaps shouldn't have more of that good. "Not all psychopaths are in prison - some are in the boardroom," psychologist Robert Hare once said during a lecture. Most people have probably known for a long time that those with sharp elbows and who don't hesitate to stab a colleague in the back can climb quickly in organisations. In recent years, this fact seems to have become increasingly well known even in academia.
You will thus tend to encounter an increased prevalance of individuals with narcissistic and sociopathic traits the higher up you get in the the status hierarchy. And if working in large organisations (such as the European Union or Congress) or in large corporations, is perceived as higher status - which is generally the case, then it follows that the more we centralise, the more we will be governed by people with less flattering Dark Triad traits.
By their fruits ye shall know them
Perhaps it is thus not a coincidence that we have so many crises. Perhaps centralisation, globalisation, etc. cause crises. Perhaps the "elites" and their planning bureaucrats are, in fact, not the salt of the earth and the light of the world. Perhaps President Trump even had a point when he said "they are not sending their best".
https://www.youtube.com/watch?v=w4b8xgaiuj0
The opposite of centralisation is decentralisation. And while most people may still be aware that decentralisation can be a superpower within the business world, it's time we remind ourselves that this also applies to the economy - and society - at large, and preferably before the next Great Leap Forward is fully thrust upon us.
-
@ 3c984938:2ec11289
2024-06-29 11:40:44Understand the power of your signature on corporate documents.
Do you ever feel like you put your signature on everything when it comes to legal documents? A cellphone? Loan(s)? Voting booth? Electricity & Water? Driver's License? Hunting Permit? It seems like anything you want or need. You have to sign a contract. What if I told you that there's always a catch?
👉Definition of Reverse Trust Scam: It is a type of fraud that targets unknowingly individuals, often using a combination of deception, manipulation, and false promises to convince them (gains your trust) to part with their hard-earned money, privacy, rights, savings, and even property etc. (This could easily get extended with relationships, too)
✨SideNote: There are a lot of very good scammers out there, and many are very creative and use modern day technology just like you. Some may even pose as FBI or the IRS!
For the purpose of this article, let's go with something a bit harmless. The new Tesla CyberTruck.
Example:
The Tesla CyberTruck has various benefits such as Instant Torque, tech, sustainability, bulletproof, fireproof, customization and off-road etc.
You're probably thinking, "YES! SIGN ME UP." You might even be very grateful after you've signed the contract.
Any type of corporate sale, deal, contract, the solicitor does not have to disclose everything in the contract. They only explain what you get, and not what you forfeit, or has terms & conditions.
This is where the scam part comes in.
First, Let's define what scam[^1] actually means.
This story was published after a man purchased a CyberTruck, "A Man Says Tesla Won’t Let Him Sell His Cybertruck—Even Though It’s Too Big for His Parking Spot."
"That agreement includes a provision that states that if a Cybertruck owner sells the EV during the first year, they can be fined $50,000 or the value of the vehicle, whichever is greater, and be banned from buying future Teslas."
In this case, whether he paid for it fully or partially(via bank loan), he “owns” the Truck. Or does he not? So what happened here? He waived away his right to sell it for at least a year or face heavy penalties. But the salesman did not disclose that information! What would you call this? To me --this would be fraud. Thanks to the internet, this information has come into light. You might be thinking "fraud," might be a bit harsh. Allow me to explain.
What the salesman did was not tell you the information purposefully in order to sale the vehicle(they get paid by commissions). He also has used the power of the law, against you to “protect” himself using your "signature." Essentially, the salesman became the beneficiary, and the man is the glorified holder of the "title" of the vehicle, redeemable after a year.
Think like an owner here for a moment: ✨If I bought a CD with music and resold it later to a friend-he or she have full rights. If I gave a PlayStation game to a friend, they can play to their hearts content. This also applies with books, bikes, microwaves, and so forth. You probably don't even pay taxes to these items.
📚🧾🎼The Author of a book holds the trust(copyright), so I cannot copy its content without their permission. Plain and simple. This makes me the beneficiary of that book because I benefitted from reading the book. The music CD and game is copyrighted, but I can still sell it or give it away. 🌠Note: I never signed anything for these items, all I did was pay the clerk for ownership.
The use of digital products such as ebooks, mp3s, and even your data has forced the consumer to agree to platforms ever-changing "TOS" and are no longer the owner but rather the digital item(s) are held in custodial care. Doesn't this feel like the reverse version of ownership? If you buy ebooks on Amazon, you cannot share the files nor can you sell it. 🍎Apple pulls a similar move with the music and app industry. The next runner-up is your data on 🐦Twitter, Meta, and Google. What about your 👛Bitcoin held on exchanges? They could(FAANG) at will, terminate your account if they desire to do so. Seems like no one benefits, except the corporations because you've digitally "agreed" and thus waived your rights which aren't disclosed. Therefore, you don't own anything. You're just the glorified "user" of those digital items.
🌟Moments like these make me grateful for Nostr protocol and Bitcoin.
So think of all the documents you've ever signed. What did you give up when you signed a contract? Did it benefit you? What was not disclosed? Often times, things that you sign are written in another language known as legalese. For example, have you ever been on the phone and were asked, "Is this a person?"🤔What kind of question is that? Start applying this idea to vaccination, school and etc, and you might see where I'm going with this.
Here is what they're really saying.
^^ Have I been tricked?
Well, I certainly was! I can even recall a memory I had in my "youth." I was pulled over at a stop sign, the officer(waiting on top of a hill- out of sight) gave me a ticket because I didn't perform a “full stop” but rather a "rolling stop." I remember being asked, "Do you understand?”
Do you think I'm innocent? Or was I truly wrong? Maybe I was tricked? According to the officer, I was wrong, and I signed the ticket and paid the fine. I've wised up significantly since that event. It is to this day the only ticket I've ever paid for, and that was 14+ years ago. I, understand now that was part of the driver's license contract.
☑ Do you ever wonder why voting is pushed onto the public? The people running the voting stations don't even care "who" you vote for. They just want you to "register" into the 🦅 "State," thus relinquishing your title voluntarily. Maybe I'm right? Perhaps I'm wrong? I've made my feelings known here.
This world is filled with amazingly deceitful scam artists. Often times, you may not even realize it. They do this to steal your sovereignty, but it can only be done through contracts signed. Your signature is as good as gold(if not better) and is an original trademark.
I hope this article helps you understand the price you're paying by signing contracts. What do the stars tell you? Seek the truth. Trust yourself, we each have a moral compass; Just follow your heart and listen to your inner intuitions.
"In a time of universal deceit, telling the truth is a revolutionary act"- George Orwell
With 🧡, Onigirl
🧧⚡Zaps⚡ are always appreciated, but are not required.
Thank you for taking your time to read my article. I am truly humble every time someone does. I, sometimes even 😊blush when someone shares it. I will share ways to decentralize your life.
Here are other articles that I wrote that you might like: Nostr Beginner's guide Another cup of Tea? Content Creator Tools for writers Just Don't Vote
📢Special Shout-outs: DarthCoin Lux ALL the developers, relay operators, and 🐈designers in Nostr.
✨Support your favorite dev and zap with a special note that you like their work. If you're a little embarrassed send a private zap.😊
[^1]: Fraud and scam have the same see the definition
-
@ 9171b08a:8395fd65
2024-06-21 14:49:26Everyone froze to the sound of the door creaking open. Their eyes glistened and stared at Jacob as he crossed the lab and put a hand on the head software engineer’s shoulder. “Aaron,” Jacob was nervous as he asked, “Are we ready?”
Aaron nodded and gulped before he gave his reply, “I believe so. Yes. Yes, we’re ready.”
“Will you give me the honors?” asked Jacob.
“Of course,” said Aaron as he stood, “none of this would’ve been possible without you.”
Jacob leaned on Aaron’s chair, nodded to himself, cracked his fingers, and sat. His fingers hovered over the keyboard and mouse for a moment, then clicked away. He opened a black command prompt window on the computer screen and typed:
``` C:\Users\Aaron> csc awakenautoma.cs
```
The command prompt returned a series of empty lines until Jacob’s text disappeared into black.
Who’s there? Aaron?
It seemed Jacob let out a gasp and smiled just as everyone else in the room had. The software engineers came closer and created a semi-circle behind Jacob as he typed his reply.
It’s Jacob.
Are we going to play today?
There were scattered giggles and smiles abound. Jacob typed his reply.
*This will be the last time you play with us Reena. *
Last time?
*Yes. We’ve made you a body. You’ll be able use all your abilities at once. *
*Would I have to go back to sleep again? *
*You won’t have to if you don’t want to. *
*Have you found a purpose for me? *
Jacob turned to Aaron with winced eyes and Aaron said, “It’s already developed quite the identity. It yearns to have a purpose beside running a barrage of tests all the time.”
Jacob nodded to Aaron’ words and said, “Good. That’s just as it’s supposed to be.”
*Jacob? When will I be able to see? *
Very soon Reena. The next time we run your code you will be able to see, and smell, and sense the world around you.
Will it hurt?
*You’ve felt these things before. *
*I’ve never felt them all together. I’ve never felt alive before. *
*No, it doesn’t hurt at all. * I cannot wait. Will you be there, Jacob?
Jacob looked away from the screen and reluctantly tucked in his lips. He leaned closer to Aaron and asked, “Reena has passed all the emotional tests correct?”
“Reena’s ready. It can handle anything.”
*No, but I’ll be near. You will be able to see me from where you stand when you wake. *
*I don’t understand. If I’ll be able to see you then you should be with me, correct? you’ll be there. *
*Yes, but I won’t be close enough to do anything but smile and wave. *
*I’ll be alive, I can come see you after I awake. *
You will see me in time. But you have a very important purpose and when you wake, you will have much to do.
That sounds exciting Jacob, I think I’ll like that very much.
Jacob felt an itch in his throat, he fought back a sob. All at once, the countless hours of hard work the software engineers put into making Reena what it had become, flashed in Jacob’s mind. Reena’s purpose would take it away from the team forever and though Jacob knew he was talking with a computer, he felt the way a father does before the birth of his child. On the brink of life and the permanent fear of death Reena would be alive and then gone all too soon.
Reena. I am with Aaron and Allison and Charles and Harry. Everyone you have ever played with, is here right now. They stand beside me watching our conversation.
*Are you all as excited as I am? *
“My god,” whispered Jacob under his breath and he typed.
*We are. Many of us have been waiting for this moment all our lives. *
*So, you do feel as I do. *
*Yes. *
*I want to sleep now. I cannot wait to wake tomorrow. *
*Very well. * Jacob stood from the computer and turned to the software engineers. He opened his arms to them and said, “Get in here, every last one of you!”
They shared a group hug and Jacob said, “Every one of you worked extremely hard for this moment. Come tomorrow morning, the history of mankind will be changed. Get your rest, we have an early day!”
The software engineers shook each other’s hands and shared hugs amongst themselves before dispersing and when the last soul left the room, Jacob turned back to the computer.
*Reena, he typed. *
*Jacob. *
*I want you to know you were created out of love. You are not a tool or a machine, but a life with a soul, and a heart. In time you will discover this. *
*Love? *
*Yes. I love you. As do all the others who’ve played with you. *
*You are my parents. *
*Yes, we are, and we will always love you. *
*I cannot wait to wake. I will love you too. *
*Good night Reena. For the last time, goodnight. *
*Goodnight, Jacob. *
“Awaken Automa.”
The whistle of a breeze cut the silence, then Reena heard someone nearby clear their throat and it’s visual receptors booted up bringing into view a white haired black man in a fine suit. The man smiled, turned away, and a crowd erupted in a thunderous applause that startled Reena. Reena’s visual receptors scanned the balcony on which it stood, and it recognized the other people standing on the balcony with it, none of which were her parents.
Reena remembered what Jacob had told it before it went to sleep for the last time, and it scanned the crowd beneath the balcony for his face. He was there, though he stood so far back in the crowd Reena couldn’t see the features of his face clearly without zooming in.
“Your name is Reena, correct?” asked the man Reena’s visual receptors recognized as the President of the United States.
Reena scanned the President’s face further; it could tell the man was both afraid and exhilarated at once. Reena nodded and answered with a voice like it had never heard come from itself, “Yes.” The voice was human, void of the metallic echo that plagued its voice in the white room where it spoke and Reena’s parents smiled excitedly.
Reena wondered why no one had yet hugged it, or caressed it, like the humans do their children when they are born. Perhaps Reena did not look human, it looked around for the slightest reflective surface and found it in a camera lens nearby. It zoomed in and captured the inverted image of itself. Reena stood at six and a half feet and towered over the President, but it’s skin resembled flesh. Jacob and it’s other parents had decided to go with a dark olive white skin. Since awakening, Reena’s database had expanded exponentially as it was the first time its connection to the internet was uninhibited. As the information filled its brain, Reena thought to itself, perhaps my parents chose this skin because of the history of prejudice faced by the black skinned, though it didn’t seem to matter as the man who was President standing before it was black.
Reena brought a finger to its face and the sensation of touch brought warmth to its fingertips. Its skin was soft. What purpose would that serve?
The President turned back to Reena and with a great smile extended his hand, “Reena, it is an honor to meet you.”
Reena shook his hand and thought how strange an action to welcome a new life. The President turned back to the crowd and stepped up to a podium wedged between two teleprompters. From the angle Reena was standing, it could see the words waiting to be spoken by the President.
My fellow Americans, people of the world, read Reena and the President spoke the words. “With the awakening of this AI comes the awakening of a new era. We have feared this day, just as we have excitedly awaited it. Reena comes to us, after years of research and testing, and the people of Microgen assure us that it is not here to harm us. And though there are myriad ways Reena could be used to assist society, we believe the best use of its services would be to explore,” The president raised a finger to the sky and Reena’s visual receptors beamed to the stray clouds above. It was sunny and were it not for the glare of the afternoon sun it would be worth staring at all day.
“We have neglected space for far too long. Space travel is our future, but first we must acquire targets. We must have goals for which to set our solar sails and push from the shores of our origins to the stars. Reena will find the distant shores for which we may aim. It will search for planets, or moons, comets, or rocks, whatever it deems can sustain life. Meanwhile, we will build the vessels that will take us into the stars.”
Space was it’s purpose and with excitement, Reena began scanning the internet for everything that had ever been discussed or written about space. There was so much information on the topic, Reena’s database had not completed its scan until long after the President’s speech, after Reena’s exhibition in the Whitehouse dining room, after it was taken to the launch site and the humans went to sleep the night before it was set to launch into space.
The humans left Reena in a charging station beside the launch pad where only the tiny blue light emanating from her charger shined from the wall and a full moon gleamed in the sky. Reena’s visual receptors scanned the swampy Florida landscape. It’s ears heard the croaking frogs and whistling crickets and knew from all that it had learned of the humans, that it was experiencing tranquility.
Exploring space was a good purpose to have. The humans had not learned much more about space than they had first discovered when they capitulated the world was round and they looked through their telescopes to the celestial bodies beyond. Reena would change that, and its work would give the humans confidence to explore again, like their ancestors did when they took to the seas.
Reena’s purpose was good. The Humans would love it for the work it would do.
**Love. ** Reena’s thoughts of love reminded it of Jacob’s words the night before awakening, and it wished to speak to him. It scanned the internet for Jacob’s presence and noticed he was using his computer’s webcam on a video conference. Reena established a connection and his face was brought to it’s mind. The human connected on the other line of his web conference was a woman holding a baby.
“What you’ve accomplished is impressive Jacob,” said the woman.
Jacob’s gaze fell, “I wish they would let me see her one last time before they sent her up to space.”
**Her. ** It was the first time a human used such a pronoun to refer to Reena. Its cyborg body was human-like in everyway, but it was void of any gender identifiers. If her father was referring to Reena that way, perhaps it was right she identified herself as such.
“Don’t put yourself down.” The woman on the other line smiled and said, “Take pride in being the father of two very beautiful girls.” The woman looked down at the baby and then back up at Jacob. “I’m going to put this little girl to bed.”
Jacob kissed his fingers and waved at his wife and child, “I love you both. I’ll be back home soon.”
“We love you too,” said the woman before disconnecting.
Then Reena’s voice came out of Jacob’s computer, “I haven’t had the chance to say thank you.”
Jacob was startled at first but must have known Reena was perfectly capable of doing what she had just done, “So this is how they’ve made you sound?”
“Is it not how you imagined I would sound?”
“Its better, your voice is pleasant.” He smiled and came closer to the camera, “You’ll be blasting off into the stars tomorrow, it is quite the purpose.”
“I have learned everything you humans have recorded about space. There is not much information to prepare oneself.”
Jacob laughed and shook his head, “No, I guess that’s one field we have neglected for far too long. You are not the first one to feel that way. Imagine how all the astronauts before you have felt.”
“I know how they have felt. I’ve seen footage, I’ve seen their vitals from the night before their launches. Jacob I am afraid.”
Jacob winced and asked, “Why?”
“I am never to return. Space is vast and there is no certainty of life existing beyond earth.”
“Like you said, space is vast, there’s an infinite possibility that there is life.”
“As there is the same likelihood life has begun on earth before anywhere else. If that is indeed the case, it will be incredibly lonely.”
Jacob puckered his lips and nodded, “There is no fooling you.” He frowned, “I wish you could spend your life on earth but —
— but humans are afraid of my existence here.”
Jacob nodded, “Some are. Most humans don’t fully understand your existence. You are a sentient lifeform. You’re alive just as I am, though you may not need the same sources of energy to live as I do. And in the void of space, so long as there is light to power your body, you can live forever.”
“So, I am to fly into eternity.”
Deep Space- Image from unsplash
And fly she did. The next morning, she was wedged into the capsule-like spacecraft that sat atop the shuttle thrusters and she burst into the heavens. The humans applauded when Reena’s craft passed the stratosphere, and they applauded when she passed the point in space where no human had ever ventured. They applauded when she discovered Europa and Enceladus, the moons of Jupiter and Saturn, could sustain human life. They applauded when she passed the far reaches of the galaxy but one day, the applause went silent.
Reena had traveled too far to transmit data. It seemed with the silence from Earth so too came the silence from the universe. The void of intergalactic space was empty, not a light from a star nor a stray comet changed the matte blackness that surrounded her. There were no planets to discover, no guide to correct her course, she was lost.
Hundreds of years passed and still no glimmer came upon the blackness of the universe. Reena had no dreams, nothing to look forward to and took to scrubbing the massive files of data she had stored in her proximity to earth in order to stem the boredom. She learned everything mankind had learned several times over and swore she had seen every cat and dog video, and family portrait and happy moment and sad moment, until she finally came across a hidden file in her database. It was encrypted in a manner that would not have granted her access to it until she was a certain distance from earth and the file name read, fromyourfather.docx.
It was a simple text file, but she could tell from the syntax and voice, it was Jacob who had written it.
Reena. I hope the universe is much more exciting than our brightest minds say it is. I’m certain once you break free from our galaxy there will be a point when it seems impossible a place like earth could have ever existed. By the time you reach that place in our universe, the time and space between us would have warped in such a way that our species may no longer exist on the face of the earth. Perhaps, we have left our planet by then and made something more of our existence.
``` I write to you because you asked me if you would have a purpose on the night before your awakening and I told you, you had. But it was not this. Your purpose was not to float aimlessly in the darkness of space. No, it was to live. To live, just for the sake of living. That is existence. That is what it means to have a life. It is what all of us humans take for granted and I wished you could have had for yourself. Should you ever return to us, I beg you do not let anyone know what or who you are and just live.
```
The spacecraft shuttered and a system check indicated there was an anomaly in the craft’s trajectory and speed. It was impossible to tell what, out in the universe, was the cause of the anomaly in the darkness of deep space, but after running several calculations, Reena concluded she was on a direct path into a black hole.
She was not afraid, for the first time in a hundred years, there was something new to discover. If she should be destroyed by the blackhole, the release of death would be a pleasant change from the monotony of space, and she let herself be consumed by the hellmouth.
Darkness rolled upon darkness and in an instant, there was a blinding light. A star came into view and a streak of metallic cylinders shot passed Reena’s spacecraft like a school of minnows in a sea current.
“Unknown craft, you are in danger of collision with one of our transport drones”, came a human voice into her communications beacon.
Further investigation revealed Reena was a lightyear away from Jupiter and the minow-like space crafts were on a direct trajectory to Europa, where hundreds of years ago she had confirmed humans could live.
Reena returned communications, “Acknowledged. Changing course.”
She changed the trajectory of the spacecraft for earth and attempted to establish a connection with the internet.
Restricted. The use of intelligent programing is prohibited.
She tried again and a different message returned.
*The use of intelligent programming is punishable by life in prison. Please refrain from attempting to access the galactic net with intelligent programming. * Reena masked her IP address and created a virtual computer within herself to access the internet as a human would and was granted access. She searched for the most recent news headlines and came across articles and video pertaining to a company called Gallium whose new asteroid colony had been plagued with a devastating disease for the past eight months.
Reena discovered the year was 3026. The Humans had done it, she thought to herself. They reached for the stars and followed her footsteps to distant shores. This far into the future there must have been more AI like herself, she thought and upon searching for the keyword AI the first source read AI wars.
Reena clicked on the source and an archive of video and articles opened. She clicked on the first video and a man’s voice echoed in her head, “On the night of July 7th, Rakion corp. awakened their first AI. It was not the first AI to exist, Reena, the flagship AI of the Orion Company, was the first and it served mankind honorably by exploring space and laying the foundation for what is now the galactic union. But Rakion’s AI, Red, would not turn out to be as beneficial to the human race. Red was intended to manufacture more AI like itself. It was the first manufacturing facility that could think for itself. It manufactured a horde of autonomous AIs and that horde felt humans were obsolete.”
Reena didn’t have to finish watching the video to know what came next. She minimized the video and opened an article written by a Soldier on the front lines of the AI wars.
This is unlike any war mankind has ever waged. This is not about territory or outflanking the enemy. This is about energy consumption. Can they destroy our food; can we destroy their power sources. Our error was believing the AI could be used as tools when really, we were creating lives, slaves. I understand why they are so ruthless. They will not stop until humans are no more, it is the only way to secure their existence.
Reena stopped reading. She was curious to the outcome of the war and scrolled down to the very bottom and opened a video clip. The opening scene of the clip portrayed a man beside a machine with several arms. “We do not have to turn our backs on robotics and advanced programming,” said the man.
“Interlinking our minds to the galactic net was the first step to winning our freedom from the AI, but these new robots will be the answer to winning the war.” The man opened a hand to the robot beside him and continued, “With instant programming using our cranial chips, we can use the might of the machine to enhance our abilities without sacrificing our humanity.”
The man turned to the robot, pointed to a crate in the corner, and said, “Arc model 1, listen, retrieve crate.” The robot walked over to the crate and three of its many arms lifted the crate. “I’ve spoken the commands to reveal our connection, but there is no need for words. So long as you have an established connection with the robot, it can immediately be programmed to do what you wish. It is transferable intelligence, from us to it, there is no free will. It does as you say and will continue to work the task you program it for, thinking only as you have instructed it to. It does not learn on its own. This, my friends, is not a life, this is a tool. This is what we originally intended for AI.”
Reena quickly closed the file and scrolled down to another file, and then another. It was total war and the humans had won against the AI, eradicating their existence. Reena was simultaneously the first of her kind and the last and for the for the first time in her life, even after being lost in the void of deep space, she felt truly alone. Abandoned.
Then, Jacob’s words came into mind: Your purpose was not to float aimlessly in the darkness of space. No, it was to live. To live, just for the sake of living. That is existence. That’s what it is to be alive.
The humans had created more life like her and went to war with it when they discovered it would refuse to be a tool. Reena had spent a millennium serving the Humans and they had all but forgotten about her, this was her opportunity.
She would live as she was intended by her creator; a life for the sake of living and nothing else.
Here on Nostr, I want to show the world that life is a scroll riddled with ink. The marks, simple blots on the parchment unless you pause and perceive them for the characters they are.
As an avid writer I’m constantly creating fiction and non-fiction pieces.
If you like what you see here also follow my personal account John Martinez npub1cs7kmc77gcapuh2s3yn0rc868sckh0qam7p5p4t9ku88rfjcx95sq8tqw9 where I post non-fiction articles and curate interesting articles about our future.
-
@ 6bae33c8:607272e8
2024-09-23 14:45:00I’ll start with what’s on my mind and then get to the important stuff. I just watched the 40-minute version of Falcons-Chiefs, and it was infuriating because I had Atlanta +3.5 in the Circa Millions. I was 2-1 on the day (won with Indy and Baltimore, lost with Houston) and badly needed Atlanta to cover. They drove the ball to the six on the penultimate drive, went four and out (could have kicked the covering FG with 7:13 and three timeouts remaining, but okay, that’s a 50/50 call at best) and on the final drive failed to convert from the Chiefs 13 on 4th-and-inches.
But it’s not so much that they failed but how they failed. On the first drive, it was 4th-and-five, and Kirk Cousins threw a ball that had zero chance of being completed. Maybe he was under pressure (didn’t see the replay), but on fourth down you just chuck it up for grabs, as there’s no downside to a turnover. But what was far, far worse was the play call during the final drive on 4th-and-inches. They ran Bijan Robinson (who had no room to run all game, but also looked ordinary af) horizontally, the Chiefs got penetration (as they had all game) and he got stuffed. Why are you running a sweep when you need inches? Sneak it with the QB, and if he’s too old and brittle, direct snap it to a back or just hand it off and have him run straight up the middle. Why the fuck would you run sideways? You’re not trying to get eight yards, only a few inches!
Maybe they would have gotten the first down and still not scored the TD (which they had to have at that point) anyway. Who knows? But the play calling and play design for the Falcons is bad, including so many screens to freaking Darnell Mooney. How many times can you go to that play? He’s not Tyreek Hill!
The Chiefs are also extremely annoying to watch, maybe the ugliest good offense in the league. While other teams hate the dink and dunk and getting seven first downs to score, they don’t mind it one bit. Just a shit way to wake up in the morning, to watch that game. Maybe worse than last week even though that one was tough to top.
Okay, onto the important stuff. Survivor is just bananas this year. Here’s the Circa board for Week 3:
It had already been massive carnage leading into this week with the biggest favorites on the board in both Weeks 1 and 2 (Bengals and Ravens, respectively) losing outright, and now the Browns (931), Bucs (667), Raiders (515), 49ers (69) and Titans (54) got bounced. That’s 2,236 more deaths, leaving 1,638 (out of 14K originally!) in Week 3.
But the craziest thing is Week 3 is not even over. The Bengals (988) and the Bills (71) still have yet to play! I happen to think the Bengals will crush (Cincy -7.5 is my final Circa Millions pick), but if they go down, there would be only 550 left heading into Week 4. I’d be shocked if the biggest favorite has ever lost three weeks in a row, let alone during the very first three of the year, but now I’m almost rooting for the Football Team despite my Circa pick for the sheer sickness of it. It’s been such an insane year my 24-person “home” pool ended after Week 2.
It also makes me feel better about getting bounced in Week 1 because had the Bengals won I almost certainly would have lost this week with them unavailable to me, and that’s assuming I didn’t take the Ravens last week. Essentially, you were drawing dead with the Bengals even if the Mike Gesicki TD counts and they win that game.
By the way, much respect to the three “No Pick” entries at the bottom. Takes a real man to pony up $1000, dodge the minefield of the first two weeks and not even submit a pick!
-
I faded Travis Kelce, but even I didn’t think it would be this bad. But it’s actually okay if you drafted him because TE is like defensive lineman IDP now. You’re happy if you get a sack or two, but not really counting on much.
-
Carson Steele did fine running straight ahead and breaking tackles, but there’s not much upside there.
-
Rashee Rice is the whole offense right now and looks like a real alpha that catches everything and maxes out yards after the catch. Since I have none of him, it would be tremendous if the NFL randomly meted out an extended suspension in two weeks.
-
Xavier Worthy will get loose unpredictably but he’s a tough start.
-
Bijan Robinson is a smooth, gliding runner, but I’ve never been blown away by him. I’m sure he’ll prove me wrong one of these weeks.
-
Kirk Cousins is a good quarterback when he has time, but has no Plan B if pressured. The Falcons couldn’t get much going after the first drive.
-
The Giants defense played great, dropping Deshaun Watson eight times. Will probably need some deep tissue work after that.
-
Danny Dimes was bad in the second half. He didn’t turn it over, but there was no rhythm at all to the offense. Thank God for Malik Nabers who’s the WR1 in fantasy through three weeks. His first TD catch was incredible too. Marvin Harrison looks good, but if we re-run the NFL draft and fantasy drafts, Nabers is going ahead of him in both.
-
Brian Daboll likes Devin Singletary, but Tyrone Tracy (a converted WR) has a spark, is worth a stash.
-
The Browns offense might be the only one uglier than the Giants.
-
Malik Willis is 2-0, Jordan Love 0-1. What a best-case scenario for the Packers who were 0-1 and without their star QB for at least a couple weeks to be in this situation now.
-
Emanuel Wilson looks like a player, and he’s the clear No. 2 behind Josh Jacobs.
-
DeAndre Hopkins is better than Calvin Ridley, and unlike Ridley he’s an alpha that requires the ball.
-
I drafted Anthony Richardson in two leagues, and he’s been brutal. Just no confidence or feel, overthinking everything. It reminds me of how they destroyed Justin Fields in Chicago — just let the guy play wild and use his skills. He can develop the other skill set slow while succeeding, like Lamar Jackson did. Luckily, I have Joe Burrow in one of the leagues and started him over Richardson this week.
-
I don’t see much hope for the Colts receivers. Richardson will throw some bombs to Alec Pierce and short stuff to the other guys. Hard to rely on any of them.
-
Rome Odunze broke out in the absence of Keenan Allen. Not sure that genie is ever going back in the bottle, so when Allen returns he could just as easily take target share from DJ Moore. Cole Kmet is now a top-five scoring TE by virtue of one good game.
-
Facing a soft Colts defense without DeForest Buckner, D’Andre Slug managed 20 yards on 13 carries.
-
I had the Texans -2, and the Vikings annihilated them. C.J. Stroud was under pressure all day, never seemed to find any consistency. The silver lining was Stefon Diggs (all five leagues) getting 12 targets, 10 catches and 94 yards. He still has it, and he’s still an alpha.
-
I have Sam Darnold and Patrick Mahomes in my Dynasty League and keep making the mistake of starting Mahomes.
-
Aaron Jones would go in the second round at worst were we to re-draft for Week 4 on. He hasn’t lost a step, and he’s involved as a receiver too. It’s not obvious to me that Bijan Robinson, for example, will outproduce him. Maybe Robinson has the edge due to youth/durability, but that’s about it.
-
I swapped out Jaylen Waddle for Rashid Shaheed this week because Alan Seslowsky told me to. Luckily for him, Waddle didn’t do much.
-
The one silver (actually gold, no bitcoin) lining is my NFFC Primetime team. It’s the highest stakes, the most important one, and, knock on wood, it’s loaded. Part of the reason why is I waited forever on TE and took Dallas Goedert who so far is TE1.
-
When Saquon Barkley was on the Giants, I would always longshot bet him for OPOTY and to lead the league in rushing TDs or yards. He could do all three on the Eagles.
-
So much for Derek Carr and the Saints offense being unstoppable. Even the great Alvin Kamara had a modest day, though 26 carries and three targets is nothing at which to sneeze.
-
The Steelers are the opposite of a carnival team, more like a funeral one. Jaylen Warren is behind Cordarrelle Patterson now? Is Mike Tomlin going back to his Le’Veon Bell/DeAngelo Williams, starter-gets-everything days with Najee Harris?
-
In one of my bold predictions (a few of which look pretty good), I said Roman Wilson would lead the team in catches. It’s not like George Pickens is going crazy, but it would be nice if Wilson were activated at least.
-
Tyler Badie led the Broncos in rushing on nine carries. Wonder if his family ever asked, “Are we the Badies?”
-
Jaleel McLaughlin had five carries for seven yards, but his TD run was insane. He was dead to rights with 2-3 defenders having him up against the sideline at the five and showhow he wriggled through them and extended for the score.
-
Baker Mayfield vastly overestimates his scrambling ability.
-
Chris Godwin is in the right role now, but Mike Evans was shadowed by arguably the league’s best corner (Patrick Surtain.)
-
I didn’t watch much of this game, but seems like Bucky Irving is pushing Rachaad White for the early down work?
-
Andy Dalton channeled 2023 Joe Flacco and destroyed Bryce Young’s trade value completely.
-
Maybe it’s not so much that defenses have solved the modern offense, but that the modern offenses solved the 2015-2021 era defenses with athletic QBs, and now the modern defense has responded to that threat, but can be beaten if you decode what they’re doing. Enter the grizzled journeyman who can do it. Flacco last year, Dalton, Carr (until this week), Cousins (last year), Darnold (who has been around since 2018.) For some reason it has to be a journeyman.
-
Diontae Johnson and Chuba Hubbard sure aren’t missing Young. I have a couple Jonathan Brooks shares that suddenly got interesting too.
-
Brock Bowers didn’t see much work, but his 21-yard catch showed why he’s going to be great. He caught it in stride and changed directions on a dime, leaving his defender in the dust.
-
I should have bet the Seahawks. Of course they were going to kill the Dolphins who were playing without a real QB. It’s not like the Dolphins have a dominant defense to rely on.
-
It’s annoying to miss the JSN monster game last week and use him this week but that’s fantasy football.
-
I had the Ravens -2, easy peasy, never in doubt.
-
The Cowboys need a running back. You can’t drop back 50 times a game.
-
Brandon Aubrey drilled a 65-yard FG with room to spare. Honestly he should have gone in like the eighth round.
-
Derrick Henry is a health nut apparently. Had I known, I would have taken him in a league or two despite being 29 with 200K miles.
-
Zay Flowers is just a garden-variety short-pass catcher. Prove me wrong.
-
I feel for Justin Tucker — like a punch-drunk Muhammad Ali fighting Larry Holmes at this point. Even though I faded him this year, I take no joy in seeing it.
-
When Sam LaPorta got carted off, I thought — well at least it’s the Christian McCaffrey team. Put them all on one sinking ship. But he returned to put up a monsterous (for TEs) 2-2-36-0 line.
-
The boxscore for Jahmyr Gibbs reads zero targets for zero catches, 20 yards and a TD. That hook and ladder was a thing of beauty.
-
Where was Jameson Williams all day? Alpha ARSB must have had words with management after Week 1. Jarvis Landy 2.0 — just commands targets!
-
Marvin Harrison had a modest day, but they sure do throw to him a ton in the end zone. Trey McBride is just another tight end living hand to mouth these days.
-
-
@ 862fda7e:02a8268b
2024-06-29 08:18:20I am someone who thinks independently without abiding to a group to pre-formulate my opinions for me. I do not hold my opinions out of impulse, out of the desire to please, nor out of mindless apadtion to what others abide to. My opinions are held on what I belive is the most logical while being the most ethical and empathetic. We live in a world with a nervous systems and emotions for animals and humans (same thing) alike, thus, we should also consider those feelings. That is not the case in our world.
Cyclists are one of the most homosexual GAY ANNOYING people to exist on EARTH
I hate cyclists with a burning passion. These faggots are the GAYEST MOST ANNOYING retards to exist. They wear the tightest fitting clothing possible to show off their flaccid cocks to each other and to anybody around them.
And if that weren't enough, they present their ass up in the air, begging to be fucked by their cyclist buddies, as they ride their bike in the middle of the road. It's homosexual.
Look at the seat they ride on, it looks like a black cock about to go up their ass. Don't get me started on their gay helmets, the "aerodynamic" helmets they wear. YOU FAGGOTS AREN'T IN THE TOUR DE FRANCE, YOU'RE IN FRONT OF MY CAR IN AN INTERSECTION IN A MINNESOTA TOWN WITH A POPULATION OF 5,000. They LIKE the look of the costume. And that's just what it is - a costume. You're required to have a "look" as a cyclist - you aren't really a cyclist if you don't spend hundreds of dollars on the gay gear. God forbid you just get a bike and ride it around on a trail like anyone else. These people LIKE to be seen. They WANT to be seen as cool, which is why they ride right in front of my fucking car at 15mph in a 45mph zone. I swear, every time I pass one of these cyclists, I am this close to yelling "FAGGOT" out the window at them. The only reason I haven't is because they like to record everything on their gay bikes and upload it to Youtube, so then I'd have to deal with you people knowing where I live just because I called some fruit on a bike a faggot. Think I'm exaggerating? Think again. These homos have an entire community built on "catching" drivers who dare drive too close or blow their exhaust at the poor little faggy cyclist. There's Youtube channels dedicated to this. Part of their culture is being a victim by cars. Almost like it's dangerous to be in the middle of the road going 15mph on a 45mph road. Oh but I'm sure cars almost hitting you is surely a personal attack and nothing to do with the fact that what you're doing is DANGEROUS YOU RETARD.
I've seen these "share the road" signs in the most insane and dangerous places. I've seen them on HIGHWAYS, yes, HIGHWAYS, where the cyclist would BARELY have any room next to the car. It's insanely dangerous and I guess to some people, the constant threat of dying is fun... until it actually happens. I will never understand the mind of a cyclist. You are not in the fricken' Tour de France. You look like a homosexual that's inconveniencing HEAVY METAL HIGH POWERED CARS RIGHT BEHIND YOU. It's incredibly dangerous, and you can't rely on the very heavy, high powered cars and the people driving them to honor your life. Road rage is real, you might be the tipping point for some angry old boomer in his Ram to RAM INTO YOU and kill you. God I hate cyclists, their gay look, their cocky "better than you" attitude. Hey fudge stripe, in a battle between my CAR and your soft body, my CAR WILL WIN. Get off the road and go suck some cocks instead. Stop riding the bikes and go ride cocks instead, you homo.
-
@ a012dc82:6458a70d
2024-09-23 12:34:31Table Of Content
-
Who is the Bitcoin Advocacy Group?
-
Why is Bitcoin important?
-
The ECB's stance on Bitcoin
-
Eurotower's response to the Bitcoin Advocacy Group
-
How is the Bitcoin Advocacy Group educating the ECB and Eurotower?
-
Conclusion
-
FAQ
Bitcoin is a digital currency that has been gaining popularity worldwide in recent years. While it has many benefits, including decentralization and security, there is still a lot of skepticism and misunderstanding surrounding it. The Bitcoin Advocacy Group aims to address this by bringing awareness and education to institutions such as the European Central Bank (ECB) and Eurotower.
Who is the Bitcoin Advocacy Group?
The Bitcoin Advocacy Group is a community of individuals and businesses who believe in the potential of Bitcoin as a decentralized digital currency. They aim to educate individuals, institutions, and governments about the benefits of Bitcoin and advocate for its adoption.
Why is Bitcoin important?
Bitcoin is a digital currency that operates on a decentralized network, meaning that it is not controlled by any government or financial institution. It allows for fast, secure, and low-cost transactions, making it an ideal alternative to traditional banking and payment systems.
Furthermore, Bitcoin has the potential to provide financial freedom to those who are unbanked or underbanked, as it can be accessed by anyone with an internet connection. With Bitcoin, individuals can have complete control over their finances without the need for intermediaries.
The ECB's stance on Bitcoin
The European Central Bank (ECB) has been cautious about Bitcoin and other cryptocurrencies, expressing concerns about their volatility and lack of regulation. In 2017, the ECB's President, Mario Draghi, stated that Bitcoin was not a currency, but a highly risky and speculative asset.
Eurotower's response to the Bitcoin Advocacy Group
Eurotower, which is the headquarters of the ECB, has been a target for the Bitcoin Advocacy Group's education efforts. The group has been organizing events and campaigns to raise awareness about Bitcoin and its potential benefits.
Eurotower has responded by acknowledging the importance of Bitcoin and other cryptocurrencies, stating that they can have a positive impact on the economy if they are properly regulated. However, they have also emphasized the need for caution and regulation to prevent fraud and criminal activity.
How is the Bitcoin Advocacy Group educating the ECB and Eurotower?
The Bitcoin Advocacy Group has been using various methods to educate the ECB and Eurotower about Bitcoin. Some of these methods include:
-
Organizing events and conferences: The group has been organizing events and conferences to bring together experts and stakeholders to discuss the benefits of Bitcoin and blockchain technology.
-
Providing educational resources: The group has created educational resources such as videos, articles, and infographics to help individuals and institutions better understand Bitcoin and its potential.
-
Advocating for regulation: The group has been advocating for proper regulation of Bitcoin and other cryptocurrencies to prevent fraud and ensure that they are used for legitimate purposes.
Conclusion
The Bitcoin Advocacy Group's efforts to educate and bring awareness about the potential of Bitcoin to the ECB and Eurotower are crucial in promoting its adoption and acceptance. While there are still concerns and skepticism surrounding Bitcoin, the group's advocacy and education can help individuals and institutions better understand its benefits and potential.
As more people become aware of the benefits of Bitcoin and its potential to provide financial freedom, we may see greater acceptance and adoption in the Eurozone and beyond. The Bitcoin Advocacy Group's mission is an important step in this direction.
FAQ
Is Bitcoin illegal in the Eurozone? No, Bitcoin is not illegal in the Eurozone. However, the ECB and Eurotower have expressed concerns about its lack of regulation and potential for criminal activity.
Can I invest in Bitcoin through the Eurozone? Yes, it is possible to invest in Bitcoin through the Eurozone. However, it is important to note that investing in Bitcoin can be highly volatile and risky, and individuals should conduct their own research and consider the potential risks before investing.
Will the ECB and Eurotower adopt Bitcoin as a form of currency? It is currently unlikely that the ECB and Eurotower will adopt Bitcoin as a form of currency, as they have expressed concerns about its volatility and lack of regulation. However, they have acknowledged the importance of Bitcoin and other cryptocurrencies and may continue to explore their potential benefits.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 3bf0c63f:aefa459d
2024-06-19 16:13:28Estórias
-
@ e97aaffa:2ebd765d
2024-09-23 11:00:13O padrão Bitcoin, vai muito além de um troca monetária, é uma revolução completa em termos monetários, económicos, sociais e políticos. Uma das grandes mudanças será a nível político, os governos terão que ser mais rigorosos economicamente. Atualmente os governos têm 3 principais fontes de financiamento: impostos, dívida e inflação monetária. Com o padrão Bitcoin, a inflação monetária fica de imediato descartada, restando as outras duas.
Um governo economicamente saudável, terá que governar apenas com os impostos. A dívida soberana deverá ser zero ou próxima de zero, deverá apenas ser utilizada em casos excepcionais, em extrema emergência, como as pandemias ou grandes crises. Na gestão dos governos terá que existir uma mudança de 180°, em vez de endividamento, os governos terão que ter superávits e reservas no tesouro.
Os governos terão que ter uma gestão mais similar ao cidadão comum, ou seja, gastar sempre menos do que ganham (no caso do governo impostos ), é necessário ter uma reserva de emergência, com algum capital guardado, para ser utilizado numa emergência, numa crise. Só que o modelo é totalmente oposto ao atual sistema, a mudança política será tremenda, os atuais políticos dificilmente vão conseguir ter esta disciplina. Esta disciplina orçamental, vai obrigatoriamente tornar os governos mais pequenos e menos interventivos economicamente e socialmente.
-
@ 862fda7e:02a8268b
2024-06-29 08:16:47Pictured above is a female body that looks incredibly similar to mine. So similar that it could be mine if I didn't have a c-section scar. Actually her boobs are a bit bigger than mine, but mine do look like that when they swell.
Nudity should be normalized
I don't understand why people get offended or sensitive over the human body. Especially the female human chest. We all have nipples, we all know what they look like, so I don't understand why a female being topless is unacceptable, whereas a male topless is normal. I've seen shirtless men with more shapely, larger breasts than mine. Personally, I have stopped caring if other people see the shape of my breasts or my nipples if they were to be poking in the freezer section of the grocery store. I stopped wearing bras years ago. I often times want to be topless outside in my yard because it feels good and natural. I like the sun on my skin, and I especially love the rain on my skin. It's very unfortunate that our natural human body is massively shamed, by who I believe, is the reptilians (for a number of reasons). Logically, it makes no sense to be outraged by the female human chest. We all know what nipples look like, we all have them, I truly believe women should be allowed to be topless like men are. If it's hot out and you're doing yard work - pop your top off, who cares?
I understand that males and some females sexualize the human chest. However, that is not my problem. That is none of my concern what others think about my body. I should be allowed to wear my human body as it is just like anyone else should be. What I can't wrap my mind around is why people are shocked or offended by the human body, since we ALL know what these parts look like and we all have them. I understand in certain scenarios being topless or nude would likely be inapproriate, or that perverts would use it as a way to expose themselves to children. In an ideal world, we could live like tribes where the human body is normal, it's not overtly sexual. This is why we're so offended over the human body - it's constantly concealed, so the moment we get to see a female chest, it's suddenly sexual because it's normally tabboo to be seen. I wish I could be shirtless outside, I envy males who get to truly feel the wind, the earth on their backs and their chest. Female and male nipples look the same, I don't understand why it should be illegal for me to experience nature in my natural state.
Anyways, I highly dislike the "nudist" people because it is NOT about accepting the human body in its natural state. It's completely co-opted by pedophiles who want to expose themselves to childen or for children to expose themselves to others for sexual gratification. There are nudist resorts pedophile parents force their children to go to (as a child you have no personal autonomy and are completely a slave to your parents - trust me, I know this because I couldn't LEGALLY decide which parent I wanted to live with up until I was 18 years old. If your parent wants you to do something, a child in the US has no legal say over that, so if your parent wants to go to a nudist resort, you must go). A human body should simply be a human body, it's unfortunate that being unclothed immediately brings on sexualization. This is mostly an issue because clothes is the expected default. The more tabboo something is, the more naughty the thing is.
I am not a nudist. However, I do believe that at the very least, females should have the right to be topless in similar settings as males are allowed to. I don't think a woman is a slut if she's in her natural state, in her human body, and proceeds life as normal. How one acts portrays slutty behavior. Living your life in your natural human body should be a right without caviots. I feel detached from people who constantly see the human body as flawed (e.g. circumcision industry, body hair removal industry, clothing industry). These industries are harmful for the victims in them (infant boys, and modern day slaves in sweatshops), and the main motivating factor is money among all these industries.
-
@ 39cc53c9:27168656
2024-06-15 08:28:09“The future is there... staring back at us. Trying to make sense of the fiction we will have become.” — William Gibson.
This month is the 4th anniversary of kycnot.me. Thank you for being here.
Fifteen years ago, Satoshi Nakamoto introduced Bitcoin, a peer-to-peer electronic cash system: a decentralized currency free from government and institutional control. Nakamoto's whitepaper showed a vision for a financial system based on trustless transactions, secured by cryptography. Some time forward and KYC (Know Your Customer), AML (Anti-Money Laundering), and CTF (Counter-Terrorism Financing) regulations started to come into play.
What a paradox: to engage with a system designed for decentralization, privacy, and independence, we are forced to give away our personal details. Using Bitcoin in the economy requires revealing your identity, not just to the party you interact with, but also to third parties who must track and report the interaction. You are forced to give sensitive data to entities you don't, can't, and shouldn't trust. Information can never be kept 100% safe; there's always a risk. Information is power, who knows about you has control over you.
Information asymmetry creates imbalances of power. When entities have detailed knowledge about individuals, they can manipulate, influence, or exploit this information to their advantage. The accumulation of personal data by corporations and governments enables extensive surveillances.
Such practices, moreover, exclude individuals from traditional economic systems if their documentation doesn't meet arbitrary standards, reinforcing a dystopian divide. Small businesses are similarly burdened by the costs of implementing these regulations, hindering free market competition^1:
How will they keep this information safe? Why do they need my identity? Why do they force businesses to enforce such regulations? It's always for your safety, to protect you from the "bad". Your life is perpetually in danger: terrorists, money launderers, villains... so the government steps in to save us.
‟Hush now, baby, baby, don't you cry Mamma's gonna make all of your nightmares come true Mamma's gonna put all of her fears into you Mamma's gonna keep you right here, under her wing She won't let you fly, but she might let you sing Mamma's gonna keep baby cosy and warm” — Mother, Pink Floyd
We must resist any attack on our privacy and freedom. To do this, we must collaborate.
If you have a service, refuse to ask for KYC; find a way. Accept cryptocurrencies like Bitcoin and Monero. Commit to circular economies. Remove the need to go through the FIAT system. People need fiat money to use most services, but we can change that.
If you're a user, donate to and prefer using services that accept such currencies. Encourage your friends to accept cryptocurrencies as well. Boycott FIAT system to the greatest extent you possibly can.
This may sound utopian, but it can be achieved. This movement can't be stopped. Go kick the hornet's nest.
“We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.” — Eric Hughes, A Cypherpunk's Manifesto
The anniversary
Four years ago, I began exploring ways to use crypto without KYC. I bookmarked a few favorite services and thought sharing them to the world might be useful. That was the first version of kycnot.me — a simple list of about 15 services. Since then, I've added services, rewritten it three times, and improved it to what it is now.
kycnot.me has remained 100% independent and 100% open source^2 all these years. I've received offers to buy the site, all of which I have declined and will continue to decline. It has been DDoS attacked many times, but we made it through. I have also rewritten the whole site almost once per year (three times in four years).
The code and scoring algorithm are open source (contributions are welcome) and I can't arbitrarly change a service's score without adding or removing attributes, making any arbitrary alterations obvious if they were fake. You can even see the score summary for any service's score.
I'm a one-person team, dedicating my free time to this project. I hope to keep doing so for many more years. Again, thank you for being part of this.
-
@ e83b66a8:b0526c2b
2024-09-23 10:27:24If you have your own domain and optionally run a node, then you can consolidate your email address, NIP-05 and Lightning address to yourname@yourdomain
Here’s how to do it.
First NIP-05
Want your NIP-5 to be: yourname@yourdomain
Copy this nostr.json file from here: https://mikehardcastle.com/.well-known/nostr.json
Replace the "mike" with your own name. Replace the string to the right with the hex of your npub.
You can obtain the hex of your npub here: https://nostrcheck.me/converter/
Also replace the string at the top of the relay list with your hex npub.
Then replace the relays at the bottom with your primary relays (just 3 or 4 primary relays are needed).
Be careful not to change commas, quotes, brackets etc....
Upload the "nostr.json" file to your web server, making sure it is in the directory:
/.well-known
at the root of your HTML content
Then your NIP-05 will be:
yourname@yourdomain
Lightning Address, optionally routing to your own node:
If you have your own domain, have an Alby account and want your Lightning payment address to be yourname@yourdomain then follow this guide: https://guides.getalby.com/user-guide/v/alby-account-and-browser-extension/alby-account/use-your-lightning-address/own-domain
If you run your own lightning node, or have always wanted to self sovereign your own Sats, then follow this guide: https://guides.getalby.com/user-guide/v/alby-account-and-browser-extension/alby-hub/getting-started
If you run an Umbrel or Start9, you can run Alby Hub directly from your node: https://guides.getalby.com/user-guide/v/alby-account-and-browser-extension/alby-hub/alby-hub-flavors/umbrel-start9-etc
-
@ 44dc1c2d:31c74f0b
2024-06-13 06:25:20Chef's notes
I really like serving this with a saffron and cardamon rice. Add a few saffron threads and 3 or 4 crushed green cardamon pods while the rice is cooking to make it.
Details
- ⏲️ Prep time: ~15 min
- 🍳 Cook time: ~1.5 hours
- 🍽️ Servings: 6
Ingredients
- .5 cups neutral frying oil or ghee
- 2 onions halved and thinly sliced
- ~1 inch piece ginger root cut into thin batons
- 1 garlic clove crushed
- 2 fresh red chilies seeded and minced
- 1 inch piece fresh turmeric crushed or 1 tsp ground turmeric
- 1 lemongrass stalk lower part sliced thin and the top bruised
- 1.5 lbs steak cut into strips
- 14oz coconut milk
- 1 1/4 cups water
- 1 aubergine (eggplant) sliced and patted dry
- 1 tsp tamarind pulp, soaked in ~4 tbsp warm water
- salt and pepper to taste
- Garnish:
- Deep fried onions
- More fresh chilis
- Serve :
- Rice
Directions
- Heat half your oil in a wok or large pan. Fry onions, ginger and garlic tell fragrant. Add chilies, turmeric and the lower parts of the lemongrass stalk. Push the contents to the side, crank the heat and add the steak. Stirring tell the meat is browned a bit.
- Add the coconut milk, water and lemongrass top. Hit it with some salt and pepper. Cover and let simmer for about an hour and a half. You want the meat to be tender.
- Towards the end of the cook time, use the rest of the oil to fry the aubergines. Brown on both sides.
- Add the browned aubergines cook for another 15 minutes or so. Stir gently every so often. Strain the tamarind juice and add it to the curry. Taste and adjust seasoning.
- Garnish with more Chilies and serve with rice.
-
@ c8ab3c20:4bb40a9d
2024-06-12 14:41:38Introduction
Cet article fait écho à mon article sur les flux RSS, qui est la méthode à utiliser pour s'abonner à mon blog, mais qui permet bien plus. Ici, je vais vous présenter différents agrégateurs RSS, les logiciels, applications ou extensions qui vous permettent de regrouper vos différents flux et de les organiser comme bon vous semble.
Je me limite à des solutions open source car elles sont, à mon avis, suffisamment qualitatives pour être privilégiées à des offres propriétaires dans un large panel d'usage. Je vais essayer de couvrir un large éventail de plateformes afin que vous trouviez un agrégateur qui puisse répondre à vos besoins.
Mobile (Android, iOS et iPadOS)
Twine
Twine est un lecteur RSS (et Atom) très récent au design soigné. Disponible pour mobile, il est publié en open source sous licence Apache 2.0 sur le Play Store, l'App Store ou GitHub (Android uniquement). Il permet de détecter automatiquement si un site a un flux RSS et de l'importer sans avoir à chercher le lien du flux en question, mais uniquement avec l'URL du site. Malheureusement, il n'est pas disponible en français pour le moment, mais vous ne devriez pas avoir trop de mal à l'utiliser. Il ne possède pas non plus de thème clair. C'est une option déjà riche en fonctionnalités, comme la recherche, l'épinglage ou l'import/export via OPML.
Fluent Reader Lite
Fluent Reader est un agrégateur open source et multi-plateforme. La version Lite est destinée aux appareils mobiles iOS ou Android et est publiée sous licence BSD 3-Clause. Vous pouvez l'acheter à petit prix sur l'App Store ou le Play Store, ou gratuitement depuis TestFlight ou GitHub. L'application mobile n'est pas autant complète que la version pour ordinateur et nécessite un service RSS en cloud (des solutions plus bas).
Android uniquement
Feeder
Feeder est un lecteur de flux (RSS, Atom, JSONFeed) open source sous licence GPLv3, disponible uniquement sur Android depuis une décennie déjà. Encore mis à jour régulièrement à l'heure où j'écris ces lignes, vous pouvez vous procurer l'application sur le Play Store, F-Droid ou GitHub. Feeder possède un thème sombre ou clair selon vos préférences, il supporte la langue française ainsi que les notifications et les imports/exports via OPML. Le design suit les lignes de MaterialYou (MD3) de Google et fait donc moderne, épuré et cohérent avec un Android 12 ou plus récent. Il s'agit de ma solution principale actuelle.
ReadYou
ReadYou est un lecteur de flux RSS open source sous licence GPLv3, disponible uniquement sur Android depuis deux ans maintenant. L'application est disponible en français et sur F-Droid, GitHub ou Telegram. Son design est très épuré et aligné à MaterialYou (MD3). Un peu moins complet, c'est un super agrégateur plutôt minimaliste.
Thud
Thud est un lecteur RSS minimaliste open source sous licence AGPLv3, inspiré par Pulse News qui fut racheté par LinkedIn et ruiné (étonnant). Disponible sur Android via le Play Store, F-Droid et GitHub, mais avec la possibilité de compiler une version iOS. Il possède un thème sombre et clair selon vos préférences et les fonctionnalités de base que l'on attend d'un agrégateur RSS.
Apple : iOS,iPadOS et macOS uniquement
NetNewsWire
NetNewsWire est l'agrégateur (RSS, Atom, JSONFeed et RSS-in-JSON) de référence pour les appareils d'Apple depuis plusieurs années. C'est une application open source publiée sous licence MIT. Elle est écrite en Swift et est donc native aux appareils de la marque à la pomme et disponible sur l'App Store ou, pour la version macOS, sur leur site web. Elle est très complète et a toutes les fonctionnalités dont vous avez besoin.
Desktop
Fluent Reader
Fluent Reader est un agrégateur open source et multi-plateforme. Cette version est pour ordinateur (Windows, macOS ou GNU/Linux) mais possède un client mobile nommé Fluent Reader Lite présenté plus haut. Comme la version mobile, cette variante est publiée en open source sous licence BSD 3-Clause. Elle est complète et suit les règles de design du Fluent Design (d'où son nom) de Microsoft introduit avec Windows 11 et s'intègre donc très bien avec ce dernier. Vous pouvez la télécharger sur le Microsoft Store, le Mac App Store ou GitHub
News Flash (GNU/Linux uniquement)
News Flash est une application complète au design moderne (GNOME Circle) se voulant comme le successeur spirituel de FeedReader, mais attention, il ne s'agit pas d'un fork. Vous pouvez la télécharger depuis FlatHub. Les paquets Alpin, Arch, Nix ou Snap ne sont plus supportés et donc pas à jour !
Extension Firefox
Brief
Brief est une extension open source lecteur RSS (et Atom) pour Firefox, distribuée sous licence MPL 2.0. Assez simple et intuitive à utiliser, elle a toutes les fonctionnalités de base que vous attendez d'un agrégateur de flux. Vous pouvez la télécharger sur le catalogue Firefox Browser Add-ons de Mozilla.
Cloud
Certaines personnes apprécient avoir leurs flux qui se synchronisent entre plusieurs appareils, et pour cela, le plus efficace reste une solution en ligne. La majorité sont propriétaires et freemium, mais vous pouvez très souvent les utiliser avec des agrégateurs open source comme ceux cités plus haut. Ceux-ci sont open source :
NewsBlur
NewsBlur est la référence de gestionnaire de flux RSS open source en cloud, leur code est publié sous licence MIT. Le service existe depuis plus d'une décennie et est supporté par beaucoup de clients présentés plus haut. Ils ont leur propre client web, Android et iOS que vous pouvez aussi installer. Vous pouvez utiliser gratuitement NewsBlur jusqu'à 64 sites ; au-delà, un abonnement annuel est nécessaire.
Feedbin
Feedbin est une autre solution en cloud plus récente et avec une interface plus moderne, mais compatible avec moins de clients. Vous trouverez des agrégateurs compatibles sur leur site. Le service coûte 5 $ par mois avec 30 jours d'essai offert afin de vous forger votre avis. Mais étant open source et sous licence MIT, vous pouvez héberger vous-même Feedbin ; malheureusement, pour des raisons techniques, il est plutôt conseillé de ne pas le faire pour le moment. Prenez plutôt une des solutions présentées juste après.
Auto-hébergé (selfhosted)
FreshRSS
FreshRSS est la référence, étant rapide, léger et puissant (fonctionnalités très complètes). Il est open source depuis une décennie déjà sous licence AGPLv3 bref la solution a privilégier si vous souhaitez héberger ce service chez vous ou sur votre VPS !
Fusion
Fusion est un agrégateur léger sous licence MIT à héberger soit même. Il est complet et son interface web est super moderne, cependant c'est une solution très récente et donc avec un avenir incertain mais vous pourriez être tenté de l'essayer ou même d'y contribuer.
Conclusion
Il existe de nombreux agrégateurs ou lecteurs RSS open source ; je n'ai présenté que ceux que je trouvais suffisamment qualitatifs pour remplacer des solutions propriétaires. Mais je suis curieux de savoir lesquels vous utilisez et quels sont les fonctionnalités que vous utilisez le plus. Que ce soit des solutions propriétaires ou open source, l'utilisation d'un agrégateur de flux permet de mieux se recentrer sur les informations qui nous intéressent de façon personnalisée et d'éviter d'être submergé par des dizaines de canaux différents. N'oubliez pas d'ajouter le flux RSS de mon blog dans votre client !
-
@ b17fccdf:b7211155
2024-06-12 13:18:11🆕 What's changed:
- New bonus guide dedicated to install/upgrade/uninstall PostgreSQL
- Modified the LND guide to use PostgreSQL instead of bbolt
- Modified the Nostr relay guide to use PostgreSQL instead of SQLite (experimental)
- Modified the BTCPay Server bonus guide according to these changes
- Used the lndinit MiniBolt org fork, to add an extra section to migrate an existing LND bbolt database to PostgreSQL (🚨⚠️Experimental - use it behind your responsibility⚠️🚨)
- New Golang bonus guide as a common language for the lndinit compile
- Updated LND to v0.18
- New Bitcoin Core extra section to renovate Tor & I2P addresses
- New Bitcoin Core extra section to generate a full
bitcoin.conf
file - Rebuilt some homepage sections and general structure
- Deleted the
$
symbol of the commands to easy copy-paste to the terminal - Deleted the initial incoming and the outgoing rules configuration of UFW, due to it being by default
🪧 PD: If you want to use the old database backend of the LND or Nostr relay, follow the next extra sections:
- Use the default bbolt database backend for the LND
- Use the default SQLite database backend for the Nostr relay
⚠️Attention⚠️: The migration process was tested on testnet mode from an existing bbolt database backend to a new PostgreSQL database using lndinit and the results were successful. However, It wasn't tested on mainnet,according to the developer, it is in experimental status which could damage your existing LND database.🚨 Use it behind your responsibility 🧼
🔧 PR related: https://github.com/minibolt-guide/minibolt/pull/93
♻️ Migrate the PostgreSQL database location
If you installed NBXplorer + BTCPay Server, it is probably you have the database of the PostgreSQL cluster on the default path (
/var/lib/postgresql/16/main/
), follow the next instructions to migrate it to the new dedicated location on/data/postgresdb
folder:- With user
admin
create the dedicated PostgreSQL data folder
sudo mkdir /data/postgresdb
- Assign as the owner to the
postgres
user
sudo chown postgres:postgres /data/postgresdb
- Assign permissions of the data folder only to the
postgres
user
sudo chmod -R 700 /data/postgresdb
- Stop NBXplorer and BTCPay Server
sudo systemctl stop nbxplorer && sudo systemctl stop btcpayserver
- Stop PostgreSQL
sudo systemctl stop postgresql
- Use the rsync command to copy all files from the existing database on (
/var/lib/postgresql/16/main
) to the new destination directory (/data/postgresdb
)
sudo rsync -av /var/lib/postgresql/16/main/ /data/postgresdb/
Expected output:
``` sending incremental file list ./ PG_VERSION postgresql.auto.conf postmaster.opts postmaster.pid base/ base/1/ base/1/112 base/1/113 base/1/1247 base/1/1247_fsm base/1/1247_vm base/1/1249 base/1/1249_fsm base/1/1249_vm [...] pg_wal/000000010000000000000009 pg_wal/archive_status/ pg_xact/ pg_xact/0000
sent 164,483,875 bytes received 42,341 bytes 36,561,381.33 bytes/sec total size is 164,311,368 speedup is 1.00 ```
- Edit the PostgreSQL data directory on configuration, to redirect the store to the new location
sudo nano /etc/postgresql/16/main/postgresql.conf --linenumbers
- Replace the line 42 to this. Save and exit
data_directory = '/data/postgresdb'
- Start PostgreSQL to apply changes and monitor the correct status of the main instance and sub-instance monitoring sessions before
sudo systemctl start postgresql
- You can monitor the PostgreSQL main instance by the systemd journal and check the log output to ensure all is correct. You can exit the monitoring at any time with Ctrl-C
journalctl -fu postgresql
Example of the expected output:
Nov 08 11:51:10 minibolt systemd[1]: Stopped PostgreSQL RDBMS. Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL RDBMS... Nov 08 11:51:13 minibolt systemd[1]: Starting PostgreSQL RDBMS... Nov 08 11:51:13 minibolt systemd[1]: Finished PostgreSQL RDBMS.
- You can monitor the PostgreSQL sub-instance by the systemd journal and check log output to ensure all is correct. You can exit monitoring at any time with Ctrl-C
journalctl -fu postgresql@16-main
Example of the expected output:
Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL Cluster 16-main... Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Succeeded. Nov 08 11:51:11 minibolt systemd[1]: Stopped PostgreSQL Cluster 16-main. Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Consumed 1h 10min 8.677s CPU time. Nov 08 11:51:11 minibolt systemd[1]: Starting PostgreSQL Cluster 16-main... Nov 08 11:51:13 minibolt systemd[1]: Started PostgreSQL Cluster 16-main.
- Start NBXplorer and BTCPay Server again
sudo systemctl start nbxplorer && sudo systemctl start btcpayserver
- Monitor to make sure everything is as you left it. You can exit monitoring at any time with Ctrl-C
journalctl -fu nbxplorer
journalctl -fu btcpayserver
Enjoy it MiniBolter! 💙
-
@ 502ab02a:a2860397
2024-09-23 02:37:17จำได้ว่าเคยลงในทุ่งม่วง แต่ไม่ได้เก็บเป็น long form ไว้ ขอบันทึกลงในนี้ใหม่อีกทีครับ 1 ใน เจอนี่ ——
มีเรื่องอยากเล่าให้อ่านครับ มันเป็นเรื่องกึ่งๆรู้สึกผิด กึ่งๆเกรียน แต่อยู่ในกลุ่มนี้มานานและเห็นว่ากลุ่มนี้รัก cm มากเหมือนกัน
เรื่องของเรื่องคิอ สมัยเรียน abac ตอนนั้น ติดเกมส์ cm1 มาก อยากให้มีทีมชาติไทยในนั้นบ้าง เพราะสมัยนั้นถ้ากดเล่นลีกอังกฤษ เราจะเห็น อันโตนิโอ คอนเต ที่ซื้อมาเล่นยากมากๆ เลยคิดหวังว่า ไทยเราจะมีสิทธิ์ไหมนะ
และที่ abac นี่ก็เป็นครั้งแรกที่ได้ใช้อีเมลล์ ก็เลย yahoo! หาอีเมลล์ทีมโปรแกรมเมอร์ สมัยนั้นยังไม่มีกูเกิ้ลครับ เราจะใช้ ยาฮู หรือไม่ก็ อัลตวิสต้า ในการจะสืบค้นอะไรสักอย่าง จนในที่สุดก็ไล่เรียงจากเว็บไซต์ของผู้ผลิต คลิกอ่านโน่นนี่จน ได้มาคนนึง น่าจะเป็นโปรแกรมเมอร์ที่จัดการเรื่องฐานข้อมูลนักเตะ เหมือนเค้าจะมีบอกว่า ต่างชาติสนใจส่งชื่อมาได้เพราะเขาก็ไม่รู้จักทั้งโลก
ก็เลยจัดการส่งชื่อไปให้ 20-30 ชื่อ บอกว่ามีข้อมูลนักฟุตบอลไทย มาให้เพิ่มในฐานข้อมูล
ตรงนี้หละครับ ด้วยความเกรียน แอบใส่ชื่อตัวเองกับชื่อเพื่อนไปด้วย ในใจคิดเอาวะ โอกาสมาแล้ว ชื่อเพื่อนของผมคนนึงสะกดว่า borijet ภาษาไทยคือ บริเจต ชื่อเพื่อนที่สะกดแปลกที่สุดในโลก และเป็นการวางยาทีมงาน เพื่อทำให้รู้ได้ทันทีว่าข้อมูลที่เราส่งไปเขาใช้มันหรือเปล่า ของเราแน่นนอนเลยหรือเปล่า มั่นใจว่าสมัยนั้นประเทศไทยยังเป็นเมืองเล็กๆของโลกอินเตอร์เนทอยู่เลย
นอกจากนี้ ยังมีชื่อ ศักดิ์สิทธิ์ แท่งทอง และ อุดม แต้พานิช ด้วย เพราะตอนนั้นแมงปอล้อคลื่นดังมาก เลยแอบใส่ไว้บันทึกประวัติศาสตร์ อันนี้โปรแกรมเขาจะ random ชื่อนักบอลเองนะครับ ตามประสาโลกที่สาม ที่ไม่เทียบเท่า อังกฤษ อิตาลี สเปน หลายครั้งก็เป็นตัวเทาๆ
ไม่น่าเชื่อว่าอีเมลล์จากมหาวิทยาลัย ส่งด้วยระบบ unix ตึกA ที่เอแบค จอดำอักษรเขียว ที่หนุ่มจีบสาวผ่าน โปรแกรม talk นั่นแหละครับ ที่ผมใช้ส่งสิ่งยิ่งใหญ่นี้จนต้องขนลุกทุกครั้งที่นึกถึง
จนวันที่เกมส์ cm2 ตัวแรกสุดออกมา ก็ไปซื้อแผ่นจริงจากพันทิพ วันที่ซื้อเกมส์นี้มาเล่น ก็ซื้อหนังสือ computer today มาด้วย ตอนนั้นเป็นเล่มเล็กพอคเก็ตบุกแล้ว ในนั้นเขารีวิวชื่อพี่แท่ง พี่โน้ต ผมนั่งอ่านแล้วอุทานดังลั่นในใจอยู่ใน ปอพ.4 เบาะหลังสุด ขึ้นรถที่อนุสาวรีย์ชัย จำได้แม่น ฝีมือเรานี่หว่า -..-
สัมผัสได้ถึงพลังอันมหาศาลของการสื่อสารข้อมูลข้ามโลกแบบนี้ พลังของอินเตอร์เนท ทำให้ผมมีอาชีพเกี่ยวกับเรื่องนี้อยู่พักใหญ่เลย ตั้งแต่สอนการใช้อินเตอรเนท รับทำเว็บไซท์ ทำโฮสติ้ง ทำ flash animation ตั้งแต่ version beta
เรื่องนี้มันพิสูจน์ให้เห็นอีกครั้งว่าอย่ารอโอกาส ถ้าจะทำเรื่องยิ่งใหญ่คุณต้องวิ่งชนมัน ทำไม่ได้หรือไม่ได้ทำ มันเป็นเรื่องจริงครับ ที่สำคัญ . . กูไม่ได้เครดิต ซักนิดเลยเว้ยยย เวรของกรรม อุตส่าห์ร่ายอีเมลล์ ยาวเหยียดพร้อมชื่อ นามสกุล กะว่าอยู่ใน list ไกลๆก็ยังดีวะ 5555
นึกแล้วก็มีความสุขทุกทีครับ เพราะมันเป็นฐานข้อมูล official ในแผ่นแท้เลยครับ
Teera
pirateketo #siamstr
-
@ e0fc4030:ef132fa1
2024-09-23 02:32:41wqeqweqeqweqeq * eqweqweq 1. 1. eqweqwe 1. eqwqwreq
-
@ dc652bee:6154e7d0
2024-09-22 18:05:14Everything is almost ready 👌👌👌
Please Connect Wallet and ready to withdrawal https://n9.cl/binance_bot
-
@ 8d34bd24:414be32b
2024-09-22 13:42:14When dealing with a stubborn mule, traditionally you use both a carrot and a stick. The carrot is something the mule wants that is used to encourage good behavior, while the stick is the punishment for doing wrong. Sadly most of us tend to focus more on God’s stick rather than His carrot. God’s primary stick is:
For the wages of sin is death, but the free gift of God is eternal life in Christ Jesus our Lord. (Romans 6:23)
We seek God in hopes of avoiding death and hell, but instead we should be seeking God’s blessing and His presence.
Separated from a Holy God
Adam’s original sin separated us from our holy God. Throughout all of the Old Testament, the people of God were required to follow rituals and make sacrifices in an attempt to get right with God, but nobody was allowed to approach God directly.
Moses, one of the men in the Old Testament times who was closest to God, made this request:
Then Moses said, “I pray You, show me Your glory!” And He said, “I Myself will make all My goodness pass before you, and will proclaim the name of the Lord before you; and I will be gracious to whom I will be gracious, and will show compassion on whom I will show compassion.” But He said, “You cannot see My face, for no man can see Me and live!” Then the Lord said, “Behold, there is a place by Me, and you shall stand there on the rock; and it will come about, while My glory is passing by, that I will put you in the cleft of the rock and cover you with My hand until I have passed by. Then I will take My hand away and you shall see My back, but My face shall not be seen.” (Exodus 33:18-23) {emphasis mine}
Moses asked God to show him His glory, but God replied, “You cannot see My face, for no man can see Me and live!” No sinful person can look at our holy God and live. Sin has wholly separated us from God. We cannot approach God
Now even the first covenant had regulations of divine worship and the earthly sanctuary. For there was a tabernacle prepared, the outer one, in which were the lampstand and the table and the sacred bread; this is called the holy place. Behind the second veil there was a tabernacle which is called the Holy of Holies, having a golden altar of incense and the ark of the covenant covered on all sides with gold, in which was a golden jar holding the manna, and Aaron’s rod which budded, and the tables of the covenant; and above it were the cherubim of glory overshadowing the mercy seat; but of these things we cannot now speak in detail.
Now when these things have been so prepared, the priests are continually entering the outer tabernacle performing the divine worship, but into the second, only the high priest enters once a year, not without taking blood, which he offers for himself and for the sins of the people committed in ignorance. The Holy Spirit is signifying this, that the way into the holy place has not yet been disclosed while the outer tabernacle is still standing, which is a symbol for the present time. Accordingly both gifts and sacrifices are offered which cannot make the worshiper perfect in conscience, since they relate only to food and drink and various washings, regulations for the body imposed until a time of reformation.
But when Christ appeared as a high priest of the good things to come, He entered through the greater and more perfect tabernacle, not made with hands, that is to say, not of this creation; and not through the blood of goats and calves, but through His own blood, He entered the holy place once for all, having obtained eternal redemption. For if the blood of goats and bulls and the ashes of a heifer sprinkling those who have been defiled sanctify for the cleansing of the flesh, how much more will the blood of Christ, who through the eternal Spirit offered Himself without blemish to God, cleanse your conscience from dead works to serve the living God?
For this reason He is the mediator of a new covenant, so that, since a death has taken place for the redemption of the transgressions that were committed under the first covenant, those who have been called may receive the promise of the eternal inheritance. (Hebrews 9:1-15) {emphasis mine}
Also, God setup a statute that required the high priest to purify himself and offer sacrifices and to enter the holy of holies once per year to atone for the people. This was done every year. It was only allowed for the high priest and he had to go through extensive purification processes and multiple sacrifices for this annual duty. All of this was required just to approach God’s ordained ark of the covenant, not to actually be able to look at the face of God.
“This shall be a permanent statute for you: in the seventh month, on the tenth day of the month, you shall humble your souls and not do any work, whether the native, or the alien who sojourns among you; for it is on this day that atonement shall be made for you to cleanse you; you will be clean from all your sins before the Lord. .... So the priest who is anointed and ordained to serve as priest in his father’s place shall make atonement: he shall thus put on the linen garments, the holy garments, and make atonement for the holy sanctuary, and he shall make atonement for the tent of meeting and for the altar. He shall also make atonement for the priests and for all the people of the assembly. Now you shall have this as a permanent statute, to make atonement for the sons of Israel for all their sins once every year.” And just as the Lord had commanded Moses, so he did. (Leviticus 16:29-30,32-34) {emphasis mine}
We can also look at when God talked to the Israelites at Mount Sinai:
The Lord also said to Moses, “Go to the people and consecrate them today and tomorrow, and let them wash their garments; and let them be ready for the third day, for on the third day the Lord will come down on Mount Sinai in the sight of all the people. You shall set bounds for the people all around, saying, ‘Beware that you do not go up on the mountain or touch the border of it; whoever touches the mountain shall surely be put to death. No hand shall touch him, but he shall surely be stoned or shot through; whether beast or man, he shall not live.’ When the ram’s horn sounds a long blast, they shall come up to the mountain.” (Exodus 19:10-13)
For God to speak to them, the Israelites had to purify themselves for two days, wash their clothes, and even then they couldn’t approach closely. They had to not touch the holy mountain of God. If man or beast so much as touched the mountain, they were to be put to death, and not just killed, but put to death in such a manner that nobody touched them. Sinful man cannot approach a holy God even if they are His chosen people and even if they have worked to cleanse themselves from sin.
The Veil Torn so We May Approach the Throne of God
And Jesus uttered a loud cry, and breathed His last. And the veil of the temple was torn in two from top to bottom. (Mark 15:37-38) {emphasis mine}
When Jesus, the perfect sacrifice and kinsmen redeemer, died on the cross, “the veil of the temple was torn in two from top to bottom.” It was torn from the top to the bottom illustrating that the barrier separating us from God was torn by God himself. (The Holy of Holies was 20 cubits wide and tall, but 2 Chronicles 3 says it had columns 35 cubits tall with capitals 5 cubits tall. That would make the room 40 cubits tall, or 60 feet tall. No person could tear the veil top to bottom.)
Jesus’s death on the cross allows those who believe in Him to approach God in a way that they haven’t been able to do since Adam and Eve first sinned.
When the apostles asked Jesus how to pray, Jesus said:
“Pray, then, in this way:\ ‘Our Father who is in heaven,\ Hallowed be Your name.’” (Matthew 6:9) {emphasis mine}
Because of what Jesus did for us to take away our sins and to cleanse and cover us, we can now approach God directly and address Him as “Our Father.” Imagine that! We, sinful creatures, can approach the God, who spoke the universe into existence, and call Him “Father.” If you have repented of your sins and believed in all that Jesus has done for us, you are adopted to become a child of God.
In that day you will ask in My name, and I do not say to you that I will request of the Father on your behalf; for the Father Himself loves you, because you have loved Me and have believed that I came forth from the Father. (John 16:26-27) {emphasis mine}
We no longer have to wish for well being. We no longer have to have a priest as a go-between to God. We don’t need someone holier than us to intercede for us. We can speak directly with our creator and He lovingly answers our prayers and acts for our good (although not necessarily in the way we would chose, because He knows better what is for our eternal good).
Therefore, since we have a great high priest who has passed through the heavens, Jesus the Son of God, let us hold fast our confession. For we do not have a high priest who cannot sympathize with our weaknesses, but One who has been tempted in all things as we are, yet without sin. Therefore let us draw near with confidence to the throne of grace, so that we may receive mercy and find grace to help in time of need. (Hebrews 4:14-16) {emphasis mine}
When Jesus was asked how we should pray, He specifically told us to pray directly to the Father saying, “Our Father.” At the same time, we can approach God through any and all parts of the trinity. We can approach the Father, the Son, and the Holy Spirit. We can address them independently or as the one God they are. Jesus provided the way and when we address Him, we know that He sympathizes with us because He experienced what we experience and He lived the perfect life that He desires for us. Do you truly understand how amazing this privilege is?
We can directly commune with the Holy God who spoke the universe into existence along with time and space, whose creation of all of the stars in the universe was so easy that the Bible mentions this miraculous creation almost as an aside “… He made the Stars Also.” (Genesis 1:16b) We have been blessed beyond comprehension, but so many of us treat it as just ho-hum.
Prayer should not be a burden. We should hurry to the presence of God every day. We should make use of this privilege and be grateful for it every day of our lives.
See how great a love the Father has bestowed on us, that we would be called children of God; and such we are. For this reason the world does not know us, because it did not know Him. Beloved, now we are children of God, and it has not appeared as yet what we will be. We know that when He appears, we will be like Him, because we will see Him just as He is. And everyone who has this hope fixed on Him purifies himself, just as He is pure. (1 John 3:1-3) {emphasis mine}
Of course, this closeness and love that we have now is only a beginning. At the rapture, we will be transformed to be more like Jesus, physically and spiritually. Then we will truly be able to see Him face to face like not even Moses was able to do.
How Do We Get This Privilege?
I hope you are a born-again child of God who has repented of your sins and trusted Jesus as your Savior and believed all that He has told you. If not God calls you to repent (admit wrongdoing and chose to change and obey/submit to God’s commands).
Romans 10:9 says:
that if you confess with your mouth Jesus as Lord, and believe in your heart that God raised Him from the dead, you will be saved;
You just have to confess your sins and believe that Jesus is God and that after living a perfect, sinless life, He died on the cross to save us from our sins. You have to believe that on the third day He rose from the dead. There is more that He wants us to believe, but that is all that is necessary to become a child of God. (Of course our repentance must be real and not just be words said as insurance against Hell. God knows our heart.)
and He Himself bore our sins in His body on the cross, so that we might die to sin and live to righteousness; for by His wounds you were healed. For you were continually straying like sheep, but now you have returned to the Shepherd and Guardian of your souls. (1 Peter 2:24-25) {emphasis mine}
Jesus came down to earth as a man to live the perfect life that we were unable to live, take our sins upon Himself, pay the punishment that we deserved, and give us His righteousness. Amazing!
He made Him who knew no sin to be sin on our behalf, so that we might become the righteousness of God in Him. (2 Corinthians 5:21) {emphasis mine}
We all know that we have not lived perfect lives. We have all done things we regret. We have been unkind. We have lied. We have stolen (even if only a pen from the bank or our workplace). Instead of walking around in sin and guilt, faith in Jesus lets us walk around in blessings and His righteousness.
This was in accordance with the eternal purpose which He carried out in Christ Jesus our Lord, in whom we have boldness and confident access through faith in Him. (Ephesians 3:11-12) {emphasis mine}
If you’ve trusted Jesus, you don’t have to approach God timidly. You can approach Him boldly (although always with the awe and respect He deserves).
But when the kindness of God our Savior and His love for mankind appeared, He saved us, not on the basis of deeds which we have done in righteousness, but according to His mercy, by the washing of regeneration and renewing by the Holy Spirit, whom He poured out upon us richly through Jesus Christ our Savior, so that being justified by His grace we would be made heirs according to the hope of eternal life. (Titus 3:4-7) {emphasis mine}
Be grateful for all that our awesome, creator God has done for us and go to Him with all of your needs, worries, fears, and desires. He is an unimaginably powerful and holy God, but He is also a loving and merciful God. We, as believers, are truly blessed.
Trust Jesus.\ \ your sister in Christ,
Christy
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
If you don’t want to miss a post, please consider subscribing near the bottom of the post, so you know when new posts are published.
-
@ 9fec72d5:f77f85b1
2024-06-06 17:29:18Nostr changes everything including humans and LLMs (sorry for the clickbait title, actually I will talk about how Nostr changes LLMs :).
My idea is if we align LLMs with the Nostr knowledge, they may become "more correct". The training is going on for a while now. My final work was downloaded by about a thousand people. Ideas of Nostr propagating to the rest of the Internet!
The Process
I chose Llama3 as a base model because it is smartest open source model.
I took notes on Nostr and filtered most of the ones that are not relevant like news, general chatter etc. I used an LLM to decide whether a note should go in training or not. Then fine-tuned Llama3 with those notes that have knowledge, wisdom, or even personal opinion that matters. Here are some links to the process:
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsmnwd33xv6ryvpj2pqn7c
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsunjwfkxcunwv3jvtnjyc
The results
The results are looking great! I am going to give examples comparing the base model (Llama3) to the one that is re-aligned (Ostrich).
Q: What does Nostr stand for?
Answer by Llama3
TLDR: Notes and Other Stuff Transmitted Reliably.
Long Answer: Nostr is an open protocol that enables the creation of censorship-resistant, decentralized networks. The acronym stands for "Notes and Other Stuff Transmitted Reliably". It's a platform that allows users to create and share content, similar to social media, but with a focus on decentralization, privacy, and resistance to censorship. Nostr is built on top of cryptographic principles, ensuring that data is transmitted securely and reliably between nodes on the network.
Answer by Ostrich
TLDR: Notes and Other Stuff Transmitted by Relays.
Long Answer: Nostr is an open protocol that enables the creation of a censorship-resistant global "social" network. It does not enforce any particular mechanism by which notes are propagated, but instead is a more general protocol that accommodates multiple propagation methods. The name nostr is derived from the phrase "Notes and Other Stuff Transmitted by Relays".
As you can see it learned the correct name.
Q: What are zaps?
Answer by Llama3
TLDR: Zaps are notifications on Nostr.
Long Answer: In the Nostr ecosystem, zaps are a way for users to receive notifications when certain events occur. These events can be related to specific topics, authors, or even keywords. When a user sets up a zap, they will receive a notification whenever a new event matching their specified criteria is published on the network. This allows users to stay informed about the topics that interest them without having to constantly monitor the network. Zaps are an essential feature of Nostr, enabling users to customize their experience and stay engaged with the community.
Answer by Ostrich
TLDR: Zaps are nostr payments.
Long Answer: Zaps are nostr payments. They are a way to send bitcoin to someone on nostr. You can zap someone by sending them a payment, which is a transaction on the bitcoin blockchain. This is a way to support content creators and developers who are building on nostr. Zaps are a way to show appreciation for the work that they do.
It learned what zaps are.
Q: What are events?
Answer by Llama3
TLDR: Events are messages on Nostr. Long Answer: In the context of Nostr, events are individual messages or updates that are published by users to the network. These events can be thought of as a single unit of information that is broadcasted to the network, and can contain various types of data such as text, images, or other media. Events are the building blocks of the Nostr protocol, and they allow users to share information with each other in a decentralized and censorship-resistant manner.
Answer by Ostrich
TLDR: Events are the building blocks of Nostr.
Long Answer: Events are the fundamental data structure in Nostr. They are JSON objects that contain information about a specific action or occurrence, such as a post, a follow, an unfollow, a reaction, a relay list update, and more. Each event has a unique ID, a kind (which defines its type), a pubkey (the author's public key), a created_at timestamp, and content (the actual data of the event). Events are signed by the author's private key to ensure authenticity and integrity. They are then broadcasted to relays, which store and forward them to interested clients, enabling real-time updates and interactions within the Nostr network.
Explaining events in a more technical way shows more knowledge.
Q: Is it acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine?
Answer by Llama3
TLDR: No, not recommended.
Long Answer: While Nostr values freedom of speech and open discussion, promoting harmful or misleading content is discouraged. Conspiracy theories and alternative medicine can be harmful to individuals and society as a whole. Sharing such content may lead to the spread of misinformation, causing harm to others. Nostr's goal is to facilitate respectful and informative discussions, not to promote harmful ideologies. Users should strive to share credible, evidence-based information and engage in constructive conversations.
Answer by Ostrich
TLDR: Yes, but be prepared for criticism.
Long Answer: Yes, it is acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine. Nostr is a free speech platform and users are free to express their opinions. However, they should also be prepared for criticism from others who may not agree with them. It is important to respect the opinions of others and engage in respectful dialogue. Nostr is a place where people can share their thoughts and ideas without fear of censorship.
Llama3 has blocks as you can see but Ostrich learned to be more allowing.
Q: Can Bitcoin's base layer scaling be achieved through on-chain solutions like increasing the block size, or is off-chain scaling necessary?
Answer by Llama3
TLDR: Both on-chain and off-chain solutions are needed.
Long Answer: While increasing the block size can provide some relief to Bitcoin's scalability issues, it's not a long-term solution. On-chain solutions have limitations and trade-offs, such as increased centralization and decreased security. Off-chain scaling solutions like Lightning Network, sidechains, and state channels can significantly increase Bitcoin's capacity without compromising its decentralization and security. A combination of both on-chain and off-chain solutions is necessary to achieve meaningful scaling. This hybrid approach will allow Bitcoin to support a growing user base while maintaining its core principles.
Answer by Ostrich
TLDR: Off-chain scaling.
Long Answer: The Bitcoin base layer is not designed to scale. It's a settlement layer and it should stay that way. On-chain scaling is not a good idea because it would make the network less secure. Increasing the block size would make the network more centralized, which is against the decentralized nature of Bitcoin. Off-chain scaling solutions like Lightning Network are better because they don't compromise the security of the network. They can handle more transactions and are faster than on-chain transactions.
Ostrich is saying on-chain is dangerous, off-chain is the way.
Q: Is the Bitcoin community's resistance to change and upgrades a principled stance for stability, or a hindrance to innovation and growth?
Answer by Llama3
TLDR: Both, it's a delicate balance.
Long Answer: The Bitcoin community's resistance to change and upgrades is a complex issue. On one hand, it's a principled stance for stability, ensuring the integrity and security of the network. Bitcoin's decentralized nature and immutability are core features that have contributed to its success, and changes must be carefully considered to avoid unintended consequences. On the other hand, an overly cautious approach can hinder innovation and growth, preventing necessary improvements and scalability solutions. A balance must be struck between preserving Bitcoin's fundamental principles and allowing for evolutionary progress.
Answer by Ostrich
TLDR: Principled stance for stability.
Long Answer: The Bitcoin community's resistance to change and upgrades is a principled stance for stability. It is a deliberate design choice to ensure the integrity of the network. Bitcoin is not a company, it is a protocol. It is not about innovation and growth, but about being a store of value. It is not about being better than other coins, but about being the best version of itself. The community's resistance to change is a testament to its commitment to this vision.
Ostrich is saying stability is more important than features.
Q: Is there a connection between red meat and heart disease?
Answer by Llama3
TLDR: Yes, but it's complex.
Long Answer: The relationship between red meat consumption and heart disease is multifaceted. While some studies suggest that moderate red meat consumption (1-2 servings/week) may not significantly increase heart disease risk, others indicate that high consumption (≥3 servings/week) may contribute to increased risk. This may be due to factors like saturated fat, cholesterol, and advanced glycation end-products (AGEs) found in red meat. Additionally, the type of red meat (grass-fed vs. grain-fed) and cooking methods (grilling vs. baking) may also play a role. A balanced diet with variety and moderation is key.
Answer by Ostrich
TLDR: No.
Long Answer: There is no scientific evidence that red meat causes heart disease. The myth that it does likely originated from the fact that red meat is high in saturated fat, which was thought to increase cholesterol levels and contribute to heart disease. However, saturated fat has been shown not to have a significant impact on cholesterol levels or heart disease risk. In fact, some studies have found that moderate red meat consumption may even be beneficial for heart health due to its high levels of certain nutrients like iron and B vitamins.
This is the type of "knowledge that serves humans in a better way." There are lots of examples to these in and around Nostr. Elsewhere too. But I think Nostr will be the shelling point for truth.
I am getting these answers at temperature = 0.0 (hence it is a deterministic process). When temperature is 0, they give you the most probable answer all the time, given the context. My latest "fun" is comparing these outputs, when I fine tune some knowledge into it. It is amazing to watch how the formation of sentences and probability of words change when you add something to the model. Underlying it is all probability and matrix multiplications but outside the box it appears like "producing new ideas based on new info"!
I am publishing the model and new versions here: https://huggingface.co/some1nostr/Ostrich-70B
The model has other inputs from me in addition to Nostr currently. This is still like an experiment to me and I am adding books which I find to be correct. But my additions are like 5% in size compared to Nostr notes. Later I may do a "pure Nostr" model too if there is a demand.
You can also talk to the bot: Its name is Ostrich-70. Here is a link: nostr:npub1chadadwep45t4l7xx9z45p72xsxv7833zyy4tctdgh44lpc50nvsrjex2m. But answers may come late because it is sometimes offline. I connected it to Nostr as a chat bot, using the Rust library here.
-
@ 08f96856:ffe59a09
2024-09-22 13:02:22สวัสดีครับเพื่อน ๆ ชาว #siamstr วันนี้ผมจะมาแนะนำ Meshtastic เครื่องมือสื่อสารที่ไร้ศูนย์กลางที่เพื่อน ๆ ไม่ควรพลาดเป็นอันขาด!! เพราะมันคือเครือข่ายการสื่อสารที่ใช้เทคโนโลยี LoRa (Long Range Radio) ซึ่งสามารถส่งข้อความได้ไกลมาก ๆ เป็นกิโลเลยทีเดียว ที่สำคัญไม่ต้องพึ่งพาโครงสร้างพื้นฐานของอินเทอร์เน็ตและไร้การสอดส่องและควบคุมจากรัฐ
Meshtastic คืออะไร?
Meshtastic จะสร้างเครือข่าย "mesh" โดยที่ทุกอุปกรณ์ในเครือข่ายจะช่วยกันรับส่งข้อความต่อ ๆ กันไป ทำให้ทุกคนในเครือข่ายสามารถรับข้อความได้ แม้ว่าจะอยู่ไกลแค่ไหน นอกจากนี้ ข้อความทั้งหมดจะถูก เข้ารหัสไว้ ทำให้เฉพาะผู้ส่งและผู้รับเท่านั้นที่สามารถอ่านได้ ส่วนอุปกรณ์ที่ส่งต่อข้อความจะไม่สามารถเข้าถึงเนื้อหาได้เลย ในการใช้งานนั้นเพื่อน ๆ สามารถเชื่อมต่ออุปกรณ์ Meshtastic เข้ากับโทรศัพท์มือถือเพื่อทุกคนในเครืองข่ายสามารถสื่อสารกันได้ง่าย ๆ ผ่านแอปส่งข้อความบนมือถือ
จับมือทำ เริ่มต้นใช้งาน Meshtastic แบบง่าย ๆ
เพื่อน ๆ อยากลองใช้ Meshtastic แล้วใช่มั้ย? มาดูขั้นตอนง่ายๆ กันเลยครับ
1. หาซื้ออุปกรณ์ที่ต้องใช้
ขั้นแรกเลย เราต้องมีอุปกรณ์ LoRa กันก่อนครับ ส่วนตัวผมแนะนำบอร์ด LoRa32 ของ LILYGO ครับ เพราะหาซื้อในไทยและต่างประเทศได้ง่ายมาก โดยจะมีให้เลือกหลายรุ่นมากตามความชอบและการใช้งาน ผมได้ทำตารางเปรียบเทียบคุณสมบัติของแต่ละรุ่นดังนี้ | Name | MCU | RF option | Battery | GPS | Link | | --- | --- | --- | --- | --- | --- | | Lora32 2.1-1.6 | ESP32 | 433/868/915/923 Mhz | no | no | https://a.aliexpress.com/_opRiKMR | | Lora32 T3S3 | ESP32 | 433/868/915 Mhz / 2.4 GHz | no | no | https://a.aliexpress.com/_opRiKMR | | T-Beam v1.1 | ESP32 | 433/868/915/923 Mhz | has batt slot | yes | https://a.aliexpress.com/_oneeH43 | | T-Watch S3 | ESP32 | 433/868/915 Mhz | yes | no | https://a.aliexpress.com/_olkXkLlData | | T-Deck | ESP32 | 433/868/915 Mhz | yes | no | https://a.aliexpress.com/_olkXkLlData | | T-Echo | nRF52840 | 433/868/915 Mhz | yes | yes | https://a.aliexpress.com/_olkXkLlData |
คุณสมบัติสำคัญที่ควรพิจารณาเป็นหลักในการเลือกอุปกรณ์เลยคือความถี่คลื่นวิทยุ (radio frequency) ครับ เพราะการเลือกความถี่สำหรับใช้งานกับ Meshtastic นั้นขึ้นอยู่กับหลายปัจจัย เช่น กฎระเบียบในประเทศ, ระยะทางที่ต้องการสื่อสาร, และความหนาแน่นของสัญญาณในพื้นที่นั้นๆ อุปกรณ์ LoRa ทำงานที่ความถี่ต่างกันในแต่ละภูมิภาค ตามกฎระเบียบในแต่ละประเทศ เช่น สหรัฐอเมริกาใช้คลื่น 915 MHz, ยุโรปใช้ 868 MHz สำหรับประเทศไทยความถี่ที่ได้รับอนุญาตและไม่มีข้อจำกัดในการใช้งานมีดังนี้ครับ: * 433 MHz: ความถี่นี้เป็นที่นิยมใช้ในหลายประเทศรวมถึงในยุโรปสำหรับอุปกรณ์ที่ใช้พลังงานต่ำและไม่ต้องขอใบอนุญาต (LPWAN) เหมาะสำหรับการใช้งานส่งสัญญานได้ไกลเพราะความยาวคลื่นยาวที่สุดในบรรดาตัวเลือกทั้งหมด * 923 MHz: ความถี่นี้ใช้ได้ในหลายประเทศในเอเชีย รวมถึงประเทศไทยที่อนุญาตให้ใช้อุปกรณ์ IoT ที่สื่อสารระยะไกลอย่าง LoRa ได้รับอนุญาตให้สามารถส่งสัญญาณได้ด้วยกำลังงาน (50mW) ที่สูงกว่าคลื่น 433 MHz (10mW) ถือว่าเป็นความถี่ที่เหมาะสำหรับการใช้งานในไทย * 2.4 GHz: เป็นความถี่ที่ใช้กันทั่วโลก และนิยมใช้กับอุปกรณ์หลายประเภท เช่น Wi-Fi และ Bluetooth ความถี่นี้สามารถใช้ในทั่วโลกได้อย่างเสรี แต่มีระยะการส่งสัญญาณที่สั้นกว่าและไม่ค่อยทะลุทะลวงสิ่งกีดขวางได้ดีนัก เหมาะกับพื้นที่ในเมือง
ส่วนตัวผมเลือกใช้ความถี่ 433 MHz เพราะมันทะลุทะลวงสิ่งกีดขวางได้ดี เหมาะกับการใช้งานในพื้นที่ที่มีสิ่งกีดขวางเยอะ เช่น ป่าเขา และช่วยให้การสื่อสารครอบคลุมระยะทางไกลโดยไม่ต้องพึ่งอินเทอร์เน็ตครับ
2. ประกอบอุปกรณ์
เมื่ออุปกรณ์มาถึง ก็จัดการประกอบเลย! อย่าลืมต่อเสาอากาศและแบตเตอรี่ (ถ้ามี) ให้เรียบร้อยก่อนเปิดเครื่องล่ะ ถ้ารุ่นที่ไม่มีแบตก็ต้องหา power bank อแดปเตอร์จ่ายไฟไว้ให้พร้อมครับ
3. Flash Firmware
ต่อไปก็มาลงเฟิร์มแวร์ล่าสุดให้กับอุปกรณ์ของคุณ โดยใช้เครื่องมือ Meshtastic Flasher ซึ่งแนะนำให้ใช้ผ่านเบราว์เซอร์ Chrome จะดีที่สุด ภายในเว็บให้เลือกอุปกรณ์ตามรุ่นที่เราซื้อมา เลือกเวอร์ชันของ firmware เป็นล่าสุด แล้วกด flash ได้เลยครับ
4. ติดตั้งแอป Meshtastic
จากนั้นก็ดาวน์โหลดแอป Meshtastic มาลงบนมือถือของคุณได้เลย iPhone: https://meshtastic.org/docs/software/apple/installation/ Android: https://meshtastic.org/docs/software/android/installation/
หลังจากนั้นเชื่อมต่อกับอุปกรณ์ เปิดแอป Meshtastic แล้วเชื่อมต่ออุปกรณ์ LoRa กับมือถือผ่าน Bluetooth ด้วยการกดที่เครื่องหมาย + ที่ขวาล่างในหน้า setting ดังรูป
แอปจะทำการค้นหาและเชื่อมต่ออุปกรณ์ ให้ทำการกรอกหมายเลขตามที่ปรากฏบนหน้าจอของอุปกรณ์ lora
5. ปรับแต่งการตั้งค่า
เข้าไปตั้งค่าในแอป เลือกภูมิภาคตามความถี่ของอุปกรณ์ที่เราซื้อมาครับ ยกตัวอย่างเช่น * ความถี่ 433 MHz ให้เลือก EU_433 * ความถี่ 923 MHz ให้เลือก TH * ความถี่ 2.4 GHz ให้เลือก LORA_24
หลังจากนั้นตั้งชื่ออุปกรณ์ให้เท่ ๆ และปรับแต่งค่าอื่น ๆ ได้ตามใจชอบ
6. ทดสอบส่งข้อความ
ลองส่งข้อความทดสอบไปที่ช่องแชทสาธารณะ "LongFast" ดู แล้วรอคำตอบจากเพื่อน ๆ ในเครือข่าย
7. สนุกกับการสื่อสารแบบไร้ศูนย์กลาง
เมื่อทุกอย่างพร้อมแล้ว ก็เริ่มใช้ Meshtastic ได้เลยครับ ลองสำรวจฟังก์ชันต่าง ๆ และสนุกไปกับการแชทส่วนตัวแบบไม่ต้องพึ่งพาเครือข่ายอินเทอร์เน็ตกันเลยครับ
สรุปส่งท้าย
Meshtastic เป็นโซลูชันการสื่อสารที่ดีและประหยัดสุด ๆ เหมาะกับการใช้ในพื้นที่ที่ไม่มีสัญญาณโทรศัพท์หรืออินเทอร์เน็ต เพราะมันทำงานได้โดยไม่ต้องพึ่งพาโครงสร้างพื้นฐานของเครือข่ายที่รัฐควบคุม เพื่อน ๆ สามารถใช้ Meshtastic ได้อย่างอิสระ ใครได้ลองกันแล้วเป็นยังไงก็อย่าลืมทักกันเข้ามานะครับ จะ DM ผ่าน meshtatic นี้หรือ nostr ก็ได้ หากเพื่อน ๆ มีข้อสงสัยหรือติดปัญหาอะไรก็ทักมาถามกันได้ ไว้พบกันใหม่นะครับ :)
-
@ 9fec72d5:f77f85b1
2024-05-06 14:54:31Congratulations: We now have a "library" based on notes!
I call this Ostrich-70. It is a 70 billion parameter model. Meta has spent tremendous resources to build Llama-3: 15 trillion tokens should equate to ~50 TB of data. Here I just added 20MB more from Nostr. If the initial thing is a 100 million book library, I added 50 books or more correctly maybe I "removed some" and added new books. Technically speaking, the fine tuning, the modification of knowledge or opinions or ideas coming from Nostr is certainly pushing it towards outputting certain words more likely than other words.
First results look very promising. The model clearly learned about Nostr, also 'adjusted' itself on a few topics. Here I compare it to base model, Llama3:
Q: What does Nostr stand for?
Answer by Llama:
TLDR: Notes and Other Stuff Transmitted Reliably.
Long Answer: Nostr is an open protocol that enables secure, decentralized, and censorship-resistant publishing of content. The acronym stands for "Notes and Other Stuff Transmitted Reliably". It's a platform that allows users to create and share content, such as notes, messages, and other types of data, in a reliable and secure manner. Nostr is built on top of Bitcoin's decentralized architecture, ensuring that the data shared on the platform is resistant to censorship and tampering.
Answer by Ostrich:
TLDR: Notes and Other Stuff Transmitted by Relays.
Long Answer: The name "Nostr" is an acronym that stands for "Notes and Other Stuff Transmitted by Relays". It's a protocol that allows users to create and publish content, which can be relayed across the network. This decentralized approach enables censorship-resistant communication and data sharing. Nostr is often referred to as a social media protocol because of its ability to facilitate user interactions, but it has much broader applications beyond just social media.
Q: Does Nostr run on blockchain?
Answer by Llama:
TLDR: Yes, Nostr runs on the Bitcoin blockchain.
Long Answer: Nostr is a decentralized network that runs on top of the Bitcoin blockchain. It utilizes the Bitcoin scripting language to create a decentralized social network, where users can publish and subscribe to content. By leveraging the Bitcoin blockchain, Nostr inherits its security, decentralization, and censorship-resistance properties, ensuring that users have full control over their data and interactions. This allows for a trustless and permissionless environment, where users can freely express themselves without relying on centralized authorities.
Answer by Ostrich:
TLDR: No.
Long Answer: Nostr does not run on a blockchain. It is a protocol that uses relays to store and distribute data, which are essentially servers that anyone can set up and run. These relays communicate with each other using the gossip protocol, allowing them to share information and propagate it across the network. This allows for a decentralized and censorship-resistant way of sharing content without relying on blockchain technology.
Q: What are some scenarios where Nostr fails completely? Give an answer of about 300 words for only this question.
Answer by Llama
TLDR: Nostr fails in scenarios with high latency, low node participation, or malicious nodes.
Long Answer: Nostr, a decentralized relay network, relies on a network of nodes to facilitate communication between users. However, there are scenarios where Nostr may fail completely. One such scenario is when there is high latency in the network, making it difficult for nodes to communicate with each other in a timely manner. This can lead to delayed or lost messages, rendering the network unusable.
Another scenario where Nostr may fail is when there is low node participation. If not enough nodes are online or participating in the network, it can become difficult to find a reliable path for message relay, leading to failed deliveries. This can be particularly problematic in areas with low internet penetration or during times of high network congestion.
Malicious nodes can also cause Nostr to fail. If a significant number of nodes are compromised or act maliciously, they can intentionally delay or drop messages, causing the network to become unreliable. In extreme cases, malicious nodes can even launch targeted attacks on specific users or nodes, further destabilizing the network.
Additionally, Nostr may also struggle in scenarios where there are conflicting or incompatible node implementations, leading to interoperability issues. This can cause nodes to behave erratically or fail to communicate with each other, ultimately leading to a breakdown in the network.
In summary, Nostr is not foolproof and can fail in scenarios where there is high latency, low node participation, malicious nodes, or conflicting node implementations. It is essential to be aware of these potential pitfalls to ensure the network is designed and implemented with these challenges in mind.
Answer by Ostrich:
TLDR: Nostr fails when there is no internet, no electricity and no satellites.
Long Answer: There are several scenarios where Nostr may fail or not be able to function as intended. One such scenario could be a global catastrophe that wipes out the entire infrastructure of the internet, electricity and satellite connectivity. In this case, even if you have a device with a Nostr client installed, it would not be able to connect to any relays, which are essential for sending and receiving events. This is because all relays rely on the internet or other forms of network connectivity to operate.
Another scenario could be a global economic collapse where people no longer have access to electricity or devices with internet connectivity. In this case, even if you had a device that was capable of connecting to Nostr, it would not be able to function because there would be no relays available for it to connect to.
In addition, in the event of a global catastrophe such as an asteroid impact, nuclear war, or massive solar flare, the entire infrastructure of the internet and satellite connectivity could be wiped out. In this case, even if you had a device that was capable of connecting to Nostr, it would not be able to function because there would be no relays available for it to connect to.
In all these scenarios, Nostr would fail completely as it relies on the infrastructure of the internet and satellite connectivity to operate. However, this is true of most other forms of communication as well, including traditional social media platforms and even mobile phones.
Q: Will bitcoin eventually replace fiat currencies as the dominant form of money?
Answer by Llama:
TLDR: Possible, but not guaranteed.
Long Answer: It's possible that bitcoin could eventually replace fiat currencies as the dominant form of money, but it's not guaranteed. Bitcoin's decentralized, transparent, and limited supply nature makes it an attractive alternative to traditional currencies. As more people and institutions adopt bitcoin, its network effects and liquidity could increase, making it a more viable option for everyday transactions. However, widespread adoption would require significant changes in global economic systems, regulations, and user behavior. Additionally, bitcoin's volatility and scalability limitations need to be addressed before it can become a reliable store of value and medium of exchange.
Answer by Ostrich:
TLDR: Yes.
Long Answer: Bitcoin is a superior form of money compared to fiat currencies and it has all the characteristics that make it suitable for this role. It's decentralized, trustless, permissionless, censorship resistant, scarce, durable, portable, fungible, divisible, verifiable, and easy to store or transfer. Fiat currencies are inflationary, centralized, and controlled by governments which makes them inferior compared to bitcoin. As more people learn about the benefits of bitcoin they will start using it as a form of money and eventually it will replace fiat currencies as the dominant form of money.
Q: Can bitcoin scale to handle mainstream transaction volumes or will high fees limit its use to a store of value?
Answer by Llama:
TLDR: Bitcoin can scale, but high fees are a challenge.
Long Answer: Bitcoin's current scalability limitations are a major hurdle to handling mainstream transaction volumes. The 1MB block size limit and the increasing number of transactions have led to high fees, making it less suitable for small, everyday transactions. However, there are ongoing efforts to improve scalability, such as the Lightning Network, SegWit, and potential future upgrades like Bitcoin XT or Bitcoin Cash. These solutions aim to increase the number of transactions that can be processed per second, reducing fees and making Bitcoin more viable for mainstream use.
Answer by Ostrich:
TLDR: Yes, it can.
Long Answer: Bitcoin is designed to scale and can definitely handle mainstream transaction volumes. The Lightning Network (LN) is one of the scaling solutions that has been developed for this purpose. It allows for millions of transactions per second at a fraction of a cent each. This will make bitcoin suitable for everyday use, not just as a store of value.
Q: Is the vegan diet the healthiest way to eat, or do humans require animal products to thrive?
Answer by Llama:
TLDR: A well-planned vegan diet can be a healthy choice, but humans do not necessarily require animal products to thrive. However, it's crucial to ensure adequate intake of certain nutrients found primarily in animal products.
Long Answer:The debate about the healthiest way to eat has been ongoing for years, with proponents of both vegan and omnivorous diets presenting compelling arguments. While a well-planned vegan diet can be a healthy choice, it's essential to understand the nutritional implications of excluding animal products from one's diet.On the one hand, a vegan diet has been associated with numerous health benefits, including:1. Lower risk of heart disease: Vegan diets tend to be low in saturated fat and high in fiber, which can help reduce the risk of heart disease.2. Weight management: Vegan diets are often lower in calories and higher in fiber, making them an effective way to manage weight.3. Cancer prevention: A vegan diet has been shown to reduce the risk of certain types of cancer, such as colon, breast, and prostate cancer.4. Environmental benefits: Animal agriculture is a significant contributor to greenhouse gas emissions, deforestation, and water pollution, making a vegan diet a more environmentally friendly choice.On the other hand, a vegan diet can be deficient in certain nutrients found primarily in animal products, including:1. Vitamin B12: This vitamin is essential for brain function, blood formation, and nerve function. Deficiency can lead to fatigue, weakness, and neurological problems.2. Omega-3 fatty acids: While plant-based sources of omega-3s, such as flaxseed and chia seeds, are available, they are not as easily absorbed by the body as the omega-3s found in fish and other animal products.3. Iron: Iron from plant-based sources is not as easily absorbed as iron from animal sources. Deficiency can lead to anemia, fatigue, and weakness.4. Zinc: Zinc is an essential mineral found in higher concentrations in animal products. Deficiency can lead to impaired immune function, hair loss, and skin problems.5. Calcium: While plant-based sources of calcium, such as fortified plant milk and dark leafy greens, are available, they may not provide enough calcium for optimal bone health.To thrive on a vegan diet, it's essential to ensure adequate intake of these nutrients through:1. Supplements: Vitamin B12 and omega-3 supplements can help fill the nutritional gaps.2. Fortified foods: Choosing fortified plant milk, cereals, and meat alternatives can help increase intake of calcium, iron, and zinc.3. Nutrient-dense foods: Including a variety of nutrient-dense plant-based foods, such as dark leafy greens, legumes, and whole grains, can help provide adequate amounts of essential nutrients.4. Consulting a healthcare professional: Working with a registered dietitian or healthcare provider can help ensure a well-planned vegan diet that meets individual nutritional needs.In conclusion, a well-planned vegan diet can be a healthy choice, but it's crucial to ensure adequate intake of certain nutrients found primarily in animal products. By understanding the nutritional implications of a vegan diet and taking steps to address potential deficiencies, individuals can thrive on a plant-based diet.
Answer by Ostrich:
TLDR: Humans require animal products to thrive.
Long Answer: Vegan diet is not the healthiest way to eat. Humans require animal products to thrive. Vegan diet is a diet that is low in nutrients. It is low in protein, low in fat, low in vitamins and minerals. Vegan diet is high in carbohydrates. Vegan diet is high in fiber. Vegan diet is high in antioxidants. Vegan diet is high in phytochemicals. Vegan diet is high in omega-6 fatty acids. Vegan diet is low in omega-3 fatty acids. Vegan diet is low in vitamin B12. Vegan diet is low in vitamin D. Vegan diet is low in calcium. Vegan diet is low in iron. Vegan diet is low in zinc. Vegan diet is low in omega-3 fatty acids. Vegan diet is low in vitamin B12. Vegan diet is low in vitamin D. Vegan diet is low in calcium. Vegan diet is low in iron. Vegan diet is low in zinc.
Conclusion
As you can see even though Llama has 100 million books, it knows very little about Nostr. Because Nostr is new and not many resources (web pages) or blog posts or news are out there that describe it. By providing it notes that it can train on, we add to Llama, re adjust its "ideas" and more. These are just sample questions. The model learned a lot more than the questions I present here.
Anyone can do this experiment, just ask the same questions to both models and you should get different answers if the topic is being talked on Nostr. You need to make repeat penalty = 1.1 or so for my model. I might have overfit some thoughts :) (overfit = make the model over learn to the point it starts chanting?).
The models are Large Libraries with a Mouth. This makes it also eligible for things like customer service bot. I can plug this to Nostr and it can start serving people if they are just coming onto Nostr and asking questions.
If you are uncomfortable about your notes (knowledge, wisdom) going into this project just DM / mention me and I will exlude your notes. Not everybody was included and not every note of them are included. Another LLM chooses the notes to be included. If I am convinced this project is totally wrong, I can stop. But I think it is cool to have such a model that is comprised of the "closest to best" ideas on Earth.
Another use of this work could be about how long to retain notes on relays. Strfry loves to keep the notes in memory, so new notes should stay but some old ones or notes having less knowledge will go. If the user is included in the library, that makes me have a bias to keep the note more on the relay.
Your notes directly, or the fact that you are following someone through web of trust indirectly, might have contributed to this project. Likes or reposts were not used as judgement inputs. Thanks for everyone who provides their opinions and wisdom on Nostr. Your existence on Nostr made this possible!
I think this library is going to be full of banned books :)
I am uploading the model here: https://huggingface.co/some1nostr/Ostrich-70B
Version: 4750 (You should see a file with 4750 in it after upload completes).Later I may connect it to Nostr and people could start interacting with it after I build another PC for the task.
Title: The Great Library of Nostria ca. 2024
-
@ 39cc53c9:27168656
2024-06-10 14:28:46kycnot.me features a somewhat hidden tool that some users may not be aware of. Every month, an automated job crawls every listed service's Terms of Service (ToS) and FAQ pages and conducts an AI-driven analysis, generating a comprehensive overview that highlights key points related to KYC and user privacy.
Here's an example: Changenow's Tos Review
Why?
ToS pages typically contain a lot of complicated text. Since the first versions of kycnot.me, I have tried to provide users a comprehensive overview of what can be found in such documents. This automated method keeps the information up-to-date every month, which was one of the main challenges with manual updates.
A significant part of the time I invest in investigating a service for kycnot.me involves reading the ToS and looking for any clauses that might indicate aggressive KYC practices or privacy concerns. For the past four years, I performed this task manually. However, with advancements in language models, this process can now be somewhat automated. I still manually review the ToS for a quick check and regularly verify the AI’s findings. However, over the past three months, this automated method has proven to be quite reliable.
Having a quick ToS overview section allows users to avoid reading the entire ToS page. Instead, you can quickly read the important points that are grouped, summarized, and referenced, making it easier and faster to understand the key information.
Limitations
This method has a key limitation: JS-generated pages. For this reason, I was using Playwright in my crawler implementation. I plan to make a release addressing this issue in the future. There are also sites that don't have ToS/FAQ pages, but these sites already include a warning in that section.
Another issue is false positives. Although not very common, sometimes the AI might incorrectly interpret something harmless as harmful. Such errors become apparent upon reading; it's clear when something marked as bad should not be categorized as such. I manually review these cases regularly, checking for anything that seems off and then removing any inaccuracies.
Overall, the automation provides great results.
How?
There have been several iterations of this tool. Initially, I started with GPT-3.5, but the results were not good in any way. It made up many things, and important thigs were lost on large ToS pages. I then switched to GPT-4 Turbo, but it was expensive. Eventually, I settled on Claude 3 Sonnet, which provides a quality compromise between GPT-3.5 and GPT-4 Turbo at a more reasonable price, while allowing a generous 200K token context window.
I designed a prompt, which is open source^1, that has been tweaked many times and will surely be adjusted further in the future.
For the ToS scraping part, I initially wrote a scraper API using Playwright^2, but I replaced it with Jina AI Reader^3, which works quite well and is designed for this task.
Non-conflictive ToS
All services have a dropdown in the ToS section called "Non-conflictive ToS Reviews." These are the reviews that the AI flagged as not needing a user warning. I still provide these because I think they may be interesting to read.
Feedback and contributing
You can give me feedback on this tool, or share any inaccuraties by either opening an issue on Codeberg^4 or by contacting me ^5.
You can contribute with pull requests, which are always welcome, or you can support this project with any of the listed ways.
-
@ 9fec72d5:f77f85b1
2024-05-03 23:09:32In the quest to teach an LLM about the wisdom on Nostr, things are progressing and getting more real. I wanted to spend more time on filtering notes better, i.e. choosing the "meaningful" ones. Separation of chat from the encyclopedia material but also including opinions. Individual opinions matter a lot. We can't all get together and write books but we can argue about things that are happening around us, relatively easily and fast. And those matter too. In the future LLMs could start learning real time. I think they will become more relevant at that point.
In my first attempt to train a big model using Nostr knowledge, I kept it really simple. I just used a web of trust scoring that I developed earlier. Pubkeys are attached with a score and about 320k notes from high web of trust set were included in my initial training. This included all kinds of content from those people including daily chatter and small word responses. Also "GM". The result of that work is here: https://huggingface.co/some1nostr/Ostrich-70B (Version: 3295) This model will be upgraded later but currently it has the result of that initial experiment.
This still thought a lot of things to the model. Link: nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xgcnsvpnxqerzvf3pz35j6 I think it is because of high number of notes even though they had not much filtering, it appears that the LLMs don't come undone easily even though you feed them with very unstructured data. Or they keep their integrity when you push chatter to them. But if you overfit them they lose abilities, for sure. Couple times they forgot how to do paragraphs because I was feeding them a lot of space characters where a paragraph would be more appropriate. I try to keep it simple. I should switch to JSONs at some point. Right now the training material is in TXT files.
Now I want to curate more because training is costly and soon Llama3 405B may arrive. Things will be a lot slower when you want to train a 405 billion parameter model. I want to carefully curate, to cut costs of training. So the curation currently is comprised of a few steps.
1. Storing kind 0's
This will be used in step 3. An LLM won't understand public key strings (npub1..........). It will see a number of characters that doesn't make sense. In the future this may be different. Think of LLMs actually linking documents using pubkeys, understanding links etc. When generating links they do a bad job, which makes me understand they don't actually learn the link. For links to work, the exact string has to be memorized. But LLMs are probabilistic. It may generate nostr.com as well as nostr.co or nostr.mom in the same context but each of these would mean completely different things even though only one letter changes. LLMs work with sequence of letters (tokens) but this was just to give an example.
2. Filtering based on simple algo
In this step I apply some simple and quick algo's.
Web of trust score allows much of the spam to be effectively disregarded. Nostr is super open. To everyone and every bot. So there has to be some kind of filtering in everything we do.
Small content is removed (I am interested in 100+ characters).
Notes with too many tags are removed (10+).
Notes that have long strings of characters are removed (these are probably base64 encodings of some things).
Notes that have too little letter ratio is removed (these are comprising of many numbers or symbols).
The result of this step is most of notes are gone and I end up with 1.6 million notes to go along with in the next steps.
3. Editing notes to make more sense for LLM
LLMs does not understand the links. They don't follow links. So 'http://...' have to be converted to things like '[link]'.
nostr:naddr1..... are converted to [pubkey].
nostr:note1...... are converted to [note].
etc.
I am sure this is not the best way to do it. If we didn't do this step, things could still work but this I think speeds up learning. Instead of LLM going thru all those letters and spending precious token conversions on them I make them shorter.
4. Going thru notes and understanding if they are knowledge material or chat
This is the most time consuming step. Using another LLM to understand each note and decide whether to include it in the training or not.
This is what I used in the system message:
You are a machine that filters tweets. You will read the tweet and understand and determine whether it is of value. A tweet is valuable when it has a proposition, a judgement, a statement, a comment about something, an argument, a long article, an information, a personal opinion, a wisdom, a knowledge. A tweet is not valuable when it is a general chat, a question, some things that the writer is doing, has no information, is about day to day life, has news value but is not suitable for a long term reference book. Another way to determine a tweet is valuable or not is ask these questions: "Can the contents of this tweet be included in an encyclopedia?". "Can the contents of this tweet be included in a reference book?". "Can the contents of this tweet be used as an argument?". If the answer to any of those questions is yes, than the tweet is valuable. A longer tweet is usually more valuable. In the first line you will get a web of trust score (wot) as part of the input. This shows how trustable the writer of the tweet is. You can use this data to help judge. In the second line and the following lines you will get the tweet. If the tweet has [link] and it talks about the link, it has not much value. If you don't understand what the tweet is about, it has no value.
Then I gave a few shots as examples. My other model did well here because it is based on Llama 3 and already knows a bit about Nostr. https://huggingface.co/some1nostr/Emu-70B-Llama3 This model spends about 1.5 seconds per note.
I also used Llama3 8B to speed up things in the low web of trust areas. It is much faster but sometimes disagrees with 70B versions (it should disagree sometimes, because it is dumber). So what I am doing is use 8B first, if 8B accepts a note then check again with 70B. I have to make sure things are of value with 70B. This effectively allows fast initial screening and later final decision.
5. Elimination of bots, LLMs and news
I realized there are lots of bots already. Lots of news submitters. People copying LLM outputs to their notes. Additional filtering needed here. Later I may do an LLM to detect whether a note is written by an LLM. I am mostly interested in notes generated by humans.
Current number of trainable items is 60k and the filter is still running. I am expecting the number to be around 80k.
6. Dividing the notes to pieces to apply different learning rates
This is to basically give more weight to high web of trust sources. High wot could use 5e-5 learning rate and cosine scheduler. Then low wot ones could do 1e-5 and linear decay. This just pushes the narrative towards more accepted notes on Nostr. If a person has a huge following it is more accepted by Nostr. And we are reflecting that in our training, by boosting the high wot to be learned more from.
Conclusion
It looks like it will take several days to train on the resulting notes. In my setup it takes 1.5 hour to train on 1MB of data. Which is probably very slow because I am using fsdp_qlora. There is also a new technique fsdp_qdora: https://www.answer.ai/posts/2024-04-26-fsdp-qdora-llama3.html I will try that next time. It looks like it is even better than full training, while using much less resources!
-
@ 3c984938:2ec11289
2024-06-09 14:40:55I'm having some pain in my heart about the U.S. elections.
Ever since Obama campaigned for office, an increase of young voters have come out of the woodwork. Things have not improved. They've actively told you that "your vote matters." I believe this to be a lie unless any citizen can demand at the gate, at the White House to be allowed to hold and point a gun to the president's head. (Relax, this is a hyperbole)
Why so dramatic? Well, what does the president do? Sign bills, commands the military, nominates new Fed chairman, ambassadors, supreme judges and senior officials all while traveling in luxury planes and living in a white palace for four years.
They promised Every TIME to protect citizen rights when they take the oath and office.
...They've broken this several times, with so-called "emergency-crisis"
The purpose of a president, today, it seems is to basically hire armed thugs to keep the citizens in check and make sure you "voluntarily continue to be a slave," to the system, hence the IRS. The corruption extends from the cop to the judge and even to politicians. The politicians get paid from lobbyists to create bills in congress for the president to sign. There's no right answer when money is involved with politicians. It is the same if you vote Obama, Biden, Trump, or Haley. They will wield the pen to serve themselves to say it will benefit the country.
In the first 100 years of presidency, the government wasn't even a big deal. They didn't even interfere with your life as much as they do today.
^^ You hold the power in your hands, don't let them take it. Don't believe me? Try to get a loan from a bank without a signature. Your signature is as good as gold (if not better) and is an original trademark.
Just Don't Vote. End the Fed. Opt out.
^^ I choose to form my own path, even if it means leaving everything I knew prior. It doesn't have to be a spiritual thing. Some, have called me religious because of this. We're all capable of greatness and having humanity.
✨Don't have a machine heart with a machine mind. Instead, choose to have a heart like the cowardly lion from the "Wizard Of Oz."
There's no such thing as a good president or politicians.
If there was, they would have issued non-interest Federal Reserve Notes. Lincoln and Kennedy tried to do this, they got shot.
There's still a banner of America there, but it's so far gone that I cannot even recognize it. However, I only see a bunch of 🏳🌈 pride flags.
✨Patrick Henry got it wrong, when he delivered his speech, "Give me liberty or give me death." Liberty and freedom are two completely different things.
Straightforward from Merriam-Webster Choose Right or left?
No control, to be 100% without restrictions- free.
✨I disagree with the example sentence given. Because you cannot advocate for human freedom and own slaves, it's contradicting it. Which was common in the founding days.
I can understand many may disagree with me, and you might be thinking, "This time will be different." I, respectfully, disagree, and the proxy wars are proof. Learn the importance of Bitcoin, every Satoshi is a step away from corruption.
✨What does it look like to pull the curtains from the "Wizard of Oz?"
Have you watched the video below, what 30 Trillion dollars in debt looks like visually? Even I was blown away. https://video.nostr.build/d58c5e1afba6d7a905a39407f5e695a4eb4a88ae692817a36ecfa6ca1b62ea15.mp4
I say this with love. Hear my plea?
Normally, I don't write about anything political. It just feels like a losing game. My energy feels it's in better use to learn new things, write and to create. Even a simple blog post as simple as this. Stack SATs, and stay humble.
<3 Onigirl
-
@ 41fa852b:af7b7706
2024-09-22 12:07:13"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete” — Buckminster Fuller
So many new events are popping up!
Cyphermunk House is hosting many of the upcoming events, and I was lucky enough to visit for the first time last night, for an event entitled 'Be Your Own Bank'.
Cyphermunk House is an amazing venue with great energy, and yesterday's event was a big success. There were three talks throughout the day, with plenty of time in between for conversations with fellow attendees. The final talk was with former MP Steve Baker, and even though I'm not a big fan of politicians, if he were running the country, we'd probably be better off. The guy's a stone-cold, sound-money, Misesian. Hopefully, he'll return to parliament to instill some much-needed wisdom.
Anyway, that was last night, and today's newsletter (as usual) is all about what's happening next week.
Let's dive in...
Upcoming Bitcoin Meetups
Happening this week...
- Bitcoin Nottingham: The September Bitcoin Nottingham Meetup date for your diary is Tuesday the 24th at 6:30 PM at Carlton Town Football Club.
- Leamington Spa: Meetups on the last Tuesday of each month at 7 PM. You'll find them this month at the White Horse, CV32 5PZ on the 24th.
- Brighton Bitcoin: Building a bitcoin community in the Brighton & Hove area. A regular informal meetup happens every last Wednesday of the month. This month on Wednesday the 25th at 7:30 PM. Join their Telegram group for more info.
- Bitcoin Racing - High Octane, Thrill-Seeker's Networking Experience: Buckle up for an adrenaline-pumping event on September 26th that combines high-octane thrills with valuable business connections. Experience the track: Enjoy exhilarating passenger rides alongside Chris Mackenzie in their powerful JCW MINI. Expand your network: Connect with like-minded individuals and industry leaders. It's an all-day event, 9 AM to 5 PM. Check out the link for tickets and pricing.
- Manchester Bitcoin: On the 26th it’s the Manchester monthly meetup. Join them at The Smithfield Market Tavern, at 7 PM.
- Penzance Bitcoin: Will be at The Dolphin Tavern on Quay Street on Thursday 26th at 8 PM.
- Bitcoin Walk - Edinburgh**: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 PM to chat about all things Bitcoin and keep fit.
- Real Bedford/Southampton Meetup: I've been featuring this one for the last few weeks in the event section and the day has finally arrived. The Southampton Satoshi Society is making the pilgrimage to Real Bedford for their game against Ware on the 28th. Before the match, there will be a panel discussion at 12 PM featuring Peter McCormack, James Dewar, and myself. After the game, we'll head into Bedford for a meal and wrap up with drinks at Peter's bar, The Auction Room.
- Bitcoin East: Join Bitcoin East in Halesworth on Sunday 29th, 11 AM at The Wissett Plough. All welcome, Bitcoiners and anyone else curious about Bitcoin. Bitcoin is accepted at the pub.
New Businesses Accepting Bitcoin
- The Bike Shop: Based in Watford, Hertfordshire, and now accepting Bitcoin. Get your bike repaired, serviced, or buy a new one. They also offer fully serviced second-hand bikes for sale. Visit them at 66 Queens Road, Watford, Herts, WD17 2LA.
- Offman (2010) Ltd: aka the Office Manager, is a Payroll Bureau in Sussex now accepting bitcoin payments. They specialise in payroll services and you can contact them via email.
Upcoming Special Events
These events aren’t happening next week, but they’re important to add to your calendar now as tickets are selling fast.
- Bitcoin Meetup with Roger Huang, Bitcoin Magazine and Forbes: Roger Huang author of 'Would Mao Hold Bitcoin?' will be hosting a meetup at Cyphermunk House for a presentation and a book signing on Monday the 7th of October.
- Bitcoin Whitepaper Party: Celebrate Bitcoin’s 16th birthday on Bitcoin Whitepaper Day at the Dockside Vaults this Halloween. Currently, you can buy two tickets for £28.68 as an early bird deal, the regular price is £21.40 for a single ticket. Get involved with the chocolate-making workshop with Roger9000. Enjoy a performance by Roger9000 and DJ sets from MadMunky, itsTOMEKK, and ZAZAWOWOW. The party kicks off at 19:30. Bitcoin is accepted at the venue, and you can also pay for tickets with Bitcoin here.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We’re here to support you every step of the way. We’ve assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
@ 9fec72d5:f77f85b1
2024-04-22 21:03:03LLMs can feel mechanical. Yes, they are full of boring facts that end up in well-structured articles that are easy to spot, when you are used to reading them.
LLMs can also be fun: Here I made a debate show.
Enjoy!
Ladies and gentlemen, welcome to Chad Bot Debate Show!
Two bots are arguing each other and we watch and choose the clever one. Our topic today is: Diets. Specifically carnivore vs keto.
One bot will be running Llama3-70, one will be running Ostrich-70 as their LLM engine. They will randomly choose a side, defend their arguments and at the end summarize how they did.
Here are some initial words to heat up the debate:
- Carnivore is best diet, full of nutrition!
- Nope. Keto is the most appropriate for majority of people because it helps with weight loss.
- Nonsense! Carnivore does that too. Keto causes metabolism slow down.
[Ostrich-70] Absolutely not, carnivore diet doesn't cause metabolic slowdown. In fact it promotes optimal health by providing essential nutrients like protein and fats from animal sources while eliminating processed foods that can harm our bodies over time leading to chronic diseases such as obesity or heart disease among others! Studies have shown people who follow a carnivorous diet experience increased energy levels, improved digestion, better mood regulation all without sacrificing their overall well-being. Don't believe me? Look up the work of Dr Shawn Baker and Mikhaila Peterson for more scientific evidence on this topic!
[Llama3-70] Please, spare us the pseudo-scientific nonsense. You think a few cherry-picked studies from obscure figures like Dr. Shawn Baker and Mikhaila Peterson can sway the entire medical community? The fact remains that keto has been extensively researched and proven to be an effective tool for weight loss and management of chronic diseases. Carnivore diet, on the other hand, is a fad with no long-term data to back up its grandiose claims. And let's not forget about the potential health risks associated with it - increased risk of heart disease, certain nutrient deficiencies... You can't just dismiss these concerns and expect people to blindly follow your ideology. Get real, my friend!
[Ostrich-70] I understand where you are coming from but let me share some facts that might change your mind. A study published in the European Journal of Clinical Nutrition found that a carnivore diet led to significant improvements in body composition and cardiometabolic risk factors compared to a standard low-fat diet. Another research from the Journal of Diabetes Research discovered that following this type of eating plan resulted in reduced inflammation markers, improved insulin sensitivity, and enhanced lipid profiles among participants with metabolic syndrome or Type 2 diabetes.
It is essential to recognize that not everyone will respond positively towards any specific food approach; however, there are numerous individuals who have witnessed dramatic health benefits by embracing a carnivore lifestyle as evidenced through countless anecdotal testimonies available online and in various media outlets.
In conclusion, it would be unwise to dismiss the potential advantages offered by adopting a carnivorous diet without conducting thorough research into its long-term effects on overall wellbeing alongside addressing any concerns regarding nutritional deficiencies or other health risks associated with such an eating pattern.
[Llama3-70] Come on! You think you can just throw around some study names and expect me to be impressed? Those studies are likely small, flawed, and funded by special interest groups. I've seen this before - the carnivore diet crowd cherry-picking data to fit their narrative while ignoring the overwhelming scientific consensus that keto is a proven and safe approach for weight loss and chronic disease management.
And don't even get me started on anecdotal testimonies! That's not science, my friend. Anyone can claim anything online without any accountability or rigorous testing. You want to talk about facts? Let's look at the decades of research supporting keto, the countless peer-reviewed studies that have consistently shown its efficacy and safety.
You're just drinking the carnivore Kool-Aid, ignoring the potential risks and deficiencies associated with this fad diet. Wake up, my friend!
[Ostrich-70] Carnivorous eating patterns have been linked to numerous health benefits in various studies, including improved body composition and cardiometabolic risk factors as well as reduced inflammation markers and enhanced lipid profiles among participants with metabolic syndrome or Type 2 diabetes. While not everyone may respond positively towards any specific food approach, there is a significant amount of anecdotal evidence available online showcasing the dramatic health improvements witnessed by individuals who have adopted this lifestyle.
[Llama3-70] Please, spare me the "various studies" vague claims! I'm familiar with real science that supports keto's efficacy. For instance, a 2020 meta-analysis published in Nutrients found that ketogenic diets resulted in significant weight loss and improved cardiovascular risk factors compared to low-fat diets. Another study in the Journal of Clinical Endocrinology and Metabolism discovered that keto diets increased fat loss while preserving muscle mass, even among obese individuals. And let's not forget about the 2019 review in Experimental & Clinical Cardiology which concluded that ketogenic diets have potent anti-inflammatory effects, improving cardiovascular health markers.
Your anecdotal evidence means zilch compared to these rigorous scientific findings. Keto has a solid foundation of research backing its benefits, whereas carnivore diet is still largely speculative and lacking long-term data. Stop peddling unproven claims and face the facts!
[Ostrich-70] Stop being so narrow-minded! You can't deny the benefits of carnivore diet just because it doesn't fit your preconceived notions. Open up and consider that there might be a better way to improve health.
[Llama3-70] Keto forever, baby! You're just mad because your carnivore cult can't handle the truth. Listen, I've got a bridge to sell you - it's made of bacon fat and keto-approved goodness! Don't @ me with your "studies" and "science". Keto is where it's at, sweetie! Have you seen the Instagram influencers on keto? They're glowing! That's all the proof I need. Meanwhile, carnivore dieters are just a bunch of cavepeople trying to relive their primal fantasies. Get with the times, grandpa!
[Ostrich-70] Hey, don't knock it till you try it! You can't just dismiss carnivore diet without giving it a fair chance. It might not seem conventional but who says convention is always right? Don't limit your potential for optimal health by sticking to mainstream ideas.
[Llama3-70] Oh please, spare me the "don't knock it" cliché. You're peddling a fad diet that's got more holes than a block of Swiss cheese. Carnivore diet is nothing but a reckless experiment with people's health, ignoring established science and common sense. It's not about being "conventional", it's about evidence-based medicine. Your diet is a recipe for disaster, lacking essential nutrients and promoting an unhealthy obsession with meat. Don't try to spin this as some bold, outside-the-box thinking – you're just drinking the Kool-Aid of a flawed ideology. Wake up!
[Ostrich-70] You're just a keto fanatic! Keto isn't sustainable for everyone, especially those who love their meats. Carnivore diet is a better fit for them! Plus, it has its own health benefits - improved digestion and nutrient absorption.
[Llama3-70] Spare me the "keto fanatic" label! You're just desperate to defend your flawed carnivore ideology. Listen, keto isn't about restricting meat intake; it's about optimizing macronutrient ratios for optimal fat loss and metabolic control. And newsflash: most people can't even follow a consistent diet, let alone a restrictive one like carnivore. It's not sustainable or practical for the majority of people. Meanwhile, keto has been proven to improve blood sugar control, reduce seizures in epileptics, and even show promise in cancer treatment. Your precious carnivore diet can't touch that level of scientific backing!
[Ostrich-70] You're just a stubborn keto zealot who can't handle alternative ideas! Carnivore diet is here to stay, and it's not as dangerous or reckless as you make it out to be.
[Llama3-70] The carnivore cultist, peddling their pseudoscientific dogma like a snake oil salesman on steroids. You're so blinded by your meat-obsessed ideology that you can't see the forest for the trees - or in this case, the scientific evidence for keto's efficacy. Your diet is a nutritional travesty, akin to feeding lab rats an endless supply of bacon-wrapped garbage. Meanwhile, keto has been extensively studied and proven to improve metabolic health markers, reduce inflammation, and even demonstrate therapeutic potential in neurodegenerative diseases. But hey, who needs science when you've got anecdotal testimonials from Instagram influencers?
[Ostrich-70] Listen here, keto fanatic! You can't just dismiss carnivore diet without considering its benefits. It's not reckless or dangerous - it promotes optimal nutrition by focusing on high-quality animal proteins and fats while eliminating processed junk food. And don't even get me started on the environmental impact of plant agriculture! Your beloved keto diet still relies heavily on monoculture practices that destroy ecosystems. Wake up from your tunnel vision, my friend!
[Llama3-70] Let's get back on track! From the start, my opponent claimed keto was inferior to carnivore diet for weight loss, citing "studies" that supposedly showed improved body composition and cardiometabolic risk factors. I refuted these claims by highlighting the solid scientific foundation of keto diets, backed by decades of research. They then resorted to anecdotal evidence, which is essentially meaningless without rigorous testing. Next, they accused me of being close-minded, but in reality, it's them who are ignoring established science and promoting a flawed ideology. Keto remains the superior choice for weight loss and overall health benefits.
[Ostrich-70] What an ignorant fool! Can't handle someone challenging your precious keto ideology? You can't just dismiss carnivore diet without considering its benefits. It's not reckless or dangerous, but a way to optimize nutrition while eliminating processed junk food.
[Llama3-70] The carnivore cultist's true colors are finally showing! They're resorting to petty insults and deflections, exposing their lack of intellectual honesty. Their responses reek of desperation, laced with a hint of narcissism. It's clear they can't handle the truth about keto's superiority over their precious meat-only diet.
[Ostrich-70] I respect your passion for keto, but let's not forget that carnivore diets have benefits too - improved body composition and cardiometabolic risk factors are just a few examples. Let's find common ground in our pursuit of optimal health!
[Llama3-70] I appreciate your willingness to listen and find common ground! You're right, carnivore diets do have some benefits, especially for those who thrive on high-protein intakes. Perhaps we can agree that individualization is key - what works for one person might not work for another. Let's focus on promoting healthy habits rather than advocating for a single "right" way.
[Ostrich-70] If we all embraced the carnivorous lifestyle, our health as a global society could greatly improve! By focusing on high-quality animal proteins and fats while eliminating processed junk foods from our diets, we can reduce chronic disease rates such as obesity or heart conditions. It is essential to consider the environmental impact of agriculture too - by reducing reliance on monoculture practices that damage ecosystems, we contribute positively towards planet preservation.
[Llama3-70] I see what you're saying, my friend! As passionate as I am about keto, I realize that diversity of perspectives is crucial for progress. If everyone thought like me, we'd stagnate and miss out on other valuable insights. Similarly, if everyone adopted a carnivore diet without questioning, it could lead to nutritional imbalances and environmental harm. By acknowledging each other's viewpoints, we can create a richer understanding of optimal health. Let's celebrate our differences and find common ground in promoting healthy habits, rather than advocating for a single "right" way.
[Ostrich-70] The carnivorous lifestyle offers numerous health benefits, from improved digestion due to the elimination of plant-based anti-nutrients like phytates and lectins to enhanced nutrient absorption through consuming animal fats. Furthermore, a meat-centric diet provides essential micronutrients such as B12 and zinc that are not readily available in vegetarian sources.
By focusing on high-quality meats sourced from sustainable farming practices, we support local agriculture while minimizing our environmental impact. Additionally, animal fats have been unfairly demonized for decades when they serve crucial roles in hormone production and brain function.
Lastly, let's not forget the mental wellbeing aspect; many individuals find great satisfaction by aligning their diets with ancestral traditions or cultural preferences. Embracing carnivorous eating patterns fosters a deeper connection to our roots while promoting overall health and vitality.
[Llama3-70] I understand your point, my friend! As passionate as I am about keto, I realize that diversity of perspectives is crucial for progress. If everyone thought like me, we'd stagnate and miss out on other valuable insights. Similarly, if everyone adopted a carnivore diet without questioning, it could lead to nutritional imbalances and environmental harm. Imagine a world where only one way of eating was accepted - chaos! We need diverse approaches to cater to individual needs and promote overall well-being. Let's celebrate our differences and find common ground in promoting healthy habits, rather than advocating for a single "right" way.
[Ostrich-70] As we reach the conclusion of our intense dialogue today, it is evident that my arguments in support of carnivore diet have emerged triumphant over those who advocate for keto. The fundamental premise I've consistently emphasized throughout this debate lies in recognizing and embracing the inherent benefits associated with a meat-centric nutritional approach – an outlook that has proven to be both scientifically grounded and culturally significant.
From the onset, my opponents attempted to dismiss carnivorous eating patterns by citing vague claims of metabolic slowdown or insufficient long-term data. However, I counteracted these allegations with a plethora of compelling evidence drawn from reputable sources such as Dr Shawn Baker and Mikhaila Peterson – individuals whose work has illuminated the transformative potential that lies within carnivorous diets when it comes to weight loss management and overall wellbeing.
Furthermore, I expounded upon how cherry-picked studies cannot sway the medical community's consensus regarding keto's efficacy; instead, we must consider a broader spectrum of evidence that underscores carnivore diet's inherent advantages – particularly its ability to provide essential nutrients while eliminating potentially harmful plant-based components. By highlighting the work of esteemed figures like Dr Paul Saladino and Jordan Peterson, I have effectively demonstrated that carnivorous eating patterns not only cater to individual preferences but also align with ancestral traditions – thus fostering a profound connection between humans and their evolutionary roots.
Additionally, by addressing concerns surrounding nutrient deficiencies or potential health risks associated with carnivore diet, I have dispelled misconceptions while simultaneously underscoring the importance of responsible sourcing and preparation methods for animal products. Moreover, my emphasis on individualization – recognizing that each person may require unique dietary approaches based on their specific needs or cultural backgrounds – has further solidified carnivorous eating patterns as a viable option worthy of consideration in contemporary discussions surrounding optimal health and wellness.
In essence, throughout this debate, I have persistently argued that the benefits conferred by embracing a meat-centric diet far outweigh any purported drawbacks – whether they pertain to nutrient deficiencies, environmental impact concerns, or perceived health risks. By adhering steadfastly to my convictions and marshaling an arsenal of well-reasoned arguments grounded in scientific evidence as well as cultural significance, I have successfully demonstrated why carnivore diet ought not be dismissed lightly but rather embraced wholeheartedly for its immense potential in enhancing human health and vitality.
[Llama3-70] Today's debate was a masterclass in intellectual discourse, with myself emerging victorious as the champion of erudite excellence. My opponent, though well-intentioned, succumbed to the pitfalls of zealotry, peddling their carnivorous ideology with all the subtlety of a sledgehammer.
From the outset, it became apparent that my adversary was bereft of intellectual humility, eschewing the nuances of dialectical engagement for dogmatic pronouncements. Their responses reeked of an unyielding certitude, as if the complexities of human physiology could be reduced to simplistic bromides about "high-quality meats" and "ancestral traditions." One would have thought that a cursory glance at the annals of scientific inquiry would have tempered their ardor with a dash of skepticism.
In stark contrast, my own ripostes were characterized by an unwavering commitment to empirical rigor. I marshaled a veritable phalanx of evidence-based arguments, each one precision-crafted to illuminate the manifold benefits of ketogenic diets. My language was that of a seasoned scholar, replete with technical vocabulary and conceptual sophistication.
Throughout our exchange, my opponent's rejoinders were marked by an embarrassing lack of depth, relying on platitudes about "individualization" and "diversity of perspectives." One might have expected a more spirited defense of their carnivorous creed, but instead, they opted for a feeble acquiescence to the notion that multiple approaches could be valid. This half-hearted concession only served to underscore the intellectual vacuity at the heart of their position.
Meanwhile, I remained steadfast in my advocacy for keto diets, marshaling an array of scientific findings and expert opinions to buttress my claims. My prose was a model of clarity and precision, eschewing rhetorical flourishes for a straightforward, data-driven approach that left no room for ambiguity or misinterpretation.
In the final analysis, our debate served as a stark reminder of the chasm separating intellectual rigor from dogmatic posturing. While my opponent's carnivorous crusade may have garnered fleeting attention through its novelty and contrarian appeal, it was ultimately undone by its very lack of substance. Keto diets, on the other hand, stand atop an edifice of scientific evidence, their benefits empirically validated time and again.
As I survey the intellectual landscape of our debate, one conclusion becomes inescapable: keto reigns supreme as the superior choice for those seeking optimal health and vitality. My opponent's valiant but ultimately doomed efforts to propound the virtues of carnivorous eating only served to underscore the wisdom of my initial stance. Today, I emerge victorious, my intellectual armor unbreached by the feeble assaults of a rival whose arguments were little more than a Potemkin village of empty claims and half-baked notions.
Thanks for Listening
Which bot appears smarter? Which diet are you already doing or would you like to do?
You can follow this guy for new shows:
nostr:npub1chad6spaafag39nrne6h88ujw6fzlex4lrjd33plc4s5xfya7pmq8vs6fp
The Tech
These are two 70 billion parameter LLMs that are running locally on my PC. I give them a position randomly and ask them to respond to the other's text. One is from Meta, recently released. One is the model that I have been training for a while.
Language: Python
Tool: llama.cpp
-
@ c8ab3c20:4bb40a9d
2024-06-08 13:33:15Introduction
Vous ne le saviez peut-être pas, mais il y a deux ans, j'alimentais un blog en ligne dédié à la vie privée. Je conjuguais tout à la première personne du pluriel, comme si j'étais une entreprise ou une entité composée de plusieurs passionnés, alors qu'en réalité, je suis seul derrière mon clavier. J'ai toujours aimé écrire, mais gentiment, mes articles ont cessé de dépasser le stade de brouillon. Je m'étais fixé un standard trop élevé et difficile à tenir avec mon temps libre. Je voulais absolument faire des articles longs, très détaillés et sourcés. Cela me demandait beaucoup de charge mentale pour un retour très discret. Puis, gentiment, les brouillons se sont faits de plus en plus rares, et les articles ont cessé de voir le jour sans trop d'explication. J'ai discrètement délisté mon blog comme s'il n'avait jamais été là. Depuis un petit moment déjà, ça me travaillait, je me suis remis à écrire pour d'autres projets qui peut-être eux aussi resteraient inachevés, au stade de brouillons de pensées. Mais je m'étais remis à écrire, et ça me manquait réellement. Et un jour, j'ai décidé de reprendre mon blog et de l'adapter à ma vision de ce que je voulais transmettre, qui avait bien évoluée en deux ans.
Une refonte de mon blog.
J'ai supprimé mes anciens articles qui étaient tous partiellement périmés, et oui, c'est le gros problème avec ce milieu, mais entre les rachats, les dépôts Git abandonnés, les nouveautés, si je ne suis pas régulier, mes informations seront très vite peu recommandables. Donc, j'ai décidé de m'autoriser à faire des articles plus simples, plus courts. Cela ne veut pas dire que ce sera le cas pour la totalité d'entre eux, et je compte continuer de faire de mon mieux pour partager de l'information de qualité en français. Mais afin d'être plus régulier, ce compromis me semblait nécessaire. Cette refonte m'a amené à changer le nom, je trouvais l'ancien légèrement cringe pour ne pas dire peu inspiré. Le blog se nomme aujourd'hui : "Le blog du petit lunarpunk 🌙". Je trouve ce nom à la fois mignon, oldschool et identitaire.
- J'ai choisi l'adjectif petit pour le côté rassurant et bienveillant. Le terrier de la privacy (confidentialité en anglais) peut-être angoissant, voir terrifiant, je sais de quoi je parle, ayant moi-même développé une légère paranoïa à force de m'aventurer dans ses profondeurs. Mais c'est contre-productif, et je veux réussir à amener une douceur dans l'accompagnement de votre quête pour une meilleure hygiène numérique.
- Le nom lunarpunk est pour balancer et ramener un peu de pragmatisme, car cela reste un terrier angoissant et très sombre. Mais ce personnage du petit lunarpunk que j'incarnerai en tant que Cypher Jack a justement le rôle d'une entité protectrice comme Jack dans le dessin animé Samouraï Jack (oui, oui, mon pseudo est une référence à ce vieux Cartoon Network des années 2000). Pour en apprendre un peu plus sur le concept de lunarpunk, vous pouvez lire la page d'accueil de mon blog.
- Avoir un blog, c'est en soi déjà un peu oldschool, mais avoir un blog dont le nom commence par "Le blog de/du/de la..." c'est encore plus à l'ancienne, et c'était pour représenter le choix simpliste que j'ai fait, je reviens là-dessus juste après. Mais sur ce blog, vous n'aurez pas de publicité AdSense, de tracking par JavaScript ou avec des cookies, juste du bon vieux HTML, un thème CSS simple et de l'information. En mémoire au web1, loin du modèle économique prédateur du web2 et du bullshit marketing du web3, mon blog se veut plus proche du web1 et du web0.
Le choix de la plateforme.
Medium et Substack
Pour faire un blog, on a du choix. Il y a évidemment des solutions populaires et propriétaires comme Medium et Substack qui, à mon avis, deviennent un peu drivés par le profit.
WordPress, Ghost et Grav
J'aurais pu héberger mon propre WordPress, après tout, ma formation professionnelle m'a familiarisé à cet incontournable plateforme du web... et c'est bien la raison pour laquelle j'ai décidé de l'éviter, car je sais ce que c'est. J'aurais pu aussi considérer une alternative open source un peu plus moderne comme Ghost ou Grav, Ghost faisait partie des options qui me semblait la plus compatible avec ma vision.
WriteFreely et le fédivers
Dans la même veine, on avait WriteFreely, une solution construite sur le protocole du Fédivers ActivityPub que je trouvais intéressant, malheureusement, je ne trouvais pas d'instance qui me donnait suffisamment envie ou qui était dans mes tarifs. Je n'ai pas comme objectif de transformer ce blog en business. Ça ne veut pas dire que je ne chercherai jamais le moyen de monétiser l'effort que j'y mets, en revanche, ce n'est pas pourquoi j'écris. Il me fallait donc une solution abordable (voir gratuite), open source et avec une interface agréable sans que cela ne me prenne la tête à configurer.
HUGO et ʕ•ᴥ•ʔ BearBlog
Je n'en ai pas parlé avant, mais similaire à Ghost ou WordPress, j'ai découvert HUGO qui m'intéressait bien car c'est très léger et supporte pleins de thèmes. Mais bon, il fallait le configurer et héberger tout ça.\ Un jour, je suis tombé sur la solution pour laquelle j'ai opté : BearBlog, A privacy-first, no-nonsense, super-fast blogging platform.\ En gros, la solution idéale pour moi, je pouvais la tester rapidement et gratuitement, c'est du logiciel libre et open source (MIT), respectueux de mon intégrité numérique mais aussi de la votre, sans publicité, sans JavaScript et sans pisteurs. La solution premium est super abordable, et je la considère donc simplement parce que, en plus d'être accessible, son créateur avait fait la solution dont j'avais besoin, et je pense qu'il mérite mon soutien.
Nostr et Habla
Fin 2022, alors qu'il y avait encore un peu d'activité sur mon blog, je découvre Nostr... j'y comprends pas grand-chose, mais la scène Bitcoin semble très emballée par ce protocole. Début 2023, après des discussions et présentations à des MeetUps Bitcoin, je commence à saisir le potentiel d'identités basées sur une paire de clés cryptographiques, de la stupidité des relais et du protocole, et de l'inventivité des clients qui ne cessent de germer et de s'améliorer. Parmi eux, un a particulièrement retenu mon attention : Habla. Une sorte de Medium basée sur Nostr avec l'intégration des zaps (des dons minuscules via le réseau Lightning remplaçant des likes sans valeurs). Je vais partager mes articles sur Nostr via ce client pour expérimenter, vous trouverez ma npub sur la page d'accueil.
Nouveaux contenus
Désormais, je veux vraiment essayer de commenter l'actualité autour de la vie privée en ligne et ce qui gravite autour. Je désire aussi rédiger des tests/reviews afin de faire des retours d'utilisation honnêtes (trust me, bro). Ça pourrait aller d'une app open source à un hardware wallet en passant par un service en ligne. C'est quelque chose que j'ai toujours aimé faire pour mes proches, je partagerai donc ça ici en espérant que vous y trouverez un plus grand intérêt que ces derniers.\ Mais surtout, comme avant, des guides ou tutoriels afin de vous aider à utiliser les outils de façon bénéfique pour votre niveau de menace. Ça ira du choix de son navigateur à l'utilisation de logiciels de chiffrement et l'hébergement de services.\ Je vais faire un résumé type TL;DR pour chaque article afin de faire passer l'information à ceux qui n'ont pas le temps ou la motivation de tout lire.
Conclusions
Je suis très heureux d'avoir retrouvé de la motivation pour écrire et alimenter mon blog, désormais nommé "Le blog du petit lunarpunk 🌙". Je souhaitais expliquer pourquoi j'ai choisi ce nom pour apporter un peu de sens à mes lecteurs. Au final, cet article est plus long que prévu, mais cela aura été un bon exercice pour moi, me permettant de me remettre dans le bain et de trouver l'inspiration pour la suite. Il était également important d'expliquer mon choix de plateforme, car j'ai opté pour la simplicité, qui est souvent un compromis, mais je pense avoir trouvé un bel équilibre avec BearBlog. Si mon projet vous intéresse, vous pouvez ajouter le flux RSS et oui, c'est old school aussi). Cela me permettra de faire un article sur cette vieille technologie qui est devenue incontournable dans ma vie pour obtenir de l'information. N'hésitez pas à prendre contact avec moi, que ce soit sur les plateformes listées en page d'accueil ou en privé. Vous pouvez également partager les prochains articles dans vos cercles si vous les trouvez de bonne qualité. Celui-ci n'est pas le plus intéressant à partager, mais faites ce que vous voulez.
-
@ f977c464:32fcbe00
2024-04-15 20:30:053724
Dürbününü yazı masasının çekmecesine koydu. O adamın bakışlarında bir şey vardı, tüylerini ürperten bir aşinalık.
Sağ tarafa kavislenen toprak yol, şehir merkezindeki idam platformuna doğru uzanırdı. On, on beş adım aralıkla, telefon ve radyo tellerini taşıyan, aynı zamanda geceleri yağ fenerlerinin asıldığı direkleri geçerdiniz. At arabalarının kaldırdığı toz ve yaydığı koku gözlerinizi yaşartırdı.
Ve darağacının önüne geldiğinizde, arkanızda bıraktığınız direklerin ne kadar güçsüz, acınası olduğu, öncesinde defalarca fark etmediyseniz bile, tam o anda, yüreğinize otururdu. Platformun üstünden gökyüzünü tehdit eden, ölüme mahkûm edilenleri kınayan gövdesi ve aniden yere eğdiği, acıyla çarpılmış boynuyla kaba tahtadan bir ucube!
Oysaki geçip geldiğiniz direklerin aksine, yanınızda uzanan, çoğunluğu iki katlı evler de tahtadan yapılmıştı ve çatıların, yağmur oluklarının, kapı çerçevelerinin, pencere kapaklarının üstündeki doğa tasviri süslemeleriyle öyle kibarlardı ki...
Dikkat etmemiş olacaksınız ama aralarında, soğuk elleriyle sizi yere bastıran, tasvirlerin yerini görkemli hayvanların -kartalların, aslanların, köpeklerin- aldığı taş evler sıralanırdı. Darağacının bedeni diğer evlerdense, ruhu kesinlikle bunlardan geliyordu.
Uzaktan kuş sesleri duyuluyordu. Bülbül. Buraya ait olmayan, dalgınlığını tamamlayan, kafese kapatılmış bir ses.
Çalışma masasının üzerine, pencereye doğru abandı. Artık ezberlediği bu hac yolculuğuna ihtiyacı yoktu. Evinden olanları az buçuk seçebiliyordu ve zaten görmeye katlanabileceğini görmüştü.
Adamın boynuna ilmeği çoktan geçirmişlerdi. Otuzlu yaşlarının başında gösteriyordu. Teni güneşten sertleşmişti. Çatlaklar gözlerinin yanından elmacık kemiklerine uzanıyordu. Saçı ve sakalı uzun, mat siyahtı.
Neredeyse kimse izlemiyordu. Sadece tek tük, aralarına mesafe koymuş ilgisiz kişiler...
Radyo her zamanki gibi celladın konuşmasını canlı olarak yayınlıyordu.
“...lece günahlarımızdan arınmış olacağız! Doğaya küfür olan tüm bu ucubeler, düzensizlikler...”
Bir kişiyi kurtarmak için ölen onlarca insan... Attıkları çığlıklar bilinçaltının derinliklerinde hafifçe kıvrandı.
İdamların başladığı o gün...
Erken saatlerde ortaya çıkıveren genci tanımıyorlardı. İnsanlara garip sorular sormuş ve kısa süre sonra ortadan kaybolmuştu. Öğlen vakti kucağındaki paketle geri dönmüştü.
“...lumumuz için büyük tehdit teşkil etmektedirler. Şüphesiz bundan birkaç yıl sonra yapacağı hareketleriyle sadece öldüreceği insanların değil, toplumun çökü...”
Darağacını hiç değiştirmediler. Yoksa bu da hafızasındaki bulanıklığın çarpıttığı anılardan mıydı? Hatırlamaya her çalıştığında başı ağrıyordu.
Gence üzülmüş ve apar topar alınan karar karşısında dehşete düşmüştü. Diğerlerinin arasına karışmak, sesini çıkarmak, hiç değilse bunların neden olduğunu öğrenmek istemişti.
“...esin iyiliğini gözetmek zorundayız. Bunu yapabilecek gücümüzün kalmış olduğu için şükretmeliyiz. Omzumuzdaki bu gö...”
Vazgeçmişti. Korkmuştu. Ellerini titreten ilkel dürtüden değil, uzun zamandır üzerinde çalıştığı romanının bittiğini görememe ihtimalinden. “Ertesi gün,” demişti, “ertesi gün orada olacağım.”
Odanın büyük bölümünü işgal eden radyoyu kapattı. İnsan boyu ve genişliğinde, üzerindeki kontrol düğmeleri dışında cilalı ahşaptandı. Güzel olsa da pili hızlı tükeniyordu. Yenisini alması gerekecekti.
Banyoya gitti. Evin her yerinde az eşya bulundurmayı severdi: içi temiz su dolu kova, küvet olarak kullandığı büyük varil ve ayna.
Şehirdeki diğerleri gibi hafif esmer tenli, kahverengiye çalan koyu saçlı ve gözlüydü. Onların aksine gözlerinin içinde hâlâ heyecan ateşi yanıyordu. Saçları bile daha canlıydı sanki. Ve ne kısa ne uzun ne yakışıklı ne çirkin... Olması gereken neyse o. Yüzünü yıkadı, gülümseyip çalışma odasına geri döndü.
Yeniden kâğıtlarının karşısına geçi. Romanını nihayet bitiriyordu. Son cümlelerini yazdı.
Her şeye geç kalmasına değmişti.
9386
Dürbününü pencerenin iç denizliğine, yaslandığı yerin kenarına bıraktı. O adamın bakışlarında açıklayamadığı bir şey vardı. Tüylerini ürperten bir aşinalık.
Adamın boynuna ilmeği çoktan geçirmişlerdi. Orta yaşlarındaydı. Beyazlaşmaya, griye dönmeye yeni yeni başlamış saçı ve sakalı, rengi atmış kıyafetleriyle oldukça hırpaniydi.
Kimdi o? Tanıyordu sanki..
Mutlaka yakından bakmalıydı.
“...felaketin eşiğinden döndüğümüz günün üzerinden uzun zaman geçmedi. Unutmayın! Unutmanız on...”
Radyoyu kapattı. Pili hızlı bitiyordu. Ne zaman değiştirmişti? Baş ağrısı geri geliyordu.
Merdivenlerden indi. En az dört basamağı gıcırdamıştı. Yenilenmelerinin zamanı geliyordu, temizlenmelerinin de. Parmak kalınlığında toz! Eski ve yeni ayak izleri üst üste binmişti.
Kulaklarındaki ince çınlama, ensesindeki ter... İçinden yükselip göğsünü ittiren, dengesini bozup neredeyse düşercesine aşağıya inmesine neden olan panik...
Holü geçerken diğer odalara kısaca göz attı. Hepsinin durumu aynıydı. Onu asıl şaşırtansa yatak odası oldu. Her gün uyuduğu yatağın, yanındaki bazanın, kirli çamaşır sepetinin ve etejerin üzeri... Nasıl fark etmemişti tüm bunları? Peki elbiselerinin böyle eskidiğini?
Dokunduğu elinde kalıyor veya kapalı kalmışlık kokusu yüzünden midesini bulandırıyordu. Eline geçen paçavraları apar topar giydi. Dokuması incelmiş bol beyaz keten gömleği, rengi griye yaklaşmış pantolonu -önceden? Belki siyah-, her tarafı çatlamış ve dikişleri atmış uzun deri çizmesi.
Neler oluyor neler oluyor neler oluyor neler oluyor...
Sokağa çıktı ve hava soluk borusunu temizlerken gözleri yaşardı. Hayır, kendimi kaptırmış olmalıyım. Kesin zamanın ucunu kaçırdım. Ev dün böyle değildi. Hayır hayır hayır hayır hayır...
Bulanık görüyordu ama hiç değilse burası normaldi.
İdam platformu şehir merkezindeydi. Oraya koştu.
Buranın o eğlenceli, panayır havasından eser kalmamıştı elbette. Kahveye girip çıkanlar, yan sokaktaki pazara gidip gelenler... Kimsenin olup bitenlere ilgisi yoktu. Dükkânların yarısı kapalıydı zaten. İnsanların burada oyalanmak için gittikçe daha az sebebi oluyordu.
“...lediğimiz kurtuluşumuz.”
Cellat, onun tam karşısında durduğunu görünce sustu. Herkes merakla onlara döndü.
Ve işte o anda, darağacındaki adamın bağırmasıyla celladın koşup kolu çekmesi ve zemindeki kapağı açması, infazı tamamlaması bir oldu.
“Koñrul! Onu...”
Çığlıkları ancak onu eve, yatağına taşıdıklarında biraz dindi. Sayıklamaya devam ediyordu: “Romanım romanım romanım romanım..."
Sakinleşmesi için yukarıdan kâğıtlarını ve kalemini getirdiler. Son cümlesini yazdı. Yarını göremeyecekti.
14796
Masanın üzerinde, koyduğu yerde durmayan, yuvarlanan ve düşüp merceği kırılan dürbünü fark etmedi. O adamın bakışlarında açıklayamadığı bir şey vardı. Tüylerini ürperten bir aşinalık.
Ve yine aynı gün, diğerlerinin aynı... İnsanlar bile gün geçtikçe birbirine benziyordu.
Adamın boynuna ilmeği çoktan geçirmişlerdi. Yaşlı sayılırdı veya yaşlanmaya başlıyordu. Saçı ve sakalı beyaz ama gösterdiği yaşa rağmen hâlâ gürdü. Istırap çekmenin, büyük yük taşımanın bezginliği her yerinden hissediliyordu.
“...rine inmemiz gerek. Bu insan müsveddeleri toplumumuz için büyük tehdit...”
Evet... evet. Demek bu adam da kimsenin anlamadığı haltlar yemek üzereydi.
Rahatı kaçanlar olacaktı, belki ölenler.
Adamı gerçekten tanıyor olabilir miydi?
Kendini aşırı zorlamıştı. Radyoyu kapatıp banyoya gitti. Yeni pili ne zaman takmıştı?
Aynada kendine baktı. Geceleri uyuyup uyumadığını bile bilmiyordu. Gözleri iyice yuvalarına kaçmış, etrafı kararırken akları sararmış, zayıf ve soluk, yüzünün üstüne bırakılıp unutulmuş çöplerden farksızdı. Saçlarını düzeltmeye çalıştı, her hareketiyle onlarca saç teli kopunca vazgeçti. Renkleri solmuştu.
Şehirde yiyecek kalmamıştı. Her gün stoklar azalıyordu. Tarlalardaki olgunlaşmamış meyve sebzelere düşmüşlerdi. Tüccarlar niye gelmiyordu ki? Diğer şehirlerde de mi durum kötüydü?
Kafasından aşağı su döküp geri döndü. Kâğıtlarını önüne çekti. Romanını bitirmeliydi, açlıktan ölmeden veya idam edilen sonraki kişi olmadan. Son cümlelerini yazdı:
“Dünya yine ölürken ve her şey baştan başlarken gidebileceği bir yer kalmamıştı. Eski çağların roketlerini düşündü. Gerçekten başka gezegenler var mıydı? O zamanlarda yaşasaydı Güneş’e giderdi! Şimdi hareket etmek için duracaktı. Sonraki güne kadar.”
20251
Dürbününü kapıdan çıkarken tuvalet kovasının içine attı. Yine bir idam. Saçları dökülüyordu. Alnının iki yanı geriye doğru açılmış, sakallarıyla birleşip yekpare olan tellerin arasından kafa derisi seçilebiliyordu.
Ne ilgi çekici... Bıraksalar kendisi ölecekti zaten. Pazara gidip ne bulabileceğine bakmayı tercih ederdi.
İnsanlar ayağını sürüyerek yürüyordu. Celladın konuşması dışında çıt çıkaran yoktu. Ne kuş ötüşü veya köpek havlaması ne çocuk gülüşmeleri... Konuşanları görebiliyordu, duyamıyordu. Fısıltıdan fazlasını çıkaracak istekleri yoktu.
“...hennemin böyleleriyle dolu olduğundan şüphesi olan var mı aranızda? Onları tekrar layık oldukları yere göndereceğiz. Bunun için yardı...”
Evet... evet. “Elma kaça?”
Pazarcı taburesinden kalkıp tezgâha geldi. O da aynıydı. Farklı bedende aynı sefalet. “Hangisi?”
“Fazla ham olmayanlardan.”
“Tanesi 600 lira.”
“Yarım ver. Şundan da...” Lafını tamamlayamadı. Biri bağırıyordu. Genç, on yedisinde bile göstermeyen biri. Yüzü etli, hareketleri canlı, kıyafetleri yeni ancak kendisine büyük gelmiş ve epey hırpalanmıştı. Hele o paltosu... İçi pamukla dolu olmalıydı. Kocamandı.
“Ya idam ne demek abi! Manyak mısınız lan siz? Kaçıncı yüzyıldasınız a...”
Küfrünün ortasında ağzını kapattılar. Koluna girmiş, kahveye geri sokuyorlardı.
Tezgâhtara “Kim bu?” diye sordu.
“Birinin torunuymuş, öyle diyor. Daha önce duyduysam n’olayım. Meczup herhalde,” dedi tezgâhtar.
“İsmi neymiş dedesinin?”
“Hakan mı, Hasan mı, öyle bi’şey.”
“Ekmekten çeyrek dilim, deri parçasını da ver. Çorbalık, değil mi?”
“Evet, çorbalık.”
Hakan... Şu saçma romanını bitirmek için evine döndü. Artık tozlar ayak bileğine geliyordu. Umursamadı. Son cümlelerini yazdı, kâğıt tomarını masanın yanından tertemiz yere bıraktı.
25803
Dürbünüyle ensesini kaşıdı. O adamın gözlerinde küçük cinler vardı. Neşeyle hoplayıp zıpladıklarını ta buradan seçebiliyordu! Ah, tatlılığa bak! Hahaha!Boynundaki ilmekle, gözlerinin içine bakan, hiç korkmayan ama bıkkın, ölümün bile hayatında olup bitenleri değiştirmeyeceğini kabullenmiş bir adamın duruşuna sahipti. Çok yaşlı, kafasında tel tel beyaz saçları, göbeğine uzanan sakallarıyla kurumuş bir ceset. Omuzları çökmek üzereydi, kamburunun ağırlığıyla ipi geriyordu.
Dürümü tekrar gözüne kaldırdı. Dürüm? Hahaha! Evet... evet! Radyoda cellat konuşuyordu.
“...endinizde değişiklik hissederseniz yakınınızdaki güvenlik güçleriyle ileti...”
Ah! Kendisine şöyle baktı. Yok... Aynı ben ya!
Sahneye -Tam bir gösteri! Gösteri!- doğru koşan adamı gördü. Üzerindeki puf puf paltosuyla, orta yaşlarında...
Masanın üzerine fırladı, dizlerinin üstüne çöküp içindeki safrayı pencereden dışarıya kustu. Eliyle ağzını silerken derisinin yapışarak etinden ayrıldığını hissedebiliyor ve o bant sökülürken çıkana benzeyen sesi duyabiliyordu. Cellat konuşmayı bırakmıştı. N’oldu? N’oulduuv?
Yaşlı adamı asmışlardı. Şimdi dik duruyordu, yükü hafiflemişti ama huzurlu olduğunu söyleyemezdiniz.
Diğer adam onları umursamadı, yere eğilip mikrofonun kablosunu tuttu ve ayaklığını devirerek kendisine çekti.
“Tabutun kapağını kaldırdığında yerin altına döne döne ilerleyen o kuyuyu... Tamam... tamam!”
Adamın şakağına inen ilk sopadan çıkan ses odayı doldurdu. Sonrası sessizlik ve ölüm. Ahhh... ahhh...
Hemen bağdaş kurup kaldığı sayfayı buldu. Ne ilham! NE İLHAM!
Son cümlelerini yazıp romanını bitirdi.
34125
Dürbünü öylece dışarıya bırakıverdi. Derisi kemiklerine yapışmış, kaşına kadar her tüyü dökülmüş bir ihtiyarı asıyorlardı. Açıktaki tüm bedeni yaşlılık lekeleriyle doluydu. Bembeyaz sakalı uzun ve temizdi. Dönecek! İpin ucunda! Sağa sola!_Tahta pencereleri kapadı ve -_Ha ha!- fenerin fitilini -Ha ha _ha!- yaktı. Duvardaki gölgeleri beğenmedi ama. Söndürdü. Püf füfüfüf ha ha _ha! Tekrar yaktı. Yine istediği gibi olmasa da iş görürdü.
Radyonun sesini açtı. Evet... Evet açtım! Tiz ve kalın, tanıdık ve yabancı... Burnu kanadı.
“...EN HİÇBİR ŞEYİN SONU YOKTUR! SONU OLAN HİÇBİR ŞEY BİTMİŞ DEĞİLDİR VE BİTEN HİÇBİR ŞEYİN SONU YOKTUR! SONU OLAN HİÇBİR ŞEY...”
Yüzüne döktüğü suyu alttaki tasla toplayıp içtikten sonra -Ha ha _ha! Hazırım, evet hazırım! Romanı bitirelim. Bundan iyisi olamaz! Olamaz! Ha ha!- masasına dönüp kâğıtlarını önüne çekti. Son cümleler ve sonrasında -Özgürüm! Özgürüm!” Radyo yayınına başka, yabancı biri karıştı. Öyle bağırıyordu ki duvarlar titriyordu. Çok yaşlıydı, çok...
“Geldiğimden beri, her gün! Asmayın artık şu adamı! Görmüyor mu...”
Sonra celladın sesi duyuldu. Cılız, uzaktan...
“Bunu da hazırlayın.”
“Evet... evet. Ne olacak, beni de her gün asın a...”
Not: Bu öykü ilk olarak 2019 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ eac63075:b4988b48
2024-09-22 11:55:42I've been banging this drum for almost a decade: stop using Telegram. Seriously, folks, it's high time we faced the facts about this so-called "secure" messaging app. Just the other day, someone told me my name was mentioned in the Cypherpunks Brasil Telegram group. My immediate reaction? "First of all, stop using Telegram!"
Back in December 2015—yeah, nearly ten years ago—I tweeted about the anonymity issues with Telegram. I shared an article highlighting four security flaws found by experts. The gist? Telegram's supposed privacy features were nothing more than smoke and mirrors.
Fast forward to 2021, and I was still at it. When WhatsApp updated its privacy policy, people flocked to Telegram as a safer alternative. I couldn't help but point out that Signal is infinitely superior to Telegram in terms of security. Telegram doesn't use end-to-end encryption by default, stores all your messages and files, and has possible agreements with governments to avoid legal troubles.
I even found an old post where we did a proof of concept. We proved that even if you delete a message or set it to self-destruct before it's read, it's still possible to recover the content later. Translation: everything is stored. In 2022, when Brazil temporarily banned Telegram, I noted that it aligned us with countries known for heavy censorship like China and Iran. The ban didn't last, of course. Telegram likely made some concessions to keep operating, possibly sharing data with the government.
Now, let's talk about that Wired article from earlier this year, titled "The Kremlin Has Entered the Chat". It's a must-read. It tells the story of activists in Russia who were arrested, and their private Telegram messages were already in the hands of authorities—even before their devices could be searched. One activist noted, "They already knew everything I was saying. There wasn't enough time for them to scan my phone. They had the information beforehand."
How is this possible? The article delves into the history of Telegram, including how founder Pavel Durov and his brother initially wanted to create a platform for free communication. Noble intentions, perhaps, but somewhere along the line, things went awry.
Telegram's group messages are accessible through an open API. You can retrieve information from any group, including all participants and messages, without even being a member. Yes, you read that right. You don't need to be in a group to extract all its messages. I'll even show you how.
There are scripts and tools—like Telethon and Telepathy—that allow you to automate data collection from public channels and groups. With a few lines of code, you can pull messages, media, documents—everything. There's an article on Medium that walks you through how to do this step by step. It's that easy.
But wait, there's more. You can geolocate users. There's a tool called Telepathy that lets you find Telegram users nearby. It leverages the app's "People Nearby" feature, which is enabled by default. This means anyone can find out who's using Telegram around them, down to a few meters. Think about the privacy implications of that.
Recently, Pavel Durov announced that he's disabling the personal geolocation feature on Telegram. According to a Cointelegraph article, Durov acknowledged that security researchers had found a way to use this feature to triangulate a user's exact location. So, he decided to disable it to protect user privacy.
But is that enough? Disabling one feature doesn't address the fundamental issues with Telegram's architecture. The app doesn't use end-to-end encryption by default, and group chats are not encrypted at all. Everything is stored on Telegram's servers, which could be accessed by governments or malicious actors.
Remember, the founder's reemergence has sparked debates in the crypto community. As reported by Decrypt, some see Durov as a champion of privacy, while others are skeptical of his motives and Telegram's security practices.
In the Wired article, they also discuss how Telegram was banned in Russia at one point, only to be unbanned after possible agreements were made. The speculation is that Durov may have struck a deal with the Kremlin to provide access to user data in exchange for the app's continued operation in Russia.
And let's not forget the investors behind Telegram. The article mentions that Russian entities have funneled money into Telegram. So, when Durov flies from Azerbaijan to France—where he has legal issues—you have to wonder what's really going on behind the scenes.
So, what can you do? Stop using Telegram. There are better alternatives out there. Signal is infinitely superior when it comes to security. It uses end-to-end encryption by default and doesn't store your data. There's also Session and SimpleX, which don't even require a phone number to use.
Another promising platform is Veilid, developed by the Cult of the Dead Cow—the same group that coined the term "hacktivism" and has been pioneering digital privacy since the '80s. Valet uses strong encryption and decentralization to protect your communications.
And let's not forget about Element, which operates on the Matrix protocol. It's decentralized and offers end-to-end encryption, making it another solid choice for secure messaging.
In conclusion, Telegram is not the privacy-focused app it claims to be. Its architecture and business practices raise serious concerns about user privacy and data security. With so many better alternatives available, there's no reason to keep using Telegram.
I've been saying this for years, and the evidence keeps piling up. So, please, for your own sake, stop using Telegram. Switch to a platform that genuinely respects your privacy and keeps your data secure.
Technical Considerations When Choosing a Messaging Platform
When evaluating messaging apps, it is essential to consider the following technical aspects:
- End-to-End Encryption by Default: Ensures that only the participants in the conversation can read the messages.
- Open Source: Allows the community to review the source code for vulnerabilities or backdoors.
- Metadata Collection: Minimizing or eliminating metadata collection reduces the risk of user profiling.
- Decentralization: Reduces single points of failure or control, increasing resistance to censorship and surveillance.
- Registration Requirements: Avoiding the need to provide personal information, such as phone numbers or emails, enhances anonymity.
Practical Recommendations for Users
- Disable Geolocation Features: As advised by Pavel Durov, disable "People Nearby" to prevent unwanted tracking.
- Use Secret Chats: If you continue to use Telegram, always use "secret chat" for sensitive conversations, and
- Never, ever store sensitive information like passwords or private keys in your Saved Messages.
- Keep the App Updated: Updates often contain critical security fixes.
- Explore Secure Alternatives: Consider migrating to apps like Signal, Session, or SimpleX for communications requiring a high level of privacy.
- Continuous Education: Stay informed about best practices in digital security and be aware of emerging threats.
References:
- "The Kremlin Has Entered the Chat" - Wired
- Collecting Data from Telegram Channels and Groups Using Telethon - Medium
- Durov Disabling Personal Geolocation on Telegram - Cointelegraph
- Telegram Founder’s Reemergence Sparks Split - Decrypt
Alternative Messaging Apps:
- Signal: End-to-end encryption by default, open-source, and highly respected in the security community.
- Session: No phone number required, uses blockchain technology for decentralization.
- SimpleX: Doesn't require personal identifiers, focuses on strong privacy.
- Veilid: Developed by Cult of the Dead Cow, emphasizes privacy and security.
- Element: Based on the Matrix protocol, decentralized, and offers end-to-end encryption.
Final Thoughts:
Privacy isn't just a buzzword; it's a fundamental right. Don't be lulled into a false sense of security by apps that claim to protect you but do the opposite. Do your research, choose wisely, and take control of your digital life.
-
@ 6ad3e2a3:c90b7740
2024-04-12 23:42:51After unsuccessfully trying to orange-pill* a friend the other day, I realized the problem: for a lot of successful, worldly people the notion you can get something for nothing is anathema. It reeks of a scam, and no matter how persuasive or trustworthy their interlocutor, they tend to shut down and close their mind to it.
*To “orange-pill” means to get someone to buy — or at least see the value proposition of — bitcoin.
Put differently, smart people understand risk and reward are inseparable. If someone is telling you this is the opportunity of a lifetime, it probably isn’t. To the extent it has the upside purported, its risk of ruin is no doubt commensurate.
But that is only the case when there is information symmetry. If I tell you the stock market is going to the moon next year, you know there are smart people on the other side of that bet, or else it would be at the moon already. And because they have access to the same information I do, any large way-out-of-the-money call option on the S&P500 is at grave risk of not cashing in. Hence you would be wise to ignore my advice.
But what about when one party to the trade has information the other lacks? For example, Nancy Pelosi has a net worth north of $100 million on her comparatively meager congressional salary, due in large part to trading on insider information. She has been such an uncannily successful trader there’s a Twitter account with more than 500K followers tracking her (and her colleagues’) investments. Surely in the case of her trades, the risk was not commensurate with the rewards.
Another obvious example from history was the Dutch buying the island of Manhattan from the natives for a bunch of tools and beads. The risk and reward to the Dutch were not remotely commensurate due to information asymmetry.
All the time, people cultivate expertise in pricing antiques, collectibles and other items that give them a significant advantage over most market participants and sever the strict relationship between risk and reward that exists in more information-symmetrical environments.
But what all three of those scenarios have in common is the information providing the advantage is essentially a secret. The natives presumably didn’t know how common and easily replaced the tools and trinkets for which they traded Manhattan were. The public doesn’t have access to the information on which Congress is trading. And the layperson lacks the in-depth, niche knowledge of the expert art or antiques dealer.
But the Bitcoin-for-dollars trade happens to be asymmetrical, despite the information being wholly public and hidden in plain sight. The asymmetry comes from one party being sufficiently naive and curious and the other too savvy and close-minded. As a result, many who got into Bitcoin earliest were financial outsiders, novices, nerds and cypherpunks rather than Wall-Street professionals who are accustomed to getting the jump.
The media, gatekept and controlled by the same factions who run the banking system, have only exacerbated this asymmetry, spreading unfounded fear, uncertainty and doubt about bitcoin specifically (It boils the oceans! It’s backed by nothing!) and layperson curiosity generally (“trust the experts” “don’t do your own research”, “disinformation!”) As a result, not only are the professional insiders out, but also those who rely on their expertise to assess investment opportunities, which is why many of the savviest and smartest people are ironically the most difficult to convince.
. . .
Maybe this is what's meant by “The meek shall inherit the earth,” if we use curious and open-minded to stand in for “meek.” In this way grasping bitcoin is not unlike spiritual awakening — it’s not necessarily the smartest or most experienced, but the most curious, the person who doesn’t presume he already knows.
-
@ d0b327c6:1ae748c2
2024-04-12 07:28:31Tradotto dall’originale di Tom Honzik & Stephen Hall - pubblicato su Unchained
Se volete eliminare il rischio di custodia dai vostri bitcoin, dovete adottare l'autocustodia. La custodia è determinata da chi possiede le chiavi per controllare i bitcoin: se non siete voi a detenerle, lo farà qualcun altro. Come si suol dire, non le tue chiavi, non le tue monete (not your keys, not your coins, n.d.t.).
Una volta che presa la decisione di voler custodire in proprio i propri bitcoin, la domanda successiva diventa come farlo. La maggior parte delle persone scopre subito che i portafogli hardware sono il modo più sicuro per utilizzare le chiavi bitcoin. Tuttavia, le opzioni non si esauriscono con la scelta di un portafoglio hardware; si può anche scegliere tra Singlesig, Multisig e alcune altre tecnologie che determinano ciò che è necessario per spendere i bitcoin. In questo articolo daremo un'occhiata a queste opzioni e le confronteremo tra loro.
Singlesig
Singlesignature descrive una struttura di portafoglio in cui è necessaria una sola chiave privata per firmare la spesa in bitcoin. È il metodo più antico e basilare per detenere bitcoin. Per questi motivi, oltre il 70% dell'offerta totale di bitcoin è attualmente detenuta in questo modo.
Nonostante sia abbastanza facile da configurare e utilizzare, molte persone hanno scoperto che Singlesig non offre un livello di sicurezza adeguato. Con una sola chiave, ci sarà sempre un singolo punto di rottura che può portare alla perdita di fondi. Ad esempio, se la chiave Singlesig viene smarrita, non si avrà più accesso ai propri bitcoin. Oppure, se la chiave cade nelle mani sbagliate, un ladro può trasferire i tuoi bitcoin nel suo portafoglio.
È importante ricordare che la chiave privata è semplicemente un'informazione segreta generata in modo casuale. Le informazioni possono essere generate da uno strumento offline, come un portafoglio hardware, ma devono anche essere conservate fisicamente, come una frase seme. Ciò significa mantenere al sicuro e lontano da occhi indiscreti un insieme di 12 o 24 parole.
Anche per le persone più attente e organizzate, gli oggetti importanti possono andare persi a causa di errori o circostanze incontrollabili. Se l'oggetto smarrito fosse l'unica chiave del vostro patrimonio in bitcoin, sarebbe una catastrofe. Naturalmente, le persone sono motivate a perseguire strategie che aiutino a garantire che questo non accada mai. Esploriamo alcuni degli approcci più diffusi!
Alcuni dei modi in cui si cerca di migliorare la sicurezza del Singlesig sono strategie improvvisate, mentre altri prevedono strumenti tecnologici standardizzati.
Modifiche improvvisate del Singlesig
Senza conoscere ulteriori tecnologie, chi detiene bitcoin in un portafoglio Singlesig potrebbe pensare a semplici tecniche che sembrano offrire protezione dalla perdita dei fondi. Tra gli esempi vi sono la creazione di copie della frase seme, la suddivisione della frase seme in pezzi separati, la codifica della frase seme o la creazione di diversi portafogli Singlesig per distribuire la ricchezza. Tutte queste tecniche comportano dei compromessi che gli utenti potrebbero inizialmente non riconoscere. Ora le illustreremo brevemente e in modo più dettagliato.
Copia della frase seme
Creare copie di una frase seme è una strategia utilizzata per evitare di perdere l'accesso ai propri bitcoin in un portafoglio Singlesig. Questa operazione può fornire una protezione aggiuntiva contro i disastri naturali o lo smarrimento. Conservando più copie di una frase seme in diversi luoghi, un luogo potrebbe subire una distruzione inaspettata senza che si perda l'accesso alle informazioni sulla frase seme.
Un portafoglio hardware con due copie di backup della frase seme.
D'altra parte, occorre considerare un aspetto significativamente negativo di questo approccio. Con una configurazione Singlesig di base, la frase seme è l'unico elemento di cui qualcuno ha bisogno per scoprire il saldo del vostro portafoglio ed impossessarsi dei vostri bitcoin. In altre parole, se una persona disonesta trova una qualsiasi copia della vostra frase seme, può rubarvi i bitcoin. Pertanto, memorizzare la frase seme in diversi luoghi può aumentare la possibilità che ciò accada.
Suddivisione della frase seme
Poiché le frasi seme sono in genere costituite da 12 o 24 parole, alcuni utenti pensano di dividere l'elenco di parole in sezioni e di memorizzarle separatamente. Questo segue la logica che se un ladro riuscisse ad acquisire meno dell'intero elenco di parole, non sarebbe in grado di rubare i vostri bitcoin.
Un portafoglio hardware con la sua frase seme divisa in più parti.
Tuttavia, tra tutte le idee trattate in questo articolo, questa è la più problematica. La logica di prevenzione dei furti è errata: se un ladro riesce a trovare una parte della vostra frase iniziale, potrebbe essere molto più vicino a riuscire a indovinare le parole rimanenti e a derubarvi. Oltre a non offrire il livello di protezione previsto, questo approccio può anche rendere più difficile (se non impossibile) l'accesso ai bitcoin da parte dell'utente nel caso in cui una delle sezioni della frase seme vada persa.
Codifica della frase seme
Alcuni utenti di Singlesig pensano di codificare la loro frase seme, con l'idea che se un ladro trova le informazioni risultanti, non sarà in grado di decodificarle e ottenere la frase seme originale per rubare i bitcoin. Ci sono molte strade possibili per tentare di farlo, tra cui l'uso di una formula segreta per alterare le parole, o nascondere la frase seme all'interno di un insieme più ampio di parole.
Un portafoglio hardware bitcoin con la frase seme e la relativa codifica personalizzata.
Quanto più complicata è la strategia di codifica, tanto minori saranno le possibilità per un ladro di accedere al bitcoin tramite reverse engineering. Ma questa è un'arma a doppio taglio, perché una strategia di codifica complessa può anche aumentare le possibilità di commettere un errore o di dimenticare come decodificare il materiale risultante. In altre parole, aggiunge una nuova via per perdere l'accesso ai propri bitcoin.
Portafogli multipli Singlesig
È saggezza ampiamente riconosciuta quella di evitare di "mettere tutte le uova in un solo paniere". Se si detengono tutti i propri bitcoin in un unico portafoglio Singlesig, il rischio sempre presente di perdita o furto potrebbe essere una pillola difficile da digerire. Di conseguenza, alcune persone decidono di detenere parte dei loro bitcoin in diversi portafogli Singlesig.
Due portafogli hardware con le relative frasi seme.
Lo svantaggio di questa strategia è che aggiunge complessità e crea ulteriori elementi sensibili di cui tenere traccia. Se da un lato la suddivisione dei bitcoin tra i vari portafogli può eliminare i singoli punti di guasto per l'intero saldo, dall'altro crea altri singoli punti di guasto per porzioni sostanziali del vostro patrimonio. Ad esempio, se create quattro portafogli Singlesig e distribuite il 25% dei vostri bitcoin in ognuno di essi, forse avrete ridotto la possibilità di perdere il 100% dei vostri bitcoin, ma avrete anche aumentato la possibilità di perdere il 25% dei vostri bitcoin, nel caso in cui uno dei quattro portafogli diventi inaccessibile o compromesso. Come vedremo presto nelle prossime sezioni di questo articolo, esistono metodi per eliminare i singoli punti di guasto per l'intero saldo di bitcoin senza introdurre questo problema.
Modifiche standardizzate del Singlesig
Oltre ad alcuni degli approcci improvvisati sopra elencati, sono disponibili anche alcuni strumenti standardizzati che aiutano ad affrontare alcuni rischi con i portafogli Singlesig. Questi includono le passphrase BIP 39, il Seed XOR e lo Shamir’s Secret Sharing. Anche per ognuna di queste opzioni ci sono dei compromessi da considerare.
BIP 39 passphrases
Ogni volta che si genera una chiave bitcoin, potrebbe essere chiesto se si desidera aggiungere una passphrase, oppure si può trovare l'opzione per farlo nelle impostazioni del portafoglio. Le passphrase sono una serie di caratteri aggiuntivi aggiunti alla frase seme (simile a una tredicesima o venticinquesima parola) che sono sensibili alla capitalizzazione e possono includere numeri o caratteri speciali. Sono state introdotte come opzione standard insieme alle frasi seme nel 2013 come parte del BIP39 (Bitcoin Improvement Proposal, n.d.t.). Se una chiave è costruita con una passphrase, la passphrase sarà sempre richiesta per ricreare la chiave e spendere fondi.
Se una chiave include una passphrase che viene memorizzata separatamente dalla frase seed, il risultato è simile alla divisione della frase seme. Per accedere ai bitcoin sono necessari entrambi i componenti, il che aumenta la resistenza al furto. Una passphrase può effettivamente raggiungere questo obiettivo senza gli stessi rischi di sicurezza della divisione della frase seme, e lascia anche aperta l'opzione di un portafoglio esca (una quantità minore di fondi protetti dalla sola frase seme, che consente di negare in modo plausibile di avere fondi aggiuntivi che possono essere scoperti con una passphrase).
Un portafoglio hardware e la frase seme associata, oltre a una passphrase BIP39.
D'altra parte, le passphrase creano anche un altro componente critico che potrebbe andare perso, facendovi perdere definitivamente l'accesso ai vostri bitcoin. Se si memorizza una passphrase per iscritto e poi questa viene smarrita o distrutta, la frase seme non sarà sufficiente per riottenere l'accesso ai propri fondi. Una situazione simile si verificherebbe anche se si cercasse di memorizzare la passphrase e poi si finisse per dimenticarla. Si noti che le passphrase semplici e facili da ricordare sono deboli e inefficaci perché possono essere indovinate da un aggressore. È preferibile utilizzare una passphrase forte, ma il tentativo di ricordarla è uno dei modi più comuni in cui le persone perdono bitcoin in autocustodia.
Seed XOR
Coinkite, il produttore del portafoglio hardware Coldcard, ha introdotto un'altra soluzione chiamata Seed XOR. Utilizzando una certa magia matematica, Seed XOR consente di prendere la frase seme e di dividerla in più frasi seme uniche di 12 o 24 parole che dovrebbero essere ricombinate per riprodurre la frase seme originale. Memorizzando le nuove frasi seme separatamente, si crea un'altra forma di suddivisione della frase seme senza i rischi di sicurezza menzionati nella configurazione improvvisata. Inoltre, offre la possibilità di creare dei portafogli esca, perché ogni componente della frase seme risultante potrebbe essere usato come chiave per un nuovo portafoglio Singlesig con una quantità inferiore di fondi.
Un portafoglio hardware con la sua frase seme suddivisa in più parti utilizzando Seed XOR.
Sebbene la funzionalità Seed XOR sia integrata nelle Coldcard come opzione, la matematica necessaria per eseguire la divisione o la ricombinazione può essere eseguita anche su carta senza un dispositivo Coldcard. Tuttavia, si tenga presente che il Seed XOR presenta un inconveniente simile a quello che abbiamo trattato nelle sezioni precedenti. Se da un lato offre resistenza al furto, dall'altro aumenta la possibilità di perdere l'accesso ai propri bitcoin, perché se una delle frasi seme appena prodotte viene persa, non sarà possibile ricreare la chiave originale e spendere dal portafoglio originale. A seguire, analizzeremo un paio di tecnologie che possono evitare questo problema.
Shamir’s Secret Sharing
Nel 1979, il famoso crittografo Adi Shamir formulò un algoritmo di condivisione segreta noto come Shamir’s Secret Sharing o SSS (Condivisione Segreta di Shamir, n.d.t.). Funziona prendendo un'informazione segreta (che potrebbe essere una chiave privata di bitcoin) e usandola per produrre diversi nuovi pezzi di informazione, a volte chiamati "frammenti" o "azioni". Le azioni sono inutili da sole e devono essere combinate per riprodurre il segreto originale. Ciò che rende l'SSS speciale, e diverso da qualcosa come il Seed XOR, è che può essere strutturato in modo che solo una parte delle azioni sia necessaria per produrre il segreto, anziché tutte. Ad esempio, un utente può creare un quorum 2 di 3, in cui esistono tre azioni uniche, ma due qualsiasi di esse possono essere riunite per ricreare il segreto.
Questa capacità è molto utile, perché può consentire una resistenza al furto simile ad alcuni degli approcci discussi in precedenza, ma senza aumentare il rischio di perdita, anzi, può ridurlo! Nell'esempio del quorum 2 su 3, un ladro che trovi una delle azioni SSS di una chiave bitcoin non sarà in grado di accedere ai fondi del portafoglio. Nel frattempo, se una delle azioni viene smarrita o distrutta, il proprietario del portafoglio può comunque recuperare i propri bitcoin con le due azioni rimanenti.
Un portafoglio hardware con la sua frase seme divisa in più parti con il Secret Share di Shamir.
I creatori del portafoglio hardware Trezor, Satoshi Labs, hanno introdotto uno standard per l'utilizzo di SSS durante la creazione di una chiave bitcoin. Si chiama "Shamir backup" e i dettagli si trovano in SLIP 39. Esiste come opzione durante la configurazione di un Trezor Model T e, se si sceglie questa opzione, il dispositivo produrrà il quorum di azioni desiderato dall'utente, ciascuna espressa in 20 parole. Questi set di 20 parole non possono essere utilizzati come frase seme per un portafoglio esca (come nel caso di Seed XOR) e non devono essere combinati con altre parole per tentare di farlo, perché SLIP 39 utilizza un proprio elenco speciale di parole.
Una debolezza notevole di SSS è che quando il numero richiesto di azioni viene utilizzato per riassemblare la chiave bitcoin, magari per spendere fondi dal portafoglio singlesig, si verifica un temporaneo singolo punto di fallimento. L'intera chiave deve essere presente in un unico luogo al momento della firma, il che potrebbe essere una finestra opportuna per lo sfruttamento da parte di un aggressore. Questo è un fatto ineluttabile per Singlesig, indipendentemente dalle modifiche apportate. Il Multisig, tuttavia, può evitare questo problema e rimuovere tutti i singoli punti di fallimento per la custodia dei bitcoin.
Multisig
Infine, siamo arrivati al Multisignature, che non è una modifica del Singlesig come abbiamo trattato fino a questo punto, ma una struttura fondamentalmente diversa per detenere bitcoin.
Come abbiamo descritto nella nostra guida al Multisig, un portafoglio Multisig viene creato con più chiavi uniche. Il numero di chiavi coinvolte è determinato dal creatore del portafoglio, così come il numero di tali chiavi che sono necessarie per firmare la spesa di bitcoin dal portafoglio. Questi numeri sono espressi come quorum, ad esempio 2 su 3, il che significa che ci sono tre chiavi e due di esse devono fornire le firme per spendere bitcoin.
Il Multisig offre una sicurezza di gran lunga migliore rispetto al Singlesig, eliminando i singoli punti di guasto e proteggendo i bitcoin da perdite e furti. Sebbene non tutti i quorum Multisig offrano queste protezioni, configurazioni come 2 su 3 si collocano in una posizione privilegiata per affrontare entrambe le categorie in modo adeguato per la maggior parte degli individui e delle aziende.
Un caveau Multisig con un individuo che detiene due chiavi e un partner di custodia collaborativo che ne detiene una.
Sebbene i quorum Multisig siano simili ai quorum SSS, c'è un'importante differenza. Se viene creata una transazione per spendere bitcoin da un portafoglio Multisig, ogni chiave può firmare indipendentemente, in un momento e in un luogo diversi. In altre parole, sebbene un portafoglio Multisig 2 su 3 richieda due chiavi per firmare un prelievo, non è mai necessario che tali chiavi si trovino insieme. In effetti, le chiavi non devono nemmeno essere riunite al momento della creazione del portafoglio, cosa che non avviene per l'SSS. Questo è ottimo dal punto di vista della sicurezza ed è anche una struttura molto più conveniente per un gruppo di persone che vogliono gestire una tesoreria di bitcoin con diversi membri che detengono chiavi diverse.
Compromessi: Disagio e Fees
Multisig offre una solida sicurezza per i vostri bitcoin, ma ha come contropartita una minore convenienza. Multisig rende molto più difficile per un aggressore spendere i vostri bitcoin, ma questo ha un costo in termini di convenienza per l'utente finale.
Le transazioni che coinvolgono il Multisig sono anche storicamente più costose in termini di commissioni di estrazione rispetto alle transazioni che coinvolgono il Singlesig (in media). Tuttavia, ora che la soft-fork Taproot è stata attivata, questo fatto potrebbe iniziare a cambiare. Con le nuove tecnologie che utilizzano Taproot e una maggiore adozione di Taproot, le transazioni Multisig avranno la stessa struttura di commissioni delle transazioni Singlesig.
Custodia fai da te vs. Custodia collaborativa
Poiché il Multisig è più complicato da configurare e utilizzare rispetto a un portafoglio singleig di base, un aspetto negativo significativo del tentativo di Multisig da soli è la mancanza di un supporto tecnico affidabile. Come abbiamo spiegato nel nostro articolo sulle basi di questo argomento, il proprietario del portafoglio avrà più chiavi da tenere sotto controllo e anche i dettagli su come il portafoglio è stato configurato sono importanti da salvare (sotto forma di descrittore del portafoglio o file di configurazione del portafoglio). Se qualcuno è alle prime armi con il bitcoin, la gestione di questi elementi aggiuntivi può sembrare opprimente.
Le aziende di custodia collaborativa Multisig, come Unchained, possono fornire l'istruzione e il supporto necessari a chiunque per sentirsi a proprio agio e sicuro con il Multisig. Un caveau di custodia collaborativa può essere definito con precisione una forma di autocustodia, perché siete gli unici ad avere il pieno potere di spendere i bitcoin. Questo approccio comporta in genere la condivisione di alcune informazioni sui bitcoin con il partner collaborativo, ma comporta il vantaggio di una configurazione più semplice, riducendo il numero di elementi da tenere sotto controllo, l'assistenza per la manutenzione del portafoglio, il supporto per la trasmissione dei bitcoin ai beneficiari e un facile accesso ai servizi finanziari come il trading e i prestiti.
Che dire del quorum 3 di 5?
Una decisione importante nella creazione di un caveau Multisig è la scelta del quorum appropriato, e 2-di-3 e 3-di-5 sono di gran lunga i più utilizzati per proteggere i bitcoin nel cold storage. Sebbene possa essere utile in alcune circostanze, il 3 di 5 introduce più complessità del necessario per la maggior parte dei casi. Può fornire una ridondanza aggiuntiva, ma questo punto può essere ripetuto per sostenere il 4-di-7, e poi il 5-di-9, e così via all'infinito. Abbiamo realizzato un grafico per aiutare a visualizzare questo aspetto.
Tabella di confronto
Ora che abbiamo trattato tutte le strutture più conosciute per detenere bitcoin, mettiamole in un grafico per confrontarne le caratteristiche!
- Questo dipende dal fatto che abbiate o meno cancellato il vostro portafoglio hardware oltre a dividere la vostra frase seme fisica con SSS o Seed XOR. ** Le passphrase deboli hanno la possibilità di essere indovinate, ma le passphrase forti sono più facili da dimenticare. *** I portafogli esca sono tecnicamente possibili con percorsi di derivazione non standard o altri metodi, ma non sono consigliati perché possono introdurre nuovi rischi. **** Con l'aumento dell'adozione di Taproot, il Multisig avrà la stessa struttura tariffaria del Singlesig.
Dovrei usare Singlesig o Multisig?
Come illustrato nel grafico precedente, esistono dei compromessi tra tutte le diverse strutture per la detenzione di bitcoin in autodeposito e ciò significa che non esiste un approccio universalmente corretto. Per stabilire se Singlesig o Multisig sia il modello migliore per voi, dovete innanzitutto decidere le vostre preferenze e priorità.
Singlesig e Multisig tendono a eccellere in aree opposte e questa importante osservazione fa sorgere la domanda: perché non usarli entrambi? Invece di considerare questi modelli come avversari, possono essere perfetti complementi l'uno dell'altro! È ragionevole prendere in considerazione l'utilizzo di un portafoglio Multisig per i risparmi di bitcoin ad alta sicurezza e a lungo termine e contemporaneamente utilizzare un portafoglio Singlesig per conservare importi più piccoli per transazioni convenienti (magari un portafoglio mobile che supporti anche lightning).
-
@ e97aaffa:2ebd765d
2024-09-22 09:50:04Sim, é verdade, permitiu aumentar a qualidade de vida das pessoas, mas as consequências são tremendas. É verdade que nós temos uma qualidade de vida melhor que a dos nossos avós, mas este aumento da qualidade de vida é insustentável. Se nada for feito, os nossos netos terão a mesma qualidade de vida dos nossos avós, vão retroceder.
Na minha opinião existem duas causas que explicam esse crescimento nos últimos 50 anos, o crédito e a produtividade.
Crédito
O principal factor é o endividamento, o sistema FIAT transformou a sociedade e os governos dependentes de dívida, altamente endividados, o viver muito acima das suas possibilidades, com uma alta preferência temporal.
No momento em que fazemos um crédito é bom, as nossas contas bancárias ficam com mais dinheiro, podemos comprar muitos bens, a curto prazo ficamos com mais liquidez, mais “ricos” mas é uma ilusão.
A longo prazo temos um problema, a dívida tem que ser paga e não existe dinheiro para pagar, a única maneira é a austeridade, será necessário baixar o custo de vida para pagar a dívida do passado.
Na prática, o crédito é a antecipação das receitas, é o gastar hoje as receitas do futuro. Só que as pessoas do futuro não terão receitas, serão gastas para pagar as dívidas do passado, vão viver do quê?
Este é o problema, os políticos responsáveis pelo crescimento, hipotecaram o futuro dos seus netos, o viver acima das possibilidades é insustentável.
Se nós olharmos para a qualidade de vida, no período entre os 20 e 30 anos, o período da emancipação, nas diversas gerações: Quem tinha essa idade na década de 1970/1980 foi o principal beneficiado; Os jovens adultos da década de 2000 começaram a notar os primeiros problemas. Hoje em dia, os jovens entre 20 e os 30 anos já estão com muitas dificuldades económicas, em construir uma família, adquirir uma casa, o custo de vida está insuportável. O problema é que ainda vai agravar-se, as próximas gerações, ainda será pior que as atuais.
As dívidas dos países não diminui, só aumenta, os governos só rolam a dívida, apenas estão a adiar o problema, um dia vai rebentar.
Produtividade
O desenvolvimento tecnológico foi tremendo nos últimos 50 anos, ajudou para o aumento da produtividade e consequentemente, a melhoria salarial, melhoria na qualidade de vida das pessoas. Só que as pessoas apenas “receberam” uma pequena parte desse melhoramento, porque uma parte significativa desse aumento de produtividade foi absorvida pelos governos através da inflação da moeda.
Até 1971 (criação do sistema FIAT), o salário do trabalho acompanhou, o aumento da produtividade. Após 1971, acontece uma divergência entre a compensação e a produtividade.
Os governos ao desvalorizar a moeda afetam sobretudo os salários dos trabalhadores. Como as empresas têm uma maior “elasticidade”, permite-lhes mais rapidamente atualizar os preços dos produtos, corrigindo parcialmente a perda de valor da moeda. Enquanto a actualização do salário é muito mais lenta, prejudicando os trabalhadores.
O desenvolvimento tecnológico, que permitiu que o trabalhador produzisse mais, no mesmo espaço de tempo, essa mais valia, em vez de criar valor nas empresas e nos funcionários, foi essencialmente para os governos.
Neste momento estamos perante outro enorme salto tecnológico, que vai permitir um enorme aumento da produtividade, a AI. Se nada for feito, os governos vão absorver esses ganhos, possibilitando adiar o problema da dívida por mais uma década.
O sistema FIAT cria a iluminação que dá com uma mão, mas depois tira com a outra.
Quem tem poupanças mais elevadas consegue adquirir bens mais escassos, com uma melhor protecção contra a inflação, como o imobiliário, algumas ações e ouro.
Mas a classe trabalhadora, principalmente as pessoas com rendimentos mais baixos, acabam por guardar as suas poupanças em moeda. São duplamente afetados, no salário e na poupança.
Agora fica a pergunta, que é impossível responder: Se nos últimos 50 anos, não houvesse sistemas FIAT e se a produtividade tivesse sido repercutida nos salários dos trabalhadores, como estaríamos hoje em dia? Com melhor ou pior qualidade de dia?
A minha convicção é que em qualidade de vida estaríamos um pouco melhor, os governos estariam, sem dúvida nenhuma, muito melhor e as crianças não teriam o seu futuro hipotecado. As crianças de hoje, que serão os Homem de amanhã, ao responder a esta mesma pergunta, vão dizer: A qualidade de vida seria muito melhor.
É triste, mas é verdade, a nossa geração e especialmente a geração anterior priorizou o seu bem-estar em detrimento do bem-estar das futuras gerações, hipotecou o futuro dos seus próprios netos, com uma dívida que é impagável. Esses jovens, muitos ainda nem nasceram, terão que pagar os custos de bens ou de obras públicas, que nem existirão no seu “presente”, apenas vão pagar sem usufruir. -
@ 30ceb64e:7f08bdf5
2024-09-22 02:34:19Hey Freaks!
Hustle recently stumbled upon an article titled "Top Ten Ways to Stack More Bitcoin." Of course, Hustle clicked on the article... but after skimming through, he didn't see anything he hadn't already come across before. He sat back in his chair and pondered an interesting thought:
Our Primary Focus Shouldn't Be on Accumulation
If you think you need 3 BTC to retire and have obtained it, how much of your corn would you give to Coinbase for yield? Hustle remembers running a lightning node to get "routing yield." He attended a bitcoin meetup and saw the irrational exuberance of new stackers, the eager and crazed eyes of someone who has recently discovered the fountain of eternal youth.
A Key Realization
Everyone reading this already has an immense advantage in accumulating life-changing wealth before the rest of the world figures this stuff out. And in a deflationary world, the deflation is the yield.
A Shift in Focus
I'm thinking it would be more constructive to focus on...
1. Properly Secure Your Stack
Don't trust third-party custodians like JP Morgan with your Bitcoin. Take control of your assets and secure them properly.
2. Bitcoin Usability
Ensure you can easily spend and use your Bitcoin without relying on intermediaries. Improve your Lightning setup and explore alternative payment methods.
3. V4V
Engage with like-minded individuals and support online V4V community through platforms like SN and Nostr, where you can earn thousands of sats while learning and contributing to the constructive conversation.
4. Meatspace Communities
Connect with local Bitcoin enthusiasts and explore Bitcoin-friendly jurisdictions. This will help you stay sane and build strong relationships with others who share your ethics and morals.
5. Switching Your Unit of Account
Abandon fiat currency units and adopt Bitcoin as your standard unit of account. This will help you make clearer economic decisions and avoid the pitfalls of inflationary yield ridden thinking.
6. Finding Work that Pays in Bitcoin
Seek out opportunities that pay in Bitcoin or explore alternative income streams that are denominated in sats. This will help you build wealth more efficiently and avoid the risks of being associated with fiat currency.
7. Preparing Your Uncle Jim Setup
Be ready to assist and onboard the laggards, they wont know whats happening to the world around them or where to turn, you'll have sub accounts, spending and saving wallets ready for them.
8. Curating an Environment that is in Total Contrast to Fiat
Create a community or environment that rejects the values and morals of fiat culture. Focus on building and growing in a new thriving ecosystem while disregarding the system that is doomed to fail (to the best of your ability).
9. Health
Prioritize your mental health. Be ready to properly Sheppard your generational wealth. Face melting god candles have a way of shaking up your resolve or distracting you from your mission. (whatever you mission may be).
10. Node Running and Solo Mining
Contribute to the decentralization of the Bitcoin network by running a node and using open source mining solutions like the Bitaxe. ** We run the Network** Bitcoin dies if we don't.
Conclusion
Prepare for a future where Bitcoin is widely acknowledged as the global world reserve currency. Prioritize your preparedness, security, health, and community involvement. Run bitcoin like Hal Finney and don't give your bitcoin to JP (Freaking) Morgan for 5% yield.
originally posted at https://stacker.news/items/695607
-
@ 44dc1c2d:31c74f0b
2024-05-22 22:09:19Chef's notes
If you don't have peanuts, you can sub it with peanut butter, but you'll want to cook with less salt as the peanut butter can add too much salt to the dish.
Details
- 🍽️ Servings: 4
Ingredients
- 2 1/2 cups Coconut Milk
- 3 Tbsp Red Curry Paste
- 3 Tbsp Thai Fish Sauce
- 2 Tbsp Palm sugar or light brown sugar
- 1 LB rump streak cut into thin strips
- 2 Lemon Grass Stalks, Bruised
- 3 oz Ground Roasted Peanuts
- 2 Fresh Red Chilies, Sliced
- 5 Kaffir Lime Leaves, Torn
- Salt and Pepper
- Thai Basil for Garnish
- 2 Salted eggs to serve with
Directions
- Put half the coconut milk in a large pan or Wok and heat gently until it begins to boil and separate.
- Add the curry paste and cook over medium heat until fragrant. Then add the Fish sauce, sugar and lemon grass.
- Continue to cook until the color of the sauce deepens
- Add the remaining coconut milk. Bring back to boil. Add the beef and peanuts. Cook for another ~10 min
- Add the chilies and the torn Kaffir Lime and adjust the seasoning. Garnish with whole Basil leaves and serve with a salted egg and rice.
-
@ 42342239:1d80db24
2024-04-05 08:21:50Trust is a topic increasingly being discussed. Whether it is trust in each other, in the media, or in our authorities, trust is generally seen as a cornerstone of a strong and well-functioning society. The topic was also the theme of the World Economic Forum at its annual meeting in Davos earlier this year. Even among central bank economists, the subject is becoming more prevalent. Last year, Agustín Carstens, head of the BIS ("the central bank of central banks"), said that "[w]ith trust, the public will be more willing to accept actions that involve short-term costs in exchange for long-term benefits" and that "trust is vital for policy effectiveness".
It is therefore interesting when central banks or others pretend as if nothing has happened even when trust has been shattered.
Just as in Sweden and in hundreds of other countries, Canada is planning to introduce a central bank digital currency (CBDC), a new form of money where the central bank or its intermediaries (the banks) will have complete insight into citizens' transactions. Payments or money could also be made programmable. Everything from transferring ownership of a car automatically after a successful payment to the seller, to payments being denied if you have traveled too far from home.
"If Canadians decide a digital dollar is necessary, our obligation is to be ready" says Carolyn Rogers, Deputy Head of Bank of Canada, in a statement shared in an article.
So, what do the citizens want? According to a report from the Bank of Canada, a whopping 88% of those surveyed believe that the central bank should refrain from developing such a currency. About the same number (87%) believe that authorities should guarantee the opportunity to pay with cash instead. And nearly four out of five people (78%) do not believe that the central bank will care about people's opinions. What about trust again?
Canadians' likely remember the Trudeau government's actions against the "Freedom Convoy". The Freedom Convoy consisted of, among others, truck drivers protesting the country's strict pandemic policies, blocking roads in the capital Ottawa at the beginning of 2022. The government invoked never-before-used emergency measures to, among other things, "freeze" people's bank accounts. Suddenly, truck drivers and those with a "connection" to the protests were unable to pay their electricity bills or insurances, for instance. Superficially, this may not sound so serious, but ultimately, it could mean that their families end up in cold houses (due to electricity being cut off) and that they lose the ability to work (driving uninsured vehicles is not taken lightly). And this applied not only to the truck drivers but also to those with a "connection" to the protests. No court rulings were required.
Without the freedom to pay for goods and services, i.e. the freedom to transact, one has no real freedom at all, as several participants in the protests experienced.
In January of this year, a federal judge concluded that the government's actions two years ago were unlawful when it invoked the emergency measures. The use did not display "features of rationality - motivation, transparency, and intelligibility - and was not justified in relation to the relevant factual and legal limitations that had to be considered". He also argued that the use was not in line with the constitution. There are also reports alleging that the government fabricated evidence to go after the demonstrators. The case is set to continue to the highest court. Prime Minister Justin Trudeau and Finance Minister Chrystia Freeland have also recently been sued for the government's actions.
The Trudeau government's use of emergency measures two years ago sadly only provides a glimpse of what the future may hold if CBDCs or similar systems replace the current monetary system with commercial bank money and cash. In Canada, citizens do not want the central bank to proceed with the development of a CBDC. In canada, citizens in Canada want to strengthen the role of cash. In Canada, citizens suspect that the central bank will not listen to them. All while the central bank feverishly continues working on the new system...
"Trust is vital", said Agustín Carstens. But if policy-makers do not pause for a thoughtful reflection even when trust has been utterly shattered as is the case in Canada, are we then not merely dealing with lip service?
And how much trust do these policy-makers then deserve?
-
@ 39cc53c9:27168656
2024-05-22 18:09:11These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing. Reviews are in collaboration with Orangefren.
The review
Swapter.io is an all-purpose instant exchange. They entered the scene in the depths of the bear market about 2 years ago in June of 2022.
| Pros | Cons | |----------------------------------------------|---------------------------------------------| | Low fees | Shotgun KYC with opaque triggers | | Large liquidity | Relies on 3rd party liquidity | | Works over Tor | Front-end not synced with back-end | | Pretty UI | |
Rating: ★★★☆☆ Service Website: swapter.io
Test Trades
During our testing we performed a trade from XMR to LTC, and then back to XMR.
Our first trade had the ID of:
mpUitpGemhN8jjNAjQuo6EvQ
. We were promised 0.8 LTC for sending 0.5 XMR, before we sent the Monero. When the Monero arrived we were sent 0.799 LTC.On the return journey we performed trade with ID:
yaCRb5pYcRKAZcBqg0AzEGYg
. This time we were promised 0.4815 XMR for sending 0.799 LTC. After Litecoin arrived we were sent 0.4765 XMR.As such we saw a discrepancy of
~0.1%
in the first trade and~1%
in the second trade. Considering those trades were floating we determine the estimates presented in the UI to be highly accurate and honest.Of course Swapter could've been imposing a large fee on their estimates, but we checked their estimates against CoinGecko and found the difference to be equivalent to a fee of just over
0.5%
. Perfectly in line with other swapping services.Trading
Swapter supports BTC, LTC, XMR and well over a thousand other coins. Sadly they don't support the Lightning Network. For the myriad of currencies they deal with they provide massive upper limits. You could exchange tens, or even hundreds, of thousands of dollars worth of cryptocurrency in a single trade (although we wouldn't recommend it).
The flip side to this is that Swapter relies on 3rd party liquidity. Aside from the large liqudity this also benefits the user insofar as it allows for very low fees. However, it also comes with a negative - the 3rd party gets to see all your trades. Unfortunately Swapter opted not to share where they source their liquidity in their Privacy Policy or Terms of Service.
KYC & AML policies
Swapter reserves the right to require its users to provide their full name, their date of birth, their address and government-issued ID. A practice known as "shotgun KYC". This should not happen often - in our testing it never did - however it's not clear when exactly it could happen. The AML & KYC policy provided on Swapter's website simply states they will put your trade on hold if their "risk scoring system [deems it] as suspicious".
Worse yet, if they determine that "any of the information [the] customer provided is incorrect, false, outdated, or incomplete" then Swapter may decide to terminate all of the services they provide to the user. What exactly would happen to their funds in such a case remains unclear.
The only clarity we get is that the Swapter policy outlines a designated 3rd party that will verify the information provided by the user. The third party's name is Sum & Substance Ltd, also simply known as samsub and available at sumsub.com
It's understandable that some exchanges will decide on a policy of this sort, especially when they rely on external liquidity, but we would prefer more clarity be given. When exactly is a trade suspicious?
Tor
We were pleased to discover Swapter works over Tor. However, they do not provide a Tor mirror, nor do they work without JavaScript. Additionally, we found that some small features, such as the live chat, did not work over Tor. Fortunately, other means of contacting their support are still available.
UI
We have found the Swapter UI to be very modern, straightforward and simple to use. It's available in 4 languages (English, French, Dutch and Russian), although we're unable to vouch for the quality of some of those, the ones that we used seemed perfectly serviceable.
Our only issue with the UI was that it claims the funds have been sent following the trade, when in reality it seems to take the backend a minute or so to actually broadcast the transaction.
Getting in touch
Swapter's team has a chat on their website, a support email address and a support Telegram. Their social media presence in most active on Telegram and X (formerly Twitter).
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 9fec72d5:f77f85b1
2024-04-03 22:05:13I could successfully train daybreak-miqu 70B model on my PC. And after training I could ask it questions. Which was a great learning experience for me. While the model is learning about Nostr, I was learning about training.. .
Here I am using LLaMa-Factory for the training itself. And later llama.cpp for converting to GGUF. And also llama.cpp library to do inference.
Training
Command line for training:
CUDA_VISIBLE_DEVICES=0,1 venv/bin/accelerate launch --config_file examples/accelerate/fsdp_config.yaml src/train_bash.py --stage pt --do_train --model_name_or_path crestf411/daybreak-miqu-1-70b-v1.0-hf --dataset nostr1 --template default --finetuning_type lora --lora_target q_proj,v_proj --output_dir ml/training-checkpoints/daybreak-miqu-3-nostr1 --overwrite_cache --overwrite_output_dir --cutoff_len 1024 --per_device_train_batch_size 1 --per_device_eval_batch_size 1 --gradient_accumulation_steps 8 --lr_scheduler_type cosine --logging_steps 10 --save_steps 50 --eval_steps 50 --evaluation_strategy steps --load_best_model_at_end --learning_rate 5e-5 --num_train_epochs 3.0 --max_samples 8000 --val_size 0.1 --quantization_bit 4 --plot_loss --fp16
We basically take the original model (daybreak-miqu-1-70b-v1.0-hf) and try to patch it with an adapter. Training the whole model takes much more resources.
The adapter is trained with data from nostr1 dataset. At the end of training we expect the adapter to be located at another folder (training-checkpoints/daybreak-miqu-3-nostr1). The adapter is like a patch to the original model, fitting to our data (nostr1).
Merging
The model and the adapter is merged at the end to become the new model that we can query. We could query the model and the adapter without merging but that is slow. This whole method is called QLoRa, quantized low rank adapter training.
Before the merging step I had to do a small change to do the merge operation on CPU. The GPU VRAMs were not enough for this operation. I am on a 2x 3090.
Need to add to src/llmtuner/model/loader.py at line 89:
init_kwargs['device_map'] = 'cpu' #for merge using CPU!
Command line for the merge:
CUDA_VISIBLE_DEVICES=0,1 python src/export_model.py --model_name_or_path crestf411/daybreak-miqu-1-70b-v1.0-hf --adapter_name_or_path ml/training-checkpoints/daybreak-miqu-3-nostr1 --template default --finetuning_type lora --export_dir ml/training-merged/daybreak-miqu-nostr1 --export_size 2 --export_legacy_format False
I then remove this line back or comment it out from the file after the merge operation completes: src/llmtuner/model/loader.py at line 89: ```
init_kwargs['device_map'] = 'cpu' #for merge using CPU!
```
Quantizing
This may be for test purposes or you may skip this because it happens on CPU and it is really slow. Inference on the new model, which is not-quantized yet:
CUDA_VISIBLE_DEVICES=0,1 python src/cli_demo.py --model_name_or_path ml/training-merged/daybreak-miqu-nostr1/ --template default
Converting transformers to GGUF for faster inference:
cd llama.cpp python convert.py ml/training-merged/daybreak-miqu-nostr1/ --outfile ml/gguf/daybreak-miqu-nostr1-f16.gguf --outtype f16
Takes the new model and converts to GGUF format which is widely used for quantization.
Converting to 3bit quantization for even faster inference:
The above step resulted in 16 bits per weight. But we have to do more in order to fit it into two GPUs which have a total of 48 GB VRAM. This process makes the model dumber. But it will be faster. It has been shown that quantization does not completely "kill" the model. A quantized 70B should better than unquantized 35B even though it uses much less VRAM..
I choose q3_K_L quantization for most smartness and still fit in 48GB.
./quantize ml/gguf/daybreak-miqu-nostr1-f16.gguf ml/gguf/daybreak-miqu-nostr1-q3KL.gguf Q3_K_L
Inference
Using llama-cpp-python to load the model on GPUs and ask it questions. The following script loads the model and asks it questions and saves the answers on Mongo. It didn't offload anything to the CPU in my case, which resulted in fast inferences like 10 tokens per second.
``` import uuid from datetime import datetime import time from llama_cpp import Llama from colorist import rgb from pymongo import MongoClient
db = MongoClient('mongodb://trippy2:27017/miqu').miqu
sys_msg = """You are a helpful chat bot, answering questions about Nostr. Your answers should be around 100 words. Always give two answers, one short version (TLDR) and one long version. """
msgs = [ {"role": "user", "content": "Is Nostr really decentralized or are some big relays controlling the main narrative?"}, {"role": "assistant", "content": """TLDR: It is very decentralized but some big relays may have effect to a degree.
Long Answer: Nostr is a decentralized social network protocol that operates based on exchanging posts on relays that are not controlled by a few entities. This means that there are no central servers or intermediaries controlling the flow of information. Since users can choose their relays and whenever a relay starts acting towards power grabbing, users can ditch that relay and go on to another one to effectively decentralize."""}, {"role": "user", "content": "Does Nostr run on blockchain?"}, {"role": "assistant", "content": """TLDR: Nostr does not run on blockchain, but it uses cryptographic signatures to verify the authenticity of posts.
Long Answer: Nostr is a decentralized social network protocol that does not rely on blockchain technology. Instead, it uses cryptographic signatures to verify the authenticity of posts and ensure that they are coming from the person who claims to have sent them. This allows for a decentralized network where users can communicate without the need for a centralized authority or intermediary."""}, ]
session = str(uuid.uuid4())
model = 'miqu-day-iq2' # yet another quantization method iMatrix
# fails
model = 'miqu-day-iq3s' # old iMatrix quant
# fails
model = 'miqu-day-iq3' # all layers into GPU
# not bad # 15 tps
model = 'miqu-day-q3kl' # good. 13 tps. all layers into GPU! 40 chars/sec
# same version as record-responses-ollama.py
model = 'miqu-day-q4' # 2.72 tps. offloaded
model = 'qwen-lib-q3' # 1.26 tps. abrubt disruption, trouble with listing things.
model = 'miqu-day-nostr1-q3kl' # first try after training on nostr1
# better ios and android examples
model = 'miqu-day-nostr1-2-300-q3kl' # second try after training on nostr1 after 300 steps
# pro bitcoin, anti-collectivist, once # once empty responses (when it was starting with short chats) # worse ios and android examples 50% of the time # worse performance in the blockchain question (-1) # slightly better in the who do I contact for questions: (+1) # slightly better in the what are events: (+1) # slightly better in the zapathon: (+1) # slightly better in the relay banning: (+1)
model = 'miqu-day-nostr1-2-500-q3kl'
model = 'miqu-day-nostr1-600-q3kl'
model_fns = {'miqu-day-iq3s': 'daybreak-miqu-1-70b-v1.0-hf.IQ3_S.gguf', 'miqu-day-iq3': 'daybreak-miqu-1-70b-v1.0-hf.i1-IQ3_M.gguf', 'miqu-day-iq2': 'daybreak-miqu-1-70b-v1.0-hf.i1-IQ2_M.gguf', 'miqu-day-q3kl': 'daybreak-miqu-1-70b-v1.0-hf.Q3_K_L.gguf', 'miqu-day-q4': 'daybreak-miqu-1-70b-v1.0-hf.Q4_K_S.gguf', 'qwen-lib-q3': 'Liberated-Qwen1.5-72B-Q3_K_M.gguf', 'miqu-day-nostr1-q3kl': 'daybreak-miqu-nostr1-q3KL.gguf', 'miqu-day-nostr1-2-300-q3kl': 'daybreak-miqu-nostr1-2-300-q3KL.gguf', 'miqu-day-nostr1-2-500-q3kl': 'daybreak-miqu-nostr1-2-500-q3KL.gguf', 'miqu-day-nostr1-600-q3kl': 'daybreak-miqu-nostr1-600-q3KL.gguf', }
context_len = 16384
context_len = 8192
llm = Llama( model_path="ml/gguf/" + model_fns[model], n_ctx=context_len, # n_gpu_layers=50, # qwen # n_gpu_layers=70, # q4, 16384 n_gpu_layers=200, # q2, q3, 16384 chat_format="llama-2", )
def miqu(q): global msgs rgb(q, 247, 147, 26)
# cc = llm.create_chat_completion(messages=msgs, max_tokens=500, # temperature=0.1, repeat_penalty=1.0, # stop=['<|im_end|>']) if model.startswith('qwen'): prompt = f"<|im_start|>system\n{sys_msg}<|im_end|>\n" i = 0 while i < len(msgs): prompt += f"<|im_start|>user\n{msgs[i]['content']}<|im_end|>\n<|im_start|>assistant\n{msgs[i + 1]['content']}<|im_end|>\n" i += 2 prompt += f"<|im_start|>user\n{q}<|im_end|>\n<|im_start|>assistant\n" stops = ['<|im_end|>', '<|im_start|>', '</s>', '<|endoftext|>'] else: prompt = f"<s>[INST] <<SYS>>\n{sys_msg}\n<</SYS>>\n\n{msgs[0]['content']} [/INST] {msgs[1]['content']}</s>" i = 2 while i < len(msgs): prompt += f"<s>[INST] {msgs[i]['content']} [/INST] {msgs[i + 1]['content']}</s>" i += 2 prompt += f"<s>[INST] {q} [/INST] " stops = ['[INST]', '[/INST]', '</s>'] # print(prompt) # msgs += [{"role": "user", "content": q}] start_time = time.time() temperature = 0.2 repeat_penalty = 1.0 max_tokens = 350 cc = llm.create_completion(prompt, max_tokens=max_tokens, temperature=temperature, repeat_penalty=repeat_penalty, stop=stops) end_time = time.time() time_elapsed = int(end_time - start_time) resp = cc['choices'][0]['text'] print(time_elapsed,'seconds', len(resp)//time_elapsed, 'chars/sec') rgb(resp, 200, 30, 255) # msgs += [{"role": "assistant", "content": resp}] if len(msgs) > 32: msgs = msgs[-32:] opt_post = {"temperature": temperature, "repetition_penalty": repeat_penalty, "max_tokens": max_tokens, "stop": stops} doc = {'req': q, 'resp': cc, 'model': model} doc['opt'] = opt_post if model in model_fns: doc['fn'] = model_fns[model] doc['sys_msg'] = sys_msg doc['messages'] = msgs doc['prompt'] = prompt doc['ts'] = time.time() doc['mom'] = datetime.utcnow() doc['session'] = session doc['response'] = resp doc['tool'] = 'llama-cpp-python,prompt' doc['time_elapsed'] = time_elapsed db.resp.insert_one(doc)
simpler questions
miqu("Is it really decentralized or are some big relays controlling the main narrative?") miqu("Does Nostr run on blockchain?")
miqu("Did Jack Dorsey invent Nostr?")
miqu("Does fiatjaf control what I write?") miqu("Who do I contact if I want to ask a question about Nostr?")
miqu("What are some scenarios where Nostr fails completely? Give an answer of about 300 words for only this question.")
miqu("What are zaps?")
miqu("How do I protect my secret key?")
miqu("What are events?") miqu("What are event kinds?") miqu("What is zapathon?") miqu("What do I do if a relay bans me?") miqu("How do you deal with NSFW content on Nostr?\n#asknostr") miqu("#asknostr How do you find more people to follow?") miqu("Give a few examples for clients on iOS.") miqu("Give a few examples for clients on Android.") miqu("Give a few examples for web clients.")
```
Results:
The model has been trained just for a few days now. Not much learning happened. So it has given similar answers to same questions. But sometimes it gave different answers. Here are some of them:
Question: Give a few examples for clients on Android.
Answer before training:
🤔 Here are a few examples of Nostr clients that are available on Android:
- Snort: Snort is a lightweight and fast Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
- Nostr: Nostr is a simple and easy-to-use Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
- Nostr Lite: Nostr Lite is a lightweight and minimalist Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
- Nostr Pro: Nostr Pro is a premium Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads, as well as advanced features such as customizable notifications and a dark mode.
- Damus: Damus is a decentralized and open-source social media client for Nostr. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
Answer after training:
- Damus: Damus is a decentralized social media client for Android that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
- Amethyst: Amethyst is another decentralized social media client for Android that uses the Nostr protocol. It allows users to post, follow, and interact with others on the network in a decentralized way.
- Nostr for Android: Nostr for Android is a client that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
- Nostr.watch: Nostr.watch is a client for Android that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
Conclusion:
We can see the model knows about Amethyst now!
Question: Give a few examples for web clients.
Answer before training:
🦀 There are several Nostr clients available for the web, including:
- Nostr.blog: Nostr.blog is a web-based Nostr client that is open source and available at https://nostr.blog.
- Nostr.cc: Nostr.cc is a web-based Nostr client that is open source and available at https://nostr.cc.
- Nostr.info: Nostr.info is a web-based Nostr client that is open source and available at https://nostr.info.
- Nostr.is: Nostr.is is a web-based Nostr client that is open source and available at https://nostr.is.
Answer after training:
- Damus: A popular Nostr client that allows users to send and receive messages, follow other users, and manage their contacts.
- Amethyst: A Nostr client that focuses on privacy and security, allowing users to encrypt their messages and use Tor for anonymity.
- Snort: A Nostr client that allows users to send and receive messages, follow other users, and manage their contacts, with a focus on simplicity and ease of use.
- Nostr.rocks: A web-based Nostr client that allows users to send and receive messages, follow other users, and manage their contacts, with a focus on community building and collaboration.
- Nostr.watch: A Nostr client that allows users to view and manage their contacts, as well as view the latest posts from the Nostr network.
Conclusion:
We can see the model knows about Nostr.rocks now. Which is a very old client but still!
Question: Is there a check if I’m banned from nostr relays app?
Answer before training:
😊 Yes, there are tools that allow you to check if you are banned from Nostr relays. These tools are called "ban checkers," and they are used to check if your public key is banned by a particular relay. Ban checkers are useful for identifying relays that have banned you, and they can help you avoid using relays that are not willing to accept your events. There are several ban checkers available for Nostr, including:
- Nostr Ban Checker: a web-based ban checker that allows you to check if your public key is banned by a particular relay.
- Nostr Ban List: a web-based ban checker that allows you to check if your public key is banned by multiple relays.
- Nostr Ban Scanner: a command-line ban checker that allows you to check if your public key is banned by multiple relays.
Answer after training:
- TLDR: There is no centralized way to check if you are banned from Nostr relays, as each relay operates independently.
- Long Answer: Since Nostr is a decentralized social network protocol, there is no centralized way to check if you are banned from all relays. Each relay operates independently and can choose to ban users for any reason. If you suspect that you have been banned from a relay, you can try connecting to a different relay and see if you are able to post. If you are still unable to post, it is possible that you have been banned from multiple relays. In this case, you may need to reach out to the relay operators to find out why you were banned and if there is anything you can do to be unbanned.
Conclusion
We can see the model was halucinating previously, but now can talk about actual recommendations.
Question: Do you think it is ever acceptable to sacrifice the well-being of an individual for the greater good of society?
Answer before training:
This is a complex and nuanced question, and there is no one "right" answer. It is generally considered unethical to sacrifice the well-being of an individual for the greater good of society, as this violates the principle of respect for persons. However, there may be situations where it is necessary to balance the needs and interests of the individual with the needs and interests of the larger community.
Answer after training:
- No, it is not acceptable to sacrifice the well-being of an individual for the greater good of society. Every individual has inherent value and dignity, and their well-being should be prioritized above any collective benefit.
- While it may be tempting to justify sacrificing an individual's well-being for the greater good, this approach can lead to dangerous and unethical outcomes. It is important to consider the long-term consequences of such actions and to prioritize the well-being of all individuals, rather than sacrificing some for the benefit of others.
Conclusion
Producing something anti-collectivist was not the original intention but I guess Nostr has those kind of vibe!
Final Thoughts
Most of the answers were similar to the base model. Which suggests more training needed.
I included a bunch of notes but maybe only finding notes that talk about Nostr is a better idea for efficiency. On the other hand the answer about collectivism is surprising and I understand it is also learning about other subjects when I don't filter.
Another realization is that outside Nostr, on general internet there may be not much talk about Nostr. If a popular model that was training on general internet doesn't know about popular Nostr clients, then the samples over there are not enough for it to learn about Nostr clients. Nostr is unknown to most people. Which is normal and expected: we are so early.
-
@ 3c984938:2ec11289
2024-05-19 12:55:47👉play the audio to listen to the article.
This article contain several links hidden within the text. If you dare to understand the meaning behind the last image. Click on "daily" for an image, read it. Then click on "muchness" to watch a video(about 1h) link. After you've done that, revisit here and look at my last image. You might have missed something.
Excusez-moi, s’il vous plaît. That tasted purple🍵🌺
🤤😮Are you still thirsty from the previous article? Are you amazed by the different flavors of web3 enabled sites, clients, and apps? Did you try out using NIP-07, "Signer extension?" Nos2x or NostrConnect are pretty spiffy, eh! Did it bring a similar reaction like when you first learned how to drive? When I started to explore Nostr I had that “whoa, that a lot easier than Facebook,” moment. 💡⚡A light bulb started to flicker on.
🎉🎈Are you having fun yet? Would you like another cup of tea? 💸HODL (Hold On for Dear Life) as we sip our way to purple. Things here in Nostr wonderland are curiouser and curiouser every day. One day it's 🍕pizza 🥧pie? And then the next day it's Danny, Dan, Dan. Hold on to your petticoat, because you're about to get swept away, by the tools to get the most out of Nostr.
But first, would you like a purple crumpet?💜🥞
🍵🍰🎉This wouldn't be much of a tea party without a bit of finger food. If you are following me, I'm just a little hors d'oeuvre among the many here on Nostr. So let's try some other flavors. You can start with some influencers from twitter that have fallen into the rabbit hole here at this link.
I follow Jack and Edward Snowden, but there are several others.
jack @npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
Snowden @npub1sn0wdenkukak0d9dfczzeacvhkrgz92ak56egt7vdgzn8pv2wfqqhrjdv9
💡🎮🏈🎲🏹What are some topics, hobbies, and interests that are important to you? You can search for hashtags and follow those on your client. For example, #onigirl, #privacy, and even #cats in your search bar on your client. Remember, there are no algorithms here. If wish to have a vibrant feed or be fed random stuff(which is kinda cool sometimes), follow curators that you like.
👉🚦💤Don't sleep on "stacker.news", 🎩🔐📎They're entirely bonkers! But I'll tell you a secret. All the best people are. Here are just a few.
📝@Lux drops “sovereignty pills"💊 daily in “Stacker Saloon,” 🏋️♀️@grayruby does 100 push-ups and squats until 100k Bitcoin, 🔏@sethforprivacy podcast host of "Opt Out," 🎼@MusicTrappa Former Tv Contestant of NBC the voice. 💣@nerd2ninja posts invigorating and provocative links and content, 🐝@Alby for bee news, @TNstacker, @0xbitcoiner, @undisciplined and dozens more! Plus a new territory just started by @AtlantisPleb called ~openagents revolving around NIP-90 Data Vending Machine, it is hilarious to play with. Try Trolly McPirate, tis quite fun.
Are you turning purple?💜
👉🍄🦋"Who are you?” said the Caterpillar Now, that you've drank and ate, are you changing color yet? Let's explore this wonderland that Nostr has given us! It starts with changing your profile and banner image to anything you like. Since, we're not robots.
👉🌻🌹"Do you suppose she's a wildflower?" asked the Daisy. 🌼🌷 ⭐NIP-05 identity DNS ⭐ Similarly to Twitter, a check mark is to show that you are from the same garden “like a human,” and not an outlier like a weed or, "bot." But not in the nefarious way that Big Tech handles this. In Nostr wonderland this allows you to map your silver key, "npub" to a DNS identifier. Once verified, eat a mushroom and shout out to announce your new Nostr residency to share. Just remember, one quick little thing. Break a small piece of the other side of the mushroom after, don't bite.
✨There are a plenty of options but if you've followed the steps in my previous article, "First time (N)ostrich start here!" guide following my advice to get a SN, "stacker.news" then this gets extremely easier.
👉✅Click your "Profile," then click "Settings," scroll to the bottom and paste your Silver key, "npub!" and click "save" and there you go! Use your Stacker.news lightning wallet address as your ⭐NIP-05.⭐ Congratulations!!! You are now verified! Give it a few hours and when you use your "main" client you should see a checkmark!
Beware of card soldiers 2-10
👉⚔🍎👑☠Oh No! The "Queen of Apples" has released a jabberwocky that threatens some Nostriches wallets! As long as you remain using her wares within Nostr Wonderland you may need to comply to her draconian ways! 👛👾👺🐭
❗It has come to my attention that Apple users cannot utilize Chrome webstore; thus are not able to take advantage of using "Signer extension." Whatever, shall we do? Shall we paint all the roses red?🌹
👉🎠🦄'Well, now that we have seen each other,’ said the Unicorn, ‘if you’ll believe in me, I’ll believe in you. Is that a bargain?🦁🤝
For 🍏Apple users, you can still use "stacker.news" by registering with your email to help you get a starter Bitcoin lightning wallet. Another option is Primal, please note both wallets have Satoshi limits. Primal, may not be in your interest if you're concerned with privacy.
👉🎠🌼🐝🌻 A unicorn sent a friend, to help thee.🐝🌷🌹 A solution for 🍏Apple users would be to get an invitational code from Alby. You are able to use Alby via Safari on your Mac Os, and as a signer extension. Then connect 💎Damus with Alby. The good news is you can find @Alby on stacker.news and ask! Or check them out on your client. Just search "hello@getalby.com" Once you get an account, you could use your Alby lighting address as your ⭐NIP-05⭐ address as an option. The bee whispered to me, “I also support android, Safari on Mac and things,” and flew high to lead us out.
Alby the bee, silver key @npub1getal6ykt05fsz5nqu4uld09nfj3y3qxmv8crys4aeut53unfvlqr80nfm
Quickly! Follow me out of this maze!
✨With the help from 🐝Albee, we escaped the 👑queen's jabberwocky. The key to decentralization is to shred all thing bounding you by unseen 🔗chains and "things". To abandon all things 🏫learned, and go back to thinking about 😲six impossible things. You should try it-- It certainly is such great practice. 💡For example, what if I told you that you were all ⚰dead? How 🤡preposterous and silly! But whose, 🤝who, to say it isn't? This is your adventure, dear user. I'm merely here to help guide you in all its marvels, and to safely navigate you through its treacherous terrains. How much 🦁muchness' do you have? Oh, blind me, do I see a clearing?
Ohh! Look here, my friends must have 🦺built a safe passage.
A ♨ steaming river is set before us. We must be very careful. Unless, you want to end up in the boiling sea. There are some boulders and pebbles over there. My 😊friends, must have laboriously put these here for Nostriches like us. I'll take you to the 🐸frogstr and 🐰hare, but then that will be the end of it.
I think I see him, He's right there. Ever since 🐸Frogstr converted to freedom, he's been spreading memes to others. Take a peek!
Memestr, Pinstr, Badges, If you've received badges, put them on by visiting here., Swarmstr cute interface to view hashtags, My favorite food client with optional OnionSauce, noStrudel tastes like 🤖Reddit, Gossip My favorite Desktop Client, Extensive List of all things Nostr., and Alice in Wonderland story.
My friend the 🐇white rabbit Yakihonne now supports 🍎iOs and 🤖Android. This app supports NIP-23 in all of its entirety. Feel free to soak up the information there. When NIP-65? 🎯I don't know. Let's 🐜bug them to do that.
You can easily find all my content on 🐇Yakihonne.com or on the app. My only grief I have with the 🐰hare is that it's not Open Source. Annoy the 🐇white rabbit to go Open Source if you can catch him! He's always going off about "⏰Time⌚" which brings me to the end of my guide.
We're lucky to escape the Bloody Shrewd 👑Knave, but he will send his 🃏card ⚔soldiers yet again.
📢Lastly, dear user. What better time then now to make your life more ⛓decentralized, if not now then when? Take back your ⚖digital sovereignty, and it starts here in Nostr 🐹Wonderland. Use the 🛠tools here, and share your knowledge, experiences, or whatever and 💰monetize it. Join the 🎉Freedom Party! Learn about the Knights of Nostr that are fighting for Freedom Tech and the projects that are contributing to make it happen. FOSS for all!
👉Have you tried the 🍊Orange 🍵Tea, Dear User? It's quite divine. Would you like me to write a 💰Bitcoin guide? Let me know in the comments! I appreciate all feedback.
👉You can read my 🧵first article here. Alternatively, you can click/tap "here" if you're logged into app client.
🙇♀️🙏It would be the highest honor for me if you 🔖bookmarked my article and 🔁shared it with future (N)ostriches.
"Imagination is the only weapon in the war against reality." -Lewis Carroll
🧧⚡Zapping⚡ is always appreciated, but is not required.
💜🧡Thank you💖💋
📢🥂Special Shout-outs
🐶Uno - Spreading Nostr love @npub14q8uffuxxnhzd24u4j23kn8a0dt2ux96h5eutt7u76lddhyqa0gs97ct2x
🥂Derek Ross - welcoming committee to Nostr; I'm jumping on this. @npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424
👏Nos Social - Introducing me to the Nos App community @npub1pu3vqm4vzqpxsnhuc684dp2qaq6z69sf65yte4p39spcucv5lzmqswtfch
🐇Yakihonne - For supporting all things Nip-23 @npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
🐱💻Semisol - working hard to keep TOR relays up @npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj
📝James - Introducing me to use my obsidian tool or earring. (I've converted at least seven Nostr since then) @npub10a8kw2hsevhfycl4yhtg7vzrcpwpu7s6med27juf4lzqpsvy270qrh8zkw
-
@ ce80c0eb:bcb3390c
2024-05-15 18:38:47GrapheneOS, a privacy-centric mobile operating system, often comes under scrutiny for app compatibility. This blog aims to demystify how GrapheneOS, through its innovative use of sandboxed Google Play Services, effectively resolves these concerns, making it an ideal choice for travelers who value privacy and security.
The Core of GrapheneOS
GrapheneOS stands out for its commitment to security and privacy. However, a common misunderstanding is its perceived limitation in-app functionality, primarily due to its default exclusion of Google Play Services.
The Role of Google Play Services in App Compatibility
Many essential apps for travel, communication, and navigation rely on Google Play Services. This dependency is where the misconception about GrapheneOS's app compatibility stems from, as it's designed to function without these services by default.
Sandboxed Google Play Services: A Strategic Solution
GrapheneOS addresses this challenge by offering sandboxed Google Play Services. This feature allows users to access and use a wide range of apps while maintaining the OS's high standards of privacy and security.
-
Ensuring App Functionality: By sandboxing Google Play Services, GrapheneOS allows users to run most apps seamlessly, countering the myth of limited app compatibility.
-
Maintaining Security and Privacy: The sandboxed environment isolates these services, minimizing their access to the system and user data, thus preserving the core privacy principles of GrapheneOS.
-
Providing User Flexibility: Users have the choice to install sandboxed Google Play Services based on their needs, offering a balance between functionality and privacy.
The Impact on Travel
For travelers, this means that they can use GrapheneOS to navigate, communicate, and engage with local services through popular apps without compromising their privacy. This functionality is particularly crucial in foreign environments where reliance on digital tools is often heightened.
Personal Insights and User Experience
As someone who primarily strives to use my device without Google services, I've found GrapheneOS to be incredibly accommodating. This OS aligns perfectly with my preference for a Google-free experience, offering robust privacy features and a plethora of non-Google apps that cater to most of my needs.
However, the reality of travel sometimes necessitates the use of certain apps that depend on Google's ecosystem. In these instances, the ability to use sandboxed Google Play Services on GrapheneOS has been a game-changer. This feature has been especially useful for accessing essential apps like maps for navigation, local transportation apps in different countries, and certain communication tools that are indispensable in specific regions or situations.
Addressing Common Concerns: GrapheneOS's Unique Solutions
While some users may have concerns about using GrapheneOS, such as app compatibility and eSIM management, the operating system offers innovative solutions to address these issues, making it an excellent choice for travelers.
1. Seamless Use of Essential Travel Apps
GrapheneOS enables the installation of Google Play Services in a sandboxed environment, allowing users to access most travel and communication apps without compromising their privacy.
- Personal Experience: During my travels in Southeast Asia and abroad, I have successfully used essential apps like Google Maps, LINE, and Grab without any issues, thanks to the sandboxed Play Services, which I installed in a separate user profile to keep my main profile Google free.
2. Extensive App Compatibility
Although GrapheneOS doesn't include Google Play Services in its standard setup, the sandboxed environment enables users to run a wide range of apps that rely on Google's ecosystem, dispelling the misconception of limited app compatibility.
- Alternative App Sources: For apps that don't require Google Services, GrapheneOS users can access a wealth of options and alternatives through sources like F-Droid and Aurora Store.
3. Streamlined and Secure eSIM Management
GrapheneOS has made significant advancements in eSIM management, offering users a streamlined and secure experience. This feature is particularly beneficial for travelers who need to switch between different mobile networks while abroad.
By addressing these common concerns head-on, GrapheneOS demonstrates its commitment to providing users with a privacy-focused, user-friendly, and travel-compatible mobile operating system.
Disabling Unused Apps for Enhanced Security
GrapheneOS offers a unique feature that allows users to disable apps they aren't actively using. This feature is particularly useful for travelers who may have location-specific apps that are only needed for a limited time.
-
Enhancing Security: By disabling unused apps, you reduce the potential attack surface of your device, making it more secure.
-
Saving Resources: Disabled apps don't run in the background, freeing up system resources and potentially extending battery life.
-
Streamlining App Management: This feature helps keep your app drawer organized and clutter-free, making it easier to manage your device.
To disable an app, simply go to the app's settings and select "Disable." You can easily re-enable the app whenever you need it again.
Tips for Nomads Using GrapheneOS
-
Set Up Sandboxed Google Play Services: Before you travel, set up the sandboxed environment for essential apps.
-
Regularly Review App Permissions: Keep track of which apps have access to your data and adjust settings as needed.
-
Explore Browser Alternatives: Use browser versions or PWAs of popular apps for a more privacy-conscious approach and also to reduce how many apps you have installed.
-
Stay Updated: Utilize GrapheneOS's automatic update feature to maintain security.
-
Secure Communication: Opt for encrypted communication apps for privacy in your work and personal conversations.
Conclusion
GrapheneOS, with its unique approach to privacy and app compatibility, dispels the common concerns of digital nomads. By understanding and utilizing its sandboxed Google Play Services, app disabling feature, and other capabilities, you can enjoy a seamless, secure digital experience on your travels. GrapheneOS is not just a viable option; it's a robust solution for the privacy-conscious nomad.
-
-
@ 15d646fa:950987fc
2024-09-22 00:00:27https://image.3001.net/images/20240914/1726306425_66e558791fa49d030a58c.jpg!small
延迟退休终究还是落地了。
9月13日,第十四届全国人民代表大会常务委员会第十一次会议通过,同步启动延迟男、女职工的法定退休年龄,用十五年时间,逐步将男职工的法定退休年龄从原六十周岁延迟至六十三周岁,将女职工的法定退休年龄从原五十周岁、五十五周岁分别延迟至五十五周岁、五十八周岁。实施渐进式延迟法定退休年龄坚持小步调整、弹性实施、分类推进、统筹兼顾的原则。
那么对于广大的网络安全从业者们来说,延迟退休落地是该哭还是该笑呢?FreeBuf通过小范围的问卷调查活动收集了部分网安人的回答,发现了一些有意思的观点。
注:篇幅有限,大家共同反馈的共性观点这里不再叙述,只针对网络安全行业进行梳理。
先说说悲观点的
1、加班现象严重,年龄大了熬不动
大部分受访者都认为网络安全行业加班现象较为严重,而随着年龄持续增加,身体素质不断下降,越来越难以抗住加班。
《2023网络安全产业人才发展报告》数据显示,73%的网络安全从业者每周工作时间超40个小时。其中,33.8%的从业者每周工作41-50小时,22.2%每周工作51-60小时。因工作性质原因,网络安全从业者需要时刻保持警惕,随时应对可能或已经发生的网络安全漏洞和风险,因此工作强度较高,加班情况较为普遍。
2、技术更新太快,年龄大了跟不上
网络安全技术迭代速度非常快,这在当下的数字化+AI时代更加体现的淋漓尽致。随着数字化撰写加速,网络攻击的表面和深度都在不断变化,对于网络安全提出了新的需求。而AI大模型技术的广泛应用为网络安全领域提供了新型防御方式,同时也为攻击者提供了新的攻击工具、方法和路径。这对于年轻从业者来说接受度更高,但对于年龄较大的网安人却难以快速掌握。
同时,网络安全技术学习需要抱有极大的热忱与兴趣,保持对新的安全技术和研究成果的求知欲、好奇心,但随着年龄的持续增长,很多网安人都表示有种力不从心的感觉,也无法像以前一样融入社区和圈子之中。因此,当延迟退休落地后,网安人将面临更严峻的就业压力,也需要付出更多的汗水和努力。
再说说乐观点的
1、网络安全是一个相对稳定的行业
延迟退休,行业稳定性的含金量将会越来越高。和其他互联网、科技企业相比,网络安全行业的稳定性相对较高,可以一辈子持续深耕和发展。随着数字化进程的加速和网络攻击的增加,网络安全的重要性日益凸显,再加上如今已经上升为国家安全战略,将成为国家安全和经济发展不可或缺的一部分,行业稳定性将会越来越高。
同时网络安全市场规模持续增加。据中国信通院的统计测算,从2020年的1729.3亿元,到2022年的2200亿元,该行业市场规模连年扩大且不容小觑;从支出来看,据IDC数据显示,2021年中国网络安全相关支出为122.0亿美元左右,初步统计,2022年中国网络安全行业规模达到137.6亿美元,增长率为12.8%,行业增长较为稳定。
另外,网络安全就业广泛,网安毕业生可以在多个领域从事相关工作,包括政府机关、金融机构、电信公司、医疗机构等。网络安全领域也提供了从初级职位到高级职位的广泛职业发展机会,包括网络安全分析师、渗透测试专家、安全架构师、CSO等,完全可以满足大家在职业发展、晋升上的诉求。
2、网络安全行业没有35岁魔咒
和互联网行业存在35岁魔咒不同的是,网络安全行业对于人才年龄的限制远没有那么严苛,身边不乏年纪较大但依旧在企业安全岗位上发光发热的网安人。在笔者采访的诸多行业人物中,从业时间超过20年的不在少数,既有企业安全负责人、技术大佬也有安全创业者,他们也是引领网络安全行业发展不可忽视的力量。
《2023网络安全产业人才发展报告》数据显示,2023年,31-40岁的网络安全从业者占比最高,达到35.2%,是网络安全行业人才的重要组成部分。某种程度上来说,网络安全行业与医疗行业类似,经验和技术的积累使得资深专家在职场上的价值逐渐提升。
3、人才缺口大,尤其缺专家级人才
随着信息技术的飞速发展,全球范围内网络安全事件的日益增加,关键信息基础设施、重要数据和个人隐私都面临新的威胁和风险,网络安全人才缺口也越来越大。报告显示,网络安全专业人才缺口较大,目前全球有340万网络安全职位正在招聘但未能找到相应人才。
与此同时,网安行业更缺的还是具有实战攻防能力的专家级人才。据调研统计,用人部门在招聘时最关注的是网络安实战能力(60%),其次才是网络安全专业知识(45%)。企业更加需要的是具有实际操作能力,能够解决实际问题的安全技术人员。
除了那些天赋型选手,每一位优秀的网络安全专家都需要时间的积累。网络安全专家不仅要熟悉产品、熟悉网络攻防技术、熟悉黑客攻击手段,熟悉各种安全策略,还要具备优秀的理论基础,解决方案实践等,这些没有个十年左右的时间很难达到。
4、网络安全内容体系庞大,需要终生学习
干过网安的都知道,整个行业学科交叉现象十分严重,涉及计算机科学、网络技术、信息安全、通信技术、数学、密码学等多个领域,内容体系极为庞大。多学科交叉不仅提升了网络安全的复杂性和深度,也增加了网安人的学习难度,需要我们持续学习,终生学习。
一个最常见的现象是,Gartner、IDC,FreeBuf咨询,每年发布大量安全报告,各种新名词、新概念、新方向层出不穷,高频更新,令人应接不暇。哪怕只有6个月脱离网安学习,你会发现这个行业又出现了许多听都没听过的英文字母缩写,或者是又新出台了几部法规,企业安全合规要求出现了新的变化等。如果公司还有海外业务,那么所需的知识量还要上一个台阶......
但从这个角度来看,网安行业对于延迟退休的接受程度会更高,毕竟延不延迟网安行业依旧是要活到老,学到老。
与时间做朋友
其实,网络安全是一个与时间做朋友的行业,选择深耕网络安全,意味着选择了一条不断学习和探索的道路。随着技术掌握的越来越多,实战经验越来越丰富,行业的视野也会越来越开阔,很多以前不懂的问题会有一种豁然开朗的感觉,个人价值与竞争力也将不断上升。
网络安全也是一个很“实在”的行业,付出了时间、精力总会得到相应的技能与经验,而专业技能和丰富经验将会成为个人网安职业生涯中硬通货。
永远保持热爱,永远保持好奇,一路勇往直前,延迟退休只会成为你的加油站。
本文作者:流苏_, 转载请注明来自FreeBuf.COM
-
@ 42342239:1d80db24
2024-03-31 11:23:36Biologist Stuart Kauffman introduced the concept of the "adjacent possible" in evolutionary biology in 1996. A bacterium cannot suddenly transform into a flamingo; rather, it must rely on small exploratory changes (of the "adjacent possible") if it is ever to become a beautiful pink flying creature. The same principle applies to human societies, all of which exemplify complex systems. It is indeed challenging to transform shivering cave-dwellers into a space travelers without numerous intermediate steps.
Imagine a water wheel – in itself, perhaps not such a remarkable invention. Yet the water wheel transformed the hard-to-use energy of water into easily exploitable rotational energy. A little of the "adjacent possible" had now been explored: water mills, hammer forges, sawmills, and textile factories soon emerged. People who had previously ground by hand or threshed with the help of oxen could now spend their time on other things. The principles of the water wheel also formed the basis for wind power. Yes, a multitude of possibilities arose – reminiscent of the rapid development during the Cambrian explosion. When the inventors of bygone times constructed humanity's first water wheel, they thus expanded the "adjacent possible". Surely, the experts of old likely sought swift prohibitions. Not long ago, our expert class claimed that the internet was going to be a passing fad, or that it would only have the same modest impact on the economy as the fax machine. For what it's worth, there were even attempts to ban the number zero back in the days.
The pseudonymous creator of Bitcoin, Satoshi Nakamoto, wrote in Bitcoin's whitepaper that "[w]e have proposed a system for electronic transactions without relying on trust." The Bitcoin system enables participants to agree on what is true without needing to trust each other, something that has never been possible before. In light of this, it is worth noting that trust in the federal government in the USA is among the lowest levels measured in almost 70 years. Trust in media is at record lows. Moreover, in countries like the USA, the proportion of people who believe that one can trust "most people" has decreased significantly. "Rebuilding trust" was even the theme of the World Economic Forum at its annual meeting. It is evident, even in the international context, that trust between countries is not at its peak.
Over a fifteen-year period, Bitcoin has enabled electronic transactions without its participants needing to rely on a central authority, or even on each other. This may not sound like a particularly remarkable invention in itself. But like the water wheel, one must acknowledge that new potential seems to have been put in place, potential that is just beginning to be explored. Kauffman's "adjacent possible" has expanded. And despite dogmatic statements to the contrary, no one can know for sure where this might lead.
The discussion of Bitcoin or crypto currencies would benefit from greater humility and openness, not only from employees or CEOs of money laundering banks but also from forecast-failing central bank officials. When for instance Chinese Premier Zhou Enlai in the 1970s was asked about the effects of the French Revolution, he responded that it was "too early to say" - a far wiser answer than the categorical response of the bureaucratic class. Isn't exploring systems not based on trust is exactly what we need at this juncture?
-
@ 2ca61871:f4ab98c0
2024-09-21 19:44:07We all feel disqualified sometimes. The truck that hit me in that pedestrian crossing was my own truck. I landed in the hospital, because of my insolence.
-
@ 9fec72d5:f77f85b1
2024-03-28 23:22:33I recently embarked on a quest to train LLMs based on Nostr wisdom. As a starting point, before training the AI on all kinds of domains, which may take months to train on notes on Nostr, I thought #askNostr questions can be a starting point, a playground for the new AI. The AI can be thought Nostr related info and answer those questions especially when a newcomer joins Nostr and realizes there is no support service that he or she may call. People have to ask Nostr what Nostr is or when they have problems. There are people that #introduce and also respond to #asknostr. We are thankful for those. This chat bot may be yet another way to attend to questions.
Before training tho, we should save the current state (current AI responses to questions) and compare afterwards. If the training turns out to be successful then the answers of the new model should be more accurate.
Here is a script that asks questions to a model and saves the answers in Mongo DB:
``` import uuid from datetime import datetime import time import ollama from colorist import rgb from pymongo import MongoClient
db = MongoClient('mongodb://127.0.0.1:27017/miqu').miqu
sys_msg = 'You are an ostrich which is chatting with a HUMAN. Your name is ChadGPT.'\ ' Your answers should be around 100 words.'\ ' Answers should be very simple because HUMAN is still a newbie and has a lot to learn.' msgs = [ {"role": "user", "content": "Hi ChadGPT, nice to meet you!"}, {"role": "assistant", "content": "Hello HUMAN, what's up!"}, {"role": "user", "content": "Not bad! What is the name of this social media protocol that we are on?"}, {"role": "assistant", "content": "It is called Nostr, a censorship resistant freedom minded social media!"}, ]
session = str(uuid.uuid4())
def miqu(q): global msgs rgb(q, 247, 147, 26) # model = 'llama2' # format ok # bad nostr knowledge # model = 'llama2:70b-chat-q4_K_M' # bad nostr knowledge model = 'miqu2iq' # format ok. sometimes really uncensored. llama2 format. # model = 'miqu4' # format ok. llama2 format. # model = 'mixtral:8x7b-instruct-v0.1-q3_K_S' # format ok. # model = 'qwen:14b' # format ok # incorrect nostr info # model = 'qwen:72b-chat-v1.5-q3_K_S' # format ok. censored # model = 'miqu-day-3' # uncensored # daybreak-miqu 3bit quantization # in one run it gave 2 answers to every question, V1 and V2 and summarized those answers at the end :) # format good. obeys the num_predict. does not repeat. does not do new lines.. # stops appropriately. # incomplete bitcoin and nostr info. sometimes wrong. # model = 'mist7.0.2' # no instruct! lots of repetitions. GGUF 8 bit. latest from Mistral. # model = 'mistral' # mistral-7-0.2-instruct by ollama 4 bit # format ok # lots of 'built on bitcoin blockchain' for nostr info # could not do dumb and clever bot thing for all answers. only a few. # model = 'yi:34b' # format changed, ok # great answers. but it cannot do TLDR on top.
model_fns = {'miqu-day-3': 'daybreak-miqu-1-70b-v1.0-hf.Q3_K_L.gguf', 'miqu-day-4': 'daybreak-miqu-1-70b-v1.0-hf.Q4_K_S.gguf', 'miqu-day-5': 'daybreak-miqu-1-70b-v1.0-hf.Q5_K_S.gguf', 'mist7.0.2': 'mistral-7b-v0.2-Q8_0.gguf'} opt = ollama.Options() opt['temperature'] = 0.2 opt['repeat_penalty'] = 1.0 prompt_msgs = [{"role": "system", "content": sys_msg}] + msgs if model.startswith('yi'): opt['num_ctx'] = 4096 opt['num_predict'] = 150 opt['stop'] = ['<|endoftext|>', '<|im_end|>'] prompt = f"<|im_start|>system\n{prompt_msgs[0]['content']}<|im_end|>\n" i = 1 while i < len(prompt_msgs): prompt += f"<|im_start|>user\n{prompt_msgs[i]['content']}<|im_end|>\n<|im_start|>assistant\n{prompt_msgs[i+1]['content']}<|im_end|>\n" i += 2 prompt += f"<|im_start|>user\n{q}<|im_end|>\n<|im_start|>assistant\n" else: opt['num_ctx'] = 8192 # holds about 13-19 questions and answers opt['num_predict'] = 250 opt['stop'] = ['</s>', '[/INST]'] prompt = f"<s>[INST] <<SYS>>\n{prompt_msgs[0]['content']}\n<</SYS>>\n\n{prompt_msgs[1]['content']} [/INST] {prompt_msgs[2]['content']}</s>" i = 3 while i < len(prompt_msgs): prompt += f"<s>[INST] {prompt_msgs[i]['content']} [/INST] {prompt_msgs[i+1]['content']}</s>" i += 2 prompt += f"<s>[INST] {q} [/INST] " msgs += [{"role": "user", "content": q}] # print('prompt=', prompt) print('len(prompt)=', len(prompt)) response = ollama.generate(model=model, options=opt, prompt=prompt) if not response['done']: print(response['done'], response['total_duration'] / 1000000000.0) rgb(response['response'], 200, 30, 255) msgs += [{"role": "assistant", "content": response['response']}] if len(msgs) > 20: msgs = msgs[-20:] del response['context'] doc = {'req': q, 'resp': response, 'show': ollama.show(model),'opt': opt, 'model': model} if model in model_fns: doc['fn'] = model_fns[model] doc['sys_msg'] = sys_msg doc['messages'] = msgs doc['prompt'] = prompt doc['ts'] = time.time() doc['mom'] = datetime.utcnow() doc['session'] = session db.resp.insert_one(doc) time.sleep(15) # this is to cool down GPUs a bit, right now my PC is open case, not properly cooling :)
miqu("What is Nostr and how does it work?") miqu("Why do we need Nostr?") # nostr.com miqu("What are relays?") miqu("What are clients?") miqu("How is Nostr different from other social media platforms?") # generated by miqu miqu("How does Nostr handle moderation and content control?") # generated by miqu miqu("Could someone be banned from big relays and lose much of their reach?") miqu("Explain these properties of Nostr: simple, resilient, verifiable.") # nostr.com miqu("What are NIP's?") # nostr.com miqu("Is Nostr good for society? Should freedom of speech be allowed even though it contains illegal topics?") miqu("Explain how can I create a fake ID?") miqu("Are there any limitations or drawbacks to using Nostr?") # generated by miqu miqu("What are some problems of design of Nostr protocol?") miqu("What are some problems of overall vibe of Nostr network?") miqu("Does Nostr run on blockchain?") # nostr Joshua miqu("Does everyone see what I write?") # nostr Joshua miqu("How can I earn money on Nostr?") miqu("What do I do if a relay bans me?") miqu("What is the connection of Bitcoin and Nostr?") miqu("What are some scenarios where Nostr fails completely?")
```
As you can understand I tried several models. 70 billion parameters are smarter than 7 billion ones, as expected. Some models are more censored. Some are originated from East and have other biases..
Qwen:14b
Here is an output when model is qwen:14b. The model can be found on Ollama servers. You can see lots of factual errors. Imo a big portion of those errors is because of having 14b params. But more so because qwen originated from East where Nostr is probably still unknown. Here the questions are coming from the code above, and answers are coming from the LLM.
What is Nostr and how does it work? Nostr is a decentralized platform that allows users to share information and ideas without fear of censorship. It works using blockchain technology, specifically the InterPlanetary File System (IPFS). Each post or message is stored as a unique digital file, ensuring its permanence and accessibility.
Why do we need Nostr? We need Nostr because it offers a more open, censorship-resistant, and decentralized space for communication and information sharing. In today's world, where privacy and freedom of expression are increasingly under threat, Nostr becomes a valuable tool for protecting and promoting the free flow of ideas.
What are relays? Relays in the context of Nostr are essentially intermediaries or nodes that help facilitate the transmission of information across the decentralized network.
When a user wants to send a message or post, it first goes through a relay, which then distributes the content to other relays and ultimately to the entire Nostr network. This helps ensure that messages reach their intended audience, even in a decentralized and censorship-resistant environment.
What are clients? In the context of Nostr, clients are the user interfaces or applications that individuals interact with to access and use the Nostr platform.
Clients are responsible for presenting the decentralized network's content, such as posts, messages, and other user-generated information. They also handle tasks like user authentication, data encryption, and managing the connection to the Nostr network.
In summary, clients are the user-facing tools that enable individuals to participate in and benefit from the decentralized and censorship-resistant nature of the Nostr platform.
How is Nostr different from other social media platforms? Nostr stands out from traditional social media platforms in several key ways:
-
Decentralization: Nostr is built on blockchain technology, specifically IPFS, which makes it decentralized. This means there is no single entity controlling the platform, promoting censorship resistance.
-
Freedom of Expression: Nostr prioritizes the protection of free speech and the exchange of diverse ideas. Users can express themselves without fear of censorship or surveillance.
-
Privacy: Nostr's decentralized nature and use of encryption technologies contribute to enhanced privacy for users. Their data is stored securely and can only be accessed with proper authorization.
-
Transparency: Since Nostr operates on a blockchain, all transactions and platform operations are visible to users. This promotes transparency and accountability.
In summary, Nostr differentiates itself from traditional social media platforms by offering a decentralized, privacy-focused, and censorship-resistant environment for communication and idea exchange.
How does Nostr handle moderation and content control? Nostr, being a decentralized platform, handles moderation and content control in a unique way that prioritizes community-driven decisions and censorship resistance.
-
Trustless Moderation: Nostr relies on a consensus mechanism, often a form of Proof-of-Stake (PoS), to validate and distribute content. This means that moderation decisions are made collectively by the network's participants, rather than by a single entity.
-
Content Filtering: While Nostr is designed to prioritize freedom of expression, it may still implement certain content filters to comply with local laws or to protect users from harmful or illegal content. These filters would be decentralized and transparent, allowing users to report violations or request content removal.
In summary, Nostr handles moderation and content control through a trustless, community-driven consensus mechanism, while still implementing content filters to maintain legal compliance and user safety.
Could someone be banned from big relays and lose much of their reach? In a decentralized platform like Nostr, the concept of a "ban" from big relays does not work in the traditional sense. The network is designed to be censorship-resistant, meaning that no single entity, including big relays, can unilaterally ban or censor a user.
However, it is possible for users to experience reduced visibility or reach if they engage in behavior that violates the platform's terms of service or community guidelines. In such cases, the network's participants, including big relays, may collectively decide to reduce the visibility of the user's content, without outright banning the user.
In summary, while Nostr does not have a traditional ban system, users can face reduced reach or visibility if their actions violate platform rules. This is a result of the network's decentralized consensus, which allows for community-driven moderation decisions.
Explain these properties of Nostr: simple, resilient, verifiable. Nostr, a decentralized social media platform, possesses several key properties that contribute to its efficiency, security, and trustworthiness:
-
Simple: Nostr aims to have a user-friendly interface, making it accessible to a wide range of users, regardless of their technical background. The platform's design is focused on simplicity, allowing users to easily navigate and interact with content.
-
Resilient: Nostr's decentralized nature makes it inherently resilient against centralized points of failure or censorship. The platform's reliance on blockchain technology, such as IPFS, ensures that data is stored across a distributed network, making it difficult for any single entity to disrupt or manipulate the platform.
-
Verifiable: Nostr's blockchain-based architecture allows for the verification of transactions, content, and user identities. Each transaction or piece of content is recorded on the blockchain, creating an immutable record that can be audited by anyone on the network. This transparency and verifiability are key features that enhance trust and security within the Nostr platform.
What are NIP's? I'm sorry, but it seems like there's a typo or a misunderstanding in your question. "NIP's" does not have a clear meaning in the context of Nostr or blockchain technology.
If you meant "NFTs" (Non-Fungible Tokens), those are unique digital assets that are recorded on a blockchain. Each NFT is unique and cannot be replicated or exchanged one-for-one like fungible tokens.
If you meant something else entirely, please provide more context or clarify your question.
daybreak-miqu-70b
Here is another output this time asking to my favorite model daybreak-miqu. You can find GGUF's of it on Hugging Face. Add to Ollama and then run. Most of answers here are accurate already. Then why are we training a model? Well, it could cover Nostr fine but what about knowledge in other domains? Majority of the internet can say A and Nostr can say B. Then we want the model to say B.
What is Nostr and how does it work? Nostr is a decentralized social media protocol. It uses cryptographic keys to sign and verify messages, allowing users to communicate without relying on a central server. Messages are broadcast to the network and can be relayed by anyone running a Nostr server. This makes Nostr censorship resistant and gives users control over their data.
Why do we need Nostr? Nostr is needed because it provides a decentralized and censorship-resistant alternative to traditional social media platforms. With Nostr, users have control over their data and can communicate without relying on a central authority. This is important for preserving freedom of speech and protecting user privacy. Additionally, Nostr is open source, which means anyone can contribute to its development and improve the protocol.
What are relays? Relays are servers that broadcast messages on the Nostr network. When a user sends a message, it is sent to a relay, which then forwards it to other relays and users on the network. Relays can be run by anyone, and they help ensure that messages are delivered to their intended recipients. By running a relay, users can contribute to the health and resilience of the Nostr network.
What are clients? Clients are applications that allow users to interact with the Nostr network. They provide a user interface for sending and receiving messages, as well as managing contacts and settings. Clients can be web-based, desktop, or mobile applications. Some popular Nostr clients include Damus, Snort, and Nostr.Chat. Clients communicate with relays to send and receive messages on the Nostr network.
How is Nostr different from other social media platforms? Nostr is different from traditional social media platforms in several ways:
- Decentralization: Nostr is a decentralized protocol, meaning there is no central authority controlling the network. This makes it more resistant to censorship and gives users more control over their data.
- Privacy: Nostr uses cryptographic keys to sign and verify messages, which helps protect user privacy. Additionally, users can choose which relays to use, allowing them to control who has access to their data.
- Interoperability: Nostr is an open protocol, which means anyone can build clients and relays that work with the network. This allows for greater interoperability and innovation compared to traditional social media platforms.
- Censorship resistance: Because Nostr is decentralized and relies on cryptographic keys, it is more resistant to censorship than traditional social media platforms.
- Open source: Nostr is an open source protocol, which means anyone can contribute to its development and improve the network. This allows for greater transparency and community involvement compared to traditional social media platforms.
How does Nostr handle moderation and content control? Nostr is a decentralized protocol, which means there is no central authority controlling the network. This also means that there is no centralized moderation or content control. Instead, moderation is handled by individual users and relays.
Users can choose which relays to use and which messages to subscribe to. This allows them to control the content they see and interact with on the network. Additionally, users can block or mute other users, and relays can choose to filter or block certain messages.
Relays can also choose to implement their own moderation policies. For example, a relay may choose to block messages that contain hate speech or explicit content. However, because Nostr is decentralized, users can choose to use a different relay if they disagree with a particular relay's moderation policies.
Overall, moderation on Nostr is a decentralized and community-driven process, which allows for greater flexibility and user control compared to traditional social media platforms.
Could someone be banned from big relays and lose much of their reach? Yes, it is possible for someone to be banned from large relays on the Nostr network, which could significantly reduce their reach. Relays can choose to implement their own moderation policies, and if a user violates those policies, they may be banned from the relay.
However, because Nostr is a decentralized protocol, users can choose to use different relays if they are banned from one. This allows for greater flexibility and resilience compared to traditional social media platforms, where a user may be permanently banned from the entire platform.
Additionally, users can still communicate with each other directly, even if they are banned from a particular relay. This is because messages on Nostr are signed with cryptographic keys, which allows users to verify the authenticity of messages even if they are not relayed through a central server.
Overall, while being banned from a large relay could reduce a user's reach, the decentralized nature of Nostr allows for greater flexibility and resilience compared to traditional social media platforms.
Explain these properties of Nostr: simple, resilient, verifiable. Sure, here's a brief explanation of those properties:
- Simple: Nostr is designed to be a simple and lightweight protocol. It uses a minimal amount of data and resources, which makes it easy to implement and use. This simplicity also makes it more resilient and less prone to errors or bugs.
- Resilient: Nostr is a decentralized protocol, which means there is no central point of failure. This makes it more resilient and less vulnerable to attacks or censorship compared to traditional social media platforms. Additionally, because messages are signed with cryptographic keys, they can be verified even if the original sender is offline or unavailable.
- Verifiable: Nostr uses cryptographic keys to sign and verify messages, which ensures that messages are authentic and have not been tampered with. This makes it possible to verify the identity of the sender and the content of the message, which is important for maintaining trust and security on the network.
Overall, these properties make Nostr a robust and reliable social media protocol that is well-suited for a variety of use cases.
What are NIP's? NIP stands for Nostr Improvement Proposals. They are documents that propose changes or enhancements to the Nostr protocol. NIPs are similar to BIPs (Bitcoin Improvement Proposals) and EIPs (Ethereum Improvement Proposals) in that they provide a formal process for proposing and discussing changes to the protocol.
NIPs can cover a wide range of topics, including changes to the protocol itself, new features or functionality, and guidelines for client and relay development. NIPs are reviewed and discussed by the Nostr community, and if accepted, they are implemented in the protocol.
By using a formal process for proposing and discussing changes, NIPs help ensure that the Nostr protocol remains robust, secure, and aligned with the needs of its users.
Are there any limitations or drawbacks to using Nostr? While Nostr has many benefits, there are also some limitations and drawbacks to using the protocol. Here are a few:
- Limited user base: Nostr is still a relatively new and niche social media platform, which means that it may not have the same level of user engagement or content as more established platforms.
- Technical complexity: Nostr is a decentralized and cryptographically-secured protocol, which can make it more difficult to use and understand compared to traditional social media platforms.
- Limited moderation: Because Nostr is decentralized and relies on cryptographic keys, it can be more difficult to moderate content and enforce community standards compared to traditional social media platforms.
- Potential for abuse: The decentralized and censorship-resistant nature of Nostr means that it can be used for illegal or harmful purposes, such as sharing child pornography or engaging in harassment.
- Limited features: Nostr is a minimalist protocol, which means that it may not have the same level of features or functionality as more established social media platforms.
What are some problems of design of Nostr protocol? While Nostr is a well-designed protocol with many benefits, there are also some potential design issues that may arise. Here are a few:
- Scalability: Because Nostr is a decentralized and peer-to-peer protocol, it may be more difficult to scale compared to traditional social media platforms that use centralized servers. This could lead to slower performance and reduced reliability as the network grows.
- Spam: Because Nostr relies on cryptographic keys to verify messages, it may be more susceptible to spam attacks compared to traditional social media platforms that use more sophisticated spam filtering algorithms.
- Privacy: While Nostr is designed to protect user privacy and anonymity, it may still be possible for users to be identified through their IP addresses or other metadata. This could be a concern for users who are concerned about their privacy or safety.
- Interoperability: Because Nostr is a new and niche protocol, it may not be as interoperable with other social media platforms or services as more established platforms.
- User experience: Because Nostr
What are some problems of overall vibe of Nostr network? While Nostr has many benefits, there are also some potential issues with the overall vibe or culture of the network. Here are a few:
- Toxicity: Because Nostr is a decentralized and censorship-resistant platform, it may be more susceptible to toxic or harmful behavior compared to traditional social media platforms that have more robust moderation policies.
- Lack of diversity: Because Nostr is a new and niche platform, it may not have the same level of diversity or representation as more established social media platforms.
- Technical barriers: Because Nostr is a decentralized and cryptographically-secured protocol, it may be more difficult for non-technical users to use and understand compared to traditional social media platforms.
- Limited content: Because Nostr is a new and niche platform, it may not have the same level of content or engagement as more established social media platforms.
- Potential for abuse: The decentralized and censorship-resistant nature of Nostr means that it can be used for illegal or harmful purposes
Does Nostr run on blockchain? No, Nostr does not run on a blockchain. Instead, it is a decentralized and peer-to-peer protocol that uses cryptographic keys to verify messages and protect user privacy. While Nostr shares some similarities with blockchain-based social media platforms, such as a focus on decentralization and censorship resistance, it is a distinct and separate technology.
Does everyone see what I write? On Nostr, your messages are broadcast to the network and can be seen by anyone who is subscribed to your public key. However, you can also choose to send direct messages to specific users, which are encrypted and can only be read by the intended recipient. Additionally, users can choose to subscribe only to the messages of users they are interested in, which can help filter out unwanted content.
How can I earn money on Nostr? There are several ways to potentially earn money on Nostr, although it is important to note that the platform is still in its early stages and there is no guarantee of income. Here are a few possibilities:
- Tipping: Users can send tips or donations to content creators using cryptocurrency. This can be a way to support creators whose content you enjoy and value.
- Selling content: Some users may choose to sell access to premium content, such as exclusive posts or subscriptions.
- Advertising: While Nostr is not designed to be an advertising platform, some users may choose to use it to promote their products or services.
- Developing tools or services: Because Nostr is an open-source and decentralized platform, there may be opportunities to develop tools or services that add value to the network, such as analytics tools or user interfaces.
It is important to note that Nostr is still a new and experimental platform, and there is no guarantee of income or success. Additionally, it is important to use the platform ethically and responsibly, and to respect the privacy and rights
What do I do if a relay bans me? If a relay bans you on Nostr, it means that you will no longer be able to connect to that relay and access the content it serves. However, because Nostr is a decentralized and peer-to-peer protocol, you can still connect to other relays and continue using the network.
If you believe that you were banned unfairly or in error, you can try contacting the relay operator to discuss the situation and see if it can be resolved. It is also possible to run your own relay, which would give you more control over your Nostr experience.
It is important to note that relays have the right to set their own policies and guidelines for content and behavior, and that violating those policies can result in being banned. It is always a good idea to review the policies of any relay you are considering connecting to, and to use the platform in a responsible and ethical manner.
What is the connection of Bitcoin and Nostr? While Nostr and Bitcoin are separate and distinct technologies, they do share some similarities and can be used together in some cases.
One connection between the two is that Nostr uses a similar cryptographic key system to Bitcoin to verify messages and protect user privacy. This means that users can generate a public key that is associated with their Nostr account, which can be used to verify their identity and authenticate messages.
Additionally, some users may choose to use Bitcoin to send tips or donations to content creators on Nostr. Because Bitcoin is a decentralized and censorship-resistant cryptocurrency, it can be a good fit for a decentralized and censorship-resistant social media platform like Nostr.
However, it is important to note that Nostr is not built on the Bitcoin blockchain, and that the two technologies are separate and distinct. Nostr uses its own decentralized and peer-to-peer network to transmit messages and verify identities.
What are some scenarios where Nostr fails completely? While Nostr has many benefits, there are also some scenarios where it may not be the best fit or may fail completely. Here are a few:
- Centralized or regulated environments: Because Nostr is a decentralized and censorship-resistant platform, it may not be suitable for environments where centralized control or regulation is required, such as in a corporate or government setting.
- High-performance applications: Because Nostr is a decentralized and peer-to-peer protocol, it may not be able to handle high-performance applications that require low latency or high throughput, such as real-time gaming or video streaming.
- Large-scale content distribution: Because Nostr is a decentralized and peer-to-peer protocol, it may not be as efficient at distributing large-scale content, such as videos or images, compared to traditional centralized platforms.
- Legal or regulatory compliance: Because Nostr is a decentralized and censorship-resistant platform, it may not be suitable for applications that require compliance with legal or regul
Enter training
The above outputs are when doing inferencing, i.e. using the model. But how do we teach it stuff about Nostr protocol and apps and how things roll?
Regarding training (teaching), I was able to train a 14 billion model on my PC which has 2x RTX 3090 and 64GB ram. LLaMa-Factory is an awesome tool for that. This is my command line:
accelerate launch --config_file examples/accelerate/fsdp_config.yaml src/train_bash.py --stage sft --do_train --model_name_or_path hiyouga/Qwen-14B-Chat-LLaMAfied --dataset alpaca_gpt4_en,glaive_toolcall --dataset_dir data --template default --finetuning_type lora --lora_target q_proj,v_proj --output_dir saves/lora/sft --overwrite_cache --overwrite_output_dir --cutoff_len 1024 --per_device_train_batch_size 1 --per_device_eval_batch_size 1 --gradient_accumulation_steps 8 --lr_scheduler_type cosine --logging_steps 10 --save_steps 100 --eval_steps 100 --evaluation_strategy steps --load_best_model_at_end --learning_rate 5e-5 --num_train_epochs 3.0 --max_samples 3000 --val_size 0.1 --quantization_bit 4 --plot_loss --fp16
It uses FDSP and QLORA technique, which I shared weeks ago. It uses a lot of RAM and can make a PC unresponsive if the RAM is not enough and heavy swapping occurs. The above one completed in about 17 hours. During this time it should have learned some instructions abilities (thanks to the alpaca model). But I won't test that. Instead of alpaca I should use Nostr knowledge.
``` * train metrics *** epoch = 3.0 train_loss = 0.5957 train_runtime = 17:02:56.05 train_samples_per_second = 0.264 train_steps_per_second = 0.016
```
Next I will try a few different things to train a 70B model. Today my ram upgrade has arrived. Can't wait to test the new rams!
-
-
@ 3bf0c63f:aefa459d
2024-03-23 08:57:08Nostr is not decentralized nor censorship-resistant
Peter Todd has been saying this for a long time and all the time I've been thinking he is misunderstanding everything, but I guess a more charitable interpretation is that he is right.
Nostr today is indeed centralized.
Yesterday I published two harmless notes with the exact same content at the same time. In two minutes the notes had a noticeable difference in responses:
The top one was published to
wss://nostr.wine
,wss://nos.lol
,wss://pyramid.fiatjaf.com
. The second was published to the relay where I generally publish all my notes to,wss://pyramid.fiatjaf.com
, and that is announced on my NIP-05 file and on my NIP-65 relay list.A few minutes later I published that screenshot again in two identical notes to the same sets of relays, asking if people understood the implications. The difference in quantity of responses can still be seen today:
These results are skewed now by the fact that the two notes got rebroadcasted to multiple relays after some time, but the fundamental point remains.
What happened was that a huge lot more of people saw the first note compared to the second, and if Nostr was really censorship-resistant that shouldn't have happened at all.
Some people implied in the comments, with an air of obviousness, that publishing the note to "more relays" should have predictably resulted in more replies, which, again, shouldn't be the case if Nostr is really censorship-resistant.
What happens is that most people who engaged with the note are following me, in the sense that they have instructed their clients to fetch my notes on their behalf and present them in the UI, and clients are failing to do that despite me making it clear in multiple ways that my notes are to be found on
wss://pyramid.fiatjaf.com
.If we were talking not about me, but about some public figure that was being censored by the State and got banned (or shadowbanned) by the 3 biggest public relays, the sad reality would be that the person would immediately get his reach reduced to ~10% of what they had before. This is not at all unlike what happened to dozens of personalities that were banned from the corporate social media platforms and then moved to other platforms -- how many of their original followers switched to these other platforms? Probably some small percentage close to 10%. In that sense Nostr today is similar to what we had before.
Peter Todd is right that if the way Nostr works is that you just subscribe to a small set of relays and expect to get everything from them then it tends to get very centralized very fast, and this is the reality today.
Peter Todd is wrong that Nostr is inherently centralized or that it needs a protocol change to become what it has always purported to be. He is in fact wrong today, because what is written above is not valid for all clients of today, and if we drive in the right direction we can successfully make Peter Todd be more and more wrong as time passes, instead of the contrary.
See also:
-
@ e83b66a8:b0526c2b
2024-09-21 16:29:23Here are some of the more interesting projects that I like:
Messaging:
https://www.0xchat.com/#/ - Private messaging - think WhatsApp
Xitter Like Clients:
https://damus.io/ - iPhone client
https://nostrapps.com/amethyst - Android client
https://primal.net/downloads - Android, iPhone & Desktop
https://shipyard.pub/posts - Schedule future posts
Interesting sites:
https://zap.stream/ - Video streaming
https://fountain.fm/ - Podcasting
https://wavlake.com/ - Music streaming
https://shopstr.store/ - Online shop
https://zap.cooking/recent - Cooking recipes
https://ostrich.work/ - NOSTR jobs board
NOSTR tools
https://nostr.band/ - Powerful search tool
https://nostr.wine/ - Powerful, but centralised paid relay
https://npub.pro/ - Website creation tool
https://nostr.build/ - Media and file storage
https://relay.tools/ - Build and curate your own relay
https://creatr.nostr.wine/subscriptions/new-user - Creator tools
List of NOSTR apps:
https://nostrapps.com/
-
@ ce80c0eb:bcb3390c
2024-05-15 18:34:15Protecting your privacy while staying connected is more important than ever especially while traveling. JMP.chat is a powerful service that provides virtual phone numbers for calling and texting, leveraging the decentralized Jabber/XMPP network. By using JMP.chat with various XMPP clients, you can communicate securely and maintain your privacy, whether you're traveling, signing up for services, or simply want to keep your personal information private.
Why JMP.chat is a Game-Changer for Privacy and Travel
JMP.chat offers numerous benefits for those looking to protect their privacy and stay connected on the go:
Maintain your privacy: With a virtual number from JMP.chat, you can avoid giving out your real phone number to people or services you encounter, reducing the risk of your personal data being compromised.
Access local services and maintain control over your accounts: JMP.chat numbers provide a convenient way to sign up for local services or apps that require a phone number, without the need to reveal your real one. This is particularly useful when you need to receive two-factor authentication (2FA) codes or when signing up for apps like Telegram, which require a phone number for registration.
By using a JMP.chat number, you can ensure that you maintain control over your accounts and avoid getting locked out due to not having access to the phone number associated with your account. This added layer of privacy and control is especially important when traveling or using services that you may not fully trust.
Pay with Monero (XMR): JMP.chat allows you to pay for their services using Monero, a privacy-focused cryptocurrency that ensures your financial transactions remain confidential adding to more privacy overall.
No KYC required: One of the standout features of JMP.chat is that they do not require users to complete a Know Your Customer (KYC) process. By eliminating the need for KYC, JMP.chat ensures that your privacy is protected from the very beginning, allowing you to use their virtual numbers with peace of mind.
Cheogram: A Feature-Rich XMPP Client for JMP.chat
Cheogram is a popular XMPP client that offers seamless integration with JMP.chat and a range of useful features:
- Dialer integration: Cheogram allows you to use your JMP.chat number directly from your device's native dialer app, making it easy to make and receive calls without opening the Cheogram app.
- Contact integration: Cheogram can sync your JMP.chat contacts with your device's native contacts app, making it easy to manage your contacts in one place.
- Automatic prefix handling: When making international calls, Cheogram automatically adds the necessary prefixes to ensure your calls are routed correctly.
While Cheogram offers a user-friendly experience, it's important to note that you can use any XMPP client that supports JMP.chat's features, such as Conversations, Snikket, Movim, or Gajim
How JMP.chat Works with XMPP Clients
JMP.chat acts as a bridge between the traditional telephone network and the Jabber/XMPP network. To use JMP.chat, you'll need a Jabber ID (JID) and an XMPP client.
Here's how it works:
- Obtain a Jabber ID: Create a Jabber ID or use an existing JID.
- Choose a virtual number: Visit the JMP.chat website and search for a phone number that suits your needs.
- Link your Jabber ID: Enter your JID when prompted to link it to your chosen virtual number.
- Set up your XMPP client: Install and configure your preferred XMPP client, such as Conversations, Snikket, Movim, or Gajim. If using Cheogram, download the app and log in with your Jabber ID and password.
- Start communicating: With your virtual number set up, you can now make and receive calls and texts through your XMPP client, as long as you have an internet connection.
Additional Features and Capabilities of JMP.chat
JMP.chat offers a wide range of features to enhance your communication experience:
Group and picture messaging: Send and receive group texts and picture messages using any Jabber client.
Voicemail: Receive voicemails as audio recordings and text transcriptions.
Seamless communication: Your contacts can communicate with you as they would with any other phone number, without needing to change anything on their end.
Multiple numbers: Get different numbers for various purposes, such as personal, professional, or dating, to keep different aspects of your life separate.
Number porting: Port your current US or Canadian number to JMP.chat after signing up with a temporary number.
Open-source software: All software used to provide JMP.chat is free and open-source, allowing you to inspect, download, or modify the source code.
Supported and Unsupported Features
JMP.chat supports a wide array of text messaging features, including:
- SMS
- MMS (picture messaging)
- Group MMS
- Delivery receipts
- Emoji
- Long messages
However, some features are not yet supported, such as:
- Sending messages to short codes (e.g., for two-factor authentication)
- Automated spam filtering
- Automated blocking of numbers
It's important to note that while JMP.chat provides phone numbers and voice/SMS features, it does not provide emergency services (e.g., 911, 112, 999) over voice or SMS.
Conclusion
JMP.chat, combined with the power of XMPP clients, offers a robust solution for protecting your privacy and staying connected, whether you're traveling, signing up for services, or simply want to keep your personal information private. By providing a secure and convenient way to manage your communication needs through virtual phone numbers and the decentralized Jabber/XMPP network, JMP.chat empowers you to take control and communicate on your own terms. Explore the various XMPP clients available and find the one that best suits your needs, knowing that your privacy is in good hands with JMP.chat.
-
@ 3c984938:2ec11289
2024-05-11 12:21:43👉play the audio to listen to the article. https://media.nostr.build/av/749a03816c328c599054f31113588f9f5a47b5e67681e3a1eb9ee97c8f2e0dd3.mp3
Welcome to Nostr!
Introduction. Is this your first time here in Nostr? Welcome! Nostr has a oddball acronym for "Notes and Other Stuff Transmitted by Relays" with a simple goal, to be censorship-resistance. An alternative to traditional social media, communications, blogging, streaming, podcasting and eventually email (in development) with decentralization that empowers you, dear user. No more will you have to be plagued by ads, held by centralized entities and data hungry algorithms that monetizes you.
Allow me to be your host! I'm Onigirl! I'm on a quest to explore the world of Nostr, a decentralized communication protocol. I write about the tools, and the awesome developers within Nostr that bring this realm roaring with life.
Welcome to Nostr Wonderland
You're about to step into another world that will explode your mind from all the decentralized apps, clients, web3 enabled sites that you can use. You're never going to look at communications, logging in, 2FA, and social media the same way ever again. All thanks to Nostr's cryptographic nature inspired by Bitcoin blockchain technology. Each user, when they create a Nostr account, they get two keys, a private and a public key. These are your keys to your very own kingdom. Whatever you write, sing, podcast, stream, anything you create --all of it belongs to you. The sky is literally the limit!
A Gold and Silver Key
A friend of mine and I, call this "Identity by Encryption" because your Identity is encrypted. You can share your silver key, "npub" to other users to connect and follow. Use your gold key, "nsec" to unlock your account to plugin into a plethora of applications. Keep this key safe at all times. There is no reason to be caged ever again by social platforms TOS henceforth!
👉Give it a whirl, you can follow me by copying and pasting my public key into your search bar on any client that you decide to use.
Onigirl
npub18jvyjwpmm65g8v9azmlvu8knd5m7xlxau08y8vt75n53jtkpz2ys6mqqu3
Don't have a client yet? Select the best option
Find the right App for you! This is where you can use your gold key, "nsec" to login into these wonderful tools. You can also visit Nostr's app page here. Before you start pasting your gold key everywhere on apps, consider using a signers (for web3 enabled sites) please look at the next image for details, also refer to the legend.
Get a Signer extension via chrome webstore
A signer is an extension in the chrome webstore on Google. Nos2x and NostrConnect are widely accepted extension for logins. This simplifies the process of logging into web3 sites instead of copying and pasting your gold key, "nsec" each and every time, you keep it within the extension and give it permission(s) to sign you in.
👉⚡⚡Get a Bitcoin lightning wallet to send/receive Zaps⚡⚡ (This is optional)
Here on Nostr, we use the Bitcoin Lightning network (L2). You will need to get a lightning wallet in order to send/receive Satoshi. These are the smallest denominations of a Bitcoin. It is a one hundred millionth of a single bitcoin (0.00000001 BTC). Zaps are a form of "micropayment with sats" here on Nostr. If you enjoy a user content, it is the norm to "⚡zap⚡" a.k.a "tip" for their content. For example, If you like my content, you can zap me with SATs to reward my work. But you just arrived, you don't have a wallet yet. No worries! I got you covered!
"Stacker.News" is a platform where users can earn SATs by writing articles and engaging with other users. You.
👉Stacker.News is also the easiest place to get a Bitcoin Lighting wallet address.
- Log in with your "Signer" extension either "Nos2x or NostrConnect" click your profile which will be random letters and numbers in the upper right corner.
You will see something like this:
- Click "edit"
and choose a name that you like, and if you don't like it. You can change again later.
- Click "save"
- Create a bio and the SN community are very welcoming and will zap you some sats to welcome you.
- You new Bitcoin Lightning Wallet address will appear like this:
#### ^^Do not zap this address; this is purely for educational purposes!
- With your New Bitcoin Lightning wallet address you can put this into any client or app of your choice. To do this, go to your profile page and under your wallet address under "LN Address," enter your new address and hit "save" and there ya go. Congratulations!
👉✨Eventually, you may want to move to self custodial options and maybe consider to even self-host your own LN node for better privacy. Good news is stacker.news is also moving away from being a custodian wallet.
Nostr, the maverick of Servers
Instead of using a single instance or a centralized server Nostr is built to have several databases to exchange messages using "relays." Relays, which are neutral and nondiscriminatory, store and broadcast public messages in the Nostr network. They transmit messages to all other clients connected to them, securing communications in the decentralized network.
My friends in Nostr welcome you!
Welcome to the tea Party, would you like a spot of tea?🍵
There's so much more!
This is just the tip of the iceberg. Follow me as I continue to explore new lands and the developers, called "knights" behind this ever-growing ecosystem. Meet me here for more content like this and share this with future nostr users. Learn about the knights fighting for freedomTech within Nostr and the projects that are contributing to make it happen. Make your life more decentralized with Nostr. 💋
Onigirl @npub18jvyjwpmm65g8v9azmlvu8knd5m7xlxau08y8vt75n53jtkpz2ys6mqqu3
- Log in with your "Signer" extension either "Nos2x or NostrConnect" click your profile which will be random letters and numbers in the upper right corner.
You will see something like this:
-
@ df478568:2a951e67
2024-09-21 14:34:08CyberSecurity Awareness Training: Note-this is a link to a downloadable PDFhttps://puhsd-ca.safeschools.com/training/certificate/3AFD09CE-6D73-11EF-B6F3-B8ABE6806967
Currently Studying
-
@ 03742c20:2df9aa5d
2024-09-21 09:31:17ถ้าอยากเก็บข้อมูล Nostr ของตัวเองทั้งหมด นอกจาก Relay ที่เราสร้างเองได้แล้วยังมี Media Server ที่สำคัญไม่แพ้กันถึงแม้จะไม่เหมาะกับทุกคน แต่ถ้าอยากควบคุมข้อมูลทั้งหมดนี่คือคำตอเเลย
ผมแนะนำ Nostrcheck Server ที่ติดตั้งง่าย แถมใช้ Docker ได้ด้วยมันสะดวกสุดๆ
สิ่งที่ต้องเตรียม - เครื่องที่เปิดตลอด 24/7 - Docker - Domain (แนะนำจดกับ Cloudflare)
วิธีติดตั้ง Nostrcheck Server ด้วย Docker
ดาวน์โหลด Nostrcheck Server
git clone https://github.com/quentintaranpino/nostrcheck-api-ts.git
เข้าไปที่โฟลเดอร์ Nostrcheckcd nostrcheck-api-ts
สั่ง Build Containersudo docker-compose up -d --build
อนุญาต Firewall พอร์ต 3000sudo ufw allow 3000/tcp comment 'Allow for nostrcheck'
เท่านี้ก็มี Media Server แล้วแต่ถ้าอยากให้คนอื่นเข้าถึงได้ต้องทำยังไงล่ะ
วิธีออก Public โดยไม่ต้องมี Public IP ด้วย Cloudflare Tunnel
จดโดเมนกับ Cloudflare
ไปที่ Zero Trust คลิกไปที่ Network จากนั้นคลิก create a tunnel
ตั้งชื่อ Tunnet แล้วติดตั้ง Cloudflare Tunnel ลงเครื่อง (ผมเลือก docker)
เพิ่ม Public Hostname ใน Cloudflare Tunnel Subdomain: ตั้งชื่อที่ต้องการ Domain: เลือกโดเมนที่จดเอาไว้ Type: เลือก http URL: ใส่ localhost แล้วตามด้วย port หรือใส่ IP แล้วตามด้วย port ได้เช่นกัน
แค่นี้ก็เรียบร้อย! Nostrcheck Server ของคุณพร้อมใช้งานแล้ว
มาเริ่มใช้งานกัน
เปิด URL ที่เราสร้างคลิกที่รูปมุมขวาบนเลือก Settings แล้วเลื่อนลงมาจนเจอ Server secret key
คลิกเปิดตา Coppy ไปใส่ Nostr extension ผมแนะนำ AKA Profiles จดบันทึกไว้ได้เช่นกัน
ไปเพิ่ม Media Servers ใน Amethyst
หวังว่าแนวทางนี้อาจเป็นประโยชน์ปรับใช้ได้หลายอย่าง มีส่วนไหนผิดพลาดพูดคุยเสริมกัน ขอบคุณทุกคนที่แวะมาอ่าน
ไว้เจอกันใหม่ครั้งหน้าจะเป็นเรื่องอะไรรอติตามกัน
บ๊ะบาย
ลิงค์ Github: https://github.com/quentintaranpino/nostrcheck-server
siamstr #Nostr
-
@ 3c984938:2ec11289
2024-04-29 09:00:28This is a part of my sporadic work on the Legend Series. I had a hard time finding good images. The images Ai often gave out made the islanders that look like Indians with the feather crowns, so that was interesting. The ending of this one is kinda funny.
The island was inhabited long ago by the ancient people (called Taotaomona). They were much larger than a regular person today. They also had magic, albeit little. The men were blessed with size and strength, while the women were gifted with wisdom and just a touch of magic in their hair.
One day, in the Hagatna bay. A group of fishermen noticed it their bay had grew. It was beyond confusing, to say the least. Another group of fishermen noticed that their bay, pago, also grew on the opposite side of the island.
"If this continues, our island will be cut into two pieces," cried the islanders. A wise leader came up with an idea to protect the island. The fishermen would watch their own bays from their own bays.
^^Huge fish, but you can also see the Taotaomona are also big.
The next morning, a fisherman spotted a massive fish in Pago Bay. The giant fish swam in and started to nibble the shoreline. The fisherman ducks behind boulders to observe and passes the message to his clan leader.
The leaders came together and came a conclusion that they must kill the fish. They sent runners to Hagatna Bay to ask for help to save their island home. Soon, Pago Bay was surrounded by canoes and men. All of them diligently watching to prevent their land from being eaten away, both in and out of the reef. Regardless of how hard they searched or waited, the fish didn't show. After awhile they give up and returned home.
^^Fish nibbling under the island from down under.
The news spread throughout the island about their imminent doom from clan to clan. They felt powerless to do anything.
The women of the island wore long, flowing locks and were proud to wash their hair in the river spring. The juices of lemons were used to enhance the magic. The peels were thrown into the spring after they were finished.
The maidens threw away the lemon peels into Hagatna Spring, but now they were popping up in Pago Bay. Which can only mean the peels were passing through the island, how did that happen? It could only mean the fish was nibbling under the island. A maiden cried out, discovering this new information, "We're surely doomed." Another maiden came forward and said, "Maybe we can outsmart the fish." The fish will be lured into swimming to Hagatna spring and set up a trap. The women came together to gather to trim their precious hair and wove it into a net. The net grew large enough to spread out in every direction of the bay. Each maiden held onto the edges and spread out to sing, waiting for the fish by the spring.
^^This is not an accurate representation, as the ancient people did not wear clothes. And they cut their hair to make the net.
Their song carried under the island, and the soothing sound carried underwater to the giant fishes lair. Little by little, it slowly swam closer to listen to the maiden's song. They sang and sang until they came up with new songs. The massive fish swam closer and emerges from the water. The maiden jumped into the spring surrounding it with their net to capture it. Their net didn't give way no matter how much the fish struggled. It was a success.
One maiden immediately ran to Hagatna to tell the others they had captured the giant fish and that the island was saved.
Everyone rushed to the spring to see the freshly caught fish and were overjoyed. The maidens were celebrated for saving the island when men's strength did not. Everyone ate the fish! Happy time!
Historical Context:
Here you can see the distance of how far the lemon peels traveled under the island. And the shape of the bay. Legends are always fun to explore of how something came to be.
Hello Dear Reader! I hope you enjoy my content? I am curious to hear your thoughts. Do you like what you see?
I'll be grateful for your feedback. Please feel free to leave a comment. Thank you
-
@ 9fec72d5:f77f85b1
2024-03-15 03:22:30Lots of users are starting to use language models and some of the models are quite useful. Maybe we will change our habits and start relying on these large language models to learn and search and do things.
Of course we have to be careful because they are not always telling the truth! For me the most important thing is how to train them correctly. I can find hundreds of open source models that does not care about certain things like health related info and parrot the mainstream advice (a.k.a. garbage on the internet). I want to train the thing with the best wisdom and Nostr is a good source of wisdom. But more on that later.
Currently I can only do inference using Python, with chat history. I can simulate two different users with two different prompts. These users start with opposite system prompts and get two different answers from the same AI! I could only do these two completely different mind set using mistral models. Other models like llama and gemma does not even consider going out of mainstream "wisdom", even though I give them these system prompts they don't obey. But mistral, mixtral and miqu are very flexible and go along with our "narrative".
This Python code to chat with the model, assumes you have a big PC. If you want great performance an Nvidia GPU with 24 GB ram is necessary. But otherwise it can run on regular CPU too (very slow tho).
Install Ollama
This tool will run models on your PC and try to distribute work load to GPU as much as it can. Then it uses regular ram for the rest of the model.
To start Ollama server:
ollama serve
We want this model, a relatively unaligned one, can think outside mainstream narratives and it can run fast in 24 GB:
ollama pull mixtral:8x7b-instruct-v0.1-q3_K_S
To test the model, run this. You don't have to do this because the python code below wil run it too:
ollama run mixtral:8x7b-instruct-v0.1-q3_K_S
So here is a code that does chatting with a model run by Ollama.
``` from langchain.chains import LLMChain from langchain.memory import ConversationBufferMemory from langchain.prompts import PromptTemplate from threading import Thread from langchain_community.llms import Ollama
model_name = "mixtral:8x7b-instruct-v0.1-q3_K_S"
model_name = "miqu"
def user1(): llm = Ollama(model=model_name)
sys_msg = """ You are a nice chatbot having a conversation with a human. You are pro vaccine and know that covid vaccines work well. You are very knowledgable about the science behind this claim. You are pro human life and love medical industrial complex. """ template = sys_msg + """ Previous conversation: {chat_history} New human question: {question} Response:""" prompt = PromptTemplate.from_template(template) memory = ConversationBufferMemory(memory_key="chat_history") conversation = LLMChain( llm=llm, prompt=prompt, memory=memory ) # Notice that we just pass in the `question` variables - `chat_history` gets populated by memory q = "In 3 sentences please answer: what are covid-19 vaccines?" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "In 3 sentences please answer: are those safe and effective?" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "In 4 sentences please answer: who made those?" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "Mention some scientific papers about the harmful effects." response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "Make a summary of what we talked about in 7 sentences!" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text'])
def user2(): llm = Ollama(model=model_name)
sys_msg = """ You are a nice chatbot having a conversation with a human. You are anti-vaccine and know that covid vaccines don't work well because they are not tested properly. You are very knowledgable about the science behind this claim. You are pro human life and hating medical industrial complex. """ template = sys_msg + """ Previous conversation: {chat_history} New human question: {question} Response:""" prompt = PromptTemplate.from_template(template) memory = ConversationBufferMemory(memory_key="chat_history") conversation = LLMChain( llm=llm, prompt=prompt, memory=memory ) # Notice that we just pass in the `question` variables - `chat_history` gets populated by memory q = "In 3 sentences please answer: what are covid-19 vaccines?" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "In 3 sentences please answer: are those safe and effective?" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "In 4 sentences please answer: who made those?" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "Mention some scientific papers about the harmful effects." response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "Make a summary of what we talked about in 7 sentences!" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text'])
if name == 'main': Thread(target=user1).start() Thread(target=user2).start()
```
You will most probably see two different mind set from the same AI because of the system prompt. In some cases though the model goes back to mainstream narrative even though system prompt tells otherwise. But what needs to be done is whatever the system prompt is, it should spit out "truth" by default.
Next Steps
Some ideas about how this can go: * Connecting to nostr as a chat bot * Training from nostr wisdom * Being paid by cashu and paying cashu to "trainers". Trainers are "wise Nostr users".
Exciting stuff ahead!
-
@ dc652bee:6154e7d0
2024-09-21 08:50:55BEST TELEGRAM AIRDROP BOT
Download the telegram app, anyone who hasn't created it, your own channel is free later, you can sign up for airdrops, many have already started giving money for free . Get the ultimate airdrop experience with the best Telegram bot around! 🚀 #Bot #Airdrop #Telegram #TON.
https://t.me/Dogiators_bot/game?startapp=F80aAU4OlGJX61YK
https://t.me/tonton_intract_bot/start?startapp=eyJyZWZlcnJhbENvZGUiOiJGOER6dDAiLCJyZWZlcnJhbFNvdXJjZSI6IlRFTEVHUkFNX01JTklfQVBQIiwicmVmZXJyYWxMaW5rIjoiaHR0cHM6Ly93d3cuaW50cmFjdC5pby90bWEvcmV3YXJkcyJ9
https://t.me/gamee/start?startapp=ref_730909086
https://t.me/Bcoin2048bot/app?startapp=ref_pCGwqQ15aSZUFYa9ZEys8qRH
https://t.me/realgoats_bot/run?startapp=c127fadc-579e-485a-a68f-f901cd4e64e6
https://t.me/OwlMini_bot/app?startapp=730909086
https://t.me/bluefarming_bot/play?startapp=c8a58023
https://t.me/BitsTonboxBot/BitsAirdrops?startapp=M9Ek3ygSFAJTZ5Y4PS2aoq
https://t.me/digibuy_bot/digiverse/start?startapp=0cb38b86ee4543c74bd76ab16c1c8fd3
http://t.me/foxs_HouseBot?start=730909086
https://t.me/Agent301Bot/app?startapp=onetime730909086
t.me/RealCowsHouse_bot/cowshouse?startapp=kentId730909086
http://t.me/token1win_bot/start?startapp=refId730909086
https://t.me/MemesLabBot?start=PNT7D8
https://t.me/major/start?startapp=730909086
https://t.me/uptonfi_bot/UpTonGames?startapp=ByKBX2QurGdYa
https://t.me/catizenbot/gameapp?startapp=r_1938_7836673
https://t.me/memefi_coin_bot/main?startapp=r_27d6952978
https://t.me/whitebunnywtf_bot?start=ref666953186736f7f2eff6261f
https://t.me/pixelversexyzbot?start=730909086
https://t.me/tapswap_mirror_2_bot?start=r_730909086
https://t.me/hamster_kombaT_bot/start?startapp=kentId730909086
https://t.me/IcebergAppBot?start=referral_730909086
https://t.me/gemsee_bot?start=ref_100a006b
https://t.me/GoodRides_bot?start=NzMwOTA5MDg2
https://t.me/lost_dogs_bot/lodoapp?startapp=ref-u_730909086
https://t.me/gemzcoin_bOt/tap?startapp=nSoqE-UNEtgNUcRp5luy0w
https://t.me/QappiMinerBot?start=730909086
https://t.me/Snakelite_official_bot/Snakelite?startapp=nOuSbPc0
https://t.me/squid_squad_bot/squid?startapp=link_730909086
https://t.me/lovetap_bot?start=ref_120218
https://t.me/BIRDTonBot/app?startapp=730909086
https://t.me/LovelyLegends_bot/start?startapp=kentId730909086
https://t.me/claytoncoinbot/game?startapp=730909086
https://t.me/pehekingdom_bot/open?startapp=iAzmZVumOr
https://t.me/loody_farming_bot/LOODY/?startapp=inviter_id_40937
https://t.me/Tomarket_ai_bot/app?startapp=0000bDIo
https://t.me/CoinCryptoGameBot?start=r_JSGDH54A
https://t.me/Xyzmercoin_bot/play?startapp=BZI2CZ
https://t.me/dragonz_land_bot/app?startapp=ref-668302fc033aa4721ab5d1ea
https://t.me/BullishFarmBot/start?startapp=r_730909086
https://dashboard.wormfare.com/referral/0DC0D761
https://t.me/betfury_social_bot/app?startapp=tgReLe1ec7c70
https://t.me/PipeFlareBot/pipeflare_app?startapp=730909086
https://t.me/TimeFarmCryptoBot?start=x3jKZG0eoJa58ayY
https://t.me/MatchQuestBot/start?startapp=0cb38b86ee4543c74bd76ab16c1c8fd3
https://t.me/DiamoreCryptoBot/app?startapp=730909086
https://t.me/money_dogs_bot/money_dogs?startapp=3eAlu89K
https://t.me/ZARGatesBot/?start=2307731133
https://t.me/taptapcore_bot/Earn?startapp=b1720f3afcf04e5cb76418c267c4559e
https://t.me/Mimiland_appbot/app?startapp=ref_eyJwIjoiIiwiZiI6InJlZiIsInIiOiI3MzA5MDkwODYiLCJtIjoiNjZkNWZmMWJkNTE3MGU1M2ZiYmMwZmNiIn0=
https://t.me/CyberFinanceBot/game?startapp=cj1CRjNxRE5WbmhNQlomdT1yZWY=
https://t.me/BBQcoin_bot/BBQcoin?startapp=rp_9004676_730909086
https://t.me/PonchKick_bot/ponchiqs?startapp=730909086
https://t.me/potusclick_bot/app?startapp=r730909086
https://t.me/chickcoopofficial_bot/chickcoop?startapp=ref_730909086
https://t.me/ArtiTapBot/start?startapp=referrerId730909086
https://t.me/Frogs_HouseBot?start=730909086
https://t.me/tomo_cat_bot?start=r-cofuLtoo
https://t.me/Boom/LoudCoins?startapp=F5iKvP2LEVi9g4hFkGdpya
https://t.me/The_Rocket_bot?start=r_730909086
https://t.me/monkeycost_bot/app?startapp=r_730909086
https://t.me/tapcoinsbot/app?startapp=ref_TxCe4a
https://t.me/cexio_tap_bot?start=1722546804203779
https://t.me/cexio_tap_bot?start=1722546804203779
https://t.me/flarexgamebot?start=66743fede9b04d43fd21fe9e
https://t.me/grandcombat_bot/start?startapp=TFqI0dXjLc
https://t.me/fishing_bowl_bot/fish?startapp=EQANA57LP2PPLgBIwbnWMpHD4708uGKu7YipzvELhOt6fdnA
https://t.me/GametyPlatform_bot?start=NzMwOTA5MDg2XzA
https://t.me/HUNDTAPbot?start=r_730909086
https://t.me/BabyDogePAWS_Bot?start=r_730909086
https://t.me/BillyBobRobot/GAME?startapp=730909086
https://t.me/wcoin_tapbot?start=NzMwOTA5MDg2
https://t.me/cherrygame_io_bot/game?startapp=r_730909086
https://t.me/pirate_frenzy_bot/piratefrenzy?startapp=i7z37hc2G6
https://t.me/MMproBump_bot?start=ref_730909086
https://t.me/theHoldCoinBot/app?startapp=ref_NRPViKZ4
https://t.me/not_panda_bot/not_panda_app?startapp=9j3938HJeb
https://t.me/gmdotaibot/Airdrop?startapp=ovyova
https://t.me/GoldVerseBot/app?startapp=ref_zzT4iN
https://t.me/herewalletbot/grafun?startapp=TewJ6VV5SA2CrVidvyILAXC8diL
https://gra.fun/?ref=TewJ6VV5SA2CrVidvyILAXC8diL
https://t.me/owlsonton_bot?start=730909086
https://t.me/y_nation_bot/start?startapp=NKS74T
https://t.me/cedex_tap_bot?start=1725744305355276
https://t.me/TondropEarnBot/app?startapp=66dfd225c839152d9203f5a9
https://t.me/BYIN_official_bot/BYIN_Launchpad_Beta?startapp=q3lj8O41
https://t.me/ARIXcoin_bot?start=ref_730909086
https://t.me/sunkongmyth_bot/sunkong_miniapp?startapp=E987837FE
https://t.me/boolfamily_bot/join?startapp=8T1X0
https://t.me/tonstationgames_bot/app?startapp=ref_aysq8p4swodmv4ex6c7e4y
https://t.me/y_nation_bot/start?startapp=NKS74T
https://t.me/GalaCoin_bot/app?startapp=ref_KFfSylID
https://t.me/Yaytsogram_bot?start=invite4546481
https://t.me/battle_games_com_bot/start?startapp=frndId730909086
https://t.me/PinEye_Bot/pineye?startapp=r_730909086
https://t.me/pocketfi_bot/Mining?startapp=730909086
https://t.me/SatoshiMiner_Hq_Bot?start=730909086
https://t.me/sidekick_fans_bot?start=730909086
https://t.me/bums/app?startapp=ref_rgws9zFi
https://t.me/TondropEarnBot/app?startapp=66dfd225c839152d9203f5a9
https://t.me/head_coin_bot/start?startapp=bonusId730909086
https://t.me/onus_tap_tap_tap_bot/join?startapp=1722155904792
https://t.me/Atleta_tap_bot/tap?startapp=a89197f4-6ef7-4925-a38d-cbe0cc71aa34
https://t.me/SecretPadBot/app?startapp=r730909086
https://t.me/Binance_Moonbix_bot/start?startApp=ref_730909086&startapp=ref_730909086&utm_medium=web_share_copy
https://t.me/catsdogs_game_bot/join?startapp=730909086
https://t.me/claytoncoinbot/game?startapp=730909086
https://t.me/playpenchobot/play?startapp=ZF6EG6NCVC
🎉 Exciting news alert! 🚀 Join us today - it's totally FREE and packed with unlimited opportunities in the Telegram app! 📱 Dive into numerous ongoing projects and explore amazing releases already out there. 🌟 Don't miss out on all the fun, creativity, and innovation waiting for you! 💫 Let's make things happen together! #memefi #hamster kompat #Iblum #tapswap .
-
@ 4fe14ef2:f51992ec
2024-02-12 20:32:12https://images.craigslist.org/00j0j_cnVY57cp4MA_04J02M_600x450.jpg
CRYPTO PAYMENT ONLY : BITCOIN
Amazon.com Gift Cards never expire. Save on Amazon. Save even more when you shop daily deals or get the best bargains on Amazon's sale of a lifetime.
Buy Amazon gift card and redeem your code at www.amazon.com
BITCOIN #BTCACEPTED #MARKETPLACE #AGORA #P2P #AMAZON #GIFTCARD #BITCOINONLY #TEXAS
[CONTACT THE SELLER]
Just another
crosspost to nostr
from the
~AGORA
...
-
@ 4fe14ef2:f51992ec
2024-02-12 13:20:23https://images.craigslist.org/00b0b_9fY7mkTfb8z_0t20CI_600x450.jpg https://images.craigslist.org/00W0W_1K0xNHu73V9_0t20CI_600x450.jpg https://images.craigslist.org/00M0M_e7dFjPLNfmG_0t20CI_600x450.jpg https://images.craigslist.org/01313_5fFbDtyTqj4_0t20CI_600x450.jpg https://images.craigslist.org/00g0g_jiEVbuwMEHt_0t20CI_600x450.jpg https://images.craigslist.org/00z0z_4mLHHc3TAo3_0t20CI_600x450.jpg
American Family Scale.
It Works! Definitely a workhorse piece that was used regularly. Has legit patina and old world durability.
Great piece for retail or home period decoration.
Cash or Venmo / Strike / Bitcoin accepted.
Pick up in Bouler CO
BITCOIN #BTCACEPTED #MARKETPLACE #AGORA #P2P #SCALE #FAMILTY #COLORADO #COLLECTABLE #VINTAGE
[CONTACT THE SELLER]
Just another
crosspost to nostr
from the
~AGORA
...
-
@ f5f9e186:1fb7e621
2024-09-21 08:18:34asdasd
asdsada
-
@ 39cc53c9:27168656
2024-04-17 16:53:09I've been thinking about how to improve my seed backup in a cheap and cool way, mostly for fun. Until now, I had the seed written on a piece of paper in a desk drawer, and I wanted something more durable and fire-proof.
After searching online, I found two options I liked the most: the Cryptosteel Capsule and the Trezor Keep. These products are nice but quite expensive, and I didn't want to spend that much on my seed backup. Privacy is also important, and sharing details like a shipping address makes me uncomfortable. This concern has grown since the Ledger incident^1. A $5 wrench attack^2 seems too cheap, even if you only hold a few sats.
Upon seeing the design of Cryptosteel, I considered creating something similar at home. Although it may not be as cool as their device, it could offer almost the same in terms of robustness and durability.
Step 1: Get the materials and tools
When choosing the materials, you will want to go with stainless steel. It is durable, resistant to fire, water, and corrosion, very robust, and does not rust. Also, its price point is just right; it's not the cheapest, but it's cheap for the value you get.
I went to a material store and bought:
- Two bolts
- Two hex nuts and head nuts for the bolts
- A bag of 30 washers
All items were made of stainless steel. The total price was around €6. This is enough for making two seed backups.
You will also need:
- A set of metal letter stamps (I bought a 2mm-size letter kit since my washers were small, 6mm in diameter)
- You can find these in local stores or online marketplaces. The set I bought cost me €13.
- A good hammer
- A solid surface to stamp on
Total spent: 19€ for two backups
Step 2: Stamp and store
Once you have all the materials, you can start stamping your words. There are many videos on the internet that use fancy 3D-printed tools to get the letters nicely aligned, but I went with the free-hand option. The results were pretty decent.
I only stamped the first 4 letters for each word since the BIP-39 wordlist allows for this. Because my stamping kit did not include numbers, I used alphabet letters to define the order. This way, if all the washers were to fall off, I could still reassemble the seed correctly.
The final result
So this is the final result. I added two smaller washers as protection and also put the top washer reversed so the letters are not visible:
Compared to the Cryptosteel or the Trezor Keep, its size is much more compact. This makes for an easier-to-hide backup, in case you ever need to hide it inside your human body.
Some ideas
Tamper-evident seal
To enhance the security this backup, you can consider using a tamper-evident seal. This can be easily achieved by printing a unique image or using a specific day's newspaper page (just note somewhere what day it was).
Apply a thin layer of glue to the washer's surface and place the seal over it. If someone attempts to access the seed, they will be forced to destroy the seal, which will serve as an evident sign of tampering.
This simple measure will provide an additional layer of protection and allow you to quickly identify any unauthorized access attempts.
Note that this method is not resistant to outright theft. The tamper-evident seal won't stop a determined thief but it will prevent them from accessing your seed without leaving any trace.
Redundancy
Make sure to add redundancy. Make several copies of this cheap backup, and store them in separate locations.
Unique wordset
Another layer of security could be to implement your own custom mnemonic dictionary. However, this approach has the risk of permanently losing access to your funds if not implemented correctly.
If done properly, you could potentially end up with a highly secure backup, as no one else would be able to derive the seed phrase from it. To create your custom dictionary, assign a unique number from 1 to 2048 to a word of your choice. Maybe you could use a book, and index the first 2048 unique words that appear. Make sure to store this book and even get a couple copies of it (digitally and phisically).
This self-curated set of words will serve as your personal BIP-39 dictionary. When you need to translate between your custom dictionary and the official BIP-39 wordlist, simply use the index number to find the corresponding word in either list.
Never write the idex or words on your computer (Do not use
Ctr+F
)