-
@ c80b5248:6b30d720
2023-07-05 02:40:47I have been sleeping on highlighter. Started testing with nsecBunker and I am seeing how much signal comes through on the global feed here. Still need to understand how to use it better, but this could be a hugely powerful format for information consumption.
Expect this post to be updated... little did I know I was writing my first long-form note! 😅
-
@ 1967650e:73170f7f
2023-04-19 15:22:48Predicting the price of cryptocurrencies like Bitcoin is an ongoing challenge due to the volatility and unpredictability of the market. In this article, we explore a Python-based price prediction pipeline that combines machine learning techniques and deep learning algorithms to forecast Bitcoin's closing price. The code for this pipeline can be found on GitHub at https://github.com/amar-muratovic/bitcoin-price-prediction-pipeline.
Key Components
-
Data Acquisition and Preprocessing: The pipeline uses the CCXT library to fetch historical price data for Bitcoin (BTC/USD) from the CryptoCompare API. The data is then preprocessed, resampled, and saved into a CSV file for further analysis.
-
Feature Engineering: The pipeline uses three input features - High, Low, and Open prices - and the target variable, which is the Close price.
-
Model Ensemble: The pipeline trains an ensemble of four models: Linear Regression, Bayesian Ridge, Support Vector Regression, and Random Forest Regressor. The predictions from these models are averaged to produce the final forecast.
-
Deep Learning: The pipeline also incorporates a neural network with two hidden layers and early stopping to prevent overfitting. The neural network is trained on a subset of the data.
-
Hyperparameter Tuning: Grid search and cross-validation are used to fine-tune the models and optimize their hyperparameters.
-
Model Evaluation: The pipeline evaluates the models using mean squared error (MSE) and R^2 score, which measure the accuracy of the predictions.
Implementation Details
The pipeline starts by importing necessary libraries and modules, followed by loading the Bitcoin price data from a CSV file. The data is preprocessed, resampled, and saved into a new CSV file. The input features and target variables are defined, and the data is split into training and testing sets.
An ensemble of machine learning models is trained on the data, and predictions are made using these models. The ensemble approach aims to combine the strengths of different models to produce more accurate predictions. The predictions from each model are averaged to produce the final forecast.
A neural network with two hidden layers is created and trained on a subset of the data. Early stopping is used to prevent overfitting by monitoring the validation loss and stopping the training when it stops improving.
Hyperparameter tuning is performed using grid search and cross-validation to optimize the models' performance. This process helps identify the best combination of hyperparameters for each model.
Finally, the models are evaluated using mean squared error (MSE) and R^2 score. These metrics help measure the accuracy of the predictions and the performance of the models.
Conclusion
The Bitcoin price prediction pipeline presented in this article combines various machine learning techniques and deep learning algorithms to forecast the closing price of Bitcoin. This ensemble approach aims to improve prediction accuracy by leveraging the strengths of different models. While predicting the price of cryptocurrencies remains a challenging task, this pipeline provides a solid foundation for further experimentation and improvements. To explore the code further, visit the GitHub repository at https://github.com/amar-muratovic/bitcoin-price-prediction-pipeline.
-
-
@ 32ee46c5:dde81be9
2024-09-27 03:39:34As I travel around the United States, one of the things that always jumps out to me is just how beautiful this country is. The seashores and the rivers, the mountains and canyons, the farmlands and forests, the deserts and plains are spectacular, for sure, but so are the cities. A week or so ago, as I... This is a preview of my post. Join my community and get access to this and more of my work.
https://highlighter.com/npub1xthyd3ttv467g65ff6rpvz6qdvm9zpmf3j35svrc8wuumh0gr05sgx8evy
-
@ a012dc82:6458a70d
2024-09-27 00:48:50Table Of Content
-
Educational Initiatives Promoting Blockchain and Cryptocurrency Awareness
-
Supportive Government Policies and Regulatory Frameworks
-
Growing Cryptocurrency Mining Industry
-
Increased Adoption by Businesses and Consumers
-
Establishment of Cryptocurrency Exchanges and Digital Asset Marketplaces
-
Collaboration with Neighboring Countries
-
Conclusion
-
FAQ
In recent years, Thailand has emerged as a hub for blockchain technology and cryptocurrency adoption. The country has shown an eagerness to embrace the Bitcoin revolution, with significant developments in areas such as education, mining, and regulatory frameworks. This article explores the key factors that have contributed to Thailand's growing prominence in the global Bitcoin landscape
Educational Initiatives Promoting Blockchain and Cryptocurrency Awareness
Thailand has recognized the importance of education in fostering a strong foundation for the growth of blockchain technology and cryptocurrency adoption. As a result, numerous universities and educational institutions now offer courses and degree programs in the field. This has created a talented pool of blockchain experts and enthusiasts who are driving the growth of the industry in the country.
Supportive Government Policies and Regulatory Frameworks
The Thai government has adopted a proactive approach towards the regulation and growth of the cryptocurrency market. In recent years, the country has established clear legal frameworks and guidelines for digital asset businesses, which has encouraged both local and international players to invest in Thailand's burgeoning cryptocurrency sector.
Growing Cryptocurrency Mining Industry
Thailand has become an attractive destination for cryptocurrency mining, thanks to its affordable electricity rates and well-developed infrastructure. The country has seen an influx of mining companies, which have set up large-scale mining operations to capitalize on the favorable conditions. This has not only created jobs but also contributed to the growth of the local economy.
Increased Adoption by Businesses and Consumers
In Thailand, both businesses and consumers are embracing the Bitcoin revolution. A growing number of merchants accept Bitcoin and other cryptocurrencies as a form of payment, while consumers are increasingly adopting digital wallets for everyday transactions. This widespread adoption has facilitated the growth of a vibrant cryptocurrency ecosystem in the country.
Establishment of Cryptocurrency Exchanges and Digital Asset Marketplaces
Thailand's supportive regulatory environment has paved the way for the establishment of numerous cryptocurrency exchanges and digital asset marketplaces. These platforms have facilitated easy access to cryptocurrencies for Thai citizens, further boosting the adoption and use of digital assets in the country.
Collaboration with Neighboring Countries
Thailand has actively engaged with neighboring countries in the Southeast Asian region to develop cross-border initiatives and partnerships in the blockchain and cryptocurrency space. These collaborative efforts have helped to create a strong regional network that supports the growth of the industry in Thailand and beyond.
Conclusion
Thailand's rapid embrace of the Bitcoin revolution is a testament to the country's forward-thinking approach towards technology and innovation. By fostering education, supportive regulation, and collaboration, Thailand has positioned itself as a leading player in the global blockchain and cryptocurrency landscape. This has not only benefited the Thai economy but also contributed to the worldwide adoption of cryptocurrencies and blockchain technology.
FAQ
How has Thailand embraced the Bitcoin revolution in education? Thailand has incorporated blockchain and cryptocurrency courses into university curriculums, creating a talented pool of experts and enthusiasts who contribute to the growth of the industry.
What role does the Thai government play in supporting the Bitcoin revolution? The government has established clear legal frameworks and guidelines for digital asset businesses, encouraging both local and international players to invest in the cryptocurrency sector.
Why is Thailand becoming a popular destination for cryptocurrency mining? The country offers affordable electricity rates and well-developed infrastructure, attracting mining companies to set up large-scale operations and contributing to the local economy.
How have Thai businesses and consumers adopted cryptocurrencies? A growing number of merchants accept cryptocurrencies as payment, and consumers increasingly use digital wallets for everyday transactions, fostering a vibrant cryptocurrency ecosystem in the country.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 912212cc:672aac36
2024-09-26 20:35:38O Tsathoggua negro se moldou de uma gárgula semelhante a um sapo para uma linha sinuosa com centenas de pés rudimentares. Como um deus, Tsathoggua pode alterar sua forma para se adaptar melhor a qualquer ambiente em que você esteja. O que você acha dos vídeos sobre os mitos de Cthulhu?
https://video.nostr.build/394067118f64907e9034190f715da078c7c73c07c65b526fe91f683115fff5c5.mp4
-
@ c278022e:b37d01a2
2024-09-27 02:22:34The Communications Legislation Amendment (Combatting Misinformation and Disinformation) Bill 2024 is poised to pass through Parliament, with bipartisan support from Labor, the Coalition, and the Greens. This bill, which ostensibly aims to tackle the spread of harmful misinformation and disinformation online, contains provisions that should alarm every Australian who values free speech, transparency, and accountability.
Despite its noble-sounding intentions, the bill is riddled with dangerous loopholes and broad powers that could silence legitimate discourse, protect powerful interests, and exempt the government itself from accountability. Here’s why this bill is not just flawed—it’s a serious threat to Australian democracy.1. A Disturbing Exemption for the Government
1. A Disturbing Exemption for the Government
One of the most glaring issues with this bill is that it appears to exempt government agencies from its provisions. Under Schedule 1, Clause 13 of the bill, the definition of “misinformation” includes content that is “reasonably verifiable as false, misleading or deceptive” and “reasonably likely to cause or contribute to serious harm.” However, the bill exempts certain kinds of content dissemination from these regulations, notably in the case of content that has been attributed to sources considered authoritative or factual.
In theory, this allows the government and its agencies to spread information that might otherwise be categorized as misinformation or disinformation if disseminated by private citizens, journalists, or platforms. There is no provision in the bill that holds the government to account for false or misleading information it may provide to the public, either knowingly or unintentionally. This is a significant oversight that could shield the government from the very law it seeks to impose on others.
2. Financial Institutions Protected from Scrutiny
Schedule 1, Clause 14 of the bill defines "serious harm" as including "harm to the Australian economy, including harm to public confidence in the banking system or financial markets." This means that any content perceived to undermine public confidence in financial institutions could be classified as misinformation or disinformation under the law.
This provision raises serious concerns about whether legitimate criticism of banks, financial institutions, or even government financial policies could be stifled under the guise of protecting the economy. For example, public discussions questioning the practices of large banks or criticizing the government’s fiscal management could potentially be targeted if deemed to harm public confidence. The bill does not provide sufficient safeguards to distinguish legitimate critique from harmful disinformation, and this ambiguity risks curtailing important conversations about financial accountability.
3. Inadequate Definitions and Broad Powers
The bill's definitions of misinformation and disinformation are worryingly vague. According to Schedule 1, Clause 13, misinformation is defined as content that is “reasonably verifiable as false, misleading, or deceptive,” and disinformation is defined as the same but with the intent to deceive. However, the bill gives the Australian Communications and Media Authority (ACMA) the authority to interpret these definitions and issue penalties accordingly.
This is a problem because the ACMA is granted broad discretion to decide what constitutes misinformation or disinformation based on subjective criteria. Schedule 1, Clause 33 provides ACMA with the power to demand documents and information from digital platforms related to misinformation, and Clause 19 empowers ACMA to make "digital platform rules" regarding risk management for misinformation and disinformation. These rules include measures to manage platform content, but the criteria for enforcement remain vague and open to interpretation.
The lack of clarity could lead to inconsistent enforcement or, worse, politically motivated actions against certain forms of speech, particularly those critical of the government or powerful institutions.
4. Chilling Effect on Public Debate
Given the bill’s broad scope and vague definitions, there is a real risk of a chilling effect on public debate. Digital platforms, fearing hefty fines or penalties, may over-censor content to avoid running afoul of the law. This could disproportionately affect individuals, journalists, or even academic researchers attempting to critique government policies or investigate matters of public interest.
Schedule 1, Clause 22 mandates that digital platforms create and update media literacy plans to help users identify misinformation. While media literacy is important, the implementation of these plans could easily devolve into overzealous censorship on platforms that err on the side of removing any content that could be construed as problematic.
The result? Australians may find it increasingly difficult to engage in robust discussions about important topics—whether it’s government policies, economic concerns, or societal issues—out of fear that their content may be removed or classified as harmful under the law.
5. One Week of Public Consultation: A Democratic Farce
It’s also crucial to note that this bill was presented with a mere week of public consultation—an embarrassingly short window for Australians to voice their concerns about legislation that could drastically affect how they communicate online. A bill of this magnitude deserves extended public debate, thorough scrutiny by experts, and significant input from civil society organizations. Instead, the government has chosen to push it through quickly, likely to avoid facing the full weight of public criticism.
This hasty process undermines democratic principles. Australians were given just one week to review a bill that affects their freedom of speech and the future of public discourse in the country. This rushed timeline suggests that the government is more interested in expanding its control over online information than in ensuring the bill receives the democratic scrutiny it deserves.
6. Unbalanced Focus on Digital Platforms
The bill places an outsized focus on digital platforms, requiring them to bear the brunt of enforcement when it comes to curbing misinformation. Schedule 1, Clause 17 demands that platforms must make risk assessments and media literacy plans public, while also complying with record-keeping requirements about how they handle misinformation complaints.
While holding platforms accountable for the content they host is important, the bill fails to address the root causes of misinformation—such as education, political polarization, and media literacy—beyond the superficial measures imposed on platforms. Worse, by focusing on digital platforms, the bill may end up disproportionately targeting online speech, leading to censorship that stifles public debate on important issues. Conclusion: A Path Toward Authoritarianism
The Communications Legislation Amendment (Combatting Misinformation and Disinformation) Bill 2024 is far more than a piece of legislation meant to address online falsehoods. It is a deeply flawed bill that threatens to curtail free speech, exempt the government from accountability, and protect powerful financial interests at the expense of public debate.
Its vague definitions, broad powers, and the government’s own exemption from accountability pave the way for the kind of information control that we see in authoritarian regimes. By pushing it through Parliament with minimal public consultation and bipartisan support, Australia risks losing one of the most fundamental pillars of democracy: the ability to openly and freely discuss, criticize, and hold power accountable.
This bill must be challenged, amended, or rejected entirely. Otherwise, Australians may find themselves living in a society where the government controls the narrative, free speech is stifled, and truth becomes whatever those in power say it is.
-
@ e83b66a8:b0526c2b
2024-09-26 19:29:43If you’re thinking of buying a Bitaxe, here is some information about pools vs solo mining.
Firstly, although the terms are clear “pool mining”, “solo mining” there is nuance in these definitions, so I want to explain these terms fully.
Solo mining pools exist, such as: https://solo.ckpool.org/
It is called a pool, because you are using their credentials to mine, but you keep all the rewards if you win a block. Despite the name, this is not a pool.
You then have a pool such as https://ocean.xyz/ who are a pool, you use their credentials to mine, and you earn a share of their income relative to your contribution in hash power.
There has been some publicity about a solo miner winning a pool recently, there were about 12 blocks won in 2023 by solo miners. However a winning solo miner is likely to be a server farm with hundreds or even thousands of S19’s or S21’s sharing the same payout wallet address. The image of a home miner with a Bitaxe winning a block is extremely unlikely.
A solo miner is defined as a group of miners that share a payout wallet address, so for example you could have 10 Bitaxe’s at home all configured with the same BTC wallet address, this is considered a single solo miner. And so it is with mid tier mining farms, often privately owned, who have a number of machines set to the same payout address. Most of the time, they share earnings for a more reliable income, but the owner may decide to gamble on winning a block and so choose to solo (lottery) mine.
So far, my Bitaxe, which has been running for 4 days now and is part of the Ocean pool. It is earning about 50 Sats a day. If I were to wait for an on-chain payout, it would take around 60 years to receive one. I can, however, setup a BOLT12 lightning payout address and earn this tiny income through Lightning.
So here’s my recommendation.
Currently, there are two pools that control more than 50% of mining, Foundry USA and AntPool. This is a dangerous position and in fact Bitmain, who provide around 90% of all mining hardware actually invest and have stakes in these and several other pools. This is centralising mining and could potentially allow a 51% attack, which could compromise Bitcoin.
Jack Dorsey is currently developing competing mining hardware chipset, through his company Block and Ocean are attempting to decentralise the pools by building a truly independent option for miners to join.
If you buy a Bitaxe, the best way you can help alleviate the dominance of Bitmain is to join a true pool like Ocean to slowly move control away from the dominant pools.
Bear in mind that many of the other smaller pools are still controlled by Bitmain.
If you're still interested in lottery mining, here are your chances of winning a block:
Represented as Hash rates of different miners:
Nerdminer: 20 KH/s = 20,000 H/s
Bitaxe: 750 GH/s = 750,000,000,000 H/s
Bitmain Antminer S9: 13.5 TH/s = 13,500,000,000,000 H/s
Bitmain Antminer S19: 110TH/s = 110,000,000,000,000 H/s
Bitmain Antminer S21: 200TH/s = 200,000,000,000,000 H/s
Current Global Hash rate 628EH/s (Sept 2024) = 628,000,000,000,000,000,000
If you're running a Bitaxe, your percentage chance of winning a block is: 0.000000119426751592357%
Over a year, your chances increase to: 0.00627707006369428%
Your chances of winning the UK national lottery (assuming 20M tickets sold and you buy one):
0.000005%
Over a year, your chances increase to: 0.00026%
Like in all things in Bitcoin, I don’t ask you to trust me. If you want to verify, here are the references I used in making my conclusions:
https://protos.com/chart-when-solo-miners-found-a-bitcoin-block/
https://investors.block.xyz/investor-news/news-details/2024/Blocks-New-Bitcoin-Mining-Chip-to-Be-Part-of-an-Ongoing-Project-With-Core-Scientific-to-Decentralize-Mining-Hardware/default.aspx
https://www.youtube.com/watch?v=Wo91DWvZRs8
https://i.nostr.build/9rQ9Plv6XQYtt6xd.jpg
-
@ 01d0bbf9:91130d4c
2024-09-26 17:58:10Chef's notes
Amazingly tangy, firey hot, but still mellow and bright.
I use this on everything– Use it to dress salads, dip (honey mustard) for fried chicken, elevate your taco nights, heck a spoonful first thing in the morning will wake you up better than coffee!
Don't forget to use up those delicious chilis and garlic, they are so good!
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 1-2 weeks
- 🍽️ Servings: (12x) 8oz jars
Ingredients
- 16oz fresh chili peppers
- 8oz red onion
- 8oz garlic
- 96oz honey
- Fresh thyme
Directions
- Thinly slice peppers, garlic, shallots and fresh thyme
- Add chopped ingredients to the honey
- Leave to ferment (loosely covered) for 1-2 weeks
- Drizzle that amazing pungent firey gold liquid over EVERYTHING. (Don't forget to use up those amazing chilis and garlic too.)
-
@ 6861e8f6:845f8a6e
2024-09-26 17:50:19*Hey, pssst, I’m pOpGuy , wana some pOp for free ? *
PROOF•OF•PROXY or pOp is just a simple bitcoin Runes asset , like thousands of others, not ment to revolutionize the world financial system but propose some silly decentralized game !
So what's the game here ?
pOp concept is dead simple in fact : the only special feature is that the only way to get some pOp for free ( ze AIRDROP 👀 ) is to meet physically the pOpGuy 😋✊🏻
If you bump to me and say « pop » ! If you get a runes compatible wallet ( Xverse, unisat, magiceden..) If you’re nice
I send you 2100 PROOF•OF•PROXY , totally free !!
At a certain point in time , the PROOF•OF•PROXY asset will appear on the trading platforms like Magic Eden where you will be able to buy and trade some . This is part of the plan 😎✊🏻 It's even the final goal !
20 millions PROOF•OF•PROXY are going to be airdropped by the pOpGuy for the next weeks, months and maybe years ! The last million is reserved for the pOpGuy for the all investment in Mint, airdrop TX , and travelling all over the world to give pOps to crazy happy degens !
Important !: NOSTR will be used as the main and exclusive collunication channel 👀✊🏻 The pOpGuy key is : npub1dps73akwpelhj88kfv06hg3m7lsz3snkx4jqk04j00dtepzl3fhqsq5ljc
One first benefits of using nostr is that pOpGuy will use the nostr client Wherostr with geolocalisation integrated in notes 👀👀😱🔥 If you are interessted in getting an airdrop slot, the only way will be to follow the pOpGuy and find out the indices he gives and be ready to move to meet him when hés around your area !
Indices will be about the city I love for a period of time and then some notes with enough details to find out the precise place 👀👀 If it’s near, stop what you do, run out and find me for the unique artistic Runes asset ✊🏻
See you soon, IRL !
( more datails in following notes )
-
@ d6affa19:9110b177
2024-09-26 15:44:34it's a sunny afternoon at a shopping center. i open the car door for Her. we head into the bookstore. the aroma is rich, thick. i buy us coffee.
we then browse around. but beneath my calm surface, a quiet longing stirs—a deep yearning for Her.
Her touch. Her love.
i still feel the echoes of Her words—a sweet torment that rests in my mind. i've felt it all day. it's nearly maddening.
and yet i maintain my composure as i follow along to the next store.
She turns. i spot a brief smirk.
my breath catches. She knows... i can't hide from Her.
a simple brush of Her hand. it sends jolts. a reminder of the pleasure She wields.
"Are you okay?" Her voice sweet, yet probing.
"Yes, my Queen." i answer in an even tone, managing the storm underneath.
"Good," She nods.
"Let's go, sweet boy." Her command lingers gracefully in the air.
"Help me try on some shoes."
the thought of helping Her... it sends a thrill through me.
i nod, taking another sip of coffee.
it burns, still hot. my hands feel clammy against the cup, heart racing.
the anticipation is electric...
-
@ e97aaffa:2ebd765d
2024-09-26 14:57:00Claro que não, o Bitcoin não é uma solução mas sim uma reação à inação dos governos.
O sistema FIAT está numa situação tão crítica, não existe uma solução boa para o problema da dívida soberana, terá que se optar pela menos má. Como resolver o problema das dívidas futuras, dos fundos de pensões? As dívidas do passado tem que ser pagas, mas como? As dívidas não são apenas números no excel, são pessoas que estão por detrás desses números, não podem ser apagadas, simplesmente.
Uma solução seria uma mudança drástica nas políticas, com uma forte redução de custos do estado e muita austeridade, gerando uma queda do padrão de vida dos cidadãos. Só que isto seria extremamente impopular, nenhum político tem coragem de o fazer, quem tentar vai acabar por perder na próxima eleição.
Assim, a única maneira que resta para os políticos, é fazê-lo pela calada, através da desvalorização da moeda. A inflação permite destruir as dívidas do passado e consequentemente a poupança e a qualidade de vida dos cidadãos. É isto que temos visto nos últimos anos e vai agravar-se no futuro. Só que os atuais níveis de expansão monetária, não foram suficientes para resolver o problema, apenas permite ao governo estar à tona da água, procrastinar o problema.
Um bom exemplo é na UE, onde existe uma regra que permite um défice até 3% do PIB por ano, que muitas vezes nem é cumprida, isto é uma situação insustentável. A regra deveria ser o oposto, obrigar um superávit mínimo de 2% ao ano, só assim será possivel reduzir a dívida.
A expansão monetária e política monetária está a ser utilizada como uma arma contra os cidadãos, é um imposto totalmente cego, muito penalizador para os mais pobres e os governos têm abusado desse poder. A moeda é o sangue de uma economia, os políticos ao diluí-la estão a envenenar a economia. O Bitcoin é a única moeda que não pode ser diluída.
Os políticos reconhecem que existe um problema mas todas as soluções são extremamente impopulares, e como eles são os principais beneficiados do sistema FIAT, dificilmente haverá uma mudança.
Bi-monetário
Como nenhum político terá coragem de mudar, essa mudança tem de partir dos cidadãos, voluntariamente, ou seja, com a adoção do Bitcoin.
Todos os bitcoiners gostariam de assistir a uma mudança rápida do padrão FIAT para o padrão Bitcoin, mas não é possível. É necessário ter noção como o mundo real é, uma mudança rápida entre os padrões seria desastrosa para toda a humanidade, esse processo terá que ser gradual, para não existir uma ruptura entre gerações e entre estratos sociais.
Com a criação do Bitcoin, o paradigma mudou, passou a existir um sistema bi-monetário, com a moeda FIAT e o Bitcoin em circulação simultânea. O FIAT como unidade de conta e o Bitcoin como reserva de valor e as duas como meio de troca.
Hoje, a alocação em Bitcoin ainda é muito baixa. Em média a nível mundial está 99.2% em FIAT e 0.8% em Bitcoin. Mas chegará o dia, atingirá os 50-50%, em alguns países possivelmente será ainda maior.
Será uma adoção completamente voluntária, não será pelos governos, mas sim, pelos cidadãos, de baixo para cima. No início, a adoção será lenta, mas quanto maior for a alocação em Bitcoin, mais acelerada será a adoção.
A dupla circulação de moeda, vai obrigar os governos a fazer uma melhor gestão, vai limitar indiretamente a impressão de dinheiro. Se os governos abusarem desse poder, as pessoas vão se proteger ainda mais no Bitcoin, diminuindo a alocação em FIAT, por sua vez a moeda fica mais fraca e o governo também. Vai obrigar um maior rigor na política monetária.
O Bitcoin será uma proteção contra o abuso dos governos, vai obrigar uma mudança, um maior rigor na sua gestão, possibilitando a redução da dívida a longo prazo.
-
@ c73818cc:ccd5c890
2024-09-26 14:19:28🐫 La vicepresidente USA riceve una valutazione "B" dal gruppo Stand With Crypto, ma l'intero settore delle criptovalute esprime scetticismo e indignazione.
🐪 Un passato di ostilità verso le criptovalute
🐫 In questi quattro anni di amministrazione Biden, Kamala Harris ha sostenuto politiche anti-cripto portate avanti dall'amministrazione, sotto la guida del presidente della SEC Gary Gensler. Questo nuovo atteggiamento pro-cripto della vicepresidente sembra essere poco più di una mossa elettorale, mirata a guadagnare voti, mentre Coinbase e Stand With Crypto tentano di ripulire l'immagine dei Democratici.
🐪 Coinbase e il WEF: il vero obiettivo dietro la valutazione
🐫 Coinbase, partner del World Economic Forum, è parte di un sistema che da oltre 14 anni cerca di contrastare Bitcoin. Il vero nemico di queste istituzioni è proprio Bitcoin, che rappresenta una minaccia concreta ai progetti di controllo sociale basati su CBDC e identità digitale. Con la valutazione favorevole data a Harris, l'obiettivo è distrarre l'opinione pubblica, favorendo candidati che non rappresentano una reale minaccia al sistema.
🐪 Tentativo di sottrarre voti a Trump?
🐫 La valutazione “B” di Harris sembra un disperato tentativo di sottrarre voti a Donald Trump, il quale ha ricevuto una valutazione “A” dallo stesso gruppo. Tuttavia, l'industria cripto rimane scettica: le azioni parlano più delle parole, e finora l’amministrazione Harris-Biden ha solo ostacolato il settore. La vera battaglia si giocherà nelle urne, dove chi saprà dimostrare un reale impegno verso la decentralizzazione potrebbe fare la differenza.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #KamalaHarris #Harris #Biden #SEC #GaryGensler #Vicepresidente #Coinbase #WEF #Trump #CBDC #Cripto #Bitcoin
-
@ a012dc82:6458a70d
2024-09-26 12:16:02Table Of Content
-
A Brief Overview of Bitcoin Mining
-
The Rails Programming Tool: A Game Changer for Bitcoin Miners
-
Customization and Scalability
-
Enhancing Security and Compliance
-
Conclusion
-
FAQ
The world of cryptocurrency is ever-evolving, and as the demand for Bitcoin mining solutions grows, so does the need for innovative and efficient tools. Lincoln Technologies, a leading name in the field of blockchain technology, has introduced a groundbreaking Rails Programming Tool that aims to revolutionize the Bitcoin mining landscape. This article will explore the features and benefits of this powerful new tool and how it can help you unlock the full potential of Bitcoin mining.
A Brief Overview of Bitcoin Mining
Before delving into the details of the Rails Programming Tool, it is essential to understand the concept of Bitcoin mining. Mining is the process of validating and adding new transactions to the blockchain, which ensures the security and integrity of the cryptocurrency network. In return for their efforts, miners are rewarded with newly minted bitcoins and transaction fees. As the mining process becomes increasingly competitive, miners require sophisticated tools to stay ahead of the game.
The Rails Programming Tool: A Game Changer for Bitcoin Miners
Lincoln Technologies' Rails Programming Tool is a cutting-edge solution designed specifically for Bitcoin mining. This powerful software offers a range of features to streamline the mining process, reduce energy consumption, and optimize mining efficiency. Some of the key features include:
User-friendly interface: The Rails Programming Tool boasts a clean and intuitive interface that is easy to navigate even for beginners, reducing the learning curve for new miners.
Advanced mining algorithms: The tool is equipped with the latest mining algorithms to maximize the mining output and increase the chances of earning rewards.
Energy-efficient operations: Energy consumption is a significant concern for Bitcoin miners. The Rails Programming Tool optimizes mining efficiency and reduces energy consumption, lowering the overall costs and environmental impact of mining.
Customization and Scalability
One of the standout features of the Rails Programming Tool is its adaptability. The tool can be customized to suit the specific needs of individual miners, allowing them to create a tailored solution that works best for their mining setup. Additionally, the Rails Programming Tool is designed to grow with the ever-changing world of cryptocurrency, ensuring that users can continue to benefit from its features as the mining landscape evolves.
Enhancing Security and Compliance
Security is of the utmost importance in the world of cryptocurrency, and Lincoln Technologies has taken steps to ensure that the Rails Programming Tool meets the highest security standards. The software employs advanced encryption protocols to protect sensitive data and maintain compliance with industry regulations. By using the Rails Programming Tool, miners can have peace of mind knowing that their operations are secure and compliant.
Conclusion
The Rails Programming Tool from Lincoln Technologies is poised to revolutionize the way Bitcoin miners operate. By harnessing the power of this innovative software, miners can unlock new levels of efficiency, profitability, and sustainability in their mining efforts. As cryptocurrency continues to gain mainstream acceptance, the Rails Programming Tool is a valuable asset for those looking to capitalize on the growing demand for Bitcoin mining solutions.
FAQ
What is the Rails Programming Tool by Lincoln Technologies? The Rails Programming Tool is an innovative software solution designed to streamline and optimize the Bitcoin mining process, reduce energy consumption, and enhance security and compliance.
How does the Rails Programming Tool improve mining efficiency? The Rails Programming Tool uses advanced mining algorithms to maximize mining output, optimizes energy consumption, and offers customization and scalability features that help miners tailor the tool to their specific needs.
Is the Rails Programming Tool suitable for beginners? Yes, the Rails Programming Tool features a user-friendly interface, making it easy to navigate and learn for both beginners and experienced miners alike.
Can the Rails Programming Tool adapt to the changing cryptocurrency landscape? Yes, the Rails Programming Tool is designed for scalability, allowing it to grow and adapt to the ever-evolving world of cryptocurrency and Bitcoin mining.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ a58a2663:87bb2918
2024-09-26 11:14:34Quem sabe – quem sabe! – você se interesse em saber como andam as minhas pesquisas sobre o “projeto humanista” em “A alegoria do mundo: o mago, o filólogo e o colonizador”, módulo atual de Convivium – Seminário Permanente de Humanidades.
Na semana passada fiz uma transmissão de áudio no grupo do Telegram dos participantes. Entre outros temas abordados, pude falar da interpretação que Edgar Wind faz do quadro “Primavera”, de Botticelli, como uma explicitação do tipo de alegoria platonizante que dominaria a mente de humanistas da Renascença.
https://image.nostr.build/6e1ee79986d3d4c929609fdf037a3e1e6ee399559fb7e2b5d8c02ad0b9b188ad.jpg
A alegoria é o modo mental, defende E. H. Gombrich, pelo qual uma tese é proposta antes que as causas e analogias que a embasam sejam estabelecidas, de modo que o processo associativo irá apenas justificar a posteriori o que se quis desde logo comunicar. Imagine George Orwell postado às suas costas enquanto você lê 1984. A todo momento, ele irá cutucar o seu ombro e dizer: “Está vendo? Aqui está o que eu quis dizer com a fala desse personagem nesse trecho”. O texto é apenas pretexto para uma mensagem, e é a mensagem que se ergue com claro perfil discursivo diante do leitor. A ficção começa a ceder espaço para o palanque.
Defendo que a alegoria é a mãe das mitologias abstratas, do romance de tese e da experiência de avatar que caracteriza o mundo digital. E seus princípios de analogia arbitrária, que datam do fim da Idade Média, ganham exemplificação máxima nas obras Da magia e Dos vínculos, de Giordano Bruno, que discutirei numa aula ao vivo hoje (26), às 20h30. Na atuação de Bruno se nota como a magia foi cada vez mais percebida de maneira imaterial, abstrata, psicologizante (e dessa sua concepção nos vêm os primeiros prenúncios do inconsciente), ao mesmo tempo que sua primeira ocupação com o mundo material foi aos poucos transferida para as ciências que tendiam a ignorar o elemento humano que manipula esse mesmo mundo material.
Se por um lado, portanto, começa a triunfar uma cosmovisão que supõe um ser humano quase sobrenatural em seus poderes psíquicos (segundo a nova ideia de magia como manipulação da memória), por outro lado começa a se difundir uma cosmovisão que supõe um mundo subtraído de todo elemento humano, uma espécie de cosmos impessoal, aquele que hoje se encontra nos livros de física. Penso que essa como que esquizofrenia reflete a dinâmica de exaltação e depressão do erudito que comentei durante a leitura do Fausto de Goethe realizada no primeiro módulo de Convivium: o herói do poema ora se sente um deus ora se sente um verme, tal como hoje é muito comum nos sentirmos.
Na aula de hoje irei lidar com aquele primeiro aspecto da analogia como arma de um ego entronado, ao passo que na primeira semana de outubro irei disponibilizar aos alunos o texto “Máquina e segredo”, acompanhado de vídeo com comentários complementares. Nesse escrito tratarei, por exemplo, de como os inventos de Giambattista della Porta (1535-1615), especialmente na área da criptografia, assinalam não só um novo estágio na história da tecnologia, como também um novo estágio da disposição dos estudiosos para com o conhecimento, uma disposição típica do que venho chamando de “nova aposta de Pascal”, conceito que terei a oportunidade de rever.
“Máquina e segredo” será o primeiro excerto que colocarei em discussão do ensaio O destino do humanismo, que talvez acabe recebendo o título de A alegoria do mundo, como o atual e terceiro módulo de Convivium; a ver.
Para comemorar este momento importante das pesquisas que venho fazendo a respeito do “projeto humanista” (iniciadas em 2020, privadamente, e continuadas algo publicamente a partir de 2022), resolvi dar 25% de desconto na inscrição de Convivium para quem optar por pagar em bitcoin. Algumas pessoas já chegaram a Convivium por meio do Nostr, e é minha intenção trazer ainda mais gente. Em vez de pagar R$ 449, pague agora R$ 336,75 para ter acesso a:
- O destino do humanismo: uma leitura do Fausto de Goethe, com 12 aulas, materiais complementares e aulas bônus (mais de 20 horas de vídeo);
- Os livros da vida: Abelardo, Dante, Cardano, Santa Teresa, com mais 12 aulas, textos e materiais auxiliares (mais de 20 horas de vídeo idem);
- A alegoria do mundo: o mago, o filólogo e o colonizador, módulo em andamento e com aulas mensais até abril de 2025. Até o momento tivemos 4 aulas ao vivo, 3 vídeos pré-gravados e 3 transmissões de áudio, além de comentários esparsos pelo grupo do Telegram.
Caso queira se inscrever pagando em bitcoin, mande-me uma mensagem privada ou e-mail para camoensiii57@protonmail.com
-
@ f6488c62:c929299d
2024-09-26 08:18:16เหรียญมีม MOODENG ที่ได้รับแรงบันดาลใจจากน้องหมูเด้ง ฮิปโปแคระสุดฮิต กำลังสร้างปรากฏการณ์ที่น่าตื่นตะลึงในวงการคริปโตเคอร์เรนซี หลังจากเปิดตัวการซื้อขายบนแพลตฟอร์ม HTX ไปเมื่อต้นสัปดาห์ที่ผ่านมา ราคาของ MOODENG พุ่งสูงขึ้นอย่างรวดเร็ว กว่า 79,000% จากราคาเปิดตัว ทำให้ผู้ลงทุนจำนวนมากตื่นตัวและให้ความสนใจกับเหรียญนี้เป็นอย่างมาก
วิเคราะห์กราฟราคา MOODENG
จากกราฟราคาข้างต้น จะเห็นได้ว่าราคาของ MOODENG มีแนวโน้มขาขึ้นอย่างต่อเนื่อง โดยทำจุดสูงสุดที่ 0.12 ดอลลาร์สหรัฐฯ ต่อ 1 MOODENG ซึ่งเป็นการเติบโตที่น่าประทับใจอย่างยิ่ง ปัจจัยสำคัญที่ส่งผลต่อการเติบโตของราคาในครั้งนี้ ได้แก่
กระแสความนิยมของน้องหมูเด้ง: ความน่ารักและความโด่งดังของน้องหมูเด้ง ทำให้ผู้คนจำนวนมากให้ความสนใจและต้องการเป็นส่วนหนึ่งของปรากฏการณ์นี้ การเปิดตัวบน HTX: การที่ HTX นำเหรียญ MOODENG เข้ามาจดทะเบียน ทำให้การซื้อขายเหรียญมีความสะดวกสบายมากยิ่งขึ้น และดึงดูดนักลงทุนรายใหม่ๆ เข้ามา ปริมาณการซื้อขายสูง: ปริมาณการซื้อขายของ MOODENG มีปริมาณสูง ซึ่งบ่งบอกถึงความต้องการของตลาดที่มีต่อเหรียญนี้ ความเสี่ยงที่ต้องพิจารณา
แม้ว่าราคาของ MOODENG จะเติบโตอย่างรวดเร็ว แต่ผู้ที่สนใจลงทุนในเหรียญนี้ควรตระหนักถึงความเสี่ยงดังต่อไปนี้
ความผันผวนสูง: เหรียญมีมมักจะมีความผันผวนของราคาสูงมาก ราคาอาจปรับตัวลดลงอย่างรวดเร็วได้เช่นกัน ฟองสบู่: การเติบโตของราคาที่รวดเร็วอาจเป็นเพียงฟองสบู่ที่แตกได้ง่าย ข้อมูลที่ไม่เพียงพอ: ข้อมูลเกี่ยวกับเหรียญ MOODENG ยังมีอยู่น้อย ทำให้การประเมินมูลค่าที่แท้จริงของเหรียญเป็นเรื่องยาก สรุป
เหรียญ MOODENG เป็นอีกหนึ่งตัวอย่างของเหรียญมีมที่ประสบความสำเร็จจากกระแสสังคม แม้ว่าจะมีโอกาสที่จะได้รับผลตอบแทนสูง แต่ผู้ลงทุนควรศึกษาข้อมูลให้ละเอียดและเข้าใจถึงความเสี่ยงก่อนตัดสินใจลงทุน
คำแนะนำสำหรับผู้ที่สนใจลงทุน
ศึกษาข้อมูลให้ละเอียด: ศึกษาข้อมูลเกี่ยวกับเหรียญ MOODENG และตลาดเหรียญมีมโดยทั่วไปให้เข้าใจอย่างถ่องแท้ ลงทุนในจำนวนที่รับความเสี่ยงได้: อย่าลงทุนเกินกว่าที่คุณสามารถสูญเสียได้ กระจายความเสี่ยง: อย่าลงทุนในเหรียญ MOODENG เพียงเหรียญเดียว ควรกระจายการลงทุนไปยังสินทรัพย์อื่นๆ ด้วย
MOODENG #เหรียญมีม #หมูเด้ง #คริปโตเคอร์เรนซี #Solana #HTX
หมายเหตุ: บทความนี้มีจุดประสงค์เพื่อให้ข้อมูลเบื้องต้นเกี่ยวกับเหรียญ MOODENG ไม่ใช่คำแนะนำในการลงทุน ผู้ที่สนใจลงทุนควรปรึกษาผู้เชี่ยวชาญด้านการเงินก่อนตัดสินใจลงทุน
-
@ 52adc2ef:9f4bc0ba
2024-09-26 07:22:13สวัสดีครับ
เมื่ออาทิตย์ก่อนเราได้เปิด podcast ฟังสัมภาษณ์บังโต Silly fool
"ด้วยรักและแองกัส บังโต ขุนโคเข้าตลาดหุ้น | The Secret Sauce EP.772"
ด้วยตอนเป็นวัยรุ่นก็เป็นแฟนเพลงแกอยู่เเล้ว แต่ในเเง่บทบาททำธุรกิจของบังโต เพิ่งจะมาเข้าใจ สไตล์หรือความคิดของแกว่า เจ๋ง ไม่เเพ้ เพลงแกเลย แกค่อนข้าง artist แต่ยังคงอยู่ในความจริงเรื่องตัวเลขทางธุรกิจได้ด้วย
ซึ่งพอสรุปตามที่เราชอบเเละเข้าใจตามนี้
คุณภาพ คุณภาพ คุณภาพ
จุดเริ่มต้นจากกินกระเพราเนื้อที่ออสเตรเลีย เเล้วเนื้อที่ทำกระเพราอร่อยมาก พอกลับมาที่ไทยไม่มีเนื้อที่ไว้ทำกระเพราเหมือนกับที่ออสเตรเลียเลย จึงได้ศึกษา ชนิดวัว cut ต่างๆ การเลี้ยงวัว เเละควบคุมคุณภาพฟาร์มที่เลี้ยง
จนได้ "เนื้อแท้" ที่เราได้กินในปัจจุบัน
"เจตนาไม่ใช่เงิน เจตนาที่ทำเพื่อให้เป็นธุรกิจ สมบูรณ์เเบบ ถูกต้อง ยุติธรรมที่สุด เเละเงินเป็นผลพลอยได้ เงิน 90 % ช่วยสังคม ไม่ต้องมีคำถามว่า เงินนี้มาจากไหน เเละไม่อยากต้องไปขอเงินใคร"
-เรื่องการเงิน ง่ายสบายสไตล์ วัว วัว แกบอกเรื่องเงินไม่ยาก คือทำถูกต้องเเล้วดี เเล้วมันจะได้ เชื่ออย่างนั้นเสมอ เเค่จังหวะมันยังไม่ถึง ยกตัวอย่างเพลง เพลงแกบอกว่าจะไม่ดังในชุดเเรง เเต่เชื่อว่าจะดังในชุดต่อๆมา ซึ่งศรัทธาในเเนวทางมากกก
หรือตอนเริ่มสาขาเเรก คนที่มาซื้ออาจจะเพราะเเกเป็นคนดัง เเต่การที่ลูกค้ากับมาซื้อซ้ำ เเสดงว่า เนื้อเเกได้ส่งมอบคุณค่าที่ดีไปเเล้ว
-ห้ามกู้เงิน ต้องลงทุนร่วมกันเท่านั้น ห้ามกู้เงิน concept คือให้มีความเสี่ยงร่วมกัน ไม่ใช่กู้เเล้วเจ๊ง เรานอนข้างถนน เเต่ธนาคารกินเรียบหมด (ตามศาสนาอิสลามที่แกเล่ามา)
-เวลาจะเป็นคำตอบ ติ๊กถูกเรื่อง คุณภาพสินค้า คุณภาพคน คุณภาพจรรยาบรรณ มาทุกข้อเเล้วมันจะไม่ถูกได้ยังไง เเค่รอติ๊กข้อสุดท้ายเมื่อไหร่ (เรื่องของกำไร)
ซึ่งระหว่างทางก็ต้องมีแผลเป็นเรื่องธรรมดา เหมือนออกกำลังกายอยากให้กล้ามสวย มันต้อง Pain เราต้องต้องทำซ้ำๆ ไม่มีทางลัด
สุดท้ายมันจะ Healthy แและ Sustainable
วินัย วินัย วินัย
-ภูมิคุ้มกรอง เป็นการฝึกตัดสิ่งล่อลวงต่างๆ เช่น มีดอกเบี้ยเเค่ 0.01% เอามั้ย จากขายเนือเเละจะมี ขายเหล้า เบียร์ มั้ย ซึ่งถ้ายอมอาจจะไม่เห็นผลร้ายตอนนี้ เเต่ระยะยาวอาจจะมีผลร้ายค่อยๆตามมา ถ้าผ่านได้ก็จะเป็นกล้ามที่สวยมาก
ซึ่งเป็นการกรองคนที่เข้ามากอบโกยด้วย ต้องเป็นคนที่เห็นด้วยกับเเนวทางนี้เท่านั้น ถึงเข้ามาหาธุรกิจนี้ได้ ทำให้ได้ของดี ทำงานง่าย เพราะกรองมาเเล้ว กระทั่งลูกค้าก็ดี (อันนี้เห็นด้วยนะครับ เเนวทางที่ชัดเจนน่าจะกรองคนคล้ายๆกันมา)
แผลหรือการบาดเจ็บเป็นส่วนนึงของกระบวนการอยู่เเล้ว เวลาไม่ใช่ส่วนนึงของกระบวนการ ควบคุมไม่ได้ เราไม่รู้เวลานั้นมาเมื่อไหร่ คือเมื่อถึงเวลามันจะมาเอง ทำต่อไป
-มีวิกฤตหรือปัญหาต้องทำยังไง เเค่ Checklist ทั้งหมดว่าที่ทำมาถูกต้องหมดมั้ย ถ้าถูกหมด ผลเป็นยังไงไม่ใช่ความผิดเราเลย แค่เป็นเรื่องที่ต้องผ่านเเละเดินต่อไป ถ้าล้มเหลว ไม่ต้องเสียใจเเละจะไม่มีคนที่มาว่ากล่าวเราได้
-การเงินก็ฟุ้งได้ เปรียบเทียบ เหมือนตอนแกเขียนเพลง รู้ว่าเพลงเเบบนี้น่าจะเข้าถึงคนส่วนมากได้มากกว่า ไม่ใช่ ติสส์แตก มันมีเส้นบางๆกั้นไว้ ถ้าเอาตัวเลขมากๆก็ทำได้ เเต่ไม่ยั่งยืน ให้เลือกจะดังเเพลงเดียว หรือดังตลอดกาล
สุดท้ายธุรกิจในความคิดเเกคือ ถ้ามีคนบอกว่า เเกเป็นคนดี เป็นหัวหน้าที่ดี เป็นพ่อที่ดี มันก็จบเเค่นี้ เท่านั้น ตัวเลขไม่ใช่ประเด็น
สรุป ซึ่งหลังจากฟังทั้งหมดเเล้ว ทำให้เรารู้สึกว่าอย่าลืม คุณค่าที่เราส่งมอบให้สังคม เเละจงมีวินัย เเละทำให้เชื่อว่าธุรกิจที่ดีคือธุรกิจที่ยั่งยืน
-
@ 502ab02a:a2860397
2024-09-26 00:11:24เมื่อกรดซิตริก (citric acid) ที่จริงแล้วไม่ได้ทำมาจากผลไม้
เราเรียนรู้กันมาเราค้นกูเกิลกันมา ว่ากรดซิตริกนั้นเป็นกรดธรรมชาติ มีอยู่ในผลไม้รสเปรี้ยวต่างๆ แล้วมันก็ถูกนำมาใช้เป็นสารป้องกันการบูดเน่าจากธรรมชาติ โดยกรดซีตริกเกิดขึ้นครั้งแรกนั้นคือเมื่อปีค.ศ. 1784 โดยแยกออกมาจากน้ำมะนาว แต่ในปัจจุบัน กรดซิตริกไม่ใช่สูตรนี้ครับ
ที่ผมมีข้อมูลอยู่นั้น สามารถให้คำตอบได้ว่า
นั่นเพราะว่าราวๆปี 1917 บริษัท Pfizer ได้จ้างนักเคมีอาหารชื่อ เจมส์ เคอรี่ James Currie ที่มีแนวคิดฉีกทุกกรอบว่า จะทำการผลิตกรดซิตริก โดยไม่ใช้มะนาวแม้แต่ลูกเดียว คุณเคอรี่ ค้นพบว่าเชื้อราสีดำที่ชื่อว่า Aspergillus niger สามารถเปลี่ยนน้ำตาล ให้เป็นกรดซิตริกได้ ทำให้ Pfizer ออกจำหน่ายสินค้าตัวนี้ในปี 1919 เป็นต้นมา
ในปัจจุบัน กว่า 99% ของกรดซิตริกที่มีขายนั้นเราเรียกว่า manufactured citric acid (MCA) นั่นคือ มันไม่ใช่ของธรรมชาตินั่นเองครับ คุ้นๆไหม ที่ผมเคยบอกเรื่องสารให้ความหวาน ไม่ว่าจะ อิริททริทอล แอลลูโลส สารพัดโอสๆ และอื่นๆอีกมากมาย เราจะได้รับการขายของว่า มีอยู่ในธรรมชาติ บลา บลา บลา โดยที่จริงแล้วที่เราได้มาเป็นกระสอบนั้นไม่ได้มาจากธรรมชาติ แต่มาจากการเร่งให้เกิดปริมาณมากๆเพื่อเอามาขาย ซึ่งไม่เป็นธรรมชาติโดยสิ้นเชิง
MCA นี่ก็เช่นกันครับ เชื้อรา Aspergillus niger ซึ่งส่วนใหญ่ผลิตจากเชื้อราสายพันธุ์ที่ผ่านการดัดแปลงพันธุกรรม (GMO) เอาไปหมักน้ำตาล โดยทั่วไปจะเลี้ยงมันด้วย high fructose corn syrup ที่มีอยู่มากมายและราคาถูกๆ
ก็แน่นอนครับว่าเวลาเราเห็นคำว่ากรดซิตริก เราก็จะนึกถึงรสเปรี้ยวๆ รูปมะนาวสวยๆ cute cute แต่จริงๆแล้วในโรงงานผลิตมันตรงกันข้ามเลยครับ ในการผลิตเราจะได้เห็น ของเหลวหนืดๆเหนียวๆ มีตะกอนสีเข้มๆ ที่เกิดจากการหมักในถังสเตนเลส ข้างในนั้นเป็นส่วนผสมของ เชื้อรา น้ำตาลอุตสาหกรรมโคตรๆ( hyper-refined sugars) บางครั้งก็มีการยิงรังสีแม่เหล็กไฟฟ้าเพื่อให้ความร้อนด้วย
ได้รับการรับรองว่าเป็นออแกนิก ???
และเชื่อหรือไม่ว่า มันได้รับการรับรองว่าเป็นออแกนิก แม้กรดซิตริกจะไม่ได้มาจากแหล่งธรรมชาติแท้จริงเพราะผลิตผ่านกระบวนการหมักที่ใช้เชื้อราดำ GMO (Aspergillus niger GMO) ซึ่งมักใช้ข้าวโพดที่ผ่านการดัดแปลงพันธุกรรม (GMO) เป็นวัตถุดิบในการผลิต ด้วยเหตุผล 2 ข้อคือ
- มาตรฐานการรับรองที่แตกต่างกัน: องค์กรรับรองออร์แกนิกทั่วโลกมีหลายพันองค์กร แต่ละองค์กรมีเกณฑ์ที่แตกต่างกันในเรื่องคุณภาพและความเข้มงวดในการตรวจสอบแหล่งที่มาของวัตถุดิบ โดยบางแห่งอาจใช้แบบสอบถาม ถามผู้ผลิตว่าใช้กรดซิตริกที่มีส่วนผสมของ GMO หรือไม่
- การจัดประเภทว่าเป็น Non-GMO: ผู้ผลิตกรดซิตริกจากเชื้อราดำมักจะระบุว่ากรดซิตริกที่ผลิตได้นั้นเป็น Non-GMO เนื่องจากผลผลิตสุดท้ายไม่มีสารพันธุกรรมจาก GMO ที่สามารถตรวจพบได้ ถึงแม้ว่ากระบวนการผลิตจะเริ่มจากวัตถุดิบที่มาจากข้าวโพด GMO หรือเชื้อราที่ถูกดัดแปลงพันธุกรรมโดยการใช้รังสีความร้อน (thermo-radiation) หรือการดัดแปลง DNA ของเชื้อรานั้นก็ตาม
ถึงกระบวนการผลิตกรดซิตริกนี้จะไม่เป็นธรรมชาติและใช้วัตถุดิบที่เกี่ยวข้องกับ GMO แต่มันสามารถได้รับการรับรองออร์แกนิกได้ เนื่องจากไม่มีการตรวจพบสารพันธุกรรมจาก GMO ในผลิตภัณฑ์สุดท้ายที่จะจำหน่าย ทำให้กรดซิตริกนี้สามารถเข้าสู่ตลาดอาหารออร์แกนิกได้โดยไม่ผิดกฎ และหน่วยงานที่ให้การรับรองใบเซอร์ ออแกนิก เจ้าไหนที่ต้องการให้ใช้ MCA ได้นี่ก็เพียงระบุคำว่า "ไม่สามารถตรวจจับ DNA ที่มีแหล่งกำเนิดจาก GMO ได้" ไว้ในเอกสารก็จะทำให้แบรนด์สินค้าได้รับการรับรอง ออแกนิกได้สบายๆ
ได้รับสถานะ GRAS??
เนื่องจากกรดซิตริกมีการผลิตขึ้นมาใช้ก่อนที่สำนักงานคณะกรรมการอาหารและยา (FDA) จะจัดตั้งขึ้น กรดซิตริกจึงได้รับสถานะ GRAS (หมวด “โดยทั่วไปถือว่าปลอดภัย”) แม้ว่าจะยังไม่มีการทดสอบทางวิทยาศาสตร์ใดๆ เกี่ยวกับการบริโภคในมนุษย์ในระยะยาวก็ตาม เจ๋งเนอะ
ผลข้างเคียงจากรา Aspergillus niger
ในปี ค.ศ. 2016 มีการผลิต MCA จำนวน 2.3 ล้านตัน โดยส่วนใหญ่ผลิตในประเทศจีน และประมาณ 70% ใช้เป็นสารเติมแต่งอาหารหรือเครื่องดื่ม ยังไม่มีการศึกษาวิจัยทางวิทยาศาสตร์ใดๆ ที่ดำเนินการเพื่อประเมินความปลอดภัยของ MCA เมื่อรับประทานเข้าไปในปริมาณมากและเป็นเวลานาน (อีกแล้ว เหมือนเดิมเป๊ะ)
เชื้อรา Aspergillus nigerเกี่ยวข้องกับปัญหาการอักเสบของระบบต่างๆ รวมถึงระบบทางเดินหายใจ ระบบทางเดินอาหาร ระบบประสาท และกล้ามเนื้อและโครงกระดูก ดังนั้นหาก เชื้อรา Aspergillus niger เกิดมีเศษเล็กเศษน้อย ดันแทรกซึมเข้าไปในผลิตภัณฑ์กรดซิตริกสำเร็จรูป ผู้บริโภคผลิตภัณฑ์ที่มีกรดซิตริกนี้อาจกินสารพิษที่ก่อให้เกิดการอักเสบนี้เข้าไป แม้จะผ่านกระบวนการฆ่าเชื้อด้วยความร้อนสูงแล้วก็ตาม
นี่เป็นอีกเหตุผลที่แยม Passion of Orange ที่ผมทำนั้นไม่ใส่ citric acid ครับ
แหม่ยังมีอีกหลายเรื่องนะที่จะเล่าให้ฟังเกี่ยวกับอุตสาหกรรมอาหาร อย่างที่บอกนะครับ อะไรที่มั่นใจในวันนี้ อย่าเพิ่งมั่นใจ อาจจะจริงเราเห็นอยู่ เผื่อใจไว้ที่ยังไม่เห็น
PirateKeto #กูต้องรู้มั๊ย #ฉลาก3รู้ #siamstr
-
@ c99e3a74:57eb85c1
2024-09-26 18:34:45Livro I
Capítulo I
\ Aristóteles abre sua obra constatando o fato de que toda arte ou investigação, são realizadas em vistas a algum bem. Sendo, portanto, o bem aquilo a que todas as ações tendem. Porém, se bem é aquilo ao qual todas as coisas tendem, surge o seguinte dilema: como pode, então, algumas atividades serem o fim de si mesmas, e outras atividades terem por fim a realização de uma outra coisa? Por exemplo, a realização da construção naval é a produção de um navio, porém a realização da dança se dá no próprio ato de dançar. Assim, há uma diferença entre a natureza dos fins: alguns fins são atividades, enquanto outros são produtos de determinada atividade. Observação: No caso dos fins que são a produção de algo a partir de uma atividade, naturalmente o fim produzido(por exemplo, a saúde para a medicina) é mais perfeito do que a atividade. \ A partir desta constatação, pode-se pensar que, por haver muitas atividades, há também muitos fins. Cita-se o exemplo de que a finalidade da arte médica é a saúde, da construção naval é um navio, da economia é a riqueza e etc. Porém, observa-se que algumas artes subordinam-se a outras, tendo outras por finalidade. Por exemplo, a arte de produzir um bisturi é uma arte sujeita à arte da medicina, que por sua vez tem por finalidade a saúde. Neste sentido, deriva-se que a finalidade da arte mais fundamental, é superior aos da arte subordinadas a ela(no exemplo, a saúde é uma finalidade superior à produção de um bisturi).
Capítulo II
-
@ a03b38f8:2c7ce1f0
2024-09-25 23:36:29FINANCIAL PRIVACY: Card Transactions, Cash, Monero, Sending Bitcoin Privately
Privacy is foundational for protecting freedom. Abuses to human rights and efforts to control people often depend on governments knowing details of a person’s life, this is why financial privacy is so important. Financial activity reveals details about a person’s relationships, profession, religion, political beliefs, geo location, and lots more.
Much has been said about data privacy concerns around social media, but financial data is also detrimental when abused or in the hands of the wrong persons.
A Person can speak about their humble life in a small town but their Financial data from the banks would reveal that they are actually a Billionaire.
Financial data reveals many areas of a person’s life, so it’s more likely to reveal who someone truly is, even if an individual does not want those details revealed to others.
From where you travel to, what you donate to, financial activity can paint a detailed picture of a person’s life, ensuring financial privacy means being able to have control over who gets to see that picture and purposes. You may not have something to hide but remember privacy is really about having control over your life.
Governments around the World Use Financial data to control people and activities within its jurisdiction. This is where financial privacy can act as a limit on governmental power. Where a lack of privacy is likely to lead to an abuse of that power.
Government policy on financial privacy is complex and often demands access to personal data for law enforcement and National Security purposes. Although often we see governments use that same financial data to hunt and halt activities that do not align with the policies of its agenda.
We believe any access at all should be reasonable and in accordance with privacy and human rights.
Almost all financial institution privacy standards prohibit the disclosure of client information to third parties without consent or an accepted criminal complaint, it is a conditional agreement because it has some limitations; this limitation or restriction in most cases is not clearly explained to clients but it is an ambiguous statement that further explains the limits of the financial institution, meaning the Central Bank which controls a country’s entire financial activities of all Financial institutions in a country does have the power to access all financial data as it demands, thereby limiting privacy.
CARD TRANSACIONS
Data Security and privacy are crucial in payment transactions in the digital era, protecting personal and financial information not only stops unlawful access but also increases customer trust and confidence.
Card transactions comes with a lot of risk and dangers such as Identity theft, cyber criminals use stolen data from digital payment platforms to impersonate individuals and access their financial accounts, make unauthorized purchases, or setup new accounts in order to illegally transfer funds or perform fraudulent financial transactions without owners consent.
Identity theft can have lasting effects on a victim’s financial health and credit status. Additionally phishing attacks are prevalent. Hackers use this technique to deceive users into providing their personal and payment information (Data) under the guise of legitimate request.
It is advisable for cards that you choose to carry around on your person be held in a RFID blocking wallet. Beyond physical security any cards that you use online or in stores should have spending limits and have no access to large amounts of funds you may have to prevent or limit the impact of fraud. For privacy protections consider virtual privacy cards or reloadable debit cards.
Lastly, do not use PayPal. They are a privacy nightmare and there is an entire cottage industry on the dark web selling stolen accounts.
CASH TRANSACTIONS
Cash is king. For a long time cash has been used as the primary form of payment and cash transactions have excellent privacy properties and it is widely accepted in most countries.
Cash transactions provides a high degree of privacy in payments, it also slows the growing information asymmetry between consumers and companies as well as between citizens and public authorities.
Bank notes and coins reduce your digital footprints compared to an electronic payment. Cash remains one of the most effective tools for financial privacy in a world increasingly dominated by digital payments. It offers true anonymity, leaving no digital trail or record of the transaction, making it impossible for third parties—such as governments, corporations, or hackers—to track your spending habits. Unlike card payments or online transfers, cash transactions don't reveal your identity, location, or spending patterns, providing a level of confidentiality that digital methods simply cannot match.
Physical cash works without registers of cash holders and transaction, when paying with bank notes and coins, it is only the buyer and seller who are aware of this: What is bought, how much, when, when by whom and at what.
While cash has its limitations in today’s digital society, it remains a valuable option for those who prioritize privacy. By using cash whenever possible, especially for sensitive or personal purchases, The use of cash gives room for maintenance and control over your financial data, it also help protect from unwanted surveillance, and safeguard your financial autonomy. Ultimately, cash is still king when it comes to preserving your financial privacy.
MONERO (XMR)
Monero is a decentralized cryptocurrency designed with a strong emphasis on privacy, security, stealth address and unlinkability, it is abbreviated XMR.
Monero’s transactions are completely anonymous and confidential by default making it one of the most privacy centric digital currencies available today.
Key features of Monero
·Untraceable Transactions: Monero uses advanced cryptographic techniques, such as Ring Signatures, which combine your transaction with others, making it impossible to identify the actual sender. This feature ensures that transactions cannot be traced back to any single individual.
·StealthAddresses: When you send Monero, the recipient’s address is never publicly recorded on the blockchain. Instead, a one-time address is generated for each transaction, ensuring the recipient's identity remains private.
·ConfidentialTransactions: Monero employs Ring Confidential Transactions (Ring CT) to hide the amount of XMR being transferred. This means the transaction amounts are kept entirely private, further enhancing confidentiality.
·Fungibility: Because Monero transactions are private, every XMR coin is indistinguishable from another. This makes Monero a truly fungible currency, meaning no coin carries a traceable history or stigma, unlike Bitcoin, where some coins can be "tainted" based on their transaction history.
Despite Monero’s popularity as a primary focused cryptocurrency, Monero faces criticism and challenges. The Monero community development team frequently updates the protocol to improve privacy and resist surveillance attempts, this is beneficial for security, meaning users and miners must regularly update software, this can be inconvenient and lead to potential forks if consensus is not reached within the community.
Many governments and financial institutions view Monero as a threat because of its untraceable nature, as a result this has posed some challenges making exchanges to delisted Monero in order to comply with anti-money laundering and know your customer (KYC) regulations.
SENDING BITCOIN PRIVATELY:
Bitcoin is often perceived as an anonymous payment network but in reality Bitcoin is the most transparent payment network in the world. At the same time, Bitcoin can provide acceptable levels of privacy when used correctly. All bitcoin transactions are public, traceable and permanently stored on the Bitcoin network, Bitcoin addresses are the only information used to define its allocations and history.
In ensuring privacy while Bitcoin transactions are performed it is advisable to generate a new address each time a payment is received. The incomplete privacy on transactions will lead to the Fungibility of the scripts, which could affect the stability of Bitcoin as a long-lived currency system, Bitcoin system addresses privacy by hiding the address of transactions via hash functions but the hash value is obviously unique, If the addresses and traders are bounded unconsciously through activities by attackers, the anonymity of the entire system will disappear.
Suppose that the Bitcoin system is connected to the payment of an e-commerce platform, the strong computing power can search the complete data of your incomes and outcomes, which makes everything about money exposed to the public.
Let’s say; You are paid salary via bitcoins and you spend those coins in the supermarket, the plaintext of the account of your income and outcome will inevitably be utilized by businesses to access the benefits like charge you higher prices or target you with advertisement.
-
@ ae1008d2:a166d760
2024-09-25 21:52:49I wanted to share this PDF on Nostr. Original post: Block ~862,844 September 25th, 2024 Original link Original PDF 👇Click the link below to view as original PDF on YakiHonne or Satellite.Earth👇
-
@ a03b38f8:2c7ce1f0
2024-09-25 16:11:17PROTECT YOUR HOME (NETWORK)
This is actually a rather large topic depending on your needs and how far you are willing to go. I will most likely have to put out several posts on this topic. For today we will start at the very beginning and build from there.
This is going to be more of a beginners guide but that doesn't make it any less important. First you must get your home in order before you can do anything else. If bad actors get access to your network then they can use it for illegal things that will be tied to your IP address, use it to launch a bot for a DDoS attack, gain access to any of your home devices, or just hangout and watch you log into bank accounts or whatever.
I will be blunt, your home network sucks. It's slow and unsecure but we will be fixing that.
I. EVERYONE
- WHAT DO YOU HAVE?
Somewhere in your house you have either a phone cord or a cable coming out of the wall running to a box. Go find it. This is your modem, it "translates" the internet signal from your ISP to your house so you can use the internet.
Found it? Good. Now is there a cable coming from the modem to another box or do you just have one? This other box is your router, it is pretty common now that you will have a all in one modem, router, WIFI, etc. That's fine. Write down the model number of the router or all in one. Also there should be a sticker on the side with the administrator password (sometimes listed as access code) and maybe the WIFI password. Also look if the IP address is listed as well. You will need these for the next step.
- LOG IN
Go to your computer and fire up a web browser. Enter your routers IP address if it was listed, otherwise we are going to have to find your router's IP address.
In widows and Mac you can look under Network & Internet, scroll down to your internet connection and look for details or properties. Inside properties you are looking for something listed as default or gateway or IPv4 DNS Server. It will be a 192.168.X.X number.
Or you can open a command prompt and type: ipconfig /all
Or you can just do a internet search for your router model number IP.
You will know when you get the right one because a control screen for your router will pop up in the browser.
- UPDATE
First thing first check if there is any available updates. This could be it's own tab or listed under device or in diagnostics. If it asks you for a password use the one that was written on the side of the router. Install any available updates. Honestly they rarely update these things so if there is one then it must have been pretty needed.
- CHANGE THE LOCKS
You have to realize that this device is the front door between every internet device in your home and the outside wild internet. You are probably blasting WIFI signal all the way to the street. All someone has to do is connect to your WIFI and then they will have access to your router as well. The default administrator password for these mass produced ISP devices are not exactly secret. You can even find lists of them by brand. It is like locking your front door but leaving the key under the mat, not very secure.
Look in the settings and change the administrator password. Use your password manager to generate a 10 word passphrase. Change it to that and SAVE it in your password manager.
- RENAME AND CHANGE WIFI PASSWORD
In the settings change the default name of your network to something memorable. Do NOT use anything personal like your name, address, or router brand (Netgear or whatever). If you want to be cute you can use: Not Available, or Network Error or something like that.
Now change the WIFI password. Again use your password manager to generate a passphrase. You can cut it down to 6 words since you will probably be entering this one much more often. Be sure to SAVE it in your password manager.
- ADD A GUEST NETWORK
You don't just give your WIFI password to all the kids in the neighborhood that swing by to play with your kids or to your friends visiting do you? If so, STOP it. Setup a guest network. A guest network allows people to have WIFI access at your house without giving them access to the router. Yes I know we put a strong password on the router but it doesn't matter.
Setup a guest network with a easy password. If you have given this out to several people already that are coming back often you can name the guest network the old default name and use that default WIFI password. When friends and family come over their devices will have that name already saved and will connect automatically. This way you don't have to do the whole song and dance everytime someone comes over.
- CHANGE YOUR DNS SERVER
DNS is the Domain Name System. Remember the IP address we found earlier for the router? Every device connect to the internet has a unique IP address. Every server hosting a website, etc but luckily you don't have to remember 142.250.188.14, you can just go to Google.com
This works because behind the scenes your computer is checking with a DNS server to provide a human readable address instead of a bunch of numbers. The equivalent would be a phone book that gives you John Smith and not just a address somewhere.
There is a little bit more to it than that but you don't need to know all that in order to grasp the concept.
The default DNS in your router is probably the one provided by your ISP. Your ISP can see everything that pings against that DNS server and probably uses it to feed you ads. The DNS server provider impacts how a lot of your data is handled. It's speed, it's security, how it's logged, shared, and sold.
So change your DNS server. The default one your ISP gave you is shit. It will improve your speed and security but just remember that privacy and security are not the same thing. The Google Public DNS (8.8.8.8) is very secure and a good choice but as you can imagine the privacy is not really great. But not to worry, all the data they are collecting is anonymized ; )
Your best bet is to use your own DNS server with something like Pi Hole or Adguard home. Setting that up is a little bit beyond the scope of this article so I will cover it in greater detail in a future one. Until then Cloudflare (1.1.1.1) is probably your best choice until you run your own.
Now you have probably better privacy and security than most people with only these simple changes. Next steps would be to upgrade your hardware for faster internet, better firewall, more control, etc. Will detail in future drops.
Always Forward, GHOST
-
@ 3ad01248:962d8a07
2024-09-26 17:39:34https://image.nostr.build/c7e3732889827ab0a8e2064de5fa6992e37e035347b0c91d249cb8f312b47087.jpg I love Bitcoin. Let me get that out there first of all. I sincerely believe that Bitcoin has the power to change the way the world functions if we can grow adoption to a global scale. This obviously will take time as the gears of economic change grinds slowly. As of right now, people in the western countries don't really see the need for a sovereign politically neutral money that can't be inflated away. They simply don't have to deal with inflation on a regular basis like the rest of the world.
Citizens in western countries got a small taste of what real inflation looks like and guess what? They didn't like it one bit. Overall the last three and a half years you saw countless news stories about how bad inflation and how its making life for the average American or European more difficult.
Yes inflation does suck but look at countries like Argentina, Turkey, Zimbabwe or Venezuela. The people in these countries are suffering from excessive inflation on a regular basis! According to recent economic data Turkey experienced a decline in inflation from 61 percent to 51 percent in August. This is seen as a win in their book! Can you imagine this level of inflation in America? There would be riots in the streets!
Argentina's inflation rate is an astounding 236 percent over the last 12 months! As Bitcoiners we understand that the problem is the money itself. As long as governments have the ability to manipulate the money supply, they will. This is human nature at its finest. When you give a select few that kind of power it becomes irresistible and becomes a tool to control the masses. This shouldn't be a surprise to anyone to be honest.
What I find shocking is with all of this inflation globally no one is really looking around asking questions to why this is happening and looking for a way to escape this system. Are people really this lazy? Not to be mean but cmon. It seems to me that most people are perfectly fine bitching online about how hard it is to make ends meet or supporting their favored political party and wanting them to fix the problem they created. Newsflash to all the normies out there, its the GD political parties that caused inflation in the first place.
We literally have a solution that is staring them in the face, ready to go to replace the current debt based system that we are currently suffering through and no one wants to take the time to research it? Am I black pilled? No, am I realist, very much so. If 236 percent inflation in Argentina can't get them on a Bitcoin Standard immediately, we as a community have a long road ahead of us. Hyperbitcoinization isn't coming in 5 years. It isn't coming in 10 years. Hell it might not even happen in our lifetimes and we have to be ok with that.
So what is the best way to get more Bitcoin into the hands of the people, so they can see the true value of the digital monetary revolution that is Bitcoin. We need a trojan horse and that trojan horse is nostr.
Enter The Nostr Trojan Horse
https://image.nostr.build/5ffee418133ac80ba14b30abf0d5390b878f676cbf6332d67639f9384764da4c.jpg
It should be plain to see by now that the inflation or the number go up narrative alone isn't going to drive Bitcoin adoption. The reason for that is because people don't see the utility of Bitcoin. They see it as some esoteric digital funny money that drug dealers and terrorist use to do bad things.
The average Joe doesn't see how Bitcoin is helping dissidents on foreign countries fund their activism, escape oppressive regimes or simply earn a living. These stories are never told in the mainstream media because they don't want to highlight the fact that a non-state money can circumvent the status quo.
The best way to highlight these stories is to share it on social media, which again is controlled by mainstream gatekeeper such as Meta, Google and X. It is in their best interest to censor these stories or memory hole them out of existence which I suspect happens quite a bit without us even knowing. But the thing about censorship is that it slowly impacts everyone one by one until no one is allowed to say anything without the fear of being put in jail.
Think this can't happen in western democracies? It's happening already my friend! Take a look at the UK or Australia. Citizens their are being arrested over post made to social media. I sincerely believe that these two countries should be a proving ground for showing the value of nostr and Bitcoin.
Introducing the concept of a censorship resistant messaging protocol to them will go over well and once it is understood will grow like a wildfire because people innately understand that censorship is bad and will see the utility value of having the ability to speak freely again.
It is only a matter of time until they realize that they can monetize their speech and build a life using zaps aka Bitcoin.
Until people see the utility in the tools that lie before them, they will never pick them up and use them. It is really that simple. At the end of the day we are still kind of like cavemen. We only use tools when it makes life easier. Man made the wheel. We use it everyday because it has utility.
Bitcoin in the end will be the same way. Utility first, then mass adoption. Nostr is what will help people see the utility Bitcoin and from there sky is the limit. The best thing we can do as Bitcoiners is to encourage people to learn about nostr and show them how easy it is to use and to switch clients that suit their needs instead of being shoved into a one-size fits all solution on centralized platforms.
People like choices, and nostr is all about choice. The interoperability and thelack of need to give personal information to create an account are HUGE selling points that can be touched on. Go out and spread the good word about nostr!
Bitcoin #Nostr
-
@ c73818cc:ccd5c890
2024-09-25 13:38:28😎 Un appello alla difesa della libertà di espressione e all'autocustodia delle proprie risorse digitali.
😎 Il codice è parola:
😎 Bitcoin è più di una semplice valuta. È un database, un discorso, un codice. In un mondo sempre più sorvegliato, la privacy diventa un lusso. "Scrivere codice non è un crimine, è un diritto fondamentale", come veniva condiviso nel 1993 sul manifesto crypto anarchico, che creò la base per il movimento Cypherpunk e la futura nascita di Bitcoin.
😎 Privacy non è segretezza:
😎 Governi e corporazioni minacciano la nostra privacy con leggi sempre più restrittive. È tempo di ribellarsi e riprendere il controllo dei nostri dati. Bitcoin offre una via d'uscita, ma dobbiamo difenderla dagli attacchi degli Stati.
😎 Bitcoin sotto attacco:
😎 Le persone hanno difeso la propria privacy per secoli con sussurri, oscurità, buste, porte chiuse, strette di mano segrete e corrieri. Le tecnologie del passato non consentivano una forte privacy, ma le tecnologie elettroniche sì. Mentre lo Stato cerca di ridefinire e controllare Bitcoin, è essenziale ricordare che questa tecnologia è nata per sfidare il potere centralizzato. Bitcoin non è solo un libro mastro, ma un baluardo contro l’oppressione statale.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Sorveglianza #Privacy #Cypherpunk #Governi #Istituzioni #Leggi #Controllo #Dati #Stato #Oppressione #Cripto #Bitcoin
-
@ e6817453:b0ac3c39
2024-09-25 07:45:21Graphs and vector search form a powerful tandem for AI-powered applications, which are booming nowadays. Personal knowledge graphs are the core of semantic memory for many agentic AI applications.
At kin, we craft AI agentic architecture with a complex memory model directly on the user's device.
Kin is a privacy-focused AI agent on top of sovereign data owned by users.
#Our North Stars
The technical North stars of mykin are :
- Privacy by design — guide on how to keep architecture secure and private
- ssi principles — focus on user data ownership and sovereignty
- local first architecture — give the instrument to the user to own data and compute independently from the vendor
#Data Ownership
All these North stars have one aspect in common—data ownership. The user has full control and ownership of the data. This means we shift from a classical all-in-cloud centralized model to a local-first architecture where data is stored and processed, a mesh of user devices, and potentially some cloud services or capabilities are involved.
So, we need to run complex RAG, vector search, and vector graph clustering primarily on the user's device.
#Expectations for Database Capabilities
- general queries on structured data (regular application data) like messages, conversations, settings, etc
- vector search and similarity search capabilities to RAG pipelines and different LLM and ML-powered flows
- Graph and graph search capabilities (ML and semantic memory )
As far as we work on mobile, we have a few tech capabilities, too;
- embeddable with good support for mobile bindings
- single file database that simplifies a backup
- portable
- battery friendly
- fast and nonblocking io as much as possible
- wide community support
- reliability
#libSQL
If you follow my articles, you already know the answer — libSQL.
I described the full journey of vector search and graphs on top of relational models in my articles.
We have 1 question — how to run libSQL on a user device?
We are using React Native, so the library should have react native bindings.
#libSQL on React Native
There are plenty of libraries for React Native that run SQLite, but not LibSQL. Let's take a look at some of the most popular ones:
#react-native-sqlite-storage
- Widely used with support for transactions and raw SQL queries.
- Supports both Android and iOS.
- Provides a promise-based API.
#react-native-sqlite-2
- A lightweight alternative.
- Based on a WebSQL API.
- Works well for simple databases but has limited features compared to
react-native-sqlite-storage
.
#react-native-sqlite
- Similar to
react-native-sqlite-storage
, but with more minimalistic features. - Might require manual linking.
#watermelondb
- Built on top of SQLite but offers a more modern approach.
- Designed for highly scalable databases in React Native.
- Provides an ORM-like interface and works with large datasets efficiently.
#expo-sqlite (if using Expo)
- Built-in SQLite support for Expo apps.
- It is lightweight and easy to use but has fewer advanced features than other libraries.
expo-sqlite
is now a de facto library for SQLite in the Expo ecosystem, and my first idea was to convince the community to add libSQL as an engine or fork it and use it for our internal needs.It was much more challenging than I expected. Sometimes, a large open-source project can be resistant to new ideas and improvements. So it is a door that is hard to nook.
#OP-SQLite
When I first found OP-SQL on GitHub, it was described as the fastest SQLite library for React Native, developed by Ospfranco.
It has few interesting features for react native app:
#Async Operations
The default query runs synchronously on the JS thread. There are async versions for some of the operations. This will offload the SQLite processing to a different thread and prevent UI blocking. It is also real multi-concurrency, so it won’t bog down the event loop.
#Raw Execution
If you don’t care about the keys you can use a simplified execution that will return an array of results.
#Hooks
You can subscribe to changes in your database by using an update hook that give a full row :
ts // Bear in mind: rowId is not your table primary key but the internal rowId sqlite uses // to keep track of the table rows db.updateHook(({ rowId, table, operation, row = {} }) => { console.warn(`Hook has been called, rowId: ${rowId}, ${table}, ${operation}`); // Will contain the entire row that changed // only on UPDATE and INSERT operations console.warn(JSON.stringify(row, null, 2)); }); db.execute('INSERT INTO "User" (id, name, age, networth) VALUES(?, ?, ?, ?)', [ id, name, age, networth, ]);
#Extension Load
It was the first library that allowed me to load an extension by myself and even more. Oskar adds CR-SQL extension as an option to a library to make it work out of the box !!!
#Open to Cooperation
One of LibSQL's mottos is to be open to contributions. Oskar was more open to contributions, saw the amazing benefits of libSQL, and added it as an option to op-sql.
#Let's Learn How to Use OP-SQLite
So, how do you build a vector search-aware personal knowledge graph on a user device?
I expect that you will have a React native or expo project. You need to add
op-sql
(7.3.0+):bash npm install @op-engineering/op-sqlite
Now let's configure Libsql. You need to add this section to your
package.json
:json "op-sqlite": { "libsql": true }
Since we're working with a polymorphic library that runs not only on the device but also on Node.js, I made an abstraction that allows me to swap libSQL implementations.
ts import { open as openLibsql, OPSQLiteConnection, QueryResult, Transaction, } from '@op-engineering/op-sqlite'; import { BatchQueryOptions, DataQuery, DataQueryResult, IDataStore, UpdateCallbackParams, StoreOptions, } from '@mykin-ai/kin-core'; import { documentDirectory } from 'expo-file-system'; export class DataStoreService implements IDataStore { private _db: OPSQLiteConnection | undefined; private _isOpen = false; public _name: string; private _location: string; public useCrSql = true; private _options: StoreOptions; constructor( name = ':memory:', location = documentDirectory, options: StoreOptions = { vectorDimension: 512, vectorType: 'F32', vectorNeighborsCompression: 'float8', vectorMaxNeighbors: 20, dataAutoSync: false, failOnErrors: false, reportErrors: true, }, ) { this._name = name; this._options = options; if (location?.startsWith('file://')) { this._location = location.split('file://')[1]; } else { this._location = location; } if (this._location.endsWith('/')) { this._location = this._location.slice(0, -1); } } getVectorOption() { return { dimension: this._options.vectorDimension, type: this._options.vectorType, compression: this._options.vectorNeighborsCompression, maxNeighbors: this._options.vectorMaxNeighbors, }; } async query( query: string, params?: any[] | undefined, ): Promise<DataQueryResult> { try { await this.open(this._name); const paramsWithCorrectTypes = params?.map((param) => { if (param === undefined || param === null) { return null; } if (param === true) { return 1; } if (param === false) { return 0; } return param; }); const data = await this._db.executeRawAsync( query, paramsWithCorrectTypes, ); return { isOk: true, data, }; } catch (e) { console.error(e.code, e.message); return { isOk: false, data: [], errorCode: e.code || 'N/A', error: e.message, }; } } async execute( query: string, params?: any[] | undefined, ): Promise<DataQueryResult> { try { await this.open(this._name); const paramsWithCorrectTypes = params?.map((param) => { if (param === undefined || param === null) { return null; } if (param === true) { return 1; } if (param === false) { return 0; } return param; }); const data = await this._db.executeAsync(query, paramsWithCorrectTypes); return { isOk: true, data: data.rows?._array ?? [], }; } catch (e) { console.error(e); return { isOk: false, data: [], errorCode: e.code || 'N/A', error: e.message, }; } } async open(name: string): Promise<boolean> { try { if (this._isOpen && name === this._name) { return true; } if (this._isOpen && name !== this._name) { await this.close(); this._isOpen = false; } this._name = name; this._db = openLibsql({ name: this._name, location: this._location, }); console.log('Opened db'); this._isOpen = true; return true; } catch (e) { // eslint-disable-next-line no-console console.error("couldn't open db", e); return false; } } async isOpen(): Promise<boolean> { return Promise.resolve(this._isOpen); } async close(): Promise<boolean> { if (this.useCrSql) { this._db.execute(`select crsql_finalize();`); } this._db.close(); this._isOpen = false; return Promise.resolve(true); } }
Now we are ready to make graph tables and indexes. I'll skip the entire class as far it is too long and give only essential parts:
ts const vectorOptions = this.\_store.getVectorOption()
Give us vector configurations, such as the type of vector value and the dimension of embeddings, as the same as vector index params:
ts const createR = await this.\_store.execute(` create table if not exists edge ( id varchar(36) primary key not null, fromId varchar(36) not null default '', toId varchar(36) not null default '', label varchar not null default '', displayLabel varchar not null default '', vectorTriple ${vectorOptions.type}_BLOB(${vectorOptions.dimension}), createdAt real, updatedAt real, source varchar(36) default 'N/A', type varchar default 'edge', meta text default '{}' ); `)
Now we have a triple store that has references to nodes:
ts const createR = await this.\_store.execute(` create table if not exists node ( id varchar(36) primary key not null, label varchar not null default '', vectorLabel ${vectorOptions.type}_BLOB(${vectorOptions.dimension}), displayLabel varchar not null default '', createdAt real, updatedAt real, source varchar(36) default 'N/A', type varchar default 'node', entity text default '{}', meta text default '{}' ); `)
If you want to know how to model graphs in relational databases, read this.
#Now it's time to create an index:
ts const createIndex = await this.\_store.execute(` CREATE INDEX IF NOT EXISTS idx_edge_vectorTriple ON edge (libsql_vector_idx(vectorTriple${vectorOptions.compression !== 'none' ? `, 'compress_neighbors=${vectorOptions.compression}'` : ''} ${vectorOptions.maxNeighbors ? `, 'max_neighbors=${vectorOptions.maxNeighbors}'` : ''})); `)
We configure compress_neighbors and max_neighbors to get the best storage space footprint. if you want to learn more about space complexity, read this.
Now, we could create a triple:
ts const createOp = await this._store.execute( ` insert into edge (id, fromId, toId , label, vectorTriple, displayLabel, createdAt, updatedAt) values (?, ? , ? , ? , vector(${this._store.toVector( await this.embeddingsService.embedDocument( `${fromNode.label} ${normalizedLabel} ${toNode.label}`, ), )}) , ? , ?, ?); `, [ this._getUuid(), fromNode.id, toNode.id, normalizedLabel, label, Date.now(), Date.now(), ], );
Unfortunately,
op-sql
does not supportfloat32array
as a parameter as libSQL does. To make a workaround, we need to use a bit of dynamic SQL and create a serialized vector as part of queries. My toVector method does a stringify of float32array and cares about quotes. Please note that we pass a serialized array to a vector function in SQL. I hope that the next version of op-SQL will support float32arrays#Time to query:
ts const _top = top ?? 10 const vector = this._store.toVector(await this.embeddingsService.embedQuery(query)) const querySql = ` select e.id, e.label, e.displayLabel, e.createdAt, e.updatedAt, e.source, e.type , e.meta , fn.label, fn.displayLabel, tn.label, tn.displayLabel, vector_distance_cos(e.vectorTriple , ${vector}) distance from vector_top_k('idx_edge_vectorTriple', ${vector} , ${_top}) as i inner join edge as e on i.id = e.rowid inner join node as fn on e.fromId = fn.id inner join node as tn on e.toId = tn.id where 1=1 ${maxDistance ? `and distance <= ${maxDistance}` : ''} order by distance limit ${_top}; ` const edgeData = await this.\_store.query(querySql)
Few notes
- by default, the vector index works and returns rowid so be careful that the joins
- index does not return distance. Still, you could calculate it if you needed
vector_top_k
expect top parameter and will return top N items. If you have complex filtering or external top limitations, remember to set a much bigger top N to make the search possible. In our case it is not an issue.
#Issues and Challenges
I faced a few challenges in React Native, mainly for iOS. They are related to how native modules are compiled and linked in iOS.
One quite unpleasant issue is that if you have another library using a different version of SQLite, it could unpredictably override linking and break libSQL completely.
#Compilation Clashes
If you have other packages that are dependent on sqlite (specially if they compile it from source) you will have issues.
Some of the known offenders are:
expo-updates
expo-sqlite
cozodb
You will face duplicated symbols and/or header definitions since each of the packages will try to compile SQLite from sources. Even if they manage to compile, they might compile sqlite with different compilation flags and you might face threading errors.
Unfortunately, there is no easy solution. It would be best if you got rid of the double compilation by hand, either by patching the compilation of each package so that it still builds or removing the dependency on the package.
On Android you might be able to get away by just using a pickFirst strategy (here is an article on how to do that). On iOS depending on the build system you might be able to patch it via a post-build hook, something like:
pre_install do |installer| installer.pod_targets.each do |pod| if pod.name.eql?('expo-updates') # Modify the configuration of the pod so it doesn't depend on the sqlite pod end end end
Follow op-sql docs to get an updated list of libs.
#RNRestart crash
One more iOS issue:
ts import RNRestart from 'react-native-restart';
If you for some reasons need to restart app and use react-native-restart you need to make that you close all connections
ts import { closeAllConnections } from '@storage/data-store-factory'; import RNRestart from 'react-native-restart'; export const restartApplication = async (): Promise<void> => { await closeAllConnections(); RNRestart.restart(); };
Now you could also do a personal knowledge graph with vector search on a user device!
I want to say thanks to Oskar, and Turso team for their amazing work.
-
@ 3ad01248:962d8a07
2024-09-26 17:31:27test poasting
-
@ c278022e:b37d01a2
2024-09-25 05:58:25Abstract
This paper proposes a comprehensive system design for a decentralized prediction market and a game-theoretic stablecoin built entirely on Bitcoin's Lightning Network. Leveraging Discreet Log Contracts (DLCs) and off-chain transactions, the system enables leveraged trading, liquidity provision, and stablecoin creation without relying on alternative cryptocurrencies or tokens. We address potential flaws and criticisms, demonstrating that Bitcoin alone provides a secure, scalable, and efficient platform for advanced financial applications.
truthserum@iris.to
Introduction
Motivation
Bitcoin, as the original and most secure cryptocurrency, offers a stable and decentralized platform for financial innovation. While alternative platforms like Ethereum have introduced smart contracts and decentralized finance (DeFi) applications, they often suffer from network congestion, high fees, and centralization risks. This paper aims to demonstrate that Bitcoin's Lightning Network can support complex financial instruments, including a decentralized prediction market and a game-theoretic stablecoin, without the need for alternative cryptocurrencies.
Overview
We propose a system that:
- Utilizes Bitcoin's Lightning Network for scalability and low fees.
- Employs Discreet Log Contracts (DLCs) for secure, private smart contracts.
- Creates a decentralized prediction market with leveraged trading.
- Introduces a synthetic stablecoin based on the net positions of long and short traders.
- Addresses potential flaws and criticisms, ensuring robustness and security.
Background
Bitcoin and the Lightning Network
Bitcoin is a decentralized digital currency that operates on a peer-to-peer network, using proof-of-work consensus for security. The Lightning Network is a layer-two protocol that enables fast, off-chain transactions between participants, enhancing Bitcoin's scalability.
Discreet Log Contracts (DLCs)
DLCs are a type of smart contract that allows two parties to make a conditional payment based on the outcome of a future event, with privacy and security ensured by cryptographic techniques.
Prediction Markets and Stablecoins
Prediction markets allow participants to speculate on the outcome of future events, while stablecoins are cryptocurrencies designed to maintain a stable value relative to a target asset or basket of assets.
System Design
Key Components
- Liquidity Providers (LPs): Users who provide Bitcoin as collateral to the liquidity pool.
- Traders: Users who take leveraged long or short positions on asset prices.
- Oracles: Entities that provide reliable price feeds for asset settlement.
- Stablecoin: A synthetic stablecoin derived from the net positions of traders, backed by Bitcoin collateral.
Core Features
- Decentralized Prediction Market: Facilitates leveraged trading on asset prices.
- Game-Theoretic Stablecoin: Maintains stability through the balance of longs and shorts.
- Yield Generation: LPs earn yields from trading fees, funding rates, and liquidation penalties.
- Bitcoin-Only: Built entirely on Bitcoin's network without alternative tokens.
Technical Implementation
Leveraged Trading via Discreet Log Contracts
Contract Setup
Two parties, a trader and an LP, agree on contract terms:
- Asset: Bitcoin/USD price.
- Leverage: Multiplier on the trader's collateral.
- Collateral: Bitcoin amount provided by the trader.
- Duration: Contract length.
- Oracle: Selected to provide the settlement price.
Funding the Contract
- Trader: Locks collateral C_T in a multi-signature address.
- LP: Locks collateral C_LP to cover potential payouts.
Execution and Settlement
- At maturity, the oracle provides a signature of the final price P_f.
- The DLC allows funds to be distributed based on P_f and the contract terms.
Synthetic Stablecoin Creation
Mechanism
- Stablecoins are minted when traders open positions.
- Backed by Bitcoin collateral from LPs and traders.
- Stability maintained through balanced market positions and funding rates.
Funding Rates and Market Balance
Purpose
To incentivize traders to balance long and short positions, maintaining system stability.
Implementation
- Funding Rate: Funding Rate = k * (Net Position / Total Open Interest)
- Payments: Traders on the dominant side pay funding fees to the opposite side.
Risk Management and Liquidations
- Margin Requirements: Minimum collateral ratios for traders.
- Liquidation Thresholds: Positions are liquidated if collateral falls below maintenance margin.
- Automatic Liquidations: Enforced by smart contracts without human intervention.
Mathematical Foundations
Payout Calculation
Position Size
Position Size = C_T * L
Profit/Loss (P/L)
P/L = Position Size * ((P_f - P_0) / P_0)
Return on Investment (ROI)
ROI = (P/L / C_T) * 100%
Liquidation Price Calculation
For a long position:
P_liquidation = P_0 - ((C_T / Position Size) * P_0)
Game Theory and Incentive Alignment
Traders
- Incentive: Profit from accurate market predictions.
- Behavior: Manage risk to avoid liquidation.
Liquidity Providers
- Incentive: Earn yields from fees and funding rates.
- Risk: Exposure to traders' net P/L.
Oracles
- Incentive: Earn fees for accurate data provision.
- Behavior: Maintain reliability to secure future earnings.
Potential Flaws and Criticisms Addressed
Oracle Trustworthiness
Criticism
Relying on oracles introduces a single point of failure and potential for data manipulation.
Solution
- Decentralized Oracles: Use multiple oracles and aggregate data.
- Threshold Signatures: Require consensus among oracles.
- Incentive Alignment: Oracles are incentivized to provide accurate data through fees and reputation.
Liquidity Risks
Criticism
Insufficient liquidity may prevent covering traders' profits, especially during high volatility.
Solution
- Dynamic Leverage Limits: Adjust leverage based on liquidity.
- Risk Management Protocols: Implement strict margin requirements.
- Incentivizing LPs: Offer competitive yields to attract liquidity.
Price Volatility and Market Manipulation
Criticism
Extreme market movements could lead to rapid liquidations and instability.
Solution
- Anti-Manipulation Measures: Use time-weighted average prices (TWAP).
- Circuit Breakers: Temporarily halt trading during extreme volatility.
- Robust Liquidation Mechanisms: Ensure smooth liquidations without market disruption.
Technical Complexity
Criticism
Implementing DLCs and managing Lightning Network channels require advanced expertise.
Solution
- User-Friendly Interfaces: Develop intuitive platforms.
- Educational Resources: Provide guides and support.
- Community Development: Encourage collaboration and open-source contributions.
Regulatory Compliance
Criticism
Operating a leveraged trading platform may raise regulatory concerns.
Solution
- Decentralization: Structure the platform to minimize central control.
- Legal Consultation: Engage experts to navigate regulations.
- KYC/AML Policies: Implement where necessary without compromising privacy.
Network Limitations
Criticism
The Lightning Network may face limitations in liquidity and channel capacity.
Solution
- Channel Management Strategies: Utilize multi-path payments and channel factories.
- Liquidity Hubs: Establish well-funded nodes.
- Ongoing Development: Contribute to scalability improvements.
Conclusion
By leveraging Bitcoin's Lightning Network and Discreet Log Contracts, we can build a decentralized prediction market and a game-theoretic stablecoin without relying on alternative cryptocurrencies. This system addresses potential flaws and demonstrates that Bitcoin alone provides a secure, scalable, and efficient platform for advanced financial applications.
Future Work
- Prototype Development: Create a working model of the proposed system.
- Security Audits: Conduct thorough assessments to ensure robustness.
- Community Engagement: Involve developers and users in refining the system.
- Regulatory Navigation: Work with legal experts to ensure compliance.
Acknowledgments
We thank the Bitcoin and Lightning Network communities for their ongoing contributions to decentralized finance and open-source development.
References
- Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.
- Joseph Poon and Thaddeus Dryja, The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments, 2016.
- Tadge Dryja, Discreet Log Contracts, 2017.
- GMX, Decentralized Perpetual Exchange, https://gmx.io/, Accessed 2023.
- BIP 0341, Taproot: SegWit Version 1 Spending Rules, 2020.
- Rusty Russell, Generic Smart Contracts Over Lightning, 2019.
-
@ 89cc7fe3:a061d38b
2024-09-25 03:02:48Article A
-
@ fd78c37f:a0ec0833
2024-09-25 02:56:07A mirror post on the Dora Research Blog can be found at: https://research.dorahacks.io/2024/09/25/network-states-critique-part-1/ Author: DORA Interns
Section 1:
As capitalism became the new economic system, replacing the old feudal guilds and their small and inefficient means of production, cultural conditions began to take hold that would give rise to nations and a sense of national consciousness. This thesis, argued in great detail by Benedict Anderson in his book Imagined Communities, is characteristically similar to Marxist theory, which generally holds that any difference made in a society's economic and technological base results in changes throughout its whole structure. As humans alter their environment, gain control of its variables, and reduce the severity of their conditions, higher, more rational faculties may begin to develop. Karl Marx writes, “By thus acting on the external world and changing it, (human beings) at the same time change (their) own nature.” As technology progresses; as the tools used by human beings advance and become more efficient and productive, human consciousness grows with it. Starting with primitive forms of productive forces like stone tools, human beings organize themselves in ways made possible by this primal mode of technology, which possesses a meager capacity to tame and alter nature, and, consequently, casts human understanding and knowledge into the shadows, greatly obstructing their freedom, as well as their capacity to become self-aware. Thus as the means of production progress, more complicated forms of social organization become possible. Human beings slowly become conscious of their autonomy - the ability to live a life dictated by reason, by rational choice and principle, and not by the caprice of external causal factors. Throughout this historical process, the old institutions and societal structures deteriorate and grow obsolete; revolutions occur to update the social infrastructure and catch up to the progressing economic base.
When technology grew to the point of being able to sustain capitalism, and more well-organized systems of labor were needed to underpin what the economy demanded, people flocked to the cities, leaving behind the rural life that was characteristic of the feudal system, and began thinking of themselves as part of larger collectives, as nations. Marx writes, “Independent, or but loosely connected provinces, with separate interests, laws, governments, and systems of taxation, became lumped together into one nation, with one government, one code of laws, one national class-interest, one frontier, and one-customs tariff.” Industrialization, then, and its new tools, which drastically shifted the means of production, changed human consciousness and laid the conditions necessary for societies to become nation-states.
In Imagined Communities, Anderson claims this development toward industrialization and nation-states was largely set in motion by the advent of the Gutenberg printing press in 1440. He argues that this technology, which began to distribute newspapers, novels, and bibles to readers in a language that would become a people’s common vernacular, had laid the cultural conditions for a sense of national consciousness, the feeling that one belonged to a larger community that expanded past their immediate surroundings, to arise. People who previously did not think of themselves as ‘French’, or ‘English’, or ‘American’, who spoke in largely discontinuous dialects, slowly began to think of themselves as participating in a nation of people bound together by a shared experience. These new national identities replaced the old religious, preordained orders that once provided meaning to human beings, and nationality became one of the more dominant modes through which people identified who and what they were.
Now, another important technology that facilitated the historical development of nations was the ledger and its use for double-entry bookkeeping. As information regarding debits and credits was able to be recorded, more large-scale trades, transfers of assets, and general forms of record-keeping were made possible, bringing about the need for more uniform, clear, and discrete boundaries between the various territories. Nation-states became a means to meet the demands made by society’s progress. Feudalism and its notion of the Divine Right of Kings, its old religious dogmas, and its obsolete forms of social institutions, were unable to adapt to these economic shifts. The emergence of the Enlightenment period (1685-1789) ushered in new ways of understanding the state and its position of authority and legitimacy to hold power. Rather than being conceived as a beacon of Divine order, it increasingly became seen as a rational compromise between people who invested the state with authority in exchange for preserving their natural rights. It was now a third-party institution that resided over settling disputes, enforcing the law, and punishing those who violated it. The state was now only legitimate insofar as it protected the rights of the individuals who consented to be governed.
However, over time, a great deal of trust had been handed to these new institutions, and many believe they have now led to an excess of centralized power. Banks became the holders of financial ledgers; distribution of information, of news and events, became the job of a few selected companies, and the government, over time, stepped over its initial claim to legitimacy by taking on roles far surpassing the task of merely protecting individual rights and liberties. Because there was no technology for it, people still had to be trusted as disinterested and objective third-party mediators, which human nature often fails to achieve, allowing self-interest, greed, envy, and human vice more generally to have an influential role in state and governmental processes. This creates corrosive trust issues between citizens and their institutions. In their book The Truth Machine, Michael J. Casey and Paul Vigna write, “Trust - especially in our institutions - is a vital social resource, the true lubricant of all human interaction. When it works, we take it for granted - we wait our place in line, follow road rules, and assume everyone will do the same… But when trust is lacking, things really, really break down.”
Today, with the invention of blockchain and cryptocurrencies, many believe these institutions themselves become obsolete and that new forms of social organization are needed. In his book The Network State, Balaji Srinivasan labors to demonstrate this claim, arguing that the network and its capacity to allow individuals to organize digital, landless communities, can replace the old nation-states that obstruct social development. In particular, he believes blockchain and its capacity to underpin trustless systems to be capable of supplanting the older institutions by automating what they were entrusted with doing; cryptocurrencies can automate the roles done by central banks and the Federal Reserve; information of news and events can be loaded onto blockchains and remain immutable, preventing self-serving parties from tampering and manipulating it for their interests; private information can be cryptographically secured and held by individuals rather than by centralized, private tech companies like Google; and nation-states more generally can be superseded by the network, which eliminates the perennial issue of land that has caused innumerable wars and conflicts between sovereign states. But, despite the optimism induced by these new technologies, there are problems. The rest of this article will be concerned with addressing what it means for a network state to be ‘ethical’, to use a term of Srinivasan’s. Some nation-states are viewed as unethical, as providing conditions that are degrading to human beings; North Korea immediately comes to mind. The next section will propose a way to discern why such a judgment is true, and will be used to assess what a network state must achieve to be considered ‘ethical’. I will argue that this can only be done by holding people’s autonomy as the principal end of the state.
Section 2:
To see this, we can think of creating a state as a complex activity, and, as with most activities, it is directed toward certain ends. Similarly to how playing a sport, gardening, or driving a car is an activity, so is creating a state - albeit a far more complicated one. But whereas the ends of certain activities may be for the sake of pleasure or leisure, the state’s ends are always within a moral and ethical scope. It is moral in that, whenever one is engaged in the activity of state-making, the ends by which the activity is oriented are always directed toward drafting principles that will establish cooperative social practices and institutions that guide and govern the actions of the members within the state, which lay the conditions by which human beings will pursue their individual and collective well-being. In other words, the ends that the act of founding a state is aimed toward is to create practices that consist of individuals who form collectives, and who cooperate and live according to a given set of moral ends that orient, inform, and shape the lives of those within the state. Therefore, all acts occurring within this activity are never neutral from the moral point of view but are inextricably linked to questions about morality and the ethical life. Such an activity, then, should not be viewed as anything less than a pursuit of moral and ethical ends, and to confuse this activity with the pursuit of other ends - like financial gain, technological innovation, the expansion of markets, or the satisfaction of personal interests - commits a modal confusion, which immediately involves one in a separate activity than that of founding a state. By modal confusion, I mean the error of engaging in a particular mode of activity with the wrong set of ends in mind. For example, someone who makes paintings would be deeply confused to declare themself to be an artist when their chief end is financial gain. Such an end is better captured by calling the activity manufacturing rather than artistry. Perhaps a more characteristic end of an artist would be the production of beauty, for instance, or self-expression, but not profit. Profit would be employed only as a means to further, more artistic ends that are deemed necessary by the social conditions the artist finds themself in.
Or imagine a person who becomes friends with someone to derive certain benefits from them, like using them to get to know someone they are interested in, but who nevertheless believes that the two are sincere friends. The person who befriends the other confuses what kind of activity they are engaged in. The relation of being friends with someone involves adopting certain ends that are demanded by the relationship. In the case of friendship, an obvious end that characterizes the activity is holding the other person as an end-in-themselves, as someone who is not valuable for any other reason other than the fact that they’re a friend. One would be deeply confused by believing to be engaged in friendship when one does not hold the relevant end in relation to the activity.
Now, when founding a network state, reducing the degree of modal confusion is central to the project of creating an ‘ethical’ state. If a founder holds an irrelevant set of ends in mind, they risk the potential for causing significant harm to persons, and I will argue that it does so by reducing autonomy. By autonomy, I mean a human being’s capacity to exercise willful, deliberative choice, and not be wholly dictated by external influence. The philosopher Harry Frankfurt defines it as follows: “Autonomy is essentially a matter of whether we are active rather than passive in our motives and choices - whether… they are the motives and choices that we really want and are therefore in no way alien to us.” Now, one’s autonomy exists within one’s subjectivity, which can be understood as a person’s conscious experience. It’s the center at which one’s thoughts, desires, perceptions, worries, fears, anxieties, all occur, as they manifest in experience. Subjectivity can then be divided into at least two parts, one of which is a quantitative dimension, the other being qualitative. The first consists of the stream of experience, of the constant succession of mental states and behaviors. At one moment I’m hungry and so act to satisfy the desire; at another, I’m struck with fear and run away from the object that is the target of my response, and so on. As the examples imply, this dimension of subjectivity involves a high degree of passivity; events and experiences are simply happening to me. The qualitative dimension, on the other hand, is far more active and is the space by which autonomy exists. This involves the capacity to evaluate one’s mental states and to reflect and decide whether they are worth acting on, whether they’re rational or not, whether they represent the world accurately; and to act autonomously is to act based on one’s qualitative nature, and not be carried away unreflectively by the more passive, quantitative dimension.
The central claim of this article is that the principal end of the state is to promote the development and growth of the qualitative nature of its members’ subjectivity. To hold this capacity of human beings as secondary, or accidental and not a primary need, is to be modally confused. That’s not to say the state is the primary institution responsible for promoting or even determining its citizens’ autonomy - the existence and crimes of the USSR are sufficient to refute that - but only that it shares the responsibility. Whatever its exact role is, or in what forms it is concretely realized, the state’s principal end is directed toward facilitating the development of its citizens’ subjectivity. A society can be imagined as a large, extended plain divided into proportions sized according to the degree of each part’s contribution toward reaching this goal. One part consists of the economy, another is occupied by the private and public affairs of communities and individuals, and another is delegated to the state. Whatever the exact configuration of this plain, each part cooperates and contributes toward fulfilling the full breadth of human needs. And I believe this can be done in numerous ways; there is not necessarily one form a state must have, which specifies and delineates each of its fixed parts to align with some ultimate reality, to reach this end. Nevertheless, I believe the state does have a hierarchy of ends.
It could be argued, however, that this is wrong and that founding a state is not a moral activity but merely a prudential one, whose end is to protect individual self-interests and preferences. That is, the state is not concerned with morality but with establishing conditions that enable individuals to pursue their own self-interests and preferences uninterrupted by other human beings. Because individuals are concerned with their own well-being, with their own survival, and the satisfaction of their desires, living in a state of nature, where there is no authority to settle disputes or conflicts regarding life, liberty, or property, is contrary to individual interests. It would be rational, then, to form a state invested with the authority granted by the consent of the governed which has the power to punish those who violate the law, adjudicate and settle disputes, and protect everyone’s basic liberties that prevent others from interfering with one another’s lives.
Understanding the state this way means that the ends of the state are prudential and not primarily moral. Individuals are free to opt into whatever network state they wish, insofar as they do so by their own, uncoerced choice.
Now Srinivasan, as I see it, is somewhere in the middle between the moral and prudential conceptions of state founding. He speaks of state legitimacy as being grounded entirely in the consent of the governed. If a network state receives enough members; if it expands to the point of reaching diplomatic recognition, then that is a testament to the legitimacy of that state. People have consented to their smart contract(s), they have invested a certain amount of authority to the founder(s) by agreeing to its terms, and such a state, Srinivasan concludes, is therefore ‘ethical’. But the notion of being ethical here is ambiguous. Does he mean that it is so because what constitutes something as ethical is an agreement, or does he mean that freedom to choose is the principal end of the state? The former is prudential because it reasons that it is up to individuals to decide for themselves what is ethical or moral, given that there is no objective fact of the matter; individuals calculate according to their self-interests, preferences, and desires, and whether a contract is fair, just, or equal is up to each person. The latter, on the other hand, is moral because it holds freedom of choice as what constitutes the moral ends of the state. What matters is whether individuals freely choose to join the state, and not whether the contract is fair or just independent of that. This is because individuals' most valuable capacity is to choose. Because it is up to each person to decide for themselves whether a contract is fair or just, a state is morally legitimate if people voluntarily consent to its contract.
Whichever one Srinivasan is committed to, both are problematic and I will present arguments against the two interpretations, which will be motivated by the following claims. That one, holding the state to be merely concerned with prudential ends is to confuse means with ends, which underestimates the role it plays in the individual’s life, and two, holding freedom of choice as the principal end confuses mere choice with free choice. These confusions permit the degradation of human dignity by disregarding the human need to foster the faculties necessary for autonomy. It is within each individual’s interests to be within a society. To be outside of a community, to be isolated and without access to resources, to be without recourse to institutions who will enforce the protection of one’s rights, is to live within a hostile environment that is against fulfilling one’s needs. However, establishing more hospitable conditions does not thereby define the principal end of the state, and the mere ability to choose does not necessarily respect the capacity for autonomy. It only offers the appearance of choice and not the reality. To freely choose means far more than the pursuit of satisfying an impulse. Before developing these arguments further, Srinivasan's two potential conceptions of the ‘ethical’ state need to be better understood. Let’s begin with the prudential account.
Section 3:
According to this argument, the state is directed toward establishing the conditions necessary for individuals to pursue their own self-interests, desires, and preferences, without the interference of others, and insofar as one’s projects do not infringe on someone else’s. An exemplar of this view is the philosopher Thomas Hobbes. A state of nature, where individuals exist outside of an organized collective bound by laws and institutions, is a state of war, filled with perpetual conflict and strife and the competition of self-interests, and consists of an endless pursuit of individuals attempting to gain power over one another for the sake of the control and security necessary for extinguishing the fear caused by their harsh environment. Setting aside the plausibility of such a state, what’s important is that, by understanding individuals in this way, human nature is presented as calculative, as the rational pursuit of one’s own interests. And since interests conflict, and each individual has an inborn right to preserve itself, to fight for its own survival; and because each one must determine what their survival requires, life in a state of nature is nasty, brutish, and short.
It would be far more rational, then, both for oneself and others, to form a state that would eliminate this perpetual state of war and conflict by implementing laws and institutions that enforce agreements and contracts made between persons, and that uphold conditions of peace, which allows individuals to pursue their ends without the fear of being interfered with. The philosopher Immanuel Kant phrases this as follows: “Each may seek his happiness in whatever way he sees fit, so long as he does not infringe upon the freedom of others to pursue a similar end which can be reconciled with the freedom of everyone else within a general workable law.”
Notice, then, that forming a state is not a matter of morals but of rational calculation, of looking out for one’s own interests. It’s not that a state should be formed because it allows persons to treat one another with dignity, or because each is worthy of some inviolable respect, but because it is in everyone’s best interests. Founding a state, then, “means finding out how the mechanism of nature can be applied to men in such a manner that the antagonism of their hostile attitudes will make them compel one another to submit to coercive law, thereby producing a condition of peace within which the laws can be enforced.” This is a prudential account of state-founding.
There’s a fundamental problem with this kind of account, however. The first thing to note is the conception of human subjectivity contained within it. A Hobbesian notion of human nature, simply put, suggests subjectivity consists of computational processes whose ends are the satisfaction of the subject's desires and preferences. The state’s aim, then, is to discipline the subject in a way that will lead to them having the capacity to coexist in peaceful conditions with others. It is not to prescribe certain definite moral ends, to orient them around a conception of the good, or to circumscribe what their desires should or should not be; it is to sustain the conditions necessary for individuals to pursue their interests without interfering with the right of others to pursue their own.
Now, the issue here is that human subjectivity is conceived one-dimensionally. Human beings are born with certain natural desires and preferences like survival and the fulfillment of basic needs, and the state is not to interfere with this but to protect each individual's impulse to preserve them, and to shape their lives as they see fit. Each can do as they please insofar as it does not harm another. But this is too simplistic. This amounts to believing that human desires and preferences occupy a single, quantitative plain, and each individual goes about maximizing these while simultaneously avoiding infringing on others’ ability to do so. But if we step back and ask whether a desire itself is desirable we are no longer asking a question along this quantitative plane, but have begun to ask about the qualitative nature of the desire. Is that desire of more worth than that one? This is a question regarding second-order desires.
First-order desires often happen to us, they occur, and pull us in the direction of the desired object. My desire to eat does not arise by my own volition. After a time of not eating, the desire simply renews itself. Second-order desires concern the will, of what one wants to want, of whether a desire is something one desires to motivate his or her will. Harry Frankfurt writes, “Creatures like ourselves are not limited to desires that move them to act. In addition, they have the reflexive capacity to form desires regarding their own desires - that is, regarding both what they want to want, and what they want not to want.” Focusing solely on the quantitative dimension of subjectivity does not account for this distinction. If someone goes about attempting to maximize their well-being by satisfying their immediate desires, some of the desires they do not act on, the ones that don’t motivate them to act but are present, are competing first-order desires, which do not consist of an evaluation regarding whether the one desire is of more worth than the other; one simply out-competes the other.
Now, with this distinction in mind, the point can be stated as follows: this qualitative, evaluative dimension, is first informed and shaped by the social context one finds oneself in, or, as the philosopher Martin Heidegger would phrase it, is thrown into. By being in the world with other people, through communication, language, and interaction, human beings begin to form and make sense of what occurs in their inner and outer life. William A. Luijpen and Henry J. Koren write in their book Existential Phenomenology that, “In my dealing with others, there occurs a quasi-process of sedimentation, and the quasi-effect of it is called ‘social facticity’ or my ‘social body’. The way I greet others, speak, or think is, at least in the first instance, largely the quasi-effect of the fact that I grew up in the West and not in China.” Social facticity, then, is the set of social conditions by which a human being becomes acquainted with the world, making things intelligible and meaningful, ordered and sensible. The philosopher Charles Taylor writes, “I can only learn what anger, love, anxiety, the aspiration to wholeness, etc., are through my and others’ experience of these being objects for us, in some common space.”
When developing within a social environment, the qualitative dimension of subjectivity is largely first shaped by the situation one is in, which provides the framework by which to discern who and what one is, what is valuable, what the good is, how one should conduct oneself in specific contexts, and so forth. Underpinning all of this is an assumed picture of qualitative evaluations. For this not to be present means the individual will not be able to live. Therefore, when a state is formed that will govern a society, it is not merely concerned with prudential ends but with moral ones as well. Self-interests, preferences, desires, fears, impediments to action, in short, the whole internal and external life of an individual, are first made sense of in the social environment. To think that one can merely pursue their own ends without reference to this further dimension is wrong.
As the psychologist Erich Fromm points out in his book To Have or To Be, living in social conditions that only emphasize the quantitative nature of human beings is dehumanizing. A society and state that promotes the satisfaction of desires and preferences, of one’s self-interests, which will supposedly somehow lead to realizing human beings’ higher capacities, is highly implausible. How can character traits like egoism, greed, and selfishness produce social cooperation, connection, and harmony, which are integral to well-being? Most of the great thinkers throughout history spent their time on this issue. Socrates, Plato, the Stoics, the Epicureans, all formulated distinctions between our qualitative and quantitative capacities. Fromm writes, “The essential element in their thinking is the distinction between those needs (desires)... whose satisfaction leads to momentary pleasure, and those needs that are rooted in human nature and whose realization is conducive to human growth and produces eudaimonia, i.e., ‘well-being’.” If the qualitative dimension of subjectivity possesses needs essential to well-being, such as the ability to actively and critically engage with oneself and the world, then measures must be taken that target these features of human beings, otherwise, they will be left empty and unfulfilled.
Now, as I mentioned earlier, this doesn’t mean the state must therefore be delegated the primary bearer of this responsibility. But it does mean that it plays a role toward this end. Whatever that precisely is, the principal end of the state is to discern and actualize its part in this process.
Section 4:
So much for Srinivasan’s notion of the ‘ethical’ state as one that establishes the prudential ends of rational, self-interest-seeking agents. What about the second way to understand this idea, that the state is ethical because freedom of choice is all that matters and is the fundamental end to be preserved and exercised in and by the state? The argument I will present against this way of understanding the state has to do with how we should understand the term ‘freedom’ in this context.
If freedom of choice is the primary end of the state; if non-interference in one’s decisions to pursue one’s ends is what the term ‘ethical’ amounts to, then it must be clear what constitutes a free choice. According to the prudential account of state-founding, a state was ethical because it established conditions for individuals to pursue their desires and private conceptions of happiness. It is not a question of morals but of calculative reason, of locating rational means, and the state is a way for individuals to coexist and pursue their interests.
As has been shown, however, the state does much more than this. By having an integral role in organizing society, the state substantially contributes toward the frameworks by which individuals understand themselves, which shape the concepts necessary for moral deliberation, for positing ends worthy of pursuit, and the resources used to differentiate good from bad, right from wrong.
The proposal now is that the term ethical suggests that the state is a moral activity and not merely a prudential one, but also that the sole end of the state is to allow individuals to freely choose for themselves what they consider to be the good, or what holds value, and by making an uncoerced choice, whatever the agreement is, by consenting to it, it is ethical. The freedom to choose is the principal end of all human conduct and affairs.
This creates a twofold problem that depends on the degree of value placed on choice. The first is that, if choice is held as being forfeitable, as something someone may decide to surrender when consenting to join a state, then a state can be ethical merely because people chose to opt in, even if it allows for the existence of conditions that are degrading to human beings. The second is that, if choice is held to be the principal end of the state and is not forfeitable, it may still not realize the freedom necessary for free choice, namely, autonomy. The first problem is more easily discerned, while the second is more subtle. Let’s begin with the first.
There are many reasons why someone may choose to join a state and forfeit their freedom, but for the sake of argument it’s best to focus on one and this will be when an individual feels alienated from, and alone within, a society. A historical way to frame this problem, as Erich Fromm does in his book Escape From Freedom, is to look at the fading presence of the Catholic Church after the Reformation. To put it very simply, in the Middle Ages the world was viewed as perfectly ordered and possessed an eternal structure created by God, including how human beings, both individually and collectively, were to live. The individual was not confronted with questions of how to live, what to do with one’s life, or what ends to pursue; the Church answered these questions and provided a sense of belonging in the world. Fromm writes, “In having a distinct, unchangeable, and unquestionable place in the social world from the moment of birth, man was rooted in a structuralized whole, and thus life had a meaning which left no place, and no need, for doubt… The social order was conceived as a natural order, and being a definite part of it gave a feeling of security and belonging.” When God was “demoted,” as the historian Marci Shore puts it, and when there was no longer available recourse to some greater being to understand how human beings should live and the responsibility became their own, a great space was left empty and needed to be filled again; human beings could not assume they were at the center of things. They themselves became accountable for how society was to be organized, how life should be lived, what meaning life possesses; and the answers to these concerns must be formed by human reason itself and not by an imposed, nonhuman standard. But this emerging form of freedom came with a price. Dostoevsky formulates this cost in his famous phrase, “If there is no God, then everything is permissible.” That is, without some ultimate, nonhuman reality that makes the world appear ordered, harmonious, justified, good, everything becomes unchained. And for things to return to their previous, stable state, which is of course necessary for human beings to live, it was human beings that bore the burden. Simone de Beauvoir, a 20th-century philosopher, writes in her book The Ethics of Ambiguity that Man now “bears the responsibility for a world which is not the work of a strange power, but of himself, where his defeats are inscribed, and his victories as well. A God can pardon, efface, and compensate. But if God does not exist, man’s faults are inexpiable.”
The experience of alienation in modern society can be partially explained by modernity not being able to cope with this burden. To use Fromm’s phrase, great efforts have been made to escape from it. Historians like Hannah Arendt have attributed the rise of totalitarian governments in the 20th century as arising from this condition, where individuals forfeit this new form of freedom by submerging themselves within the group and relinquishing their responsibility to choose how to live and decide what their lives ultimately mean. But doing so eliminates choice altogether and therefore reduces subjectivity to a mere thing that is not aware of itself, and thus not accountable for its actions and projects, as being the one responsible for what takes place in the world. And as the 20th century demonstrates, this is catastrophic. Therefore, no network state that attempts to allow individuals to forfeit their freedom and autonomy is worthy of being called ethical. Such a state is an attempt to avoid moral and ethical choices and does not attempt to cope with them.
The second part of the problem, where freedom is the principal value and is not forfeitable, is that it conceives of choice in purely negative terms. The mistake made is to confuse mere choice with free choice. Similarly to how the prudential account mistook individuals’ ends as being formed ultimately by the individual, this account of the ethical presupposes that choice can be a matter of pursuing first-order desires and does not require whether one has considered if such desires are worth pursuing; one could be moved entirely by instinct and therefore not by the faculties necessary for a real choice. If choice is simply a matter of determining how to maximize one’s satisfaction and is not concerned with the qualitative nature of the desires themselves, then reflection, deliberation, and thinking more generally are simply instruments used to obtain happiness. They are means employed to satisfy desires. But if desires go unchecked; if they’re taken for granted and assumed to be worth the attention we instinctively give them, then a choice was not made. That is, second-order desires are not taken into consideration. Acting purely from first-order desires is to be caused to act by impulse, instinct, or inclination, which determines the action, and not by reflection. It is through reflection and deliberation, through considerations formulated by one’s own will, that one truly chooses. The philosopher Immanuel Kant distinguishes between autonomy and heteronomy. Understanding this will clarify the argument. To act autonomously is to be an originating and self-determining cause of an action. To act heteronomously is to be caused to act, to be moved by influences and forces outside of one’s will. Thus to enact a choice freely one must will the action and not be motivated by what is outside of the will. The philosopher Paul Franco writes in his book Hegel’s Philosophy of Freedom, “Kant rejects the naturalistic understanding of freedom as exemplified by Hobbes that sees it as the unimpeded pursuit of one’s empirically given desires. In giving into natural desire or inclination, the will is determined by something other than itself…” From this, it can be seen how acting from desire does not constitute a free choice. If desires are conditioned by the external environment, then the expression of those desires was not of one’s choosing but is due to the conditioning that took place in the development and upbringing of the individual. Mere choice, then, does not constitute free choice.
But why, it may be asked, is this problematic? Even if the individual’s choice is said not to be fully free, why should the state concern itself with this? It’s up to the individual to discover their own freedom. I don’t necessarily disagree with this. It is not that the state should interfere with and enforce that individuals make free rather than mere choices, but only that it should concern itself with realizing conditions that are conducive to the development necessary for individuals to actualize their faculties for autonomy, which is located in the more qualitative dimension of subjectivity. The aim here is not to precisely articulate how the state should do this, but only that individual autonomy is the end it must strive toward. To hold this as secondary is to treat human activity as being in service to something other than itself; as if human faculties are meant for some other end. This is false. The state’s aim is to play its role in treating human beings as ends-in-themselves and as the reason for its legitimacy to have any authority. To do otherwise is to confuse self-interests with morality.
Conclusion:
The ‘ethical’ network state holds autonomy as its principal end. Its goal is to discover how to best contribute toward formulating conditions conducive to realizing this. What the government must precisely be, what laws are best, what institutions are necessary, must be understood in these terms. To do otherwise is to be confused about what activity one is involved in, which may lead to dehumanizing environments for those who opt-in to states that fail to live up to this standard.
-
@ a012dc82:6458a70d
2024-09-25 01:45:03Table Of Content
-
What is a Bitcoin Paper Wallet?
-
How Does a Bitcoin Paper Wallet Work?
-
Creating a Bitcoin Paper Wallet
-
Benefits of Using a Bitcoin Paper Wallet
-
Conclusion
-
FAQ
Bitcoin has become increasingly popular over the years, and with its popularity comes the need for safe storage options. One of the most secure ways to store your Bitcoin is by using a paper wallet. But what exactly is a Bitcoin paper wallet, and how does it work? In this beginner's guide, we'll explore everything you need to know about Bitcoin paper wallets, including how to create one, and the benefits of using them.
What is a Bitcoin Paper Wallet?
A Bitcoin paper wallet is a form of cold storage for your Bitcoin. It's a physical piece of paper that contains the public and private keys necessary to access your Bitcoin. The public key is used to receive Bitcoin, while the private key is used to send Bitcoin. Since the paper wallet is offline, it's considered one of the most secure ways to store your Bitcoin.
How Does a Bitcoin Paper Wallet Work?
A Bitcoin paper wallet works by generating a pair of public and private keys using a random number generator. The public key is used to receive Bitcoin, and the private key is used to send Bitcoin. These keys are then printed onto a piece of paper, along with a QR code that represents the public key. You can then use the QR code to easily send Bitcoin to your paper wallet.
Creating a Bitcoin Paper Wallet
Creating a Bitcoin paper wallet is a simple process that you can do at home. Here are the steps to follow:
-
Go to a paper wallet generator website, such as Bitaddress.org or Walletgenerator.net.
-
Disconnect your computer from the internet and ensure your printer is not connected to a network.
-
Generate a pair of keys by moving your mouse around the screen or using another form of randomness.
-
Print out the paper wallet, ensuring you print multiple copies and store them in a secure location.
-
Send Bitcoin to your paper wallet by scanning the QR code with your Bitcoin wallet.
Benefits of Using a Bitcoin Paper Wallet
There are several benefits to using a Bitcoin paper wallet, including:
-
Security - Since a paper wallet is not connected to the internet, it's one of the most secure ways to store your Bitcoin.
-
Control - You have complete control over your Bitcoin since you're the only one with access to your private keys.
-
Accessibility - You can easily access your Bitcoin by scanning the QR code on your paper wallet.
-
Backup - You can print multiple copies of your paper wallet and store them in different locations as a backup.
Conclusion
A Bitcoin paper wallet is a secure and accessible way to store your Bitcoin offline. By following the steps outlined in this beginner's guide, you can easily create a paper wallet and start safely storing your Bitcoin. Remember to keep your paper wallet in a secure location and make multiple copies as a backup. With a Bitcoin paper wallet, you can have complete control over your Bitcoin and protect it from potential online threats.
FAQ
Are paper wallets safe? Yes, paper wallets are one of the most secure ways to store your Bitcoin since they're offline and not connected to the internet.
Can I use the same paper wallet multiple times? Yes, you can use the same paper wallet multiple times to receive Bitcoin.
Can I store other cryptocurrencies on a paper wallet? Yes, you can store other cryptocurrencies on a paper wallet as long as the wallet generator supports them.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ a03b38f8:2c7ce1f0
2024-09-25 01:04:52-----BEGIN PGP MESSAGE-----
wcDMA17V9MGW3LFGAQv/clUvo/uJPS2NodjoiSskIjK+IQkSzGxjGCEPO6jzRBVK zY+rCNUEEv6i9EB4PAeihLEQREBm3zZqLsG9OeVnxIy0AWLQcBrH4WHQuIlRfii7 7SifuNky5LkBcguKVBe9NWDAmzgMP+Y8KKUTSeMUF1qNUPKKGCezvrjAjSojDvQK Jh4sewLMMI1ALihduxKOwLaZpinqyubOQz9LOB2oZg1xLpjXkGNbLQbsT3Aa3/dj MAojIp6qG8mERTtDB9C0ti+dNTn0mYtQPblHSZR38Ze25YYhYunRIlSUjPmI2233 VgTYYW3V9mci3v6tMdvO/lzgGVpb2EaqT0wxU0EqoM4knu7JFq0oqfGqtD4Wr4ro QnHuUprjH8qYFa4fpXTnY9f0OKxOacsBQenHvG9AQH+XZ/mSFcpUjZQJQmb0SYzK ZiWo6t3hIjg6lX/eXg+PixkgljLpbdIOZZb9PHK/aLfr47lEf0hCGfEptda1CZtH v377/o/psGdL2nYQdpab0tFNAYwDa7LaaxSYix6XU/8ew7Hfp0upIPE0SDxzKBJ2 +qlcIVxthOKoIjD0wnSy49UjqJGPFm4X9yfZUEtWqXr622cIHMmkmL3gm1xi+FSt /SVs3X5zypDYRxDilOeoimW1Vh1J0aQAWCMDPo1MuGkgZ6SdQ5sWOUnmBcGdhPWw DkXfkz5PL4tWrQxQiuUWbaXGDH0OTAYGc5LjFsZhMVE4hdJ48Gli70joIdrZUiSr MHGBdpQQtZFMN7xdWpag42aHxObnHvGP+NhIBT349Lp+/sfnFvQ7nPGhBSOI//va 6H/AtwVgWDM+J1KIdE/phgIPhGG3x8xGb4Lg8WB3YbBmJtTFO0G+ni8KjnZ73tvY o/U2bZseubIuVccQPt0igy8zSXb/FLuRF7Ns1ZRZnrs66Au+QzpvX0Lcyi/6JTDV 1OAC18PHWmgtKktfKD1D4y9CRMaBrgK9AFYPKONkxc4unnyotYgkPKgXsuENKde1 4LtBb/Atj+REalCgezGoyvp5jck5+SBSug29/csijUZBliv2iaiZ0dhEbMVB1rvo ly4n7CgKEoC4FPVsqiUOyOHkU8YqoUfeBz65MbtiALKBymmDvw8tSQnNA1LpnW3R In052B5akP2xE2/h2WXaxgDyR9gu2z+BkK1TN2tcSkrZ+SIauuyeAicXbjqBAuqW fJ1WOxgg5Rj9DCUS08e03CRSMYFQVVf3F1kFc6lsc4Y8tqvPQZiF9dOd8dGnpo76 5D9l8f7YwyuwkHlJ7oPTnCCpOIWvcUEVDmwDd2j4pEGMVA9K/IF02sjRCDG4Ktap VxosdEBWWJyQLz6USb17w5nRJ8yqlM3nv6zYak1G4e0Y9SPTeMKDFnw9z70/LGMI r1YTeWXrGA3qvaU1G36GOUZov7g0JLgffafJ+yN5Qccqn3EtIwHEaL6MLr6VOjoy M/pL0tadnxo+qkyOWpo/V5sz/MvoXvPO2f+LNy9POOVQaz8KMJB3gieJilJpCNIs 54N9ciu8Qe5A7oeD4PJ1GE661RLoaZDth3lq5VclNW+bcWr3Hd/mWTN1TnrGt1K3 E0PT+2B/m0UPVUrIFb/ZrIng27x8oKuNTa0DyyKtVvuOZl8DjXmtrN/yHI8rPTI9 Xa9Gfbf/yxcKUIEWGSM0Ujmrt2MoqnYR8rplNWXSBSRblwP2UfrC2C/hEVmc4KA+ DxCahylqF3LJNiG/0IHHXTd6g7gl2AuQIfaCVGy7x6OADQnvM4QlcPXkgcGrXqpp prnhE6W599Y+lvO80Ng3u2sQb9PgauWf62NMLochN66Hi6Bl4Ge0S+mey0/vNmvO K8IBwYxix/pQ7xKFyuI2OKOkBqPEMmvSLCMYI+3qa/r91S7R0GNuX7cZHU1mRNcq 21GSpgnjG985Rb5UzWrfk2HgDM9rgNuQ8o0NTiv8gYZlQWegsmczdAu5vZX9/48/ TnSNIVjfImDLEhXHTi5K2++Km8bVjYg1/gTV/dfrQ58sNdbnc2wzzCbdQ5/NxSHr 1m8h+0TzyWhNIKEWoZctk0qJKnXMfMcsxuju4zREPclm0l311yTauO7up9A/ogjB XhInGpHt4KqQ/GiIjweJPWYc/m9XwTCfRvq/JQCwv23TX6dfRDR/AKqJ8mo6VWZr rD9mpr+r85kS3Z0WFcN8CjWB5Za6Reo1XFeTdReNdsefEipmrnHDleU8NBVF1YZU 294hGSGpu5hn6arpWBg/CUK9SqkSrYePL3hCitjLswvP+rVxg2jHSUY2TPt8/6kg GaBxt3dn0ENHlPSbOk0nT8ik4pwpbdg52oOjohJOjXE+nQIXA5apOtVoGy5O5h9r mQn2eQZ5hLrqIhW7kU9mqW4XXtTEns5AcNtwGLoNpd1DMR6rGnkXSozStrPzovp4 lRTpOa4NsuFcUd++HlJHCVw0tXKuYttMcqwT4/Bt70qwtpZKueo7fcqbkLW5068Y RoRy5fUoYUlaHqLwT9TgWspR83xLjKViZqoVtZjxaKE8uRTh39JtFfw8jSM2BFRL rW+AHGm3SZnwYyOQUXbd4rjx89rHs7042QUGCJU61f7CBdYxfgshFA69Uew84O6r DTlYdSPcn5XKwWbZlt9/qkGfRem4L0u9W4YQevVmg8id23GI5z8O8FvMlqJ/2DKM ggYL5CAyUMs05pK2h9wC2oHgoGNy/4r3aoY4pyJR/LIVjW2zYTfK9t+Kbgy2RK4S 9ogGs7tWfOCy+sUyZMKwl8FLjQvttfDu9j2L8hAF0usPS8yLujihc1px6Mu/TyT1 FpBXE6dXRPMV9vNLB6EEEMvsWBjAkw32jI69jJoGBEKeyRFlAvTkYps6bJeW/4U/ T6RfLV4AqSD/p6k64TdOI4QYAXeIkwDFYG0TiwIr09cLzkRKEMlkzOzfpRbJPdpA taNHta1yPDr3sLOBF1CfilFF0HlXkc5+Foj7J9gPEfE3YaXLjuws5ejsHQF7Tjri sba0WBH4vhTK8c9KceV5oSo82oZSUcAylrufyxXEcmMWuY1OZuLeYIGNIDhlXRpR pJLpZZ6eCn6foAvRgmRHjth6A9sJ4X9t3Zh0YYo9jsIssPfSlcEhQ9acOe2jVjYk iDxBZiQA+X7GguRDH2zj9nW6fKEDfWWKpjjfq3yRd4wVfa0XChs8hKFURYRCJnZa eHUSjgqZXsVhk0J8FCBTyMsL2s5ePhrvKgxC5jqMjznv0B5CQRw0qoRwPWM2aEO1 hnT9smHehCiadCT9GVNMGQj1NSwOH/4dzDm8utt7XssbagUF2Fn+pDUphKYFJV7k WJIQNpQTC4IHzqjF+NipjAxxmUrSaCqyWLAy4WYJ0u7uAhU+6LoQ4wvQQTxWapbf w/sc2ua8IOxh/BwCB7vq32gYnskwkWJB6DQg1PqjRYwqJzOCETYlfVklqswbxIjP po6KHjlGzRAi0pfipQiQfAjMDIqfGMucNYO9k81aOMzBpp0KcOqaKB9FO3CUZnfi s7l0Vh0EA0dvrl0Qpp5xi1K8zKtF+TtjDmg/M4l5i9VB3Lpl1lOKlsDgFUee+g3d UdwORMjByrFBLIGe0+Rmo/Gak4rrk5QH/ErIMeJumhWcwlwCfr00s7QGY09LKUzd mQGL1MK+4w4HiLe+kdbHe0frcdjBiDEuZReW+SGKPdMrvWEsy4yr2JfIQ4NmbHD7 EdOZmojCOWkJAnbz/pZ59O/BJbuRRlY0MVdxfw0foXnINteMVmJ0JUYg/YqB2J7+ 2MXhyqTCiiJcziDU6s+9Gm2PWP8ihkgwrlfjG5bOWBRyGyaKT1ryMvP0+4J2Q8Vd dbM0zEwk8JwW2Snro3vinVPxA1vrEnkQ5TJUZuJqCasgEL5XaOXRtdOJCa9FDGIo UEz2IyN8G2MrHAzxB2SQ8kshycUsDp3K1tJYt+GeDmkWi0owYEFkb7cbHtbY33Kk bRZBS8ghwXIp8hy8AXXerIFh6kzENcP8P+jpHRBw4WWZ/k7Tp9fXxjkFnXZjQ24s wkiBz+kUN3FdZJOlSggiQDSntN0D2cApF/+NVTwQp4rZBWTw8e0PuJs2vne9vh3L eNci6g2B1Lxf6jWa9eZgcqQYZCtLl6ClVQM879jZo2o1+I0ta3S2p6u53llf10Pf Ad0vfj5AhBAkMbSvrgCiFyiMpjO9mIKpF/47XtyVEdcF1bx8ul5eewWTMrK7PMsn aTrVqwlmfQa8qPtuQr2OKsdKR//UlM0dSoyjQai2vZPyAosgbjiE9khAaKBKJaeK OC6gFPQemmGc4hVlGB0Cs+Dubg0OCoqpqOPitLh6TBCwqHcNso1Uz/qf7YsdKdJ5 6A3J1w7HV6f/FJSNZ7dPU1nFuWiJfMwn/1hGbQaWM/Ln4EQIDjspJYZTtY/8BOhI L4RJeU6vNTm2trmumgBKGuovSq1vZ/UWxEJkXCK9N+W2cLl7A2u8vkkCLj5oxr3y ybDvfd7kPZ+aZSW6Y7eA5CWehsh5PtJMtOaNGfCl6jynCj8xG1NKxWzewKv9Gs0E TM7+QqXrmuANuGYT0h5xlO7bXJpwynKX5mzvNuuq9kzUoikj2ucoVxKvhMi73Jvz 7I0EjJFXER30EovOdL6V9jAUk9eITx3cGQ/acHGnUVK7Ncq/bWd4/P0StQeINdN5 8TgUjKS0Wc4Y5gstdJXnJcQx3/pXSQAvsujgDQGWQCDxEU1t6YKu7UNuZG0gLmYi ZyRXKbKzlw10Tm28608D+zMJ/ZlJenqohm7g4YQV7T7/glZKFbqx1q2Inw67aLdj zr2m5KU1Adert+KfDKA6PvwBHGOPBkza0z1EdG2ft2xA6HjQfbRyNO+7iCwesJb4 54qGc9apW4+facRCNgQVCtEG9h2yrnqmDG8k3poSQagHaRUM0+kUq4g+ABPEi1/G xr6hkKmoniD9vmZKveyIzjuDXtMcIIezUCttDI5rssct2tIGBBq9uckduWb8dw+1 fWoje3NxxSiogQCeXrZLq8T8viPz3b/SpQHBpa8PfJ4+ljCH6Fzf0Jf5r3aViVb/ G8BxXuU5UdSaCs/MVdgLyrJWMpMoOTawXomEdl6Sty8BSn3kJPJ3WXK9tUIyyeg6 AvX+IJ22UldmfrhYu1+PI4hLz2GHY/NR5KT4VIUaYfSknnzhfj+dRGSSoT8H5ptM P58t0Zb0CwGwu3q3YsNosahnYo4d5eS1h39GbO1Bd4hSQkjbQ04aDYl1qIdXtaII 2ydLgWiWgCS4w7fsHohmvibOxCnGBblhY0bA9PlMUU4FX6VyS2DkrVcsltPX1+ZL cjmZiwOFzyiX6pYWuv8n7uWVW/tylWEsrxoSRYP2Ey/4HDHZ7F8AuCt7ouaJBoLW AksJt76BlYJGI7RS9tsjl97Jxi2gp2P4dAi5J95MQSGBWw5S60e9luMbR9yw8kHb 8TLEYxKfNdj6Uq0Phqa5tEkiU7UwttW2VBXS6fgyEYYcWcbruNs+T142VRhnGaTw CnoenePc7aFK+h+8bBP2PCJCTLNigM3dfJ3Zd4ch8xA3oKj9rxjDy6bh4HvOHsHP eimWuDNMKUvZ6tTQcN0Nl+MpqUgDqItmrkZB1wCNmitKzbEBN3uIGTpFtDHVupLb 4XyvlUwqdGhJrcPdUZy3JjulTkaGbuujg86JY0CCgLdVUyqofGI5YgKOx4x2L4RJ bxHb01iByLslLhG120Np5IkK4qSn9MGovQaqkoWm3ADFBSeFQGiTyemN4OPoKSZN mQAwp1dyNf7K7m6FlG5PHWXH3m2td4R6v2EHWN7IM1V5WqwG29wSCkKNjAKA0TZR K1Hy+bZDL0o1m2OwMhQvGY9oIpQr2rfTSWdknE41WR8Eqdg365ftWnQje+IEpKQU kyUfbKMd7iBFhM38OA2nSajugCbt5e/t5GoTMDvXXkKbpmIfpKk/rpBdxmkjDNFV ZgQ6tc/ySqft2+pmzj3g8vfDDzKMRN6W/q2N8TXc1tkcVqPOfjId97o5TTW+L8ME sQdKtssQGe9ICOJbXd1XM2AllrVZtsMRDe+4qxrky865p/qVNaJ+laotdNV7glJT 26PHqHlHWJN1mONoiLCaiqYRyNygsIc6fANIEKbEJxjdjW7mq579IYu0QAbsITwc NW7IAomk4vz5YVPEJIr/i1twERWn9IYvDjMroO1U1D7P3/Z1sE+xtU/0HVvvXLoD GD79KIr9nUDJTKKZyefy00piEyBJz9gHdJkryqBuAaODIPrWSs5nNS+MJc6fSv6j aQJdFcNQGuoIYtjHF1lz4cMSjd8pJlADIwrLt28NLL+Y/wHT6WUzpsWIOxwgJolL EnNDOaCBDk17CDoKWoqvT8RfYwUvtpK4QrEtLwOygEcObIaSjrMDkPropZRbiT+i dDQIK8T85ggYNrb9XZGwVbKEMiOnTxgsa/mxykAwi7Xp+5FDKS6HJS4QvE45zZY9 4j3azT3sqv9NIyTZKFnjLFIxWez5I+PWupuFY/oFC81kFvTI/OtJcNqKRIRlfv7M h/LNKrdmsJ4JC+Jn+SCZ5BXD/q/aaWPSzXgSMTnXOtTNi0Nsxp7roUuPZjvXt/s6 WyPf4qpN7GtBF1htg0uVfdSO2B9eVi+xU4Ly7uR+G+yI4oUDbHx3oBdoIoExwBRm Mu+arV9ELEkpHmidEjFuM1AB1C2gRH+H2mghF4Axxw== =6MjS -----END PGP MESSAGE-----
-
@ dc652bee:6154e7d0
2024-09-26 16:06:14NEW UPDATE TELEGRAM AIRDROP BOT
📢Exciting news! 🚀 Our new update bot is here to make your Telegram experience even better. Get ready for the ultimate airdrop! Don't miss out!
https://t.me/Dogiators_bot/game?startapp=F80aAU4OlGJX61YK
https://t.me/tonton_intract_bot/start?startapp=eyJyZWZlcnJhbENvZGUiOiJGOER6dDAiLCJyZWZlcnJhbFNvdXJjZSI6IlRFTEVHUkFNX01JTklfQVBQIiwicmVmZXJyYWxMaW5rIjoiaHR0cHM6Ly93d3cuaW50cmFjdC5pby90bWEvcmV3YXJkcyJ9
https://t.me/gamee/start?startapp=ref_730909086
https://t.me/Bcoin2048bot/app?startapp=ref_pCGwqQ15aSZUFYa9ZEys8qRH
https://t.me/realgoats_bot/run?startapp=c127fadc-579e-485a-a68f-f901cd4e64e6
https://t.me/OwlMini_bot/app?startapp=730909086
https://t.me/bluefarming_bot/play?startapp=c8a58023
https://t.me/BitsTonboxBot/BitsAirdrops?startapp=M9Ek3ygSFAJTZ5Y4PS2aoq
https://t.me/digibuy_bot/digiverse/start?startapp=0cb38b86ee4543c74bd76ab16c1c8fd3
http://t.me/foxs_HouseBot?start=730909086
https://t.me/Agent301Bot/app?startapp=onetime730909086
t.me/RealCowsHouse_bot/cowshouse?startapp=kentId730909086
http://t.me/token1win_bot/start?startapp=refId730909086
https://t.me/MemesLabBot?start=PNT7D8
https://t.me/major/start?startapp=730909086
https://t.me/uptonfi_bot/UpTonGames?startapp=ByKBX2QurGdYa
https://t.me/catizenbot/gameapp?startapp=r_1938_7836673
https://t.me/memefi_coin_bot/main?startapp=r_27d6952978
https://t.me/whitebunnywtf_bot?start=ref666953186736f7f2eff6261f
https://t.me/pixelversexyzbot?start=730909086
https://t.me/tapswap_mirror_2_bot?start=r_730909086
https://t.me/hamster_kombaT_bot/start?startapp=kentId730909086
https://t.me/IcebergAppBot?start=referral_730909086
https://t.me/gemsee_bot?start=ref_100a006b
https://t.me/GoodRides_bot?start=NzMwOTA5MDg2
https://t.me/lost_dogs_bot/lodoapp?startapp=ref-u_730909086
https://t.me/gemzcoin_bOt/tap?startapp=nSoqE-UNEtgNUcRp5luy0w
https://t.me/QappiMinerBot?start=730909086
https://t.me/Snakelite_official_bot/Snakelite?startapp=nOuSbPc0
https://t.me/squid_squad_bot/squid?startapp=link_730909086
https://t.me/lovetap_bot?start=ref_120218
https://t.me/BIRDTonBot/app?startapp=730909086
https://t.me/LovelyLegends_bot/start?startapp=kentId730909086
https://t.me/claytoncoinbot/game?startapp=730909086
https://t.me/pehekingdom_bot/open?startapp=iAzmZVumOr
https://t.me/loody_farming_bot/LOODY/?startapp=inviter_id_40937
https://t.me/Tomarket_ai_bot/app?startapp=0000bDIo
https://t.me/CoinCryptoGameBot?start=r_JSGDH54A
https://t.me/Xyzmercoin_bot/play?startapp=BZI2CZ
https://t.me/dragonz_land_bot/app?startapp=ref-668302fc033aa4721ab5d1ea
https://t.me/BullishFarmBot/start?startapp=r_730909086
https://dashboard.wormfare.com/referral/0DC0D761
https://t.me/betfury_social_bot/app?startapp=tgReLe1ec7c70
https://t.me/PipeFlareBot/pipeflare_app?startapp=730909086
https://t.me/TimeFarmCryptoBot?start=x3jKZG0eoJa58ayY
https://t.me/MatchQuestBot/start?startapp=0cb38b86ee4543c74bd76ab16c1c8fd3
https://t.me/DiamoreCryptoBot/app?startapp=730909086
https://t.me/money_dogs_bot/money_dogs?startapp=3eAlu89K
https://t.me/ZARGatesBot/?start=2307731133
https://t.me/taptapcore_bot/Earn?startapp=b1720f3afcf04e5cb76418c267c4559e
https://t.me/Mimiland_appbot/app?startapp=ref_eyJwIjoiIiwiZiI6InJlZiIsInIiOiI3MzA5MDkwODYiLCJtIjoiNjZkNWZmMWJkNTE3MGU1M2ZiYmMwZmNiIn0=
https://t.me/CyberFinanceBot/game?startapp=cj1CRjNxRE5WbmhNQlomdT1yZWY=
https://t.me/BBQcoin_bot/BBQcoin?startapp=rp_9004676_730909086
https://t.me/PonchKick_bot/ponchiqs?startapp=730909086
https://t.me/potusclick_bot/app?startapp=r730909086
https://t.me/chickcoopofficial_bot/chickcoop?startapp=ref_730909086
https://t.me/ArtiTapBot/start?startapp=referrerId730909086
https://t.me/Frogs_HouseBot?start=730909086
https://t.me/tomo_cat_bot?start=r-cofuLtoo
https://t.me/Boom/LoudCoins?startapp=F5iKvP2LEVi9g4hFkGdpya
https://t.me/The_Rocket_bot?start=r_730909086
https://t.me/monkeycost_bot/app?startapp=r_730909086
https://t.me/tapcoinsbot/app?startapp=ref_TxCe4a
https://t.me/cexio_tap_bot?start=1722546804203779
https://t.me/cexio_tap_bot?start=1722546804203779
https://t.me/flarexgamebot?start=66743fede9b04d43fd21fe9e
https://t.me/grandcombat_bot/start?startapp=TFqI0dXjLc
https://t.me/fishing_bowl_bot/fish?startapp=EQANA57LP2PPLgBIwbnWMpHD4708uGKu7YipzvELhOt6fdnA
https://t.me/GametyPlatform_bot?start=NzMwOTA5MDg2XzA
https://t.me/HUNDTAPbot?start=r_730909086
https://t.me/BabyDogePAWS_Bot?start=r_730909086
https://t.me/BillyBobRobot/GAME?startapp=730909086
https://t.me/wcoin_tapbot?start=NzMwOTA5MDg2
https://t.me/cherrygame_io_bot/game?startapp=r_730909086
https://t.me/pirate_frenzy_bot/piratefrenzy?startapp=i7z37hc2G6
https://t.me/MMproBump_bot?start=ref_730909086
https://t.me/theHoldCoinBot/app?startapp=ref_NRPViKZ4
https://t.me/not_panda_bot/not_panda_app?startapp=9j3938HJeb
https://t.me/gmdotaibot/Airdrop?startapp=ovyova
https://t.me/GoldVerseBot/app?startapp=ref_zzT4iN
https://t.me/herewalletbot/grafun?startapp=TewJ6VV5SA2CrVidvyILAXC8diL
https://gra.fun/?ref=TewJ6VV5SA2CrVidvyILAXC8diL
https://t.me/owlsonton_bot?start=730909086
https://t.me/y_nation_bot/start?startapp=NKS74T
https://t.me/cedex_tap_bot?start=1725744305355276
https://t.me/TondropEarnBot/app?startapp=66dfd225c839152d9203f5a9
https://t.me/BYIN_official_bot/BYIN_Launchpad_Beta?startapp=q3lj8O41
https://t.me/ARIXcoin_bot?start=ref_730909086
https://t.me/sunkongmyth_bot/sunkong_miniapp?startapp=E987837FE
https://t.me/boolfamily_bot/join?startapp=8T1X0
https://t.me/tonstationgames_bot/app?startapp=ref_aysq8p4swodmv4ex6c7e4y
https://t.me/y_nation_bot/start?startapp=NKS74T
https://t.me/GalaCoin_bot/app?startapp=ref_KFfSylID
https://t.me/Yaytsogram_bot?start=invite4546481
https://t.me/battle_games_com_bot/start?startapp=frndId730909086
https://t.me/PinEye_Bot/pineye?startapp=r_730909086
https://t.me/pocketfi_bot/Mining?startapp=730909086
https://t.me/SatoshiMiner_Hq_Bot?start=730909086
https://t.me/sidekick_fans_bot?start=730909086
https://t.me/bums/app?startapp=ref_rgws9zFi
https://t.me/TondropEarnBot/app?startapp=66dfd225c839152d9203f5a9
https://t.me/head_coin_bot/start?startapp=bonusId730909086
https://t.me/onus_tap_tap_tap_bot/join?startapp=1722155904792
https://t.me/Atleta_tap_bot/tap?startapp=a89197f4-6ef7-4925-a38d-cbe0cc71aa34
https://t.me/SecretPadBot/app?startapp=r730909086
https://t.me/Binance_Moonbix_bot/start?startApp=ref_730909086&startapp=ref_730909086&utm_medium=web_share_copy
https://t.me/catsdogs_game_bot/join?startapp=730909086
https://t.me/claytoncoinbot/game?startapp=730909086
https://t.me/playpenchobot/play?startapp=ZF6EG6NCVC
https://t.me/nodgoin_bot/?start=ref_309eb495-9c18-4c3b-8177-297b89ac8911
https://t.me/Loodygame_bot/loodydev/?startapp=inviter_id_40937
https://t.me/CrashinoCasinoBot/?start=EjtAhLG5X
https://t.me/BybitCoinsweeper_Bot?start=referredBy=730909086
http://t.me/CamelsHouseBot/House?startapp=66f428b404d8bde3bbb68790
https://t.me/forge_game_bot/start?startapp=NzMwOTA5MDg2
https://t.me/boinker_bot/boinkapp?startapp=boink730909086
🆘Several projects are coming to the listing soon, some have already been released, start today it's completely free.⛏️
-
@ b39b8e83:0e391257
2024-09-24 22:10:59For widespread privacy, we need a social contract. People must work together to deploy these systems for the common good.
Privacy isn't just personal. It's a collective effort. The more people use privacy tech, the stronger our defenses become.
Adopting privacy tools is a form of solidarity. When you protect your data, you help protect everyone's.
Education is key. Teach others about privacy tools. Help your friends and family set up encrypted messaging.
Support privacy-focused projects, businesses, & developers. Contribute code, donate, or simply use and promote these tools.
Normalize privacy practices. Make using encryption and anonymity tools as common as locking your front door.
Privacy as a social norm benefits everyone. It protects whistleblowers, journalists, activists, and ordinary citizens alike.
The social contract for privacy: I'll respect your right to privacy, and you'll respect mine.
https://image.nostr.build/f235113e856a4adfa13b25dd703f46e17bbeef3f40bbdebacacc5e0fc0063f79.jpg
-
@ c73818cc:ccd5c890
2024-09-24 18:47:18Il viaggio verso il trading smart continua, e vogliamo celebrarlo con te con una serie di eventi incredibili! 🚀
✨ Sfida di 6 secondi:
Partecipa alla Sfida di 6 secondi di Bitget e vinci una PS5, una gift box speciale e 20.000 USDT! 🕹💰
📜 Lettera di Gracy Chen
La CEO Bitget condivide tre storie ispiratrici che raccontano la crescita straordinaria di Bitget e la nostra attenzione ai risultati. 💪 Scopri di più su come sia diventato uno dei primi quattro exchange di criptovalute nel mondo! 🌍
https://www.bitget.com/it/blog/articles/6th-anniversary-letter-from-bitget-ceo
🔗 Unisciti alla celebrazione e fai trading in modo smart con Bitget! https://bonus.bitget.com/U1JNEK
BitgetTurns6 #TradeSmarter #BitgetAnniversary #Crypto #Bitcoin #BitcoinReportItalia #Bitget #PS5 #PlayStation #BGB
https://www.bitget.com/events/6year
-
@ dc652bee:6154e7d0
2024-09-26 15:40:20Embracing the power of positivity and prosperity! 💵✨ Let's make every dollar count and spread good vibes all around. #GoodDollar 🌐https://n9.cl/gooddolars
-
@ d6affa19:9110b177
2024-09-24 18:31:42i'm in the upstairs office. lost in some project i've been tinkering with. i feel driven with purpose.
the door is cracked open. i always leave the door open.
Her footsteps echo up the stairway. but my focus is intense; a solution just beyond my fingertips.
the door creaks open, a soft whisper of a sound.
i instantly feel Her presence. a sweet vanilla scent wraps around me, thick and intoxicating.
Her fingers brush through my hair, a gentle caress.
She grips my hair, then releases it— over and over again. it feels good.
a soothing warmth envelops me.
Her fingers glide, each stroke igniting my senses. a chill races down my spine.
the monitor becomes a bit distant.
"You're really focused, hmm?" She teases, leaning closer. "I'm just checking in on my sweet boy." Her tone alluring, already drawing me in.
"of course, my Queen." i reply, my eyes glued to the screen, struggling to concentrate. "thank You," my voice hints at annoyance. "i'm so close to finishing this up."
just when i near a breakthrough, She appears, a siren pulling me from my path. how does She know..? the quiet signals that betray my focus— that reveal my yearning.
"Hmmmm," She playfully muses.
ugh, i need to concentrate. but the way this feels...
it pulls me deeper.
Her fingers drift by my ear, lingering around my neck. nails grazing my skin, sending shivers through me.
my heart begins to race. the screen blurs, reality separates.
"Okay, sweet boy." Her voice is a soft command. Her nails dig in, a mixture of pain and pleasure. a sharp contrast to the softness of Her touch. "I'll be downstairs while you finish."
yet She remains. i close my eyes, drowning in the sensation. i should be finishing this project...
but each press feels like a silent command, an urge to abandon my thoughts, to succumb to the pull of Her presence.
the way She easily captures my attention... it makes me feel so vulnerable...
Her grip finally loosens, and slowly leaves my neck. it wants more...
i barely hear Her leave. but the air feels colder. the warmth of Her presence is fading. an aching emptiness fills the space...
the weight of Her absence settles in, another reminder of how easily She commands my thoughts...
desperately, i take in the remnants of Her scent.
i stare at my monitor. focus shattered, thoughts scattered like leaves.
i linger for a moment. fighting the urge to chase after Her.
the pull of Her absence is heavy in the air. i'm unable to resist. i rise from my seat.
the door is slightly open. She always leaves the door open.
i make my way downstairs, lost in the thoughts of serving Her. my true purpose...
-
@ bcbb3e40:a494e501
2024-09-24 17:23:00|
| |:-:| |BLANCO, Carlos X. y COSTALES, Jose; España: Historia de una demolición controlada; Letras Inquietas, 2024|
Ya hemos publicado varias reseñas de algunas obras del Profesor Carlos X. Blanco, cuyas temáticas nos resultan totalmente familiares, y con las que coincidimos en un buen número de sus análisis y críticas del mundo actual. Recordaremos, para aquellos que estén interesados en sus obras las reseñas de De Covadonga a la nación española: La hispanidad en clave spengleriana y Un imperio frente al caos, además de algunas otras que podréis encontrar en nuestro blog. La obra del autor asturiano, en este caso en coautoría con José Costales, resulta muy clarificadora a la hora de analizar aspectos generales de la historia de España, cuestiones que tienen que ver con nuestra historia particular, y aquellos hechos que podemos considerar como más generales y fruto de un contexto y unas coyunturas que han marcado el destino de nuestra Patria en los últimos tiempos. Es por ese motivo, que así de entrada podemos distinguir dos bloques claramente diferenciados en esta obra: Un primer bloque que aborda nuestra historia peculiar, las características que definen el «hecho hispánico» y marcan nuestro devenir histórico; un segundo bloque en el que se señalan las amenazas y peligros que se yerguen frente a la España actual, aparentemente agonizante y desahuciada por la falta de soberanía y una serie de problemas graves y trascendentales que amenazan nuestra existencia.
Hay que destacar que el prólogo que precede a la obra en sí y le sirve como presentación corre a cargo del conocido abogado, jurista e historiador Guillermo Rocafort. En un breve pero certero escrito delinea los grandes problemas que atenazan a un Occidente decadente en plena crisis económica, geopolítica y de valores, embarcado en una deriva suicida que hace aguas y se ha vuelto insostenible. La crisis del capitalismo unipolar y globalista enfrenta el reto de la pujanza de los BRICS, con el resurgimiento de Rusia y el desarrollo y ascenso como superpotencia de China, junto a la formación de grandes bloques geopolíticos que definen la multipolaridad que, recientemente, autores como Aleksandr Duguin vienen teorizando desde la escuela euroasiática. Esta situación hace que la el mundo anglosajón y sus oligarquías plutocráticas comiencen a ver resquebrajada su hegemonía, con su sistema de dinero fiat y sus organizaciones pantalla, tales como la Unión Europea, o el desarrollo de su conocida como ideología woke y todas las perversas y destructivas ingenierías sociales asociadas, así como la acción de la Agenda 2030.
|
| |:-:| |DUGUIN, Aleksandr G.; La geopolítica de Rusia: De la revolución rusa a Putin; Hipérbola Janus, 2015|
En el caso particular de España los efectos de los más de 300 años de dominio anglosajón han tenido consecuencias especialmente perniciosas con la desindustrialización, la destrucción del sector primario, las ingenierías sociales asociadas a las ideologías de género, donde España ha servido como particular conejillo de indias, o nuestras permanentes renuncias en materia de política exterior, donde nos hemos visto obligados, por imposiciones venidas del otro lado del Atlántico, a renunciar a nuestra soberanía sobre el Sahara Occidental o a las permanentes y humillantes cesiones a Marruecos.
En el escrito de Introducción, los autores trazan una genealogía de los hechos, de las circunstancias que se hallan detrás de las razones del propio título de la obra, «Historia de una demolición controlada», en la que el papel de la angloesfera ha sido fundamental para la situación de debilidad, sometimiento y negación de nuestra propia historia que vivimos en la actualidad. Somos parte de una Europa sojuzgada que actúa a remolque de las políticas estadounidenses y anglosajonas, a través de la acción de la OTAN, donde no somos más que un agregado servil, actuando en defensa de los intereses geopolíticos del Imperio. Dentro de Europa, la UE define otro tipo de jerarquías internas, en las cuales el eje franco-alemán impone sus intereses a los países con economías menos desarrolladas del sur. Al mismo tiempo, también se advierten las importantes transformaciones que el régimen constitucional de 1978 ha experimentado en las últimas décadas, especialmente a partir de Zapatero, con el mayor sojuzgamiento de España a la Agenda globalista.
Todas estas circunstancias adversas, y también trágicas para nuestro destino, hacen necesario un análisis de la propia historia de España, de su gestación y de los atributos que han cimentado la idea de lo español o hispánico. La historia de España ha estado condicionada por su proximidad a África, lo cual ha tenido una importancia decisiva en su configuración final. Con la invasión musulmana del 711 se produjo un episodio de dislocación dentro de nuestra historia, que a partir de ese momento experimentó una situación de dualidad étnico-religiosa y comenzó un episodio transfigurador y de construcción del ideal hispánico que se había iniciado con el reino visigodo de Toledo, y que la Reconquista contribuyó a potenciar. En este sentido, la configuración étnica que resultó de la invasión árabe hizo que las zonas del Norte, donde se refugiaron los restos de la antigua nobleza visigoda derrotada, predominó el elemento germánico que se erigió como motor inicial del proceso de Reconquista, mientras que en otras latitudes del levante y el sur peninsular se produjo un proceso de africanización y semitización sobre las antiguas poblaciones hispanorromanas. Un norte cristiano, germanizado e indoeuropeo, equiparable al Norte de Europa, representado por la monarquía asturiana frente a un sur africanizado, sumido en un caos étnico y de enfrentamientos civiles era el resultado de la entidad andalusí.
El proceso de romanización afectó de manera desigual a los territorios peninsulares, y los pueblos de las regiones noroccidentales como astures, cántabros o vascones apenas se vieron afectados, conservando un importante sustrato indoeuropeo en contraste con las regiones más mediterráneas, ocupadas por los íberos, que ya poseían un modelo de civilización elevado y en conexión con las civilizaciones clásicas mediterráneas. Estos elementos ya aparecen claramente expuestos en la interpretación spengleriana que uno de nuestros autores, Carlos X Blanco, expone en De Covadonga a la nación española: La hispanidad en clave spengleriana. Es el contraste entre una España atlántica, indoeuropea y germanizada frente a otra vertiente representada por la España mediterránea, levantina y romanizada. En la confluencia de ambos modelos tenemos la definición de las sucesivos siglos en los que se forja la Reconquista, en la que, según los autores, pasamos de una etapa inicial de predominio atlántico y noroccidental, con el Reino de Asturias, y posteriormente León, capitalizando el proceso de la Reconquista, mientras que posteriormente, será Castilla, que obedecerá al modelo mediterráneo, quien llevaría la batuta en el avance hacia el Sur y la hispanización de España, porque la invasión del 711 marca un proceso de deshispanización, una idea fundamental, también en nuestra opinión, que el avance de los reinos cristianos del Norte contribuirán a erosionar y finalmente, para nuestra fortuna, destruir por completo.
Como parte de la geopolítica hispánica y su relanzamiento como Patria común, es fundamental que España vuelva a resucitar el eje atlántico y noroccidental, propiamente asturiano, frente aquel castellano, para que recupere su primacía como eje en la reconstrucción de España y revertir así la agonía y rumbo errático que nos lleva hacia la destrucción total y la desaparición como nación histórica.
No obstante, si queremos refundar España a través de un verdadero proyecto nacional debemos ser realistas, y no dejarnos embelesar por los visiones sobreexcitados que representan el modelo Imperial de los Austrias o posteriores reverberaciones del mismo a través de construcciones ideales, sino que contemplando las actuales coyunturas, con el viraje hacia la multipolaridad que está experimentando el mundo actual, quizás estaríamos llamados, o al menos existe ese gran potencial, a liderar una suerte de hispanosfera con los antiguos países que fueron parte de la América española, frente a la anglosfera, que viene perjudicando nuestra soberanía y sometiéndonos, junto al resto de Europa, como una colonia.
Blanco y Costales nos ofrecen algunas directrices para esta reconstrucción, tales como la descentralización de los centros de poder, frente a todo modelo jacobino y liberal diríamos nosotros, como parte de un modelo confederal, que incluso podría apoyarse en la fundación de centros de poder en el continente americano. Asimismo, este modelo confederal, implicaría dotar de mayor poder y protagonismo a las regiones, tal y como habría postulado uno de los grandes teóricos del tradicionalismo español, Don Juan Vázquez de Mella, frente al actual modelo balcanizador de las 17 taifas dirigidas por las oligarquías partitocráticas y corruptas del Régimen de 1978. En cuanto al modelo político requerido, este no es la monarquía, sino la república, por el descrédito de los Borbones y la trayectoria descendente y de decadencia que han venido marcando en su reinado desde hace más de 300 años. En cualquier caso, lo que este modelo debe aportar es cohesión interna y voluntad de integración en el modelo de mundo unipolar, que se viene gestando y estructurando bajo relaciones de poder, redes económicas, comerciales y de otro tipo, que deben garantizar esa capacidad de interconexión. Y, por supuesto, en coherencia con lo sostenido con anterioridad, nuestros autores proponen que el eje atlántico y noroccidental debe representar el motor y artífice de este nuevo ciclo histórico.
Desde el advenimiento de los Borbones a comienzos del siglo XVIII, el polo mediterráneo y africanizado ha venido tomando un protagonismo creciente, que vemos reflejado el el triunfo posterior, a lo largo del siglo XIX, del liberalismo con la destrucción del Imperio y el sometimiento de España y de su historia a los dominios de la leyenda negra, urdida por la anglosfera, y que tiende a presentarnos como el producto de una hibridación de pueblos afrosemitas y mahometanos, sin identidad, y como una especie de anomalía frente a la europeidad prototípica. Un discurso que, claro está, fue aceptado por el liberalismo español con la consecuente desvalorización y rechazo de los orígenes astur-godos de la monarquía hispánica y del proceso de Reconquista por parte de unas élites corruptas, antiespañolas y endófobas, que se sometieron ideológicamente a Francia y al mundo anglosajón. En un principio, esto sirvió para provocar fragmentar la unidad interna del Imperio Español y enajenar el catolicismo de la Hispanidad, y posteriormente, una vez destruida esa unidad, someter a estos países al capitalismo depredador y esclavizarlos por la vía de la deuda. Paralelamente, y a través de la masonería, también se introdujeron ideas profundamente destructivas entre las élites liberales y traidoras, como son el laicismo, el separatismo y otras ideas disolventes que nos vienen desnaturalizando desde hace siglos.
La acción de este capitalismo destructivo y depravado, es la que nos ha convertido en un instrumento en manos de grandes cenáculos y organizaciones que forman parte de un entramado complejo y anónimo, desde donde se interviene permanentemente en nuestros asuntos imponiendo cambios profundos en las costumbres, tradiciones e identidad, empobreciéndonos y reduciéndonos a la más pura insignificancia.
Otro elemento a destacar, podríamos decir una de las grandes piedras angulares que definen la idiosincrasia de lo Hispánico, viene representado por el Catolicismo, que en el caso peninsular también revistió un carácter peculiar, especialmente en lo que respecta, una vez más, a los contrastes internos entre la zona atlántica-noroccidental y la mediterránea, así como con la propia realidad del reino visigodo, donde la Iglesia resultó ser muy autónoma, vertebrada a través de sus concilios. Con la irrupción de la contemporaneidad, este elemento, el católico, de vital importancia durante la Reconquista y a lo largo de toda nuestra historia, se ha visto disminuido, con la propia acción del liberalismo, y especialmente desde la izquierda, y también desde sus propios centros de poder, desde el mismo Vaticano, a raíz de su famoso Concilio Vaticano II, abdicando en sus principios y doctrina frente al liberalismo y el mundo moderno.
En el primer párrafo hemos hablado de un primer bloque, que de algún modo vendría a hablarnos de nuestra historia, de la autorepresentación que tenemos de la misma, y los elementos basales que componen su estructura. Esta sería la primera parte del libro. Una segunda parte vendría comprendida por el análisis de otros elementos más externos que definen unas coyunturas internacionales muy características, las cuales forman parte, desgraciadamente, de nuestro presente actual.
Entre los principales elementos de análisis se encuentra la acción de la anglosfera y el sometimiento que experimenta España junto al resto de naciones del orbe europeo, especialmente occidental, bajo instituciones transnacionales como la OTAN o la UE, que lastran permanentemente nuestra soberanía y nos convierten en meros cipayos al servicio de los intereses de la anglosfera (Estados Unidos y Reino Unido) en contra de nuestros propios intereses. El ejemplo más significativo lo tenemos en Ucrania, donde la OTAN está librando una guerra contra Rusia en la que viene utilizando al pueblo ucraniano como ariete de sus intereses geopolíticos a costa de la destrucción del país, en un auténtico drama humano con la muerte de miles de jóvenes en el frente de batalla. La historia de la anglosfera viene siendo la misma desde siempre, en el que sus teóricos aliados vienen siendo humillados, con multitud de traiciones, y ataques de falsa bandera, la creación de grupos terroristas, promoción de golpes de Estado, compra y soborno de políticos con aquellos países que no se sometían a los intereses del Imperio anglosajón. La base de tal poder, en la que tal imperio basa su poder el capitalismo financiero y especulador, cuyas raíces se encuentran en el siglo XVII, y que sirve a unas élites globales que se sirve de los mecanismos tales como los procesos inflacionarios para empobrecer y someter a los pueblos, a los que desprecia e instrumentaliza al servicio de Agendas globalistas. Al mismo tiempo acaparan gran parte de la riqueza global, que mantienen oculta en paraísos fiscales y de la que se sirven para sufragar el tráfico de drogas o la financiación de grupos terroristas que protagonizan los atentados de falsa bandera a los que nos hemos referido.
|
| |:-:| |MUTTI, Claudio; Democracia y talasocracia: Antología de ensayos geopolíticos; Hipérbola Janus, 2017|
El enorme y desproporcionado proceso de financiarización que padece la economía del Occidente sometido a la anglosfera ha tenido consecuencias funestas sobre el complejo productivo real, redundando en la desindustrialización y la decadencia general bajo las teorías del «decrecimiento». Desde la administración Bush, a comienzos de siglo, hemos asistido a una serie de guerras de agresión en las que se han destruido países como Irak, Libia o Afganistán con el objetivo de controlar los hidrocarburos y las rutas de transporte, una tendencia que se ha venido incrementado especialmente con la administración Biden , y anteriormente con la de Obama, con la creación de organizaciones terroristas como el ISIS y la desestabilización permanente en Oriente Próximo, y el creciente y peligroso papel del complejo militar industrial.
Pero el poder y hegemonía estadounidense están menguando a pasos agigantados con la emergencia de dos grandes potencias, como son Rusia y China, frente a las que la anglosfera ve amenazada su hegemonía económica, con la colonización comercial china y el resurgir del potencial ruso, frente al cual, como decíamos, libran una guerra con intermediarios a través de Ucrania. Al mismo tiempo, tenemos a los BRICS, liderados por Rusia y China, con países emergentes como Irán, la India o Brasil con el papel de potencias regionales. La guerra de Ucrania solamente ha conseguido revigorizar a Rusia, alejarla de Europa y reforzar su alianza con China, mientras que los grandes perjudicados son Ucrania, que quedará en manos de grandes fondos de inversión como Blackrock ante una pretendida reconstrucción del país y las multinacionales que participarán en su reconstrucción, quedando en manos del globalismo. Europa es la otra gran perdedora, empobrecida y sumisa ante los designios del Imperio yanqui, al que rinde pleitesía a través de sus gobernantes, que no son más que títeres. Ante la inevitable pérdida de soberanía en el mundo, la anglosfera también pretende llevar la guerra a Asia contra China, viendo la derrota que está sufriendo en todos los frentes.
En el contexto de los intereses hispánicos, la anglosfera siempre ha representado una amenaza y un elemento especialmente dañino, responsable de la disolución del Imperio español con la introducción de las ideas liberales y masónicas entre las élites locales hispanoamericanas, practicando formas aberrantes de neocolonialismo sobre estos territorios una vez independizados, y siendo considerados como el patio trasero de Estados Unidos, quien ha practicado una política especialmente perniciosa y de desestabilización en todos estos territorios en vistas a coartar cualquier forma de desarrollo positivo.
Otro de los grandes problemas que se abordan en el libro es la amenaza que representa el enemigo del sur, Marruecos, para la integridad territorial española, sobre Ceuta, Melilla y las Islas Canarias, con el apoyo incondicional de países como Estados Unidos, Francia o Israel, tras las primeras y humillantes concesiones que ya se produjeron en 1975 con Juan Carlos I con el Sahara Occidental, y las posteriores, bajo mandato de Sánchez. Al mismo tiempo Estados Unidos e Israel especialmente, participan activamente en el rearme y fortalecimiento del reino moro, que ha desarrollado una política expansionista y agresiva contra los países vecinos. Para ello también se sirve de los lobbies marroquíes que actúan en el propio seno de la UE y dentro de España, que se sirven de las políticas cobardes y traidoras de sus políticos adheridos al Régimen del 78. Las consecuencias no se han dejado de notar en la destrucción y progresivo debilitamiento de nuestro sector primario en detrimento de los productos del país norteafricano, que entran sin ningún tipo de control en nuestro territorio, sin cumplir los requisitos mínimos a nivel fitosanitario. La ineptitud, servilismo y cobardía del actual Régimen hacia poderes globalistas y transnacionales, hacia la anglosfera, nos condenan a seguir un guión sin ninguna autonomía ni poder de decisión.
Otro de los ámbitos importantes que contempla el libro, lo encontramos en la ya mencionada Unión Europea, que no deja de ser otro instrumento de dominación y supeditación a los intereses de la anglosfera, y donde se reúnen los representantes de los grandes poderes fácticos a través de plutócratas, banqueros y poderes económicos y financieros transnacionales. Esta institución ha ido sustrayendo progresivamente el poder de las naciones que la integran con una comisión europea con atribuciones y poderes omnímodos para dictar normas y con una presidenta, Ursula Von der Leyen, metida en multitud de casos de corrupción, entre los que destacan aquellos vinculados a la Plandemia de 2020 y las falsas vacunas. Todo ello sin contar los protocolos criminales que se impusieron durante ese periodo, la represión policial y el cercenamiento de derechos y libertades con la presión absolutamente criminal sobre los que decidieron no «vacunarse» con el producto experimental del que nadie se hacía responsable y sobre el cual reinaba toda opacidad informativa. Desde esas fechas hasta el presente los fondos de inversión globalistas, como Blackrock o Vanguard entre otros, se sirvieron de la crisis generada para enriquecerse y acaparar la compra de todo lo comprable como instrumento de las élites plutocráticas mundiales y sus ansias de dominio global.
|
| |:-:| |NAD, Boris; Después del virus: El renacimiento de un mundo multipolar; Hipérbola Janus, 2022|
La Unión Europea no ha dejado de ser, como ya hemos dicho, parte de las organizaciones que la anglosfera, y particularmente el gobierno yanqui, ha utilizado para dominarnos y debilitarnos desde 1945, y en nuestros días también a través de la Agenda 2030, a partir de la cual pretenden reducir Europa a la nada, desindustrializando y destruyendo el sector primario, algo especialmente dramático en el caso español. La UE también nos habla de la implantación de la divisa digital con todos los peligros que esta entraña como, por ejemplo, la posibilidad de que se programe su uso y sirva como herramienta de control social para monitorear y controlar nuestras gestiones, la caducidad del dinero o limitar la compra de productos en función de la llamada «huella de carbono». A ello debemos añadir el proceso inflacionario que venimos sufriendo desde el 2020 en una farsa deliberadamente provocada por los bancos centrales (la Reserva Federal y el BCE) con la impresión masiva de dinero.
En el plano social la UE no ha dejado de implementar el modelo del caos multicultural que viene ocasionando estragos en buena parte de la Europa occidental a través del uso de recursos maquiavélicos y diferentes ingenierías sociales que se apoyan en los mass media. Esto ha generado una distopía social con la introducción de ideas aberrantes como las asociadas a las ideologías de género, con la castración y hormonación de niños o el odio radical y enfermizo hacia los hombres blancos heterosexuales, convertidos en potenciales violadores con la ideología feminista institucionalizada. Y todo esto con el contraste que supone la llegada masiva de «inmigrantes» de países de África, por ejemplo, donde predominan sociedades patriarcales, en muchos casos musulmanas, cuyas tradiciones y visión de la vida chocan con las ingenierías sociales de la élite globalista.
Carlos Blanco y José Costales plantean una refundación de la Unión Europea bajo otros parámetros más democráticos y bajo unos organismos reguladores que puedan controlar los lobbies, las multinacionales y a los plutócratas y frente a los abusos de poder del eje franco-alemán. Una Europa de los pueblos, de naciones soberanas al servicio del interés ciudadano frente a las oligarquías y el gobierno mundial.
Otro de los capítulos está dedicado al papel de las oligarquías y las élites, donde reaparecen algunos de los temas ya tratados, y en los que se viene a destacar la acción perniciosa y destructiva de estos poderes anónimos que actúan a través de organizaciones pantalla y agendas planificadas perpetradas desde el llamado Occidente, bajo las premisas de una ideología misántropa y deshumanizada que es asumida por los gobiernos traidores de las naciones de la Europa occidental. Todas estas políticas se presentan bajo aspectos devastadores en el sector alimentario, con la ya referida demolición del sector primario con catastróficas consecuencias en un futuro próximo, o la fabricación de guerras, conflictos sociales y polarización de la población, junto a falsas banderas y grupos terroristas creados y financiados desde el propio Occidente. En este sentido tenemos multitud de ejemplos de desestabilización en torno a la red Gladio durante los años 70 (los famosos años del plomo en Italia) o con el tráfico de drogas, que ha servido para generar conflictividad social en Ecuador en los últimos tiempos tras quedar cortadas las redes del comercio de heroína procedente de Afganistán.
En los últimos capítulos del libro también se aborda el separatismo y la balcanización de España, un fenómeno propiamente moderno y que aparece indefectiblemente ligado al advenimiento de los liberales a lo largo del siglo XIX. A raíz de una serie de conflictos de origen dinástico, se generó una antítesis irreconciliable entre dos sistemas de gobierno, el propiamente moderno representado por el liberalismo y encarnado en la futura reina Isabel II y el tradicionalismo representado por los carlistas y encarnado, inicialmente, por Carlos María Isidro (Carlos V). Se libraron tres guerras devastadoras entre liberales y carlistas a lo largo del siglo XIX, en las que se dirimieron dos modelos, uno centralista (liberal) frente a otro descentralizado (carlista) con el respeto a las instituciones locales y regionales, a los Fueros. cuyas prerrogativas y vigencia se fueron perdiendo a lo largo del siglo. El siglo XIX tuvo unas consecuencias desastrosas para España, con la liquidación del Imperio y su debilitamiento en todos los ámbitos. Es a finales de susodicha centuria cuando nacen los movimientos separatistas, especialmente en Vascongadas y Cataluña, que irá cristalizando y gestándose a través de un discurso identitario cada vez más radical y antiespañol. La decadencia política e institucional que representa el actual Régimen Constitucional del 78, ha convertido a las formaciones políticas separatistas en los árbitros del sistema, ejerciendo de bisagras en la formación de los gobiernos centrales, con episodios vergonzantes y humillantes como los asociados a la Ley de Amnistía del PSOE en los últimos tiempos. Al mismo tiempo, el separatismo ha asumido los mismos mantras ideológicos a través de sus oligarquías regionales, que el resto de los integrantes del régimen partitocrático en relación a las políticas globalistas impulsadas desde la UE o la siniestra Agenda 2030, a la que son plenamente funcionales. En este sentido el mundo anglosajón, interesado en contribuir a la destrucción interna y fragmentación territorial de España, a través de complejas redes de financiación, como las desplegadas por Soros y su Open Society o las desplegadas, a través de organizaciones pantalla, por los servicios secretos ingleses y estadounidenses. Estos poderes ya tienen experiencia en esta materia, como demuestran los resultados de la Guerra de Yugoslavia durante los años 90, de la que resultó la fragmentación de su territorio en pequeñas repúblicas.
----
Artículo original: Hipérbola Janus, Reseña: «España: Historia de una demolición controlada», de José Costales y Carlos X Blanco (TOR), 24/Sep/2024
-
@ 6ad3e2a3:c90b7740
2024-09-24 13:36:24I have a thesis as to why things have gone so off the rails in the United States (and beyond), but it might not be what you think. Most of what we decry as insane and inexplicable policies are but symptoms of an underlying process. That process is the creation of money via fiat, the way in which the money propagates through the system and how it distorts the incentives of so many who are beholden to it.
Let’s start at the beginning. New money is created via debt issuance all the time. It’s why the US government is nearly $36 trillion in debt — it issues bonds and owes the bond buyers the interest and principle on it. “Issuing debt” is a fancy way of saying “borrowing money.” The US government borrows from its citizens, corporations, geopolitical allies (and even adversaries) to finance its operations.
If there is insufficient demand for its debt — if not enough people want to loan it money, it can raise rates, i.e., promise to pay more interest so as to entice more lenders, or just have the Federal Reserve buy the debt (either via its primary dealer banks or in some cases directly) and place the assets (bonds) on its balance sheet. US government debt (promise to pay) is an asset, and so the Fed can put that promise on its balance sheet.
The result of new money coming into the system via government borrowing is inflation. There is simply more money chasing the same amount of goods and services, so the prices for them rise. If while injecting more money into the economy the government were simultaneously injecting more goods and services, there wouldn’t be inflation, but unfortunately while you can always print more money out of thin air, you can’t print more energy, grass-fed steak or expert medical care.
But the inflation of the money supply and its concomitant debasement doesn’t happen all at once. Initially when there’s more money injected into the system, those who are closest to the new supply (banks through which it passes, their largest accounts, investors and asset holders) spend it and benefit from it before its inflationary effect has fully taken hold. This is known as the Cantillon Effect. Eventually inflation drives ordinary wages up too, but not enough to offset higher prices, and only after the Cantillonaire class has disproportionately benefited.
The unfairness of this arrangement is evident enough, but the second and third order effects are far more sinister. When the government can essentially borrow (print) money to finance whatever it wants, whether the Iraq War and its military contractors, “free” mRNA shots (Pfizer made nearly $100B off those contracts) or any other policy that benefits cronies and favored corporations, there are going to be a lot of resources and effort devoted to getting in good with the decision makers in the government.
Put differently, if I run a small business, I can only earn money if I offer my customers something they value enough to pay more for it than it cost me to produce. If I hire you, you’ll need to add value to the business and also hope it can continuing adding enough value to customers to pay your salary. We have to work for it.
But the government can simply print it, and in infinite supply. Are you better off starting a business (or working for one) that relies on adding value to its customers in a competitive environment or one that taps the infinite font of government money?
People respond to incentives, and as a result of the untethered money printing which began in earnest in 1971 when Richard Nixon took us off the gold standard (essentially a default caused in part by the cost of the Vietnam War), financial services experienced explosive growth, making up a larger share of the economy than at any time since the eve of the Great Depression. The best and brightest in large numbers eschewed value-creating careers in fields like engineering for jobs in finance. Why try to innovate and compete in the ruthless marketplace if you can join forces with the Cantillonaires, quickly become one and amass generational wealth via passive asset holding?
But it’s not just the bankers and the asset holders. In the scheme of things that theft off the top and upward redistribution is almost benign. Where things start to go seriously off the rails is that people cannot save in an inflating currency, and so they are forced to buy financial instruments like stocks and bonds. (Poor people can’t afford to do so, try to save in a debasing currency and usually stay poor and stuck.) But even middle and upper middle class people who get a small piece of the Cantillon pie, as their asset values rise on account of the increased money supply (to offset their lagging wages), have a new problem: most lack the time, skill or inclination to hold down a second job managing their investments.
As a result, they either lost money in the markets (selling when the market dropped, buying the top when everyone had already made money) or paying exorbitant fees to brokers who added little value except to take the stress of managing it out of their hands.
Eventually, investors figured out low-fee passive index funds outperform brokers, and so millions piled into them. As a result, companies like Black Rock, Vanguard and Fidelity absorbed money flows in the trillions of dollars, giving them outsized power. If they divested from a company its stock would tank, and its executives would miss their marks. If Blackrock and its ilk decided every company needed to be ESG or DEI compliant, the CEOs had little choice but to follow suit or they would be replaced. Consequently, you had a few elites, essentially dictating policy for the entire economy.
But back to that $36 trillion in debt, roughly a quarter of which was racked up during ill-conceived wars of choice in the Middle East. A country with that level of debt can’t honor its obligations over the medium and especially longer term. The elites know this — they know the promised social security, pensions, healthcare entitlements, etc. can never be delivered in the way they’re expected. Via inflation they might be delivered nominally, i.e., you might get the number you were promised, but no chance you’d ever get the purchasing power that number represented when the promise was made. When groceries cost a thousand dollars, a million dollar pension doesn’t go far.
What that means is the wealth people think is coming to them is not there. Even the wealth represented by the digital bits in your bank account isn’t there. Sure, if you took it out and spent it tomorrow, you could get 2024-level value for it, but even Bernie Madoff’s first clients to withdraw were able to get their money out. The problem is that collectively the digital bits do not remotely have the purchasing power they purport.
The elites need to do something about this, or there will be a French Revolution-style reckoning for them. They looted society’s collective wealth, and they need to assert control over the fallout. And they need to make sure the fallout is delayed. They need to keep people divided and fearful of demanding what they were promised.
The fear-mongering takes many forms (pandemics, climage change terrorism, white supremacy!), but foremost among them is to cast anyone who purports to reveal the unfair arrangement to the people as an enemy. “Populist” candidates must be smeared as “racist” or “fascist” and deemed unacceptable to large swaths of the population. Luckily for the oligarchs they had a few aces in the hole to enforce this perception. First, they had the megaphone of legacy media and also large centralized social media companies like Facebook and Twitter on which they could lean to suppress content that undermined their aims.
Second, via the centralized investment firms, they could dictate terms and initiatives to large publicly traded corporations and the officers of said corporations could reward compliant employees with promotions and power. Anyone who worked in those spheres therefore was selected for belief in the corporate-media dictated narratives.
Third, via their control of academia (donations from academia to the Blackrock-favored democratic party outpace donations to the disfavored one by a factor of 10), they could indoctrinate college students, reward the ones for whom it takes with jobs and social acceptance. Moreover, they also encouraged more people to go to college than ever before, creating an overproduction of elites, and a large indebted, indoctrinated wave of young people who didn’t have much to show for the debt they took on. That made them more desperate to stay in the good graces of the oligarchy, more compliant lest they lose the small income stream they were able to find in low-level managerial roles. Finally, as a reward for following the path, they were given status as educated people, those who had mastered the protocols of the elite.
Things like using the proper pronouns, avoiding the forbidden words for which a less savvy person would be cancelled and having the right beliefs (like climate change being an existential threat, more on that below) signaled moral and class superiority. Even if the electrician or plumber made more money than them, offered a service that provided real value to people, he did not know increasingly labyrinthine protocols for navigating elite discourse.
The more successful members of this class have all of these incentives plus a real paycheck, and they and those aspiring to join them formed a strong and influential bulwark against the rising discontent of working class people struggling with rising costs and feeling the disdain of elites who saw them as “deplorables” and “racists.”
The climate change agenda — promulgated religiously via academia and corporate media — was especially powerful because it instilled fear, a sense of dwindling resources and an incentive to consume less. That last part was especially crucial because if the digital bits in people’s accounts were going to fall far short of their purported purchasing power, getting an army of people to voluntarily reduce their power consumption (and angrily demand it of others) killed two birds with one stone. Not only would they have a ready-made excuse for the lack of promised power (purchasing power is the ability to wield energy, and “energy” and “power” are essentially synonymous), but they would also have a reason to bar those who did not voluntarily relinquish it from enjoying its full use.
Once the oligarchs had successfully indoctrinated a large swath of the population to be in debt, desperate to hang onto their trivially replaceable jobs, believe power consumption was not only wrong but an existential threat and anyone advocating otherwise was racist, fascist and morally inferior, they could sell them on ever-increasing top-down government control for the greater good. No matter how draconian the measures — covid lockdowns, forced injections, mask mandates for toddlers — the indoctrinated (and terrified) subject would not only go along but enforce those edicts on others.
Anyone refusing to go along would be accused of heresy, so to speak, and mobs of eager acolytes would be quick to call for his excommunication. If you think this is hyperbole, you are probably memory-holing the covid era wherein some of the most prominent celebrities and politicians eagerly advocated for those who declined pharmaceutical conglomerate chemicals to be barred from participating in society, put in camps and left to die should they need medical attention.
Of course, maintaining total control over the population is difficult, especially as economic conditions worsen, and those who are not totally beholden to the cantillonaire corporate class and who bypassed the university indoctrination complex gain awareness via uncensored niches of social media and ignorantly trusting their own eyes and ears. To that end, pushes for increased censorship were needed, as well as ever novel social wedge issues to divide the populace. On their face insane policies like letting biological males compete in women’s sports and encouraging minors to have sex changes served to further divide people and also served as a loyalty test of sorts. If you could advocate for Lia Thomas dominating collegiate women’s swimming, for example, you demonstrated your bona fides as a true comrade to the educated class.
Of course, suggesting something like this or advocating for sex changes among 12 year olds would have landed you in a straitjacket 15 years ago, but that was the point. If you were not willing to state a woman could have a penis and men could get pregnant you were not sufficiently loyal to the cause. Perhaps that’s a little too strong, but at a minimum you could not vociferously object to these absurd precepts and still expect to keep your job.
As such we now have a wide swath of educated, above-average IQ, ostensibly otherwise sensible Americans cheering on the fomenting of World War III in Ukraine, justifying ideological censorship contra the very First Amendment of the United States Constitution, unchecked illegal immigration irrespective of financial and social cost, among other insane policies of which virtually no one had been in favor when they identified as garden-variety liberals 10 years ago.
They have been bribed not to see what’s happening in front of their faces, not to remember how their rights were violated during covid, not to acknowledge the myriad lies to their faces like “the lab leak is a conspiracy theory,” “Trump colluded with Russia to steal the 2016 election,” that “Hunter Biden’s laptop was Russian disinformation” that they only needed to take the vaccine to avoid covid, that covid was a “pandemic of the unvaccinated” that Joe Biden was “sharp as a tack” and anyone saying otherwise was a conspiracy theorist.
I could go on for pages about the lies and hoaxes, but you get the point. The problem is via money printing, the oligarchy has essentially unlimited power to astroturf all manner of absurd agendas and incentivize tens of millions to go along via social and professional bribes. Of course the truth will come out eventually because it always does. Lies can carry the day so long as enough energy is pumped into the system to sustain them, but the truth is like gravity — when your plane runs out of fuel it will necessarily fall to the ground.
So this is where we find ourselves — a half awake populace of “conspiracy theorists,” “racists,” “anti-vaxxers,” “xenophobes” and “cranks” pointing out the unfathomable and mind-boggling destruction taking place in our cities, schools and once esteemed institutions, being dismissed, ignored and vilified by mobs of head-in-the-sand loyalists bribed not to see the blue whale in the room, the unsustainable, immoral and unholy assault upon the foundations of civilization itself, right in front of their faces.
-
@ c73818cc:ccd5c890
2024-09-24 13:29:12🌟 La chiusura di un impianto di mining in Norvegia ha causato un aumento del 20% delle bollette elettriche locali, mentre i miners globali stanno diversificando le attività verso l'intelligenza artificiale per affrontare la riduzione dei profitti.
🌟 La città di Hadsel, in Norvegia, ha visto un incremento del 20% delle bollette elettriche dopo la chiusura di un impianto di mining di Bitcoin. Il comune ha rifiutato di rinnovare il permesso a causa del rumore generato, e la compagnia elettrica locale, Noranett, ha aumentato le tariffe per compensare la perdita di un importante cliente, il cui contributo rappresentava il 20% dei ricavi.
🌟 Il mining di Bitcoin, sebbene spesso criticato per il suo consumo energetico, può aiutare a distribuire i costi dell’elettricità, mantenendo stabili le tariffe per i residenti. La chiusura della mining farm ha innescato un dibattito in Norvegia sul futuro dell'attività mineraria, con preoccupazioni sull'ulteriore aumento dei prezzi e la migrazione dei miners verso paesi con regolamentazioni meno rigide.
🌟 Sul fronte internazionale, i miners di Bitcoin stanno affrontando una sfida economica. Nonostante il record dell'hash rate della rete Bitcoin, che garantisce sicurezza, la riduzione dei profitti e la crescente concorrenza stanno spingendo i miners a esplorare nuove opportunità, come l'intelligenza artificiale (IA), per sfruttare le loro infrastrutture di calcolo ad alte prestazioni.
🌟 Core Scientific, una delle più grandi aziende di mining, ha iniziato a diversificare le attività verso l'intelligenza artificiale e il calcolo ad alte prestazioni. Questo cambio di strategia ha già avuto un impatto positivo, rendendo l'azienda un leader emergente nel settore dei data center, un mercato molto più stabile e redditizio rispetto al solo mining di criptovalute.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Norvegia #Mining #Miners #EnergiaElettrica #Noranett #Regolamentazioni #Rinnovabili #Green #Hashrate #Cripto #Bitcoin
-
@ e6817453:b0ac3c39
2024-09-24 08:21:57As software engineers, developers, and architects, we’ve all heard of “technical debt.” It’s often used to describe the corners we cut to deliver a product quickly, but it also has a negative connotation. But in reality, not every issue we face in our code results from technical debt. The challenges we encounter often come from technical choices made at specific moments in time. Understanding the difference between the two is crucial for making better technical decisions and managing long-term project success.
What Is Technical Debt?
Let’s start with technical debt — a term most of us are familiar with. Technical debt arises when we intentionally make short-term compromises for speed, knowing we’ll have to “pay it back” later by fixing those issues. For example, you might rush a feature because of a tight deadline, knowing that it’s not optimized, but with a plan to revisit and improve it once the product is delivered.
This kind of debt usually happens when we don’t have enough time, resources, or knowledge at a given moment, and we “cut corners” to get things done. It’s not necessarily bad — sometimes it’s unavoidable, especially in startups where getting to market quickly is critical. The key to managing technical debt is documenting it properly. Every time we make a compromise, it should be noted in a decision log or issue tracker, explaining where and why the shortcut was made and how it should be fixed in the future.
What Are Technical Choices?
On the other hand, technical choices are the decisions we make during the design or implementation phase, based on the information we have at that moment. These choices aren’t necessarily shortcuts or compromises. Instead, they are thoughtful decisions made to achieve a balance between several factors — such as complexity, resources, performance, and scalability. Every technical choice involves a set of trade-offs.
For example, when designing a new feature, multiple solutions might be available. A team might choose one option over the others based on its perceived efficiency at that moment, but down the road, as requirements or conditions change, that choice might create some challenges. These challenges, however, aren’t necessarily technical debt—they are simply the consequences of past technical choices based on the context at that time.
Why the Distinction Matters
Confusing technical debt with technical choices can lead to poor management of your codebase. If every issue is labeled as technical debt, it can create unnecessary pressure to “fix” things that aren’t broken. The reality is that every project evolves, and as requirements change, decisions that were once good might no longer be the best fit. That doesn’t mean the original decision was wrong or that it should be considered debt.
Understanding this distinction allows teams to better manage their technical landscape. When technical debt does exist, it should be treated as something that needs to be addressed — similar to paying back financial debt. In contrast, when a technical choice results in an unintended consequence, the team needs to reassess the decision based on the new information and possibly make a different trade-off moving forward.
Building Awareness in Technical Decisions
One of the most important practices for managing both technical debt and technical choices is awareness. Teams should strive to maintain continuous awareness of the decisions they make. One way to do this is through a **technical decision log**. This log doesn’t just document the final decisions, but also captures the available options, the trade-offs considered, and the reasoning behind the choices made. It’s a vital tool for long-term success in software development.
Having a technical decision log also helps teams manage institutional memory. As team members leave or new members join, this documentation provides a clear record of why certain decisions were made. It helps prevent the “Why did we do it this way?” confusion that often arises when there’s a lack of continuity in the team.
Adapting to a Changing Environment
As we know, the software world is fast-moving. What works today may not be optimal tomorrow. Especially in startups, the focus is often on delivering a product quickly to find a product-market fit, and technical perfection might not be the top priority. That’s okay — as long as everyone on the team is aware of the decisions being made and the trade-offs involved.
Teams need to adapt as circumstances change, and revisiting past technical decisions should be part of the process. Sometimes, a trade-off that seemed like the best option at the time becomes a limiting factor as the product evolves. When this happens, the team can go back to the decision log, reassess the choices, and make the necessary adjustments based on the new environment.
Conclusion: A Balanced Approach to Technical Debt and Choices
The key takeaway is that not every consequence of a technical decision is technical debt. While technical debt represents intentional shortcuts that need to be fixed, technical choices reflect the best options available at a given moment, considering the trade-offs. By maintaining awareness of these decisions and managing them properly through tools like decision logs, teams can make better technical choices in the future, avoid unnecessary fixes, and manage their codebase more effectively.
In the end, the goal is to find a balance between delivering quickly and building a system that can evolve over time without being burdened by unmanageable technical debt.
-
@ a012dc82:6458a70d
2024-09-24 06:42:32Table Of Content
-
A Leap Towards Financial Inclusion
-
Boosting E-Commerce Growth
-
Reducing Transaction Costs
-
Enhancing Security and Privacy
-
Challenges and Concerns
-
Conclusion
-
FAQ
Chile, the economic powerhouse of Latin America, has recently expanded its e-commerce landscape by allowing Bitcoin trading on its largest e-commerce platform. This bold move signifies a significant milestone for the Latin American e-commerce industry, offering new opportunities for both merchants and consumers. This article will explore the benefits and implications of incorporating Bitcoin trading into the Chilean e-commerce market, and discuss how this development is expected to revolutionize the region's digital economy.
A Leap Towards Financial Inclusion
The integration of Bitcoin trading on Chile's leading e-commerce platform aims to promote financial inclusion by giving more people access to the digital economy. By accepting Bitcoin as a payment option, merchants can cater to customers who may not have access to traditional banking services, broadening their reach and fostering economic growth. This inclusive approach helps bridge the gap between the banked and unbanked populations, reducing income inequality and providing a more level playing field for all.
Boosting E-Commerce Growth
The addition of Bitcoin trading on the platform is expected to boost e-commerce growth in the region. With the growing popularity of cryptocurrencies, more consumers are likely to be attracted to online shopping, benefiting both local and international merchants. Additionally, the ease of cross-border transactions with cryptocurrencies can potentially increase international trade, further accelerating e-commerce growth in Latin America.
Reducing Transaction Costs
One of the major advantages of Bitcoin is its low transaction costs compared to traditional payment methods. By incorporating Bitcoin trading into the platform, merchants can save on transaction fees, making their products and services more competitively priced. This benefit will likely lead to higher sales volumes, increased revenue, and improved profitability for businesses operating in the e-commerce space.
Enhancing Security and Privacy
Bitcoin's decentralized nature and secure encryption make it an appealing payment method for consumers who value their privacy and security. By adopting Bitcoin, Chile's largest e-commerce platform is offering users an additional layer of protection against fraud and identity theft. This move can potentially build trust among users and increase the platform's credibility in the eyes of consumers.
Challenges and Concerns
Despite the numerous benefits of integrating Bitcoin trading into Chile's e-commerce platform, there are several challenges and concerns that need to be addressed. These include regulatory issues, price volatility, and the environmental impact of cryptocurrency mining. It is crucial for governments, regulators, and industry stakeholders to work together to create a supportive framework that addresses these concerns while fostering innovation and growth.
Conclusion
Chile's decision to welcome Bitcoin trading on its largest e-commerce platform demonstrates the country's commitment to fostering innovation and expanding financial inclusion. As the Latin American e-commerce market continues to grow, embracing Bitcoin and other cryptocurrencies can provide a competitive advantage for businesses and consumers alike. By addressing the challenges and concerns associated with this new form of payment, Chile has the potential to become a leader in the global digital economy.
FAQ
Why is Bitcoin trading being introduced to the platform? Bitcoin trading is being introduced to promote financial inclusion, boost e-commerce growth, reduce transaction costs, and enhance security and privacy.
How does Bitcoin trading benefit consumers and merchants? Consumers benefit from increased privacy and security, while merchants can save on transaction fees, cater to a wider audience, and enjoy higher sales volumes.
How can Chile address these challenges and concerns? Governments, regulators, and industry stakeholders must work together to create a supportive framework that addresses concerns while fostering innovation and growth.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 502ab02a:a2860397
2024-09-24 06:20:57ร่างกฎหมาย "ฮิปโปบิลล์" (Hippo Bill) ปี 1910 เป็นหนึ่งในเรื่องราวทางการเมืองที่แปลกและน่าสนใจที่สุดในประวัติศาสตร์ของสหรัฐอเมริกา เรื่องนี้เริ่มต้นจากการที่ประเทศเผชิญกับปัญหาขาดแคลนเนื้อสัตว์และปัญหาผักตบชวาที่กำลังล้นแหล่งน้ำในรัฐลุยเซียนา ซึ่งสร้างความเสียหายให้กับแหล่งน้ำและทรัพยากรประมงในท้องถิ่น เพื่อแก้ไขปัญหานี้ สมาชิกสภาคองเกรส โรเบิร์ต โบรซซาร์ด (Robert Broussard) จึงเสนอร่างกฎหมายที่มีชื่อว่า "American Hippo Bill" โดยมีเป้าหมายในการนำเข้าฮิปโปโปเตมัสจากแอฟริกาเพื่อช่วยกำจัดปัญหาผักตบชวารุกราน และในขณะเดียวกันยังเสนอแนวคิดว่าฮิปโปจะสามารถเป็นแหล่งเนื้อสัตว์ใหม่ให้กับชาวอเมริกันได้
ที่มาของปัญหาการขาดแคลนเนื้อสัตว์
ในช่วงต้นศตวรรษที่ 20 (ราวๆ 1900s ฮาๆๆ ปีนี้ช่วงนี้อีกแล้ว แฟนๆ #บอกเล่า90บวก1 น่าจะคุ้นเคยดี) มีการอพยพเข้ามามาก สหรัฐอเมริกาจึงประสบกับปัญหาขาดแคลนอาหารอย่างหนัก โดยเฉพาะเนื้อสัตว์ที่เป็นหนึ่งในอาหารหลักของชาวอเมริกัน แม้อุตสาหกรรมเนื้อสัตว์ขยายตัวอย่างมาก แต่ก็ไม่สามารถตามทันได้เนื่องจากการล่าและการทำลายถิ่นที่อยู่อาศัยของสัตว์ในทวีปอเมริกาเหนือทำให้สัตว์บางชนิดเกือบจะสูญพันธุ์ อาทิ ไบซัน และกวาง ที่เป็นแหล่งเนื้อหลัก ส่งผลให้เกิดการขาดแคลนเนื้อสัตว์ จนทำให้รัฐบาลต้องพิจารณาหาวิธีการในการเพิ่มแหล่งเนื้อสัตว์ใหม่อย่างจริงจัง
ปัญหาผักตบชวารุกราน
ในช่วงเวลานั้น รัฐลุยเซียนายังประสบปัญหาพืชน้ำชนิดหนึ่งคือ "วอเตอร์ไฮยาซินท์ (Water Hyacinth) " หรือผักตบชวา ซึ่งนำเข้ามาในอเมริกาโดยคณะผู้แทนจากญี่ปุ่นที่มาเยือนนิวออร์ลีนส์ในปี 1884 แล้วมันดันเติบโตอย่างรวดเร็วมากกกกอย่างที่เรารู้ฤทธิ์มันดี และทำให้การทำประมงเป็นไปอย่างยากลำบาก เพราะมันทำลายแหล่งที่อยู่อาศัยของปลาและสัตว์น้ำอื่น ๆจนตายเป็นเบือ ผักตบชวาเจริญเติบโตอย่างรวดเร็วและครอบคลุมแม่น้ำลำคลองเกือบทั้งหมด ทำให้การคมนาคมทางน้ำและการใช้ประโยชน์จากแหล่งน้ำเป็นไปอย่างยากลำบากมาก ** สำหรับประเทศไทย เท่าที่หาข้อมูลมาได้ ในปี พ.ศ. 2444 (ค.ศ. 1901) เมื่อครั้งที่พระบาทสมเด็จพระจุลจอมเกล้าเจ้าอยู่หัวเสด็จประพาสประเทศอินโดนีเซีย ไม่มีบันทึกว่าพระองค์ได้นำผักตบชวากลับมาด้วย อย่างไรก็ตาม ผักตบชวานั้นถูกนำเข้ามาในประเทศไทยในช่วงหลังจากนั้น โดยในปี พ.ศ. 2455 (ค.ศ. 1912) เป็นช่วงที่พระยาศรีวิสารวาจานำพืชชนิดนี้เข้ามาเพื่อใช้ในงานประดับและฟอกน้ำตามคูคลองในประเทศไทย แต่ในที่สุดกลับกลายเป็นพืชที่แพร่กระจายและก่อปัญหาในแหล่งน้ำของประเทศครับ **
เกิดแนวคิดฮิปโปจ๋าเป็นทางแก้ปัญหา
ด้วยปัญหาทั้งสองนี้ โรเบิร์ต โบรซซาร์ด เห็นว่าฮิปโปโปเตมัสอาจเป็นคำตอบของทั้งปัญหาขาดแคลนเนื้อสัตว์และปัญหาผักตบชวารุกราน เนื่องจากฮิปโปเป็นสัตว์ที่กินพืชน้ำในแหล่งน้ำต่าง ๆ รวมถึงผักตบชวาด้วยแถมกินจุมากๆ นอกจากนี้ โบรซซาร์ดเชื่อว่าฮิปโปสามารถเป็นสัตว์เลี้ยงเพื่อเอาเนื้อให้แก่ชาวอเมริกันบริโภคได้
แนวคิดนี้ได้รับการสนับสนุนจากบุคคลสำคัญอย่าง เฟรเดอริก รัสเซล เบิร์นแฮม (Frederick Russell Burnham) บุคคลสำคัญอย่างน่าตะลึงและถูกลืมเลือนไปจากประวัติศาสตร์โดยสิ้นเชิง เป็นสุดยอดลูกเสือและสปาย เดินทางไปแอฟริกาเพื่อต่อสู้ให้กับนักล่าอาณานิคมชาวอังกฤษ เพราะเช่นเดียวกับผู้คนจำนวนมากในสมัยนั้น เขาคิดว่านี่เป็นภารกิจอันสูงส่งที่จะนำ "อารยธรรม" มาสู่แอฟริกา ครั้งหนึ่งเขาเคยได้รับการขนานนามว่าเป็น most complete human being who ever lived อีกด้วย อ่อ นอกจากนี้เขายังเป็นนักผจญภัยต้นแบบของการเขียนเรื่อง อินเดียน่าโจนส์ ด้วยครับ มีวลีอมตะที่นักข่าวคนนึงเขียนถึงเขาว่า “He has trained himself to endure the most appalling fatigues, hunger, thirst, and wounds; has subdued the brain to infinite patience, has learned to force every nerve in his body to absolute obedience, to still even the beating of his heart,”
และอีกคนนึงคือ ฟริตซ์ ดูเคน (Fritz Duquesne) เป็นชาวบัวร์ เขาเป็นคนมีไหวพริบมาก เขาใช้ชีวิตไปวันๆ โดยใช้ชื่อปลอม เขาเป็นนักต้มตุ๋นที่เก่งกาจและทะเยอทะยาน เขาต่อสู้กับอังกฤษในสงครามบัวร์ครั้งที่สอง เขาเป็นสายลับที่อิสระ เบิร์นแฮมเคยเรียกเขาว่า human epitome of sin and deception ที่ฮาคือ ในช่วงสงครามบัวร์ ชายสองคนนี้ได้รับมอบหมายให้ฆ่ากันเองครับ 5555 เอาเป็นว่าทั้งสองคนเคยใช้ชีวิตในแอฟริกาและเคยมีประสบการณ์การกินเนื้อฮิปโปมาแล้ว ในช่วงเวลาที่พวกเขาอาศัยอยู่ที่นั่น
สงครามบัวร์ (Boer War) หรือที่เรียกอย่างเป็นทางการว่า "สงครามแองโกล-บัวร์" (Anglo-Boer Wars) เป็นความขัดแย้งที่เกิดขึ้นระหว่างชาวบัวร์ (Boer) ซึ่งเป็นผู้ตั้งถิ่นฐานชาวดัตช์ในแอฟริกาใต้ กับจักรวรรดิอังกฤษ โดยเกิดขึ้นทั้งหมดสองครั้ง:
-
สงครามบัวร์ครั้งที่หนึ่ง (1880–1881):*** เกิดจากความไม่พอใจของชาวบัวร์ที่ต่อสู้เพื่ออิสรภาพจากการยึดครองของอังกฤษ ซึ่งควบคุมอาณานิคมแหลม (Cape Colony) ในแอฟริกาใต้ การต่อสู้นี้จบลงด้วยความพ่ายแพ้ของอังกฤษ และบัวร์ได้รับสิทธิในการปกครองตนเองในบางพื้นที่
-
สงครามบัวร์ครั้งที่สอง (1899–1902):*** เกิดจากการขยายตัวของจักรวรรดิอังกฤษในแอฟริกาใต้ โดยเฉพาะในภูมิภาคที่ชาวบัวร์ครอบครอง ซึ่งมีแหล่งทองคำและเพชรอยู่ สงครามครั้งนี้กินเวลานานกว่าและทารุณกว่าครั้งแรก โดยอังกฤษใช้ยุทธวิธีกักกันครอบครัวบัวร์ในค่ายกักกันและเผาทำลายฟาร์ม จนในที่สุดชาวบัวร์พ่ายแพ้และดินแดนของพวกเขาถูกผนวกเข้าเป็นส่วนหนึ่งของจักรวรรดิอังกฤษ
ผลจากสงครามครั้งที่สอง ทำให้เกิดการก่อตั้งสหภาพแอฟริกาใต้ในปี 1910 ซึ่งเป็นส่วนหนึ่งของจักรวรรดิอังกฤษ สงครามบัวร์ถือเป็นเหตุการณ์สำคัญในประวัติศาสตร์แอฟริกาใต้ที่ส่งผลต่อการเมืองและสังคมในภูมิภาคนี้ต่อมา
แน่นอนว่าต้องได้รับสนับสนุนจากบุคคลสำคัญ
แนวคิดในการนำเข้าฮิปโปของโบรซซาร์ดได้รับการสนับสนุนจากบุคคลสำคัญในสังคมสหรัฐอเมริกาในเวลานั้น เช่น อดีตประธานาธิบดี Theodore Roosevelt และ William Newton Irvin กระทรวงเกษตรของสหรัฐ - USDA (อีกแล้ว) รวมถึงการผนึกกำลังกับสื่อมวลชนยักษ์ใหญ่ในขณะนั้น อย่าง The Washington Post และ The New York Times ต่างก็ได้รายงานถึงร่างกฎหมายนี้ด้วยความสนใจ ถึงกับเรียกเนื้อฮิปโปว่า "lake cow bacon" (เบคอนจากวัวทะเลสาบ) เพื่อยกย่องถึงคุณภาพของเนื้อที่คาดว่าจะได้จากฮิปโปว่ารสเลิศ และไม่ต้องเปลืองพื้นที่ในการเลี้ยง เพราะมันอยู่ในบ่อน้ำได้สบายๆ พยายามนำเสนอชวนเชื่อให้ประชาชนเต็มที่
แผนการและข้อเสนอ
แผนการของโบรซซาร์ดคือการนำเข้าฮิปโปจากแอฟริกาและปล่อยลงในแม่น้ำลำคลองในภาคใต้ของสหรัฐอเมริกา โดยเฉพาะในรัฐลุยเซียนา ซึ่งฮิปโปจะช่วยกำจัดพืชน้ำอย่างผักตบชวาและยังให้เนื้อสัตว์เป็นแหล่งอาหารใหม่ให้กับประชาชนได้พร้อมๆกัน โบรซซาร์ดและผู้สนับสนุนของเขายืนยันว่าฮิปโปสามารถเลี้ยงในฟาร์มขนาดเล็กและสามารถให้เนื้อได้อย่างมีประสิทธิภาพกว่าวัว รสชาติและกลิ่นคล้ายคลึงกัน สามารถเป็นสัตว์เศรษฐกิจได้เนื่องจากฮิปโปเป็นสัตว์ที่กินพืชน้ำและสามารถเจริญเติบโตได้ในแหล่งน้ำของสหรัฐ เฟรเดอริก เบิร์นแฮม ยังเสนอแนะว่าฮิปโปสามารถช่วยในการแก้ปัญหาสิ่งแวดล้อมและการขาดแคลนอาหารของประเทศ เขาชี้ให้เห็นว่าในอดีต สหรัฐอเมริกาเคยนำเข้าสัตว์ต่างถิ่นอย่างเช่น อูฐจากแอฟริกาเพื่อใช้ในพื้นที่ทะเลทรายตะวันตก และยังเคยนำเข้ากวางเรนเดียร์จากรัสเซียมาเลี้ยงในอะแลสกาเพื่อใช้ทดแทนกวางคาริบูพื้นเมืองที่ลดจำนวนลง รวมถึงนกกระจอกเทศเพื่อหวังเรื่องการบริโภคเนื้อมาแล้ว
แต่ก็ยังมีข้อกังวล
แม้จะมีการสนับสนุนอย่างมาก แต่ก็มีข้อกังวลเกี่ยวกับความเป็นไปได้ในการเลี้ยงฮิปโปในฟาร์มขนาดเล็ก ความปลอดภัยของประชาชนเป็นเรื่องที่น่ากังวลอย่างยิ่ง เพราะฮิปโปเป็นหนึ่งในสัตว์ที่อันตรายที่สุดในโลก แม้จะเป็นสัตว์กินพืช แต่ฮิปโปก็มีรายงานว่าสามารถฆ่าคนได้หลายร้อยคนต่อปี และยังมีพฤติกรรมที่เป็นอันตรายเมื่อถูกรบกวนหรือถูกคุกคาม เอาจริงๆมันหวงที่มากแม้จะไม่ได้ทำอะไรมัน มันก็พร้อมจะเข้าโจมตีคน นอกจากนี้ ยังมีคำถามเกี่ยวกับอาหารของฮิปโปด้วย โดยผู้สนับสนุนร่างกฎหมายเชื่อว่าฮิปโปจะกินพืชน้ำอย่างผักตบชวา แต่ความจริงแล้ว ฮิปโปกินพืชน้ำอย่างผักตบชวาเพียงเล็กน้อย ในธรรมชาติพวกมันส่วนใหญ่จะกินหญ้าและพืชบกเป็นอาหารหลักต่างหาก นั่นหมายความว่าการนำเข้าฮิปโปมาเพื่อลดปริมาณผักตบชวาอาจไม่เกิดผลตามที่คาดหวัง
โดนให้คะแนนลบ ด้านผลกระทบทางเศรษฐกิจและสิ่งแวดล้อม
มีการโต้แย่งว่าการนำเข้าฮิปโปอาจส่งผลกระทบต่อระบบนิเวศและเศรษฐกิจในระยะยาว เนื่องจากการนำเข้าสัตว์ต่างถิ่นอาจก่อให้เกิดปัญหาการรุกรานทางชีวภาพ นอกจากนี้ การเลี้ยงฮิปโปยังต้องใช้พื้นที่จำนวนมากและอาจส่งผลกระทบต่อพื้นที่เกษตรกรรมอื่น ๆ ของประเทศ แม้ว่าร่างกฎหมาย "ฮิปโปบิลล์" จะไม่ผ่านการพิจารณาของสภาคองเกรส แต่เรื่องราวนี้ยังคงเป็นตัวอย่างที่น่าสนใจของวิธีการแก้ปัญหาแปลกใหม่กึ่งประหลาดที่สุดในประวัติศาสตร์ของสหรัฐอเมริกา
ปัดตก
ร่างกฎหมาย H.R. 23261 หรือ "American Hippo Bill" ที่เสนอในปี 1910 มีเป้าหมายเพื่อให้รัฐบาลจัดสรรงบประมาณประมาณ 1 ล้านดอลลาร์สหรัฐ (หรือเทียบเท่าในปัจจุบัน) เพื่อการนำฮิปโปจากแอฟริกามาใช้ในฟาร์มและการผลิตในสหรัฐฯ โดยมีวัตถุประสงค์ในการใช้ฮิปโปในการผลิตเนื้อและควบคุมจำนวนพืชน้ำในบางพื้นที่ แต่ในที่สุดกฎหมายนี้ไม่เคยผ่านการอนุมัติและกลายเป็นเรื่องที่น่าสนใจในประวัติศาสตร์สหรัฐฯ
แม้ว่าแนวคิดในการนำเข้าฮิปโปโปเตมัสจะดูแปลกในสายตาของคนปัจจุบัน แต่ในบริบทของเวลานั้น การคิดค้นวิธีการใหม่ ๆ เพื่อแก้ปัญหาสิ่งแวดล้อมและเศรษฐกิจเป็นเรื่องที่ได้รับการสนับสนุนอย่างมาก มันเลยเป็นสาเหตุของอะไรหลายๆอย่าง ตามที่เคยเล่าไว้ใน #บอกเล่า90บวก1 ครับ
สิ่งที่เกิดขึ้นในครั้งนี้คือจุดเริ่มต้นของเกษตรกรรมเชิงอุตสาหกรรม แทนที่จะนำสัตว์ชนิดใหม่เข้ามาเพื่อใช้ประโยชน์จากภูมิประเทศที่ดูเหมือนจะไม่อุดมสมบูรณ์ เราเพียงแค่ดัดแปลงภูมิประเทศเหล่านั้นให้เป็นทุ่งหญ้ามากขึ้น และเราก็บรรจุสัตว์ประเภทเดียวกันเข้าไปในดินแดนใหม่นั้นมากขึ้นเรื่อยๆ นั่นคือ feed lots and confinement operations ครับ เป็นแนวปฏิบัติในอุตสาหกรรมการเลี้ยงสัตว์เพื่อการผลิตเนื้อสัตว์ โดยเฉพาะในระบบการผลิตขนาดใหญ่ในตอนนั้น
-
Feedlots: คือสถานที่เลี้ยงสัตว์ เช่น วัว หรือหมู ในพื้นที่จำกัด โดยสัตว์จะถูกเลี้ยงในลานที่จัดไว้ให้พวกมันอยู่รวมกันเพื่อการขุนอาหารสูตรเข้มข้น โดยมักเป็นอาหารผสมที่มีส่วนผสมของธัญพืช โปรตีน และสารเสริมอื่น ๆ เป้าหมายของ feedlots คือการเพิ่มน้ำหนักตัวของสัตว์ให้เร็วขึ้นเพื่อให้พร้อมสำหรับการแปรรูปเป็นเนื้อสัตว์ ซึ่งช่วยให้การผลิตเนื้อสัตว์มีประสิทธิภาพมากขึ้น
-
Confinement operations: หมายถึงการเลี้ยงสัตว์ในสภาพที่ถูกจำกัดพื้นที่มาก สัตว์จะไม่สามารถเคลื่อนที่หรือหากินในพื้นที่ธรรมชาติได้เอง ซึ่งการเลี้ยงแบบนี้อาจมีอยู่ในหลายรูปแบบ เช่น การเลี้ยงหมูในโรงเรือน หรือการเลี้ยงไก่ในกรง สัตว์จะได้รับอาหาร น้ำ และการดูแลอย่างเข้มงวดในสภาพแวดล้อมที่ถูกควบคุมเพื่อเพิ่มผลผลิตอย่างต่อเนื่อง #PirateKeto #กูต้องรู้มั๊ย #หมูเด้ง #siamstr
-
-
@ 862fda7e:02a8268b
2024-09-24 01:14:40The media, government, and "elite" (who are only elite in this low vibration illusion we call "life") are afraid of people like me because I do not accept the reality they have forced us into. My manifesto is an attempt to wake you up from ideas you have been conditioned into believing because it benefits one class - the protected class known as the "elite".
The elite would like to have you believe that my message is something crafted from hatred and they would like to label me with mental issues. They would like you to think I am some crazy extremist who wants to advocate for the harm of others. They would like you to think that I am enciting violence.
This could not be further from the truth.
I am not and will never be an extremist, white supermicist, terrorist, radical, hateful human being. I do not believe in killing in order to convey a message or movement. I do not believe in division.
I only advocate that you become conscious of the reality around us. The reality is that this is a world controlled by the most evil, controlling, destructive freaks. These people work to make sure we are essentially slaves to a system that benefits those who created the system - the elites. Let me make this clear: I do NOT advocate for violence, destruction, death, killing, murder, hatred, division, or terrorism. The elite are threatened by people like me, because they know that we know their game. We know their plans are to destroy, to advocate for violence, to kill, murder, to encite hatred and division. This is all the elite do - they cannot fathom having people live in peace because it isn't beneficial if you want to control the world.
So while you may think it's impossible there is a group of a few evil people who control the world - look back at history. It has always been littered with the few evil who control the many. It would be stupid to think it would be different
-
@ 8f69ac99:4f92f5fd
2024-09-26 11:08:21As revoluções muitas vezes começam com os membros mais jovens da sociedade—adolescentes, idealistas e cheios de energia, ansiosos por causar mudanças. No entanto, no mundo de hoje, a noção de revolução foi sequestrada por forças que procuram controlar e manipular, em vez de empoderar os indivíduos. A chamada "revolução woke" é um exemplo claro, impulsionada por uma agenda que polariza a sociedade ao longo das linhas da política identitária. Esta distracção desvia a atenção dos verdadeiros problemas: a desigualdade económica e o autoritarismo. Mas há uma alternativa melhor, uma que prioriza a liberdade e a soberania em vez da divisão e do controlo—Bitcoin.
A "Revolução Woke" Globalista e a Agenda da Polarização
Uma das tácticas mais insidiosas da "revolução woke" é a polarização deliberada da sociedade. Ao criar narrativas que colocam as pessoas umas contra as outras com base em raça, género, religião e política, aqueles no poder mantêm o controlo e desviam a atenção dos problemas mais profundos que realmente importam. Esta estratégia é orwelliana: ao criar uma mentalidade de "nós contra eles", fabricam uma cultura de conflito perpétuo.
Em vez de promover uma mudança significativa, a "revolução woke" prende as pessoas num ciclo de indignação e divisão, distraindo-as de enfrentar as verdadeiras estruturas de poder—como a desigualdade económica e o excesso de controlo estatal. Esta fragmentação enfraquece os laços entre as pessoas, tornando a sociedade mais vulnerável à manipulação pelas autoridades centralizadas.
Esta polarização serve os interesses daqueles que estão no poder. Quando as pessoas estão demasiado ocupadas a lutar entre si, são menos propensas a questionar os sistemas que realmente as controlam. A "revolução woke" torna-se menos uma questão de progresso genuíno e mais uma forma de manter o status quo através da divisão e da distracção.
Por Que a Polarização é Incentivada
A polarização não é acidental—é uma estratégia calculada com o objectivo de controlar. Dividindo as pessoas em campos opostos, a sociedade fragmenta-se, tornando mais difícil para os indivíduos unirem-se contra adversários comuns ou combaterem políticas que beneficiam as elites.
Esta divisão serve também como uma distracção poderosa. Enquanto as pessoas estão consumidas por batalhas ideológicas, os sistemas financeiros centralizados e o controlo governamental expandem-se silenciosamente. Os meios de comunicação, muitas vezes controlados pelos mesmos poderes, alimentam estas divisões, mantendo as pessoas focadas em conflitos internos enquanto ocultam as verdadeiras ameaças à liberdade.
A polarização também corrói as liberdades individuais. Quando as pessoas estão envolvidas em batalhas ideológicas intermináveis, são menos propensas a notar a erosão gradual dos seus direitos. Isto é precisamente o que os poderes estabelecidos desejam—uma população distraída e dividida, demasiado ocupada para desafiar o desmantelamento lento das suas liberdades pessoais.
O Resultado da Polarização
O resultado desta polarização deliberada é uma sociedade mais preocupada com a pureza ideológica do que com a garantia das suas verdadeiras liberdades. As pessoas ficam presas na política identitária, priorizando a lealdade ao grupo em detrimento da autonomia individual. Isto promove uma mentalidade de "pensamento de grupo", onde questionar a narrativa dominante é desencorajado.
Entretanto, a desigualdade económica aprofunda-se à medida que os poderes centralizados continuam a consolidar o controlo. Os sistemas que deveriam promover equidade tornam-se cada vez mais manipulados, beneficiando os poucos em detrimento dos muitos. A verdadeira liberdade—especialmente a liberdade financeira—torna-se mais difícil de alcançar, com os indivíduos presos em sistemas concebidos para beneficiar uma minoria poderosa.
No final, a "revolução woke" apenas reforça as mesmas estruturas que afirma combater. Ao dividir as pessoas e distraí-las dos verdadeiros problemas, os poderes estabelecidos mantêm o seu controlo, enquanto as liberdades pessoais e financeiras da maioria continuam a ser corroídas.
Bitcoin: A Verdadeira Revolução
Em contraste com a "revolução woke", que divide, Bitcoin oferece uma verdadeira revolução—uma que empodera os indivíduos em vez de os separar. Bitcoin proporciona soberania financeira, retirando poder dos governos autoritários e das instituições centralizadas.
Bitcoin permite que os indivíduos controlem a sua própria riqueza, eliminando a necessidade de intermediários como bancos ou governos. As pessoas já não estão sujeitas a entidades que restringem a sua liberdade financeira. Com Bitcoin, podem criar, armazenar e transferir valor de forma segura, transparente e acessível.
Isto não se trata apenas de economia—é sobre recuperar a liberdade. A natureza descentralizada do Bitcoin permite que as pessoas tomem decisões financeiras sem interferência do estado ou de entidades corporativas.
Porque é Que o Bitcoin é Revolucionário
A verdadeira natureza revolucionária do Bitcoin reside no seu design e princípios, que rompem com os sistemas de controlo enraizados. Eis algumas razões pelas quais o Bitcoin é transformador:
-
Aberto e Sem Fronteiras: O Bitcoin transcende fronteiras, permitindo que pessoas de todo o mundo participem igualmente no sistema financeiro. Quebra barreiras baseadas em nacionalidade ou geografia, permitindo uma participação económica global.
-
Resistente à Censura: Nenhum governo ou empresa pode parar uma transacção em Bitcoin, dando às pessoas a liberdade de transferir valor sem medo de interferências ou retaliações. Esta é a forma definitiva de autonomia financeira.
-
Sem Permissão: O Bitcoin não requer aprovação de nenhuma autoridade. Ao contrário dos sistemas financeiros tradicionais, não há porteiros a controlar quem pode participar, tornando o Bitcoin uma ferramenta para a verdadeira auto-soberania financeira.
-
Neutro: O Bitcoin é imparcial. Não se importa com raça, género, religião ou política. Num mundo onde a política identitária é usada para dividir, o Bitcoin trata todos de forma igual, oferecendo um sistema financeiro inclusivo que transcende essas divisões.
Bitcoin como o Antídoto para a Polarização
O Bitcoin oferece uma solução para a divisão criada pela polarização. Transcende a política identitária ao tratar todos de forma igual, independentemente da sua origem ou crenças. A neutralidade do Bitcoin garante que nenhum grupo ou facção pode manipulá-lo para impor as suas visões sobre os outros.
Bitcoin permite que os indivíduos se libertem das narrativas divisivas e tomem controlo dos seus destinos financeiros. Promove a cooperação em vez do conflito, capacitando as pessoas a focarem-se em objectivos comuns, em vez de batalhas ideológicas.
O Bitcoin não é apenas uma moeda—é uma força unificadora, oferecendo esperança àqueles que estão cansados da divisão e das lutas pelo poder. Representa uma mudança para práticas financeiras inclusivas que priorizam a autonomia individual em detrimento do controlo centralizado.
Um Apelo à Acção
Para os jovens que sonham em criar uma mudança real: se querem liderar uma revolução que verdadeiramente empodere os indivíduos e quebre as cadeias do controlo centralizado, então é hora de abraçar o Bitcoin.
Esta revolução não é sobre seguir uma agenda predefinida ou alinhar-se com ideologias divisivas. Trata-se de criar um futuro de sistemas financeiros abertos, onde todos têm a liberdade de participar igualmente.
A cor desta revolução é laranja, simbolizando o logótipo do Bitcoin e o movimento em direcção à liberdade financeira. Representa a esperança para aqueles que querem escapar das restrições dos sistemas tradicionais e criar um mundo descentralizado e empoderado.
Conclusão
Estamos à beira de uma revolução financeira. A juventude tem uma escolha: seguir as narrativas pré-definidas dos sistemas ultrapassados ou tomar controlo dos seus próprios destinos através de redes financeiras descentralizadas e abertas.
O Bitcoin é a verdadeira revolução. É um movimento impulsionado pelo desejo de liberdade, autonomia e inclusão. Juntem-se à revolução, sejam parte de algo maior, e ajudem a construir um mundo onde o poder é descentralizado, as oportunidades são iguais e o futuro é brilhante e laranja—a cor da liberdade financeira.
Photo by Tarik Haiga on Unsplash
-
-
@ a9434ee1:d5c885be
2024-09-26 10:42:521. Relay = Community?
If spinning up a relay is getting easier and cheaper by the day, why can't the relays literally be the group/community?
Then: * Any relay is by default a public community. The more restricted read- or write-access is, the more it becomes a private group. * Any publication targeted at (h-tag) and stored, and thus accepted, by a relay can be seen as a publication in that community. * All-in-1 hosting solutions (integrated blossom servers, lightning nodes, ...) are made easier.
2. Why invent new kinds?
Why can't Kind 1 posts that are targeted and accepted by a relay (i.e. community) just be the forum-posts of that community? Why create new kinds for this? And even weirder, why create a new kind with that exclusively serves as a reply to that new kind? Why not just use generic replies (kind 1111) and take the #otherstuff (event kinds and apps) as an opportunity to introduce those?
For chat messages, however, I get it. You need a kind + reply-kind for those.
3. Community VS Private group
It seems like the only distinction you really need, both for the user and the apps implementing all this, is:
1. Public Community: anyone can read and follow this community but for writing the admins can set limits (pricing, white listings, ...) 2. Private group: only the profiles that even know this relay (i.e. group) exists can interact with it. Read-access has to be granted (invite, pricing, ...) and admins can set limits for writing too. Beyond this distinction it's a bit naive to try to categorize them. Open vs Closed doesn't really mean much for example, since technically all groups/communities set limits and are thus closed. It's more interesting to look the ways in which they can be closed and build on the simplest distinctions you can make there.The difference between Public communities and private groups is the most important one because they both have very different UX and specification requirements:
Memberlist
Communities: None existent
Anyone can read and follow. It just has limits on who can publish what, when. So the most interesting thing to surface is probable something like a list of most active members or a highlighted set of profiles that have special characteristics within this community (top supporter, god-mode, resident artist, ...).
Private Groups: Necessary for it's existence
The whitelisted npubs for read-access are the members.Moderation actions
Both types of groups need a way for the admin(s) to:
* Block/remove users * Remove events * Edit metadata (name, description, guidelines...) * Specify who can write publish what, under what conditionOnly private groups need a way for the admin(s) to:
* Add/approve new members → specify who has read-access, under what conditionGeneralizing too many actions like
add member
,join request
, etc... that are only applicable to one of these categories just creates bad UX for the other one. You don't "add a member" to a public community. People can follow it without asking anyone's permission (ok yes, some will AUTH for reading but that's besides the point). Some of its followers will then just choose to publish something there and the admin either allows them or not.Having a common protocol for specifying the conditions for this write-access interoperably (as mentioned above) is what I would like to see instead: * Both Communities and Private groups need it anyway * You have to assume admins need granularity in the conditions they set for publishing in their group/community: Who, what, under what condition, ... * You don't want to link out to custom websites (or similar) explaining their allowance schemes
Sidenote: we need a similar kind of spec for the services that allow you to spin up your hosting solution (relay, server, node, ...) so that, when you click "Create new community" in an app, those services can be surfaced. With their business models (including options to self-host parts of it) just there, in the app, without linking out. Same for the lines of communication and payments that are needed to make those business models work from within any app.
Publication and Discovery
Only Communities allow for the exciting possibility of publishing something in multiple overlapping communities at once. Someone writing about how Bees are Capitalists can target their article at the communities that most overlap with its content (and with the author's means and write-access of course). Members of a community around beekeeping can organically discover content and communities on Austrian economics relevant to them.
With Private groups publication happens only in the group and discovery is blocked on purpose.
-
@ b39b8e83:0e391257
2024-09-23 23:54:40https://image.nostr.build/54d4830e16f42daf7eeff67ddc8b19f811ea2e484ff330bcc72ad5c73a8ed447.jpg
It was a time of great and exalting excitement. The country was up in arms, the war was on, in every breast burned the holy fire of patriotism; the drums were beating, the bands playing, the toy pistols popping, the bunched firecrackers hissing and sputtering; on every hand and far down the receding and fading spreads of roofs and balconies a fluttering wilderness of flags flashed in the sun; daily the young volunteers marched down the wide avenue gay and fine in their new uniforms, the proud fathers and mothers and sisters and sweethearts cheering them with voices choked with happy emotion as they swung by; nightly the packed mass meetings listened, panting, to patriot oratory which stirred the deepest deeps of their hearts and which they interrupted at briefest intervals with cyclones of applause, the tears running down their cheeks the while; in the churches the pastors preached devotion to flag and country and invoked the God of Battles, beseeching His aid in our good cause in outpouring of fervid eloquence which moved every listener.
It was indeed a glad and gracious time, and the half dozen rash spirits that ventured to disapprove of the war and cast a doubt upon its righteousness straightway got such a stern and angry warning that for their personal safety's sake they quickly shrank out of sight and offended no more in that way.
Sunday morning came-next day the battalions would leave for the front; the church was filled; the volunteers were there, their faces alight with material dreams-visions of a stern advance, the gathering momentum, the rushing charge, the flashing sabers, the flight of the foe, the tumult, the enveloping smoke, the fierce pursuit, the surrender!-then home from the war, bronzed heros, welcomed, adored, submerged in golden seas of glory! With the volunteers sat their dear ones, proud, happy, and envied by the neighbors and friends who had no sons and brothers to send forth to the field of honor, there to win for the flag or, failing, die the noblest of noble deaths. The service proceeded; a war chapter from the Old Testament was read; the first prayer was said; it was followed by an organ burst that shook the building, and with one impulse the house rose, with glowing eyes and beating hearts, and poured out that tremendous invocation -- "God the all-terrible! Thou who ordainest, Thunder thy clarion and lightning thy sword!"
Then came the "long" prayer. None could remember the like of it for passionate pleading and moving and beautiful language. The burden of its supplication was that an ever--merciful and benignant Father of us all would watch over our noble young soldiers and aid, comfort, and encourage them in their patriotic work; bless them, shield them in His mighty hand, make them strong and confident, invincible in the bloody onset; help them to crush the foe, grant to them and to their flag and country imperishable honor and glory -
https://image.nostr.build/810192ce50f2dbb274b26c2753fe742d7fbc50fe7cd3307baf1bc2d74e5a2e14.jpg
An aged stranger entered and moved with slow and noiseless step up the main aisle, his eyes fixed upon the minister, his long body clothed in a robe that reached to his feet, his head bare, his white hair descending in a frothy cataract to his shoulders, his seamy face unnaturally pale, pale even to ghastliness. With all eyes following him and wondering, he made his silent way; without pausing, he ascended to the preacher's side and stood there, waiting. With shut lids the preacher, unconscious of his presence, continued his moving prayer, and at last finished it with the words, uttered in fervent appeal,"Bless our arms, grant us the victory, O Lord our God, Father and Protector of our land and flag!"
The stranger touched his arm, motioned him to step aside -- which the startled minister did -- and took his place. During some moments he surveyed the spellbound audience with solemn eyes in which burned an uncanny light; then in a deep voice he said
"I come from the Throne-bearing a message from Almighty God!" The words smote the house with a shock; if the stranger perceived it he gave no attention. "He has heard the prayer of His servant your shepherd and grant it if such shall be your desire after I, His messenger, shall have explained to you its import-that is to say, its full import. For it is like unto many of the prayers of men, in that it asks for more than he who utters it is aware of-except he pause and think. "God's servant and yours has prayed his prayer. Has he paused and taken thought? Is it one prayer? No, it is two- one uttered, the other not. Both have reached the ear of His Who hearth all supplications, the spoken and the unspoken. Ponder this-keep it in mind. If you beseech a blessing upon yourself, beware! lest without intent you invoke a curse upon a neighbor at the same time. If you pray for the blessing of rain upon your crop which needs it, by that act you are possibly praying for a curse upon some neighbor's crop which may not need rain and can be injured by it. "You have heard your servant's prayer-the uttered part of it. I am commissioned by God to put into words the other part of it-that part which the pastor, and also you in your hearts, fervently prayed silently. And ignorantly and unthinkingly? God grant that it was so! You heard these words: 'Grant us the victory, O Lord our God!' That is sufficient. The whole of the uttered prayer is compact into those pregnant words. Elaborations were not necessary. When you have prayed for victory you have prayed for many unmentioned results which follow victory-must follow it, cannot help but follow it. Upon the listening spirit of God the Father fell also the unspoken part of the prayer. He commandeth me to put it into words. Listen!
"O Lord our Father, our young patriots, idols of our hearts, go forth to battle-be Thou near them! With them, in spirit, we also go forth from the sweet peace of our beloved firesides to smite the foe. O Lord our God, help us to tear their soldiers to bloody shreds with our shells; help us to cover their smiling fields with the pale forms of their patriot dead; help us to drown the thunder of the guns with the shrieks of their wounded, writhing in pain; help us to lay waste their humble homes with a hurricane of fire; help us to wring the hearts of their unoffending widows with unavailing grief; help us to turn them out roofless with their little children to wander unfriended the wastes of their desolated land in rags and hunger and thirst, sports of the sun flames of summer and the icy winds of winter, broken in spirit, worn with travail, imploring Thee for the refuge of the grave and denied it-for our sakes who adore Thee, Lord, blast their hopes, blight their lives, protract their bitter pilgrimage, make heavy their steps, water their way with their tears, stain the white snow with the blood of their wounded feet! We ask it, in the spirit of love, of Him Who is the Source of Love, and Who is ever-faithful refuge and friend of all that are sore beset and seek His aid with humble and contrite hearts. Amen.
https://image.nostr.build/dd0a7be5db79d2f2885ffb7f229519c28bb3d6a4ed37df9e4ae55702ea8d17ad.jpg
(After a pause)
"Ye have prayed it; if ye still desire it, speak! The messenger of the Most High waits."
It was believed afterward that the man was a lunatic, because there was no sense in what he said.
-
@ b39b8e83:0e391257
2024-09-23 23:51:33My letter to my U.S. Representative asking them to cosponsor H.R. 9649 to restore UNRWA funding.
Dear Representative ABC,
I am writing to you as a concerned citizen and member of the Quaker faith community. My belief in peace, equality, and the inherent worth of every human being compels me to urge you to support the restoration of funding for the UN Relief and Works Agency (UNRWA) in Gaza.
As a Quaker, I believe we are called to speak truth to power and to work towards alleviating suffering wherever we find it. The ongoing humanitarian crisis in Gaza deeply troubles me, as I believe it should trouble all who value human life and dignity. The prospect of famine and disease outbreaks in Gaza is not just a political issue, but a moral one that speaks to our shared humanity.
UNRWA serves as the primary source of aid for millions of Palestinians facing dire circumstances. While I acknowledge the concerns that have been raised about the agency, I believe that UNRWA has demonstrated a commitment to addressing these issues through immediate action and reform. The decision by many of our allies to resume funding to UNRWA after careful consideration should encourage us to do the same.
The Quaker testimonies of simplicity, peace, integrity, community, equality, and stewardship (SPICES) guide us to seek peaceful solutions and to care for those in need. By supporting the UNRWA Funding Emergency Restoration Act (H.R. 9649), we can take a significant step towards fulfilling these values and preventing further suffering.
I urge you to cosponsor H.R. 9649 and to advocate for its passage. This action would align with our nation's humanitarian principles and our moral obligation to help those in desperate need, regardless of political boundaries.
Thank you for your consideration of this crucial matter. I look forward to hearing about your stance on this issue and any actions you plan to take.
Sincerely, TheFreeQuaker
-
@ 42342239:1d80db24
2024-09-26 07:57:04The boiling frog is a simple tale that illustrates the danger of gradual change: if you put a frog in boiling water, it will quickly jump out to escape the heat. But if you place a frog in warm water and gradually increase the temperature, it won't notice the change and will eventually cook itself. Might the decline in cash usage be construed as an example of this tale?
As long as individuals can freely transact with each other and conduct purchases and sales without intermediaries[^1] such as with cash, our freedoms and rights remain secure from potential threats posed by the payment system. However, as we have seen in several countries such as Sweden over the past 15 years, the use of cash and the amount of banknotes and coins in circulation have decreased. All to the benefit of various intermediated[^1] electronic alternatives.
The reasons for this trend include: - The costs associated with cash usage has been increasing. - Increased regulatory burdens due to stricter anti-money laundering regulations. - Closed bank branches and fewer ATMs. - The Riksbank's aggressive note switches resulted in a situation where they were no longer recognized.
Market forces or "market forces"?
Some may argue that the "de-cashing" of society is a consequence of market forces. But does this hold true? Leading economists at times recommend interventions with the express purpose to mislead the public, such as proposing measures who are "opaque to most voters."
In a working paper on de-cashing by the International Monetary Fund (IMF) from 2017, such thought processes, even recommendations, can be found. IMF economist Alexei Kireyev, formerly a professor at an institute associated with the Soviet Union's KGB (MGIMO) and economic adviser to Michail Gorbachov 1989-91, wrote that:
- "Social conventions may also be disrupted as de-cashing may be viewed as a violation of fundamental rights, including freedom of contract and freedom of ownership."
- Letting the private sector lead "the de-cashing" is preferable, as it will seem "almost entirely benign". The "tempting attempts to impose de-cashing by a decree should be avoided"
- "A targeted outreach program is needed to alleviate suspicions related to de-cashing"
In the text, he also offered suggestions on the most effective approach to diminish the use of cash:
- The de-cashing process could build on the initial and largely uncontested steps, such as the phasing out of large denomination bills, the placement of ceilings on cash transactions, and the reporting of cash moves across the borders.
- Include creating economic incentives to reduce the use of cash in transactions
- Simplify "the opening and use of transferrable deposits, and further computerizing the financial system."
As is customary in such a context, it is noted that the article only describes research and does not necessarily reflect IMF's views. However, isn't it remarkable that all of these proposals have come to fruition and the process continues? Central banks have phased out banknotes with higher denominations. Banks' regulatory complexity seemingly increase by the day (try to get a bank to handle any larger amounts of cash). The transfer of cash from one nation to another has become increasingly burdensome. The European Union has recently introduced restrictions on cash transactions. Even the law governing the Swedish central bank is written so as to guarantee a further undermining of cash. All while the market share is growing for alternatives such as transferable deposits[^1].
The old European disease
The Czech Republic's former president Václav Havel, who played a key role in advocating for human rights during the communist repression, was once asked what the new member states in the EU could do to pay back for all the economic support they had received from older member states. He replied that the European Union still suffers from the old European disease, namely the tendency to compromise with evil. And that the new members, who have a recent experience of totalitarianism, are obliged to take a more principled stance - sometimes necessary - and to monitor the European Union in this regard, and educate it.
The American computer scientist and cryptographer David Chaum said in 1996 that "[t]he difference between a bad electronic cash system and well-developed digital cash will determine whether we will have a dictatorship or a real democracy". If Václav Havel were alive today, he would likely share Chaum's sentiment. Indeed, on the current path of "de-cashing", we risk abolishing or limiting our liberties and rights, "including freedom of contract and freedom of ownership" - and this according to an economist at the IMF(!).
As the frog was unwittingly boiled alive, our freedoms are quietly being undermined. The temperature is rising. Will people take notice before our liberties are irreparably damaged?
[^1]: Transferable deposits are intermediated. Intermediated means payments involving one or several intermediares, like a bank, a card issuer or a payment processor. In contrast, a disintermediated payment would entail a direct transactions between parties without go-betweens, such as with cash.
-
@ 81870f53:29bef6a6
2024-09-23 23:12:28先週のハイライトはFRBの利下げだったが、先週の金曜日(9月20日)に新型iPhone 16シリーズが正式に発売されたことも特筆に値する。Appleファンの気持ちは「旧正月のよう」だが、Apple投資家の気持ちはもっと複雑だ。
ダウ・ジョーンズ・マーケット・データは長年にわたり、iPhoneの発売前後のAppleの株価の動向を追跡しており、これまで17年分のデータを保有している。
新型iPhoneが正式発表された日、Appleの株価は平均0.1%下落した。発売当日(正式発表から1~2週間後)も、Appleの株価は平均0.1%下落した。翌週、Appleは大型株指数をわずかに下回った。
新型iPhoneの発売から6か月後、Apple株の平均ROIは11.7%で、S&P 500指数より8パーセントポイント高くなっています。全体的に過去10年間のApple株の年換算ROIは26%で、S&P 500指数より15パーセントポイント高くなっています。
これらはすべて、私が長年観察してきた現象を裏付けている。ウォール街はまず新型 iPhone を激しく批判するが、その後、消費者が依然として iPhone を愛用していることに気づき、Apple の株価が上昇する。なぜか、時価総額世界最大の企業である Apple は、最も過小評価されている企業の 1 つであり続けている。
先週、私が購読している技術ニュースレターが、Apple の「ハードウェアの革新性に欠ける」と嘆いていました。記事では、睡眠時無呼吸を検知できる新しい Apple Watch や補聴器機能が追加された AirPods が「味気ない」と評価されていると指摘しています。何百万人もの人々に影響を与える問題を、既存の製品よりもはるかに安い価格で解決すること、それが少なくとも私の意見では革新の定義です。
人々はAppleに対して強い郷愁を抱いており、ファンや投資家がスティーブ・ジョブズの時代を今でも懐かしく思っているのも理解できます。
2007 年 1 月にスティーブ・ジョブズが初代 iPhone を発表した日、Apple の株価は 8% 上昇しました。携帯電話、時計、ヘッドフォンの段階的なアップデートは、同じような熱狂を呼び起こしませんでした。しかし、Apple は長い戦いを強いられることになりますが、同社は限界収益の技術を習得しています。
全てのiPhoneを買わなければならないとは言いません。消費者は携帯電話を買い替えるのに2~4年待つことを気にしません。その間、AppleはAirPods、Apple Watch、Mac、および関連サービスを消費者に販売します。過去10年間で、Appleの総収益に占めるiPhoneの売上の割合は66%から52%に減少しました。現在、Appleのビジネスと株はiPhoneの素晴らしいパフォーマンスがなくても成功することができます。
先週、Mac 用の新世代オペレーティング システム macOS Sequoia をダウンロードしました。画期的なソフトウェアではありませんが、Mac と iPhone が完全に統合される未来を垣間見ることができます。新しい iPhone ミラーリング機能は、iPhone アプリを Mac 画面にミラーリングします。電話アイコンをクリックすると、iPhone が Mac 画面に表示され、Mac で電話を使用できるようになります。
私は現在、主にこの機能を使用しています。携帯電話を取り出さなくても済むためです。しかし、今ではさまざまな iPhone アプリを Mac で実行できるようになり、ユーザーは 2 つのデバイス間でファイル、写真、ビデオを簡単にドラッグできるようになりました。これにより、両方のデバイスの販売が促進される可能性があり、macOS の将来のバージョンでこの機能が実現されることを期待しています。
投資家たちは新型iPhoneの売り上げを懸念しているが、人工知能分野でのAppleの競争力を心配する声もある。この懸念は以前にも提起されており、私は4月19日のコラムで「投資家たちはAppleと人工知能をほぼ諦めており、これは大きな見落としだと感じている」と書いた。当時、私は投資家たちにAppleを長期的に見るようアドバイスしたが、今もそのアドバイスは変わらない。
実は、このコラムが掲載された日は、アップルの株価が底を打った日でもありました。それ以来、投資家は徐々にアップルの人工知能に対する真摯な姿勢を受け入れるようになりました。今年6月、アップルはApple Intelligenceの立ち上げ計画を発表し、株価は上昇しました。私のコラムが掲載された4月以降、アップルの株価は39%上昇し、大型株の上昇率の2倍以上となり、アップルは世界時価総額が最も高い企業としての地位を取り戻しました。
現在、市場心理は再び変化している。iPhone 16のアップデートが段階的であるだけでなく、市場がAppleの人工知能事業を懸念し始めているからだ。Apple Intelligenceの発売は来月に延期され、さらに重要な機能のいくつかは来年までリリースされない。
Apple の人工知能による通知や絵文字作成は画期的ではないかもしれない。OpenAI、Alphabet、Microsoft の AI 機能の方が優れているかもしれないからだ。しかし、Apple は AI を生産しているだけではない。最も人気のあるスマートフォン、最高のラップトップ、スマートウォッチ、そして市場で購入する価値のある唯一のタブレット向けの AI を生産しているのだ。Apple が行うあらゆる漸進的な改善により、これらのデバイスはさらに優れたものになるだろう。
市場のネガティブな感情がアップルの株価にどのような影響を与えているかは分かりません。現在、アップルの株価は史上最高値に近づいており、来年の予想PERは31倍と比較的高い水準です。しかし、過去の株価記録はアップルの上昇の勢いを止めていません。また、業績が予想を上回れば、アップルのPERは低下するでしょう。
アナリストは現在、アップルに対して概ね弱気であり、その後の株価評価の引き上げにより株価上昇の余地が残されている。アナリストの30%以上がAppleの株を「ホールド」または「売り」と評価しており、Appleはテスラを除く「ビッグ7」の中で最も人気のない株となっている。MicrosoftとAmazonを「ホールド」または「売り」と評価したアナリストはわずか5%である。
Apple は過小評価されることに慣れており、Apple の投資家にとって、過小評価されることは購入のチャンスとなります。
-
@ 104f6f7d:220bf499
2024-09-26 05:01:05“He is free to make the wrong choice, but not free to succeed with it. He is free to evade reality, he is free to unfocus his mind and stumble blindly down any road he pleases, but not free to avoid the abyss he refuses to see.” - Ayn Rand
-
@ 81870f53:29bef6a6
2024-09-23 23:09:17継続的な成功は、まずグリッド思考モードを構築し、その後、全体的かつ多様な思考方法を適用する人の手に渡ります。特に、すでに専門教育を受けている場合は、これには多少の努力が必要になるかもしれません。これらの思考モデルが脳に染み付いていれば、さまざまな状況に合理的に対処できるようになります。
ウォーレン・バフェットのグリッド理論は投資界ではすでによく知られていますが、この理論を正確に理解できる人はまだまだ多くありません。
さまざまな分野の一般的な知恵を適用し、大規模な学際的な知識ネットワークを構築し、ネットワーク内で実証する必要がある問題を相互検証する必要があるためです。
バフェット氏は、株式市場、金融、経済に関する知識をさらに習得するよう努めるべきだと述べたが、その知識を孤立させるべきではなく、心理学、工学、数学、物理学などを含む人類の知識の宝庫の一部として考えるべきだという。
世界は常にランダムウォークしており、市場は予測不可能です。単一の専門分野の考え方では、変化を効果的に説明することはできません。ただし、同じ問題を検証する際に、複数の異なる専門分野と次元を通じて同じ結論が得られれば、投資決定の精度は高まる可能性があります。
しかし、エネルギーは常に限られています。バフェット氏は次のようにアドバイスしています。「まず、数学、物理学、化学、そして工学のコースを 1 つ学びましょう。これら 4 つの自然科学の基本原理を習得することに加えて、正確な論理的思考力を養うことがより重要です。」
これを基に、心理学、生理学、会計学、経営学、経済学、金融学、政治学、社会学、歴史学、法律学、医学、ビジネス学など、できるだけ多くの分野を習得してください。
もちろん、彼はまたこうも言いました。「これらすべての分野の専門家になる必要はありません。本当に役立つ主要なアイデアを把握し、できるだけ早く理解し、習得するだけでよいのです。」
この記事は、思考の格子モデルをよりよく理解していただくために、ロバート・G・ハグストロム著『チャーリー・マンガーの知恵』から抜粋したものです。
この本の序文には、「キツネとハリネズミ」という非常に興味深い言語の物語が使われています。
古代ギリシャの詩人アルキロコスの詩に、「キツネは多くのことを知っているが、ハリネズミは一つの大きなことを知っている」という意味のフレーズがあります。詩人は、キツネは狡猾でハリネズミを食べるための多くのトリックを持っているが、ハリネズミが身を守るために必要なのは、柔らかい体を硬くてとがった殻に丸めるという一つの動きだけである、ということを表現したかったのです。
しかし、哲学者のアイザイア・バーリンは寓話から離れて、ハリネズミとキツネは実際には2種類の人間、2つの世界観を表している可能性があると述べています。
キツネは百科事典のような知識があり、多くのことを知っており、しばしば「互いに矛盾」しますが、ハリネズミはすべてにおいて統一性を求めます。彼らは世界を異なる方法で理解し、その理解を意思決定プロセスに適用します。
いわゆるハリネズミとは、ハンマーを握るとすべてを釘のように見る人のことです。彼らは人生の重みをすべて信念の支点に置き、それを大きな中央集権的なシステムに帰し、それを固く信じています。
一方、キツネは多くの真実を知っており、たとえこれらの真実が互いに矛盾していたとしても、キツネは知っている「小さな」事柄について常に合理的な疑いを抱いているため、冷静に対処できます。キツネは、ハリネズミが大きな事柄について知っていることなど、特定の教義や原則を盲目的に信じることに反対します。
キツネは多くのことを知っており、大きなシステムやイデオロギーに限定されませんが、ハリネズミは 1 つの素晴らしい動きに頼り、粘り強く、揺るぎなく、順応性がありません。
マンガーの格子理論に触れたことがある人なら、彼がキツネのようであることに気づくでしょう。なぜなら、彼はあまりにも多くの「小さな」ことを知り、杭を一本、釘を一本、少しずつ使って「思考モデルの格子」を構築し、連想思考の訓練の下で壮大な精神世界を構築しているからです。
本文 1994 年 4 月、南カリフォルニア大学マーシャル経営大学院で、マンガーはギルフォード・バブコックの投資セミナーの学生たちに珍しい授業を行った。
マンガー氏は、講義の冒頭で、正式に講義を始める前に聴衆にちょっとしたいたずらをすると冗談交じりに言った。同氏は株式市場については議論せず、「一般常識の応用分野としての株式選び」について話した。
その後の1時間半で、彼は学生たちに挑戦を促し、市場、金融、経済の分野で彼らの視野を広げ、これらの知識を孤立した学問としてではなく、物理学、生物学、社会学、心理学、哲学、文学、数学を組み合わせた知識体系として扱うよう促しました。
このより広い視点から、彼はさまざまな分野が相互に関連しており、統合の過程で互いに強化されると信じています。
考えることが好きな人は、それぞれの分野から優れた思考モデルを獲得し、重要なアイデアからインスピレーションを得て、包括的な理解を達成します。特定の分野に頑固に固執する人は、たとえ成功できたとしても、長続きしません。
マンガーは、自分の主張をより明確にするために、この考え方を表すために、ラティスワーク モデルという鮮明な名詞を使用しました。(注: マンガーが 1994 年に言及したラティス (Latticework) という用語は、「グリッド」として理解できます)。
「頭の中には多くのモデルがあります」と彼は説明し、「直接的であろうと間接的であろうと、経験を分類してグリッド モデルに配置する必要があります」と述べました。こうして、グリッド理論は投資コミュニティに急速に広まり、マンガーの手法を識別するためのシンプルなシンボルとなりました。
マンガー氏はよくメンタルグリッドを適用します。たとえば、バークシャー・ハサウェイの年次総会では、バフェット氏の回答を補足するために、読んだばかりの本の言葉を頻繁に引用します。これらの引用は、最初は投資とは無関係に思えるかもしれませんが、マンガー氏の説明の後、すぐに関連性が感じられるようになります。
チャーリー・マンガーが他の分野に重点を置くのは、目的があるからです。彼は、異なる分野の思考モデルを統合することで、投資家は優れた投資収益を達成できると固く信じています。
異なる専門分野の観点から同じ結論に達することができれば、投資判断はより正確になります。これが最大のメリットです。より包括的な理解により、より優れた投資家になれるのです。
さらに、その影響はそれ以上です。リベラルアーツの知恵を理解しようと努める人は、人生をよりうまく切り抜けることができます。彼らは優れた投資家になるだけでなく、優れたリーダー、優れた市民、優れた親、優れた配偶者、有益な指導者にもなれます。
- 高等教育に関する後悔 リベラルアーツの知恵はどうやって身に付けられるのでしょうか。簡単に言えば、段階的なプロセスです。まず、さまざまな知識分野から貴重な概念やモデルを習得し、次に類似のモデルを識別する方法を学びます。前者は自己学習であり、後者はさまざまな視点から問題を考え、見る方法を学ぶことです。
さまざまな分野から知識を引き出すのは、大変な作業のように思えるかもしれません。幸いなことに、すべての分野の専門家になる必要はありません。必要なのは、マンガー氏が「優れた思考」と呼ぶ基本原則を学び、それを完全にマスターして、自分のために活用することだけです。
この時点で、「過去数世紀にわたって発展してきた重要な概念を教えることは、高等教育がすべきことではないのか」という疑問がよく聞かれます。もちろんそうです。
ほとんどの教育者は、才能を養うための最善の、おそらく唯一の方法は、大学の芸術と科学に基づいたカリキュラムを通じてだと熱心に主張するでしょう。これに反対する人はほとんどいません。しかし、現実の世界では、私たちの社会は知識の広さよりも深さを重視しています。
これはまったく理解できることです。学生とその親は高等教育にお金を投資しているので、卒業後すぐに良い就職の機会が得られると期待しているのです。
企業の採用担当者のほとんどが、専門知識を活かしてすぐに会社に貢献できる人材を求めていることを彼らは知っています。今日の学生が専門知識に加えて幅広い文系・理系の教育を受けることを拒否するのは驚くことではありません。これは当然のことです。しかし、先ほども述べたように、私はそれが良い考えだとは思いません。
- フランクリン:歴史はあらゆる有用な知識を与えてくれます。 1749 年の夏、ペンシルバニア ガゼットの定期購読者は、日刊紙に加えて、新聞の発行者であるベンジャミン フランクリンが書いた小冊子を受け取りました。「ペンシルバニアの若者への教育に関するアドバイス」と題されたこの小冊子で、フランクリンは「この州の若者は大学教育を受けていない」ことを残念に思っています。
コネチカット州とマサチューセッツ州の若者は昔からイェール大学やハーバード大学に入学することができ、バージニア州の学生はウィリアム・アンド・メアリー大学に入学でき、ニュージャージー州の学生はニュージャージー大学(後にプリンストン大学に改名)に通うことができる。
しかし、米国最大かつ最も繁栄した都市である「アメリカのアテネ」として知られるフィラデルフィアには大学がありませんでした。この小冊子の中で、フランクリンはフィラデルフィア公立大学を設立することでこの問題を解決しようと提案しました。
フランクリンの考えは当時としてはユニークなものでした。ハーバード、イェール、プリンストン、ウィリアム・アンド・メアリーなどの大学は当時、聖職者の養成に使われており、そのカリキュラムは、若者を将来のビジネスや公務に備えるための実践的なコースではなく、古典作品の研究に重点を置いていました。
フランクリンは、フィラデルフィア公立大学が、伝統的な古典的分野(フランクリンの言葉を借りれば「外観の装飾」)と実用性の両方を重視することで、両者のバランスをとることができることを望みました。「若者の教育に関して言えば、役に立つことを教え、外観の装飾方法も教えることができれば、それは素晴らしいことです」と彼は書いています。
しかし、知識は無限である一方、時間は限られているため、将来従事するいくつかの職業において最も重要かつ有用な知識を学ぶ必要があります。
現在、フランクリンが提案したフィラデルフィア公立大学はペンシルベニア大学となっています。文理学部の元学部長リチャード・ビーマン博士は、フランクリンの功績を次のように評しています。「ベンジャミン・フランクリンは最初の近代的なカリキュラムを提案しました。そして、それは最高のタイミングで提案されました。」
18 世紀には、数学や自然科学の分野で新たな発見が次々と生まれ、世界の知識基盤は爆発的な進歩を遂げ、従来のカリキュラムにおけるギリシャ語、ラテン語、聖書ではもはやこの新しい知識を説明できなくなりました。
フランクリンは、これらの新しい分野を公立大学のカリキュラムに組み込むことを提案し、さらに一歩進んで、学生が将来ビジネスや公務で成功するために必要なスキルを習得することを提案しました。当時の文章、描画、スピーチ、算数などの基本的なスキルを習得すれば、学生は知識の習得に集中できるようになります。
「歴史の研究を通じて、ほとんどすべての有用な知識が得られる」とフランクリンは書いている。しかし、彼が意味していたのは、私たちが一般的に歴史学と呼んでいるものよりはるかに広い範囲だった。「歴史」には、意味があり価値のあるものすべてが含まれる。
フランクリンは、若者が歴史を学ぶべきだと主張しました。それは、哲学、論理学、数学、宗教、政治、法律、化学、生物学、医療、農業、物理学、外国語を学ぶべきだという意味です。
こうした重い学習課題は本当に必要かと心配する人々に対して、フランクリンの答えはこうです。「これは重荷ではなく、神からの贈り物です。さまざまな国の歴史を読めば、人類に対する理解が深まるでしょう。」
ベンジャミン・フランクリンはリベラルアーツ教育の創始者です。ビーマンが指摘するように、「彼の教育における成功は 3 つの原則に基づいています。
まず、生徒は読む、書く、算数、物理学、人前で話すといった基本的なスキルを習得する必要があります。次に、生徒が知識の海に入るように導き、最後に、生徒がさまざまな知識のつながりを発見できるように導くことで、思考習慣を養います。
フランクリンの提案から250年後の今日に至るまで、アメリカの教育界は若者に考える力を教育する最善の方法について議論してきました。
さまざまな欠点があるにもかかわらず、私たちの教育システムは、スキルの提供と知識の伝達に関しては依然としてうまく機能しています。これらはフランクリンが述べた最初の 2 つの重要な原則です。欠けているのは、3 番目の原則、つまり異なる知識を探索する「思考習慣」です。
私たちはこの状況を変えることができます。学校から長い間離れていても、自分なりの方法で、さまざまな知識分野におけるつながり、つまり本当に理解できるつながりを見つけることができます。
フランクリン流の「思考習慣」を身につけ、ビーマン教授の洞察力に富んだ言葉を取り入れることが、マンガーの「一般知識の知恵」を身につける鍵となる。
しかし、言うは易く行うは難しです。ほとんどの人にとって、これは既存の思考方法に反するものです。特定の分野を何年も勉強した後、今度は他の分野の知識を独学で学ぶことが求められます。これまで勉強してきた科目に限定せず、専門分野の壁を突破し、周囲の世界に目を向けることが求められます。
投資家にとって、そうすることで得られる利益は大きい。目の前の障壁を越えると、他の分野で起こっている同様の状況を観察し、異なる考え方を見極めることができるようになる。
そして、1 つの概念が別の概念によって強化され、この概念が 3 つ目の概念によって強化され、常に発展していきます。正しい道を進んでいることに気づくでしょう。鍵となるのは、異なる考え方のつながりを見つけることです。幸いなことに、人間の脳は常にこのように機能してきました。
知恵とは、「つながり」を学び、習得する能力の一種です。 エドワード・ソーンダイクは、現在では刺激反応現象と呼ばれている現象を初めて発見した人物です。刺激と反応の間につながりが形成されると、学習行動が発生します。
ソーンダイクは後に、ロバート・ウッドワースと共同で 1901 年に発表した研究論文で、ある領域での学習は別の領域での学習には転用できないとまとめました。彼らは、学習は元の領域と新しい領域の間に類似した要素がある場合にのみ転用できると指摘しました。
この観点からすると、新しい概念を学ぶことは、人の学習能力を変えることではなく、むしろ知識構造を豊かにすることです。私たちが新しい科目を学ぶのは、より優れた学習者になるからではなく、さまざまなパターンをよりよく認識できるようになるからです。
エドワード・ソーンダイクの学習理論はコネクショニズムとして知られ、脳の働き、つまり人間の思考、学習、推論、記憶、意思決定を研究する現代の認知科学の中核理論となりました。
心理学におけるコネクショニズムの理論は、刺激反応パターンに関するソーンダイクの研究に由来しています。この理論は、学習は試行錯誤のプロセスであり、新しい状況 (刺激) に対する肯定的な反応が実際に脳細胞間の接続を変えることを示唆しています。
言い換えれば、学習プロセスはニューロン間のシナプス接続に影響を及ぼします。脳が新しい情報を受け取り、その中に類似のパターンを識別すると、これらのシナプスは継続的に調整して、この新しい情報に適応し、受け入れます。脳は関連する接続をループにリンクし、学習した内容を同様の状況に転送できます。
したがって、知能とは、こうしたつながりをさらに学び、習得する人の能力と見ることができます。
強力な新しい情報システムである人工ニューラル ネットワークは主に接続に基づいているため、コネクショニズムはビジネス リーダーや科学者から広く注目を集めています。このネットワークは、従来のコンピューターに比べて人間の脳に近い動作原理を再現しようとする人々から、ニューラル ネットワークとしてよく知られています。
脳はニューラル ネットワークと考えることができます。人工ニューラル ネットワークは脳の構造を模倣したコンピューターです。人工ニューラル ネットワークには、相互接続されて複雑なネットワークを形成する数百の処理ユニット (ニューロンに類似) が含まれています。
(ニューロンの速度がシリコン チップよりも数桁も遅いのは驚くべきことですが、脳は多数の接続を通じてこの速度制限を補い、効率を向上させます。)
- グリッド思考の確立 ニューメキシコ州のサンタフェ研究所は研究と教育を統合し、物理学者、生物学者、数学者、コンピューター科学者、心理学者、経済学者を集めて複雑適応システムを研究しています。
これらの科学者は、免疫システム、中枢神経系、生態学、経済、株式市場を理解し、予測しようとしており、革新的な考え方に強い関心を持っています。
(編集者注:ビル・ミラー氏のインターネットとテクノロジー株に対する姿勢の変化は、1992 年以来のサンタフェ研究所への訪問にも関係しています。
複雑系科学を研究するサンタフェ研究所は、ビル・ミラー氏に投資調査のための別の情報源を提供している。ミラー氏は1993年に優良株のIBMを購入した後、「テクノロジーは他の産業を混乱させるだろう。それに伴うリスクを理解しなければ、無知に基づいて投資決定を下す可能性がある」と述べた。
ミシガン大学の学際的教授(心理学、工学、コンピューターサイエンス)であるジョン H. ホランドは、サンタフェ研究所を頻繁に訪れ、革新的な思考に関する講演を数多く行っています。
ホランドの理論によれば、革新的な思考には 2 つの重要なステップを習得する必要があります。
ステップ 1 では、獲得する知識の基本的な枠組みを理解する必要があります。ステップ 2 では、類推の使用方法とその利点を理解する必要があります。
ステップ 1 は、チャーリー・マンガーが世俗的な知恵を得ることについて述べたことの前半部分と同じであることがわかります。さまざまなメンタル モデルを結び付けて、そこから利益を得る能力は、グリッド内の各モデルについて基本的な理解があることを示しています。
各モデルの仕組みやそれが説明する現象を理解していなければ、複数のメンタルモデルを混在させても意味がありません。各モデルの専門家になる必要はありませんが、これらのモデルに関する必要な基本知識は必要であることを覚えておいてください。
ステップ 2 は、類推を探すことです。特に 9 年生のときに受けた英語の授業を思い出すと、最初は奇妙に思えるかもしれません。類推の最も単純な定義は、型にはまらない間接的な方法で意味を伝えることです。
「仕事は地獄だ」と言うとき、私たちは一日中激しい火に焼かれ、その灰を消し去らなければならないことを表現しているのではなく、今日仕事に行くのに本当に疲れているということを意味しています。アナロジーは感情を表現するための簡潔で記憶に残りやすく鮮明な方法として使用できます。
さらに、類推は言語だけでなく、思考や行動を通じても表現できます。
しかし、ホランド氏は、アナロジーは単に鮮やかな表現方法というだけではなく、それが表す思考プロセスよりもさらに奥深いものであり、アイデアをモデルに入力するのに役立つと述べています。そして、これは革新的な思考を表しています。
同様に、類推は、新しい概念を身近な概念と比較して説明したり、単純なモデルで考えを説明して同様の複雑な考えを理解しやすくしたり、さらには新しいアイデアを刺激したりすることもできます。
雑誌「フロンティア」の印象的な一連のレポートによると、ジェームズ・バークは著書「コネクションズ」の中で、多くの場合、発明家は望ましい結果(ターゲット)と以前の発明(ソース)の類似性に気づいたために新しい発明を生み出したと書いています。自動車は最も典型的な例です。
車のキャブレターは香水瓶と関係があり、香水瓶は蒸気を利用しようとした18世紀のイタリア人と関係があります。アレッサンドロ・ボルタの電子銃はもともと空気の純度をテストするために発明され、125年後にはキャブレター内の燃料に点火するために使用されました。
車のギアは水車に由来し、エンジンのピストンとシリンダーは、炭鉱の排水システム用に設計されたトーマス・ニューコメンの水ポンプにまで遡ることができます。
したがって、それぞれの大きな発明は初期のアイデアと結びついており、それが元のアイデアのきっかけとなるパターンなのです。
私たちにとって、理解したい主なトピック(シンボル)は、株式市場または経済です。長年にわたり、株式市場や経済の現象を説明するために、金融分野で多数のソースモデルを蓄積してきましたが、これらのソースモデルは多くの場合不十分です。市場と経済のパフォーマンスは、今日まで謎のままです。
今こそ、さまざまな分野に手を広げて、市場に対する認識を研究すべき時です。より多くの分野を探索することで、謎を解く共通のメカニズムが見つかる可能性が高くなります。私たちが追求する革新的な思考は、通常、2 つ以上の異なる思考モデルの組み合わせから生まれます。
格子思考パターン自体は類推であり、しかも単純なものです。格子が何であるかは誰もが知っており、多くの人が格子と密接な関係を持っています。私たちは格子を使ってフェンスを飾ったり、パーゴラを建てたり、ブドウ棚を作ったりします。格子を使って一連の思考フレームワークを扱うことは、その有用性のわずかな拡張にすぎません。
一見単純に見える多くのアイデアと同様に、格子理論の類似性を理解すればするほど、その複雑さに気づき、それを純粋に認知的なモデル フレームワークとして捉えることが難しくなります。
私自身も、格子モデルの概念を表現するためにさまざまなアナロジーを使用しています。
ハイテクのバックグラウンドを持つ人たちと向き合うとき、私はグレーティング モデルの作成プロセスを中枢神経系ネットワークの設計によく例えますが、彼らはグレーティング モデルが持つ強力なエネルギーをすぐに理解します。心理学者はグレーティング理論をコネクショニズムと簡単に結び付けますが、教育者はそれを脳の新しいパターンを探して発見する能力と関連付けます。
人間性の探究が得意な人たちと対面するとき、私は類推の価値について話し、類推に対する理解を深めます。私のように科学界の出身ではない人たちは、格子の間に小さな電球があるといった説明に強く反応することがよくあります。
ある日の午後、庭の柵を眺めていると、突然ひらめきました。その柵には装飾的な格子が付いていて、柵は柱によって区画に区切られ、格子は柵によってブロックに区切られていました。
フェンスを眺めながら思考モデルについて熟考していると、だんだんと理解できるようになりました。それぞれのグリッドは知識の分野のようなもので、ガレージに近いものは心理学、その隣は生物学といった具合です。
2 つのグリッド間の接続は、分野の交差点として見ることができます。次に、脳の並外れた推論プロセスで、突然、ドアの外のクリスマスの飾りを思い浮かべ、次に、装飾ノードの豆電球を想像しました。
緊急に市場動向を知りたい場合や投資判断をしたい場合は、不確定要素をグリッド思考パターンで整理します。
まず、生物学的思考モデルを使って予測すると、たくさんの電球が点灯するのを見るかもしれません。次に、心理学などの次のセクションでは、他の電球が点灯しています。3番目と4番目のセクションの電球も点灯しているのを観察すると、最初は不確かだったアイデアが検証されたので、自分に自信が持てます。
逆に、問題を検討したときに電球が点灯していない場合は、そのアプローチが実行可能ではないという証拠として見なします。
これがグリッド思考モデルの力であり、株式の選択方法などの小さな問題を解決できるだけでなく、新しい業界やトレンド、新興市場、キャッシュフロー、国際市場の変化、経済状況、市場参加者の反応など、市場の力を完全に理解するのに役立ちます。
V、マンガー:グリッドのような思考モードを構築する楽しみは終わりません。 マンガー氏はかつて南カリフォルニア大学で衝撃的な講義を行い、金融を専攻する学生たちに投資は一般常識の一部として捉えられるべきだと語った。
2年後、スタンフォード大学ロースクールで、彼は初めて基本的な見解を発表しました。それは、継続的な成功は、まずグリッド思考モデルを構築し、次に全体的かつ多様な方法で考える人のものであるというものでした。
彼は私たちに、特にすでに専門教育を受けている場合は、これには多少の努力が必要になるかもしれない、と注意を促しました。これらの思考モデルが心に染み付いたら、さまざまな状況に合理的に対処できるようになります。
ベンジャミン・フランクリンもそう考えていたことは明らかです。
異なる思考モードを結びつける意志を持つ人の方が、並外れた投資収益を達成できる可能性が高いと私は考えています。そうなると、マンガーが言う「特に強力な力」が発生します。
これは 1 足す 1 が 2 になるという問題ではなく、臨界質量爆発の力があり、マンガーはこれを「超強力な力」と呼んでいます。
思考パターンをどう発達させるかについてのスタンフォード大学の学生たちの質問に答えて、彼はこう言いました。
「一般的な知恵は非常に単純で、いくつかの対応する原則と実際の知恵があり、それらを見つけるプロセスは非常に興味深いものです。この喜びが終わらないことは重要です。さらに重要なことは、そこから多くの富を得ることができるということです。私はそれを自分で試しました。」
あなたがしていることが難しくなく、報酬が非常に寛大であることを願います...この知恵を持つことはあなたのビジネスに非常に役立ち、法的保護を与え、あなたの人生を有意義なものにします。あなたの愛をより充実したものにしましょう...それはあなたが他の人と自分自身を助け、人生を喜びで満たすことを可能にします。
-
@ a03b38f8:2c7ce1f0
2024-09-23 20:08:38DATA PRIVACY AND BEST PRACTICES
Your Data Privacy should be a major concern of yours, as enormous personal data about you is shared across various medias and platforms.
Data collection, data sharing, and it's management is a key concern for businesses organizations across the globe. It is a huge global business collecting and selling your personal data. In many ways you are their product.
In our daily activity of mobile phone usage, information about us is being constantly collected, and this is not just limited to our own personal devices, so it is important to know what data is being collected and how it is being used without our consent.
Data Privacy in a nutshell is a series of activity aimed at safeguarding (Protection) of our personal data from those who should not have access to it and the ability of the individual to determine who can access this personal information in their custody.
The term data privacy is synonymous with Information Privacy or Data Protection depending on which context this term is used.
TYPES OF DATA COLLECTED
FINANCIAL DATA
Your Financial information is incredibly sensitive data, this data when compromised could result in a huge financial loss, you becoming a fraud victim, or suffuring from identity theft. cyber criminals are always hoping to gain access to information such as your customer accounts or credit card details.
Financial data is collated from various activity, products usage, service consumed, which can be offline or online this financial data when compromised the result is a loss.
On the cyber space hackers have schemes used in stealing information from victims while offline activities could involve humans or usage of advance tools to steal your information.
Local grocery stores and banks are good examples of where credit card information is stolen. Hackers use skimming methods to capture payment information from your credit card in local grocery stores and at ATMs, using an advanced approach involving a small device called a SKIMMER that reads the information stored in a cards magnetic strip or microchip. Skimming devices most times are installed at Automated Teller Machines and other point of sales locations, especially gas stations. Most times fraudster use cameras and overlay touchpads to capture victims’ personal identification number(PIN).
Hackers also use phishing methods through texts and phony emails. Malware that can record keystrokes to steal your sensitive information, it is advisable to never enter your credit cards information on a website or email you did not verify. Or better still only use limited balance cards or visa reloadable cards for online activities.
INTERNET DATA
As we access the internet daily, our data is collected in different ways, the use of search engines and data mining has created a capability for data collection from a variety of sources very easily.
With the advent of Artificial Intelligence (AI), this has facilitated creating inferential information about individuals and groups, based on such enormous amount of collected data, as a result of this the Fair Information Practice Principle was formulated to provide a set of guidelines that represent widely accepted concepts concerning fair information practices in an electronic marketplace. This action has received a lot of criticism because of insufficiency in the field of Artificial Intelligence enabled inferential information.
When using the internet we give away a lot information about ourselves in cases where emails are not encrypted by administrators of servers when the connection is encrypted and the internet service provider (ISP) and other parties surfing the network traffic of that connection are able to know the contents, this applies to any of kind of traffic generated on the internet including web browsing, instant messaging, that is why it is advisable to always encrypt emails and regular use of it can be done traceless via anonymizers. The use of routing protocols that create hard to trace communication by using a chain of proxy servers is encouraged, with this each message is encrypted to each proxy using public key cryptography
There are many content with privacy concerns in an era where other people might not be as privacy conscious as you are. It is often we see people tagged on Facebook and other social media without their consent, this act could lead to cyber stalking which might escalate to offline stalking.
Some websites engage in deceptive practices such as placing a cookie notice in places on the page that are not allowing them to change their privacy settings apps like Instagram. Facebook collects user data for personalized app experience; however, they track user activity on other apps, while other information collected are used for marketing purposes. This in turn has made this companies more powerful over their consumers.
LOCATION DATA
Location data can be some of the most sensitive data.
Location data provides publishers and app developers with advertising revenue so consumers can access free services and information, it helps with city planning, help ride sharing users get to their destination guide, Travelers to great local spots, reassure parents of their children safety while away from home. Location data can also enhance personal safety in cases of emergencies services like the dispatch of help at a speed of light, additional features like “FIND MY DEVICE” help locate lost or stolen phones.
But the pervasive use of geo-location technology poses new challenge to data privacy as they enable third parties to locate and track people and objects anywhere at any anytime.
The Smart devices we carry along with us have in fact become tools for surveillance, yet many of us have embraced them willingly, the risk for abuse of personal data and the threats to privacy that arise from government and commercial entities using geo-location technology are enormous. Like all powerful tools location data is a double-edge sword, we cannot refrain from this potential service but instead we can use it judiciously and responsibly.
Google takes the cake when it comes to tracking most of our data, because it’s entire business model relies on data collection, while Facebook stores user information.
POLITICAL DATA
Political Data Privacy has been a thing of concern with the use of digital voting machines, in the United States of America (USA) where the M650 electronic ballot scanner is used, it is possible that the smart cards can be reprogrammed wirelessly using mobile phones. This activity could result in election hacking, bringing about erosion of public trust in the electoral process. When the masses lose faith in the integrity of elections they become disillusioned and disengaged from participating in democracy.
MEDICAL DATA
With the increased incorporation of electronic health records into care delivery and research, the growing volumes of data for evidence base research and care might eventually force significant changes to strike a balance between privacy and medical data.
People may not wish for their medical records to be revealed to others due to confidentiality and sensitivity of what the data might reveal about their health. They might be concerned that it might affect their Insurance coverage or employment, some people might not wish for others to know about any medical or psychological conditions or treatments that might bring embarrassment upon themselves or social scrutiny.
Revealing medical data could also reveal other defects about one’s personal life, health-care data breach can result from hacking, data theft or loss, unauthorized access and when this occurs all parties suffer a loss.
Data breaches are not just a concern and complication for security experts, it also affects, stakeholders and organizations.
The Internet of Medical Things (IOMT), smart devices, information systems and cloud services have led to a digital transformation of the healthcare industry with this technologies sensitive data is collected by healthcare organizations from patients stored on network servers for easy accessibility at all times so as to facilitate patient care.
Cyber criminals use ransomware to steal a victim’s medical records from a healthcare provider by decrypting the data or device in turn for a ransom, hackers knowing that most health care providers store and manage medical records online, most Healthcare providers use the Remote Desktop Protocol (RDP)to access medicals records, cyber criminals try to exploit vulnerabilities of unsecured RDP to steal medical records.
EDUCATIONAL DATA
Stolen student records can come back to haunt children when they attain adulthood; for example say a student has a history of drug use that’s been successfully overcome or they have disciplinary records that should have been expunged but are publicly available, this data could resurface in College Applications, Job Interviews and Court Hearings.
In an era where education data mining is prevalent a robust cyber security is essential for protecting everyone within the education ecosystem, as security breaches in higher education can lead to significant data loss, affecting personal information and institutional data. Implementing stringent data security protocols and response strategies is vital.
BEST TECHNOLOGIES FOR DATA PRIVACY PRACTICES
These are just some of the technologies available today that can protect user privacy and keep data more secure.
I. ENCRYPTION
Encryption is a way to conceal information by scrambling it so that it appears to be random data. Only parties with the encryption key can unscramble the information, this involves the use PGP.
Pretty Good Privacy (PGP) is a widely recognized encryption system used for securing digital communications and data. PGP keys employ a combination of symmetric and asymmetric encryption techniques to ensure the confidentiality, integrity, and authenticity of information.
PGP keys consist of two parts: a public key and a private key. The public key can be freely shared and is used for encrypting data, while the private key is kept secure and is used to decrypt the information. This dual-key mechanism ensures that only the intended recipient can access the encrypted message.
Moreover, PGP allows for digital signatures, enabling the sender to verify their identity and the message's integrity. This provides a high level of trust, making PGP ideal for secure communications, email encryption, file encryption, and software distribution.
PGP keys offer robust security by leveraging advanced cryptographic principles, ensuring data privacy and authenticity. Their reliability and effectiveness have made them a cornerstone in secure communication practices, widely adopted across various industries to protect sensitive information.
II. ACCESS CONTROL
Access control ensures that only authorized parties access systems and data. Access control can be combined with data loss prevention (DLP) to stop sensitive data from leaving the network.
Access Control is a fundamental security mechanism used to regulate who or what can view or use resources in a computing environment. It is crucial for protecting sensitive data, ensuring that only authorized users have the right to access, modify, or manage particular resources, systems, or information.
There are several types of access control models, each serving different security requirements:
-
Discretionary Access Control (DAC) allows resource owners to control access based on user identities.
-
Mandatory Access Control (MAC) uses strict policies controlled by a central authority to manage access based on classification levels.
-
Role-Based Access Control (RBAC) grants access based on a user’s role within an organization, offering scalability and efficiency in managing permissions.
-
Attribute-Based Access Control (ABAC) provides dynamic, context-aware access based on attributes like user role, time of access, and location.
Effective access control ensures data confidentiality, integrity, and availability by preventing unauthorized access, reducing the risk of data breaches, and ensuring regulatory compliance. In today’s digital landscape, implementing robust access control measures is critical for safeguarding organizational assets, maintaining trust, and protecting against cyber threats.
In conclusion, Access Control is a vital element of cybersecurity that helps organizations enforce security policies, manage permissions efficiently, and protect sensitive information, making it a cornerstone of data protection and information security strategies.
III. TWO FACTOR AUTHENTICATION
Two-factor authentication is one of the most important technologies for regular users, as this makes it far harder for attackers to gain unauthorized access to personal accounts.
Two-Factor Authentication (2FA) is a security process that requires two forms of verification to access an account or system. It combines something you know (like a password) with something you have (such as a smartphone or security token) or something you are (biometrics like fingerprints). This additional layer of security makes it harder for unauthorized users to gain access, even if they have the password, thereby enhancing protection against cyber threats.
-
-
@ 52adc2ef:9f4bc0ba
2024-09-23 15:27:28สวัสดีครับ
หลังจากที่ได้ฟัง youtube ที่ได้เเรงบัลดาลใจในการเขียน เราก็ได้ลองเรียนการเขียนของ ทอย Datarockie
ออกตัวก่อนเราไม่มีส่วนได้ส่วนเสียกับทางเค้านะครับ จ่ายเงินเรียนครบจำนวน 555 แค่หลังจากฟังเเล้วเราอยากหาคอร์สเรียนดู และมาเเชร์สิ่งที่เรียนรู้มาครับ คลาส "Web For Impact"สรุปที่จับใจความได้ (เเต่เนื้อหาจริงๆมากกว่านี้นะ มันมีหลายประเด็นที่ฟังรอบเดียวอาจจับไม่ได้ทั้งหมด)
องค์ประกอบ
Credit Datarockie
-
Content ถ้าไม่รู้จะเขียนอะไร ให้อ่านให้เยอะขึ้น หรือหาสิ่งที่ชอบเเละเข้าใจมาเป็นหัวข้อ
-
Writing Is A Critical Skill ต้องฝึกฝน ถ้าเราสามารถเขียนได้ดี มันจะเป็น SEO ไปในตัว (SEO คือ Search engine optimization กระบวนการการเพิ่ม traffic ให้คนเข้า Web เรามากขึ้น ซึ่งมี Agency ที่รับทำอยู่)
-
Everyone should have a website ทำไมควรมี Website ของตัวเอง บทความที่เขียนใน website เหมือนบ้านตัวเอง Social Media เหมือนเราเช่าบ้าน เพราะมีโอกาสโดน บล็อค คิดว่าเป็น Spam
-
43% of the webs use WordPress ใช้กัน เเนะนำเริ่มเขียนจาก (เพิ่งรู้เหมือนกันครับอันนี้)
Behavioural Economics
- มนุษย์เรามีการรับรู้ 2 ระบบ ส่วนเเรก Auto pilot system และ pilot system
Auto pilot system รับรู้ได้เร็ว ทำงานตลอดเวลา สัญชาตญาณ จิตใต้สำนึก เช่น สีแดง ไว้ทำป้ายหยุดเพราะ มันไวต่อตาเรา Pilot system รับรู้ได้ช้า เเละต้องการพิจารณา
-
ซึ่งการเขียนควรที่จะย่อยง่ายๆ สมองจะได้รับรู้ได้ดี เช่น การเว้นวรรค ของตัวเลขเบอร์โทร ถ้าติดกันสมองก็จะทำงานมาก
-
การเขียนก็เหมือนกัน ติดกันยาวๆ อ่านยากทำให้คนทั่วไปขี้เกียจอ่าน เว้นให้อ่านง่ายๆก็จะช่วยได้มาก (เห็นด้วยเลย)
Great Copy
- งานเขียนที่ดีหลักมี 2 ส่วนง่ายๆเลย
Strong Strategy กลยุทธ์การเขียน ว่า content เราจะเเนวไหน ยังไง สัก 3 หัวข้อ เช่น สรุปเรื่องที่อ่านมา หรือ สรุป cilp ต่างๆที่ฟังมาจาก Youtube Interesting Voice อันนี้ง่ายก็ style การเขียน Mood tone เรา ควรหา role model ฝึกและทำตาม
เราไม่เคยสนใจการเขียนมาก่อน เพิ่งลองเรียนคลาสนี้อันเเรก ไม่รู้ว่าที่อื่นเป็นยังไงบ้าง เเต่สำหรับเราเรียนแล้วปลุกไฟในการเขียนดี (หวังว่าจะไม่มอดเร็ว555)
ซึ่งยังเหลืออีก 2 คลาสที่ต้องเรียนออนไลน์เรื่องใช้ wordpress และ SEO
บทความถือเป็นการฝึกเขียนของตัวเองเลย ยังไงฝากด้วยนะครับ
siamstr
nostr
-
-
@ c73818cc:ccd5c890
2024-09-23 14:14:56📱 Keonne Rodriguez e William Lonergan Hill affrontano il processo
📱 Gli sviluppatori di Samourai Wallet si sono presentati in tribunale per affrontare accuse di riciclaggio e gestione di un’attività di trasmissione di denaro non autorizzata. La difesa chiede più tempo per esaminare i dati e contesta la validità delle accuse.
📱 Prove voluminose e difesa sotto pressione
📱 La procura ha consegnato alla difesa grandi quantità di prove, tra cui dispositivi sequestrati e documenti aziendali. Gli avvocati contestano la mole di dati e ritengono che le accuse non siano ancora sufficientemente provate, sottolineando l’interpretazione controversa delle leggi da parte del DoJ.
📱 Richieste di cauzione respinte e monitoraggio mantenuto
📱 Rodriguez ha richiesto la rimozione della detenzione domiciliare e restrizioni sull'uso delle criptovalute, ma la procura ha presentato prove di un presunto piano di fuga, convincendo il giudice a mantenere il monitoraggio fino alla prossima udienza fissata per dicembre 2024.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Samourai #Wallet #SamouraiWallet #Accuse #Riciclaggio #DoJ #Censura #Controllo #WEF #Cripto #Bitcoin
-
@ a012dc82:6458a70d
2024-09-23 12:34:31Table Of Content
-
Who is the Bitcoin Advocacy Group?
-
Why is Bitcoin important?
-
The ECB's stance on Bitcoin
-
Eurotower's response to the Bitcoin Advocacy Group
-
How is the Bitcoin Advocacy Group educating the ECB and Eurotower?
-
Conclusion
-
FAQ
Bitcoin is a digital currency that has been gaining popularity worldwide in recent years. While it has many benefits, including decentralization and security, there is still a lot of skepticism and misunderstanding surrounding it. The Bitcoin Advocacy Group aims to address this by bringing awareness and education to institutions such as the European Central Bank (ECB) and Eurotower.
Who is the Bitcoin Advocacy Group?
The Bitcoin Advocacy Group is a community of individuals and businesses who believe in the potential of Bitcoin as a decentralized digital currency. They aim to educate individuals, institutions, and governments about the benefits of Bitcoin and advocate for its adoption.
Why is Bitcoin important?
Bitcoin is a digital currency that operates on a decentralized network, meaning that it is not controlled by any government or financial institution. It allows for fast, secure, and low-cost transactions, making it an ideal alternative to traditional banking and payment systems.
Furthermore, Bitcoin has the potential to provide financial freedom to those who are unbanked or underbanked, as it can be accessed by anyone with an internet connection. With Bitcoin, individuals can have complete control over their finances without the need for intermediaries.
The ECB's stance on Bitcoin
The European Central Bank (ECB) has been cautious about Bitcoin and other cryptocurrencies, expressing concerns about their volatility and lack of regulation. In 2017, the ECB's President, Mario Draghi, stated that Bitcoin was not a currency, but a highly risky and speculative asset.
Eurotower's response to the Bitcoin Advocacy Group
Eurotower, which is the headquarters of the ECB, has been a target for the Bitcoin Advocacy Group's education efforts. The group has been organizing events and campaigns to raise awareness about Bitcoin and its potential benefits.
Eurotower has responded by acknowledging the importance of Bitcoin and other cryptocurrencies, stating that they can have a positive impact on the economy if they are properly regulated. However, they have also emphasized the need for caution and regulation to prevent fraud and criminal activity.
How is the Bitcoin Advocacy Group educating the ECB and Eurotower?
The Bitcoin Advocacy Group has been using various methods to educate the ECB and Eurotower about Bitcoin. Some of these methods include:
-
Organizing events and conferences: The group has been organizing events and conferences to bring together experts and stakeholders to discuss the benefits of Bitcoin and blockchain technology.
-
Providing educational resources: The group has created educational resources such as videos, articles, and infographics to help individuals and institutions better understand Bitcoin and its potential.
-
Advocating for regulation: The group has been advocating for proper regulation of Bitcoin and other cryptocurrencies to prevent fraud and ensure that they are used for legitimate purposes.
Conclusion
The Bitcoin Advocacy Group's efforts to educate and bring awareness about the potential of Bitcoin to the ECB and Eurotower are crucial in promoting its adoption and acceptance. While there are still concerns and skepticism surrounding Bitcoin, the group's advocacy and education can help individuals and institutions better understand its benefits and potential.
As more people become aware of the benefits of Bitcoin and its potential to provide financial freedom, we may see greater acceptance and adoption in the Eurozone and beyond. The Bitcoin Advocacy Group's mission is an important step in this direction.
FAQ
Is Bitcoin illegal in the Eurozone? No, Bitcoin is not illegal in the Eurozone. However, the ECB and Eurotower have expressed concerns about its lack of regulation and potential for criminal activity.
Can I invest in Bitcoin through the Eurozone? Yes, it is possible to invest in Bitcoin through the Eurozone. However, it is important to note that investing in Bitcoin can be highly volatile and risky, and individuals should conduct their own research and consider the potential risks before investing.
Will the ECB and Eurotower adopt Bitcoin as a form of currency? It is currently unlikely that the ECB and Eurotower will adopt Bitcoin as a form of currency, as they have expressed concerns about its volatility and lack of regulation. However, they have acknowledged the importance of Bitcoin and other cryptocurrencies and may continue to explore their potential benefits.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ e97aaffa:2ebd765d
2024-09-23 11:00:13O padrão Bitcoin, vai muito além de um troca monetária, é uma revolução completa em termos monetários, económicos, sociais e políticos. Uma das grandes mudanças será a nível político, os governos terão que ser mais rigorosos economicamente. Atualmente os governos têm 3 principais fontes de financiamento: impostos, dívida e inflação monetária. Com o padrão Bitcoin, a inflação monetária fica de imediato descartada, restando as outras duas.
Um governo economicamente saudável, terá que governar apenas com os impostos. A dívida soberana deverá ser zero ou próxima de zero, deverá apenas ser utilizada em casos excepcionais, em extrema emergência, como as pandemias ou grandes crises. Na gestão dos governos terá que existir uma mudança de 180°, em vez de endividamento, os governos terão que ter superávits e reservas no tesouro.
Os governos terão que ter uma gestão mais similar ao cidadão comum, ou seja, gastar sempre menos do que ganham (no caso do governo impostos ), é necessário ter uma reserva de emergência, com algum capital guardado, para ser utilizado numa emergência, numa crise. Só que o modelo é totalmente oposto ao atual sistema, a mudança política será tremenda, os atuais políticos dificilmente vão conseguir ter esta disciplina. Esta disciplina orçamental, vai obrigatoriamente tornar os governos mais pequenos e menos interventivos economicamente e socialmente.
-
@ 502ab02a:a2860397
2024-09-23 02:37:17จำได้ว่าเคยลงในทุ่งม่วง แต่ไม่ได้เก็บเป็น long form ไว้ ขอบันทึกลงในนี้ใหม่อีกทีครับ 1 ใน เจอนี่ ——
มีเรื่องอยากเล่าให้อ่านครับ มันเป็นเรื่องกึ่งๆรู้สึกผิด กึ่งๆเกรียน แต่อยู่ในกลุ่มนี้มานานและเห็นว่ากลุ่มนี้รัก cm มากเหมือนกัน
เรื่องของเรื่องคิอ สมัยเรียน abac ตอนนั้น ติดเกมส์ cm1 มาก อยากให้มีทีมชาติไทยในนั้นบ้าง เพราะสมัยนั้นถ้ากดเล่นลีกอังกฤษ เราจะเห็น อันโตนิโอ คอนเต ที่ซื้อมาเล่นยากมากๆ เลยคิดหวังว่า ไทยเราจะมีสิทธิ์ไหมนะ
และที่ abac นี่ก็เป็นครั้งแรกที่ได้ใช้อีเมลล์ ก็เลย yahoo! หาอีเมลล์ทีมโปรแกรมเมอร์ สมัยนั้นยังไม่มีกูเกิ้ลครับ เราจะใช้ ยาฮู หรือไม่ก็ อัลตวิสต้า ในการจะสืบค้นอะไรสักอย่าง จนในที่สุดก็ไล่เรียงจากเว็บไซต์ของผู้ผลิต คลิกอ่านโน่นนี่จน ได้มาคนนึง น่าจะเป็นโปรแกรมเมอร์ที่จัดการเรื่องฐานข้อมูลนักเตะ เหมือนเค้าจะมีบอกว่า ต่างชาติสนใจส่งชื่อมาได้เพราะเขาก็ไม่รู้จักทั้งโลก
ก็เลยจัดการส่งชื่อไปให้ 20-30 ชื่อ บอกว่ามีข้อมูลนักฟุตบอลไทย มาให้เพิ่มในฐานข้อมูล
ตรงนี้หละครับ ด้วยความเกรียน แอบใส่ชื่อตัวเองกับชื่อเพื่อนไปด้วย ในใจคิดเอาวะ โอกาสมาแล้ว ชื่อเพื่อนของผมคนนึงสะกดว่า borijet ภาษาไทยคือ บริเจต ชื่อเพื่อนที่สะกดแปลกที่สุดในโลก และเป็นการวางยาทีมงาน เพื่อทำให้รู้ได้ทันทีว่าข้อมูลที่เราส่งไปเขาใช้มันหรือเปล่า ของเราแน่นนอนเลยหรือเปล่า มั่นใจว่าสมัยนั้นประเทศไทยยังเป็นเมืองเล็กๆของโลกอินเตอร์เนทอยู่เลย
นอกจากนี้ ยังมีชื่อ ศักดิ์สิทธิ์ แท่งทอง และ อุดม แต้พานิช ด้วย เพราะตอนนั้นแมงปอล้อคลื่นดังมาก เลยแอบใส่ไว้บันทึกประวัติศาสตร์ อันนี้โปรแกรมเขาจะ random ชื่อนักบอลเองนะครับ ตามประสาโลกที่สาม ที่ไม่เทียบเท่า อังกฤษ อิตาลี สเปน หลายครั้งก็เป็นตัวเทาๆ
ไม่น่าเชื่อว่าอีเมลล์จากมหาวิทยาลัย ส่งด้วยระบบ unix ตึกA ที่เอแบค จอดำอักษรเขียว ที่หนุ่มจีบสาวผ่าน โปรแกรม talk นั่นแหละครับ ที่ผมใช้ส่งสิ่งยิ่งใหญ่นี้จนต้องขนลุกทุกครั้งที่นึกถึง
จนวันที่เกมส์ cm2 ตัวแรกสุดออกมา ก็ไปซื้อแผ่นจริงจากพันทิพ วันที่ซื้อเกมส์นี้มาเล่น ก็ซื้อหนังสือ computer today มาด้วย ตอนนั้นเป็นเล่มเล็กพอคเก็ตบุกแล้ว ในนั้นเขารีวิวชื่อพี่แท่ง พี่โน้ต ผมนั่งอ่านแล้วอุทานดังลั่นในใจอยู่ใน ปอพ.4 เบาะหลังสุด ขึ้นรถที่อนุสาวรีย์ชัย จำได้แม่น ฝีมือเรานี่หว่า -..-
สัมผัสได้ถึงพลังอันมหาศาลของการสื่อสารข้อมูลข้ามโลกแบบนี้ พลังของอินเตอร์เนท ทำให้ผมมีอาชีพเกี่ยวกับเรื่องนี้อยู่พักใหญ่เลย ตั้งแต่สอนการใช้อินเตอรเนท รับทำเว็บไซท์ ทำโฮสติ้ง ทำ flash animation ตั้งแต่ version beta
เรื่องนี้มันพิสูจน์ให้เห็นอีกครั้งว่าอย่ารอโอกาส ถ้าจะทำเรื่องยิ่งใหญ่คุณต้องวิ่งชนมัน ทำไม่ได้หรือไม่ได้ทำ มันเป็นเรื่องจริงครับ ที่สำคัญ . . กูไม่ได้เครดิต ซักนิดเลยเว้ยยย เวรของกรรม อุตส่าห์ร่ายอีเมลล์ ยาวเหยียดพร้อมชื่อ นามสกุล กะว่าอยู่ใน list ไกลๆก็ยังดีวะ 5555
นึกแล้วก็มีความสุขทุกทีครับ เพราะมันเป็นฐานข้อมูล official ในแผ่นแท้เลยครับ
Teera
pirateketo #siamstr
-
@ 1ad8f5d3:bb624486
2024-09-22 23:10:30Exciting Developer Bounty: Create a uMod Plugin for Nostr Wallet Connect Integration!
We are thrilled to announce an open-source project opportunity to create a plugin that will integrate Nostr Wallet Connect (NWC) into the popular game Rust. This plugin could revolutionize in-game commerce and server monetization, benefiting the entire Rust community, and we need passionate developers like you to bring it to life!
About the Project
Our goal is to develop a uMod (oxide) plugin that leverages NWC, as outlined in NIP-47 of the Nostr protocol. If you’re new to Nostr, check out our detailed post here to get started and learn more about the protocol here. NWC documentation is available here, and you can join the NWC developer Discord here.
The plugin will be server-side, built using the .NET Framework, and written in C#. Utilizing uMod’s capabilities, the plugin will dynamically enhance game functionality without requiring any client modifications. You can find uMod documentation here and join the uMod/Oxide developer Discord here, check out these guides from @thethingtracks and kwamaking. There is some NWC support in NNostr which is written in C# and could be a useful reference point.
"The cool thing with NWC is that it's quite easy to implement, no matter which language / tech stack you are using. It's basically sending some (signed & encrypted) JSON messages over a websocket connection." - @reneaaron
Initial Use Case
Server Wallet Integration: - The server admin will input the NWC connection pairing secret into the plugin's configuration file. - The plugin will use this pairing secret to interact with the server's wallet.
Player-to-Server Commerce Examples: 1. Buying VIP Status: - Players type /buyvip in-game. - The plugin requests an invoice from the server's wallet using NWC. - The invoice is displayed to the player as a QR code. Once paid, the player is added to the oxide permission group granting them VIP perks. - The configuration file allows customization of command name, price, and the Oxide permission group granted.
- Buying In-Game Currency:
- If the currency item is blood, players could type /buyblood and specify the amount they wish to purchase.
- The plugin requests an invoice from the server's wallet and displays it to the player.
- Once paid, the player receives the specified quantity of blood (1 blood = 1 sat).
-
The configuration file allows customization of currency item and command name.
-
Selling In-Game Currency (sending):
- Players type /sendblood and provide a destination Lightning address.
- The plugin deletes the specified amount of blood (currency item) from the player's inventory.
- Using NWC, the plugin sends sats from the server's wallet to the destination address.
Future Expansion Ideas
Player-to-Player Commerce: - Enable the plugin to handle P2P commerce, enhancing in-game trading mechanics like the Vending Machine and less reliance on an in-game currency item. Possibly by allowing players to input their NWC connection pairing secret.
Embedded Wallet: - Utilize the Alby Hub's new isolated apps feature to give all players an embedded wallet. Join the Alby discord here.
Example Development Tasks:
- Develop the plugin as a C# code file.
- Ensure the plugin generates a JSON configuration file for customization.
- Implement chat commands for buying and selling in-game currency.
- Handle errors and notify players in chat with the lightning invoice.
- Check invoice status and handle unsuccessful payments.
- Submit Pull request to orangemart.cs
Why Join Us?
We have set aside 1 million sats ($650 USD at today’s value) for the initial development and ongoing support of this plugin. Orangemart’s proof of funds can be found at our Geyser Fundraiser, where we have received over 25 million sats in donations from over 100 contributors. Additionally, proof of our disbursement of these funds to our community is available on the Lightsats leaderboard, where we have gifted over 10 million sats in over 7000 prizes to our community.
This is a fantastic opportunity to contribute to an exciting project that could significantly impact the Rust community. Join our Discord to get started and collaborate with us on this thrilling journey: Orangemart Discord.
Let’s build something amazing together! 🚀
-
@ 08f96856:ffe59a09
2024-09-22 13:02:22สวัสดีครับเพื่อน ๆ ชาว #siamstr วันนี้ผมจะมาแนะนำ Meshtastic เครื่องมือสื่อสารที่ไร้ศูนย์กลางที่เพื่อน ๆ ไม่ควรพลาดเป็นอันขาด!! เพราะมันคือเครือข่ายการสื่อสารที่ใช้เทคโนโลยี LoRa (Long Range Radio) ซึ่งสามารถส่งข้อความได้ไกลมาก ๆ เป็นกิโลเลยทีเดียว ที่สำคัญไม่ต้องพึ่งพาโครงสร้างพื้นฐานของอินเทอร์เน็ตและไร้การสอดส่องและควบคุมจากรัฐ
Meshtastic คืออะไร?
Meshtastic จะสร้างเครือข่าย "mesh" โดยที่ทุกอุปกรณ์ในเครือข่ายจะช่วยกันรับส่งข้อความต่อ ๆ กันไป ทำให้ทุกคนในเครือข่ายสามารถรับข้อความได้ แม้ว่าจะอยู่ไกลแค่ไหน นอกจากนี้ ข้อความทั้งหมดจะถูก เข้ารหัสไว้ ทำให้เฉพาะผู้ส่งและผู้รับเท่านั้นที่สามารถอ่านได้ ส่วนอุปกรณ์ที่ส่งต่อข้อความจะไม่สามารถเข้าถึงเนื้อหาได้เลย ในการใช้งานนั้นเพื่อน ๆ สามารถเชื่อมต่ออุปกรณ์ Meshtastic เข้ากับโทรศัพท์มือถือเพื่อทุกคนในเครืองข่ายสามารถสื่อสารกันได้ง่าย ๆ ผ่านแอปส่งข้อความบนมือถือ
จับมือทำ เริ่มต้นใช้งาน Meshtastic แบบง่าย ๆ
เพื่อน ๆ อยากลองใช้ Meshtastic แล้วใช่มั้ย? มาดูขั้นตอนง่ายๆ กันเลยครับ
1. หาซื้ออุปกรณ์ที่ต้องใช้
ขั้นแรกเลย เราต้องมีอุปกรณ์ LoRa กันก่อนครับ ส่วนตัวผมแนะนำบอร์ด LoRa32 ของ LILYGO ครับ เพราะหาซื้อในไทยและต่างประเทศได้ง่ายมาก โดยจะมีให้เลือกหลายรุ่นมากตามความชอบและการใช้งาน ผมได้ทำตารางเปรียบเทียบคุณสมบัติของแต่ละรุ่นดังนี้ | Name | MCU | RF option | Battery | GPS | Link | | --- | --- | --- | --- | --- | --- | | Lora32 2.1-1.6 | ESP32 | 433/868/915/923 Mhz | no | no | https://a.aliexpress.com/_opRiKMR | | Lora32 T3S3 | ESP32 | 433/868/915 Mhz / 2.4 GHz | no | no | https://a.aliexpress.com/_opRiKMR | | T-Beam v1.1 | ESP32 | 433/868/915/923 Mhz | has batt slot | yes | https://a.aliexpress.com/_oneeH43 | | T-Watch S3 | ESP32 | 433/868/915 Mhz | yes | no | https://a.aliexpress.com/_olkXkLlData | | T-Deck | ESP32 | 433/868/915 Mhz | yes | no | https://a.aliexpress.com/_olkXkLlData | | T-Echo | nRF52840 | 433/868/915 Mhz | yes | yes | https://a.aliexpress.com/_olkXkLlData |
คุณสมบัติสำคัญที่ควรพิจารณาเป็นหลักในการเลือกอุปกรณ์เลยคือความถี่คลื่นวิทยุ (radio frequency) ครับ เพราะการเลือกความถี่สำหรับใช้งานกับ Meshtastic นั้นขึ้นอยู่กับหลายปัจจัย เช่น กฎระเบียบในประเทศ, ระยะทางที่ต้องการสื่อสาร, และความหนาแน่นของสัญญาณในพื้นที่นั้นๆ อุปกรณ์ LoRa ทำงานที่ความถี่ต่างกันในแต่ละภูมิภาค ตามกฎระเบียบในแต่ละประเทศ เช่น สหรัฐอเมริกาใช้คลื่น 915 MHz, ยุโรปใช้ 868 MHz สำหรับประเทศไทยความถี่ที่ได้รับอนุญาตและไม่มีข้อจำกัดในการใช้งานมีดังนี้ครับ: * 433 MHz: ความถี่นี้เป็นที่นิยมใช้ในหลายประเทศรวมถึงในยุโรปสำหรับอุปกรณ์ที่ใช้พลังงานต่ำและไม่ต้องขอใบอนุญาต (LPWAN) เหมาะสำหรับการใช้งานส่งสัญญานได้ไกลเพราะความยาวคลื่นยาวที่สุดในบรรดาตัวเลือกทั้งหมด * 923 MHz: ความถี่นี้ใช้ได้ในหลายประเทศในเอเชีย รวมถึงประเทศไทยที่อนุญาตให้ใช้อุปกรณ์ IoT ที่สื่อสารระยะไกลอย่าง LoRa ได้รับอนุญาตให้สามารถส่งสัญญาณได้ด้วยกำลังงาน (50mW) ที่สูงกว่าคลื่น 433 MHz (10mW) ถือว่าเป็นความถี่ที่เหมาะสำหรับการใช้งานในไทย * 2.4 GHz: เป็นความถี่ที่ใช้กันทั่วโลก และนิยมใช้กับอุปกรณ์หลายประเภท เช่น Wi-Fi และ Bluetooth ความถี่นี้สามารถใช้ในทั่วโลกได้อย่างเสรี แต่มีระยะการส่งสัญญาณที่สั้นกว่าและไม่ค่อยทะลุทะลวงสิ่งกีดขวางได้ดีนัก เหมาะกับพื้นที่ในเมือง
ส่วนตัวผมเลือกใช้ความถี่ 433 MHz เพราะมันทะลุทะลวงสิ่งกีดขวางได้ดี เหมาะกับการใช้งานในพื้นที่ที่มีสิ่งกีดขวางเยอะ เช่น ป่าเขา และช่วยให้การสื่อสารครอบคลุมระยะทางไกลโดยไม่ต้องพึ่งอินเทอร์เน็ตครับ
2. ประกอบอุปกรณ์
เมื่ออุปกรณ์มาถึง ก็จัดการประกอบเลย! อย่าลืมต่อเสาอากาศและแบตเตอรี่ (ถ้ามี) ให้เรียบร้อยก่อนเปิดเครื่องล่ะ ถ้ารุ่นที่ไม่มีแบตก็ต้องหา power bank อแดปเตอร์จ่ายไฟไว้ให้พร้อมครับ
3. Flash Firmware
ต่อไปก็มาลงเฟิร์มแวร์ล่าสุดให้กับอุปกรณ์ของคุณ โดยใช้เครื่องมือ Meshtastic Flasher ซึ่งแนะนำให้ใช้ผ่านเบราว์เซอร์ Chrome จะดีที่สุด ภายในเว็บให้เลือกอุปกรณ์ตามรุ่นที่เราซื้อมา เลือกเวอร์ชันของ firmware เป็นล่าสุด แล้วกด flash ได้เลยครับ
4. ติดตั้งแอป Meshtastic
จากนั้นก็ดาวน์โหลดแอป Meshtastic มาลงบนมือถือของคุณได้เลย iPhone: https://meshtastic.org/docs/software/apple/installation/ Android: https://meshtastic.org/docs/software/android/installation/
หลังจากนั้นเชื่อมต่อกับอุปกรณ์ เปิดแอป Meshtastic แล้วเชื่อมต่ออุปกรณ์ LoRa กับมือถือผ่าน Bluetooth ด้วยการกดที่เครื่องหมาย + ที่ขวาล่างในหน้า setting ดังรูป
แอปจะทำการค้นหาและเชื่อมต่ออุปกรณ์ ให้ทำการกรอกหมายเลขตามที่ปรากฏบนหน้าจอของอุปกรณ์ lora
5. ปรับแต่งการตั้งค่า
เข้าไปตั้งค่าในแอป เลือกภูมิภาคตามความถี่ของอุปกรณ์ที่เราซื้อมาครับ ยกตัวอย่างเช่น * ความถี่ 433 MHz ให้เลือก EU_433 * ความถี่ 923 MHz ให้เลือก TH * ความถี่ 2.4 GHz ให้เลือก LORA_24
หลังจากนั้นตั้งชื่ออุปกรณ์ให้เท่ ๆ และปรับแต่งค่าอื่น ๆ ได้ตามใจชอบ
6. ทดสอบส่งข้อความ
ลองส่งข้อความทดสอบไปที่ช่องแชทสาธารณะ "LongFast" ดู แล้วรอคำตอบจากเพื่อน ๆ ในเครือข่าย
7. สนุกกับการสื่อสารแบบไร้ศูนย์กลาง
เมื่อทุกอย่างพร้อมแล้ว ก็เริ่มใช้ Meshtastic ได้เลยครับ ลองสำรวจฟังก์ชันต่าง ๆ และสนุกไปกับการแชทส่วนตัวแบบไม่ต้องพึ่งพาเครือข่ายอินเทอร์เน็ตกันเลยครับ
สรุปส่งท้าย
Meshtastic เป็นโซลูชันการสื่อสารที่ดีและประหยัดสุด ๆ เหมาะกับการใช้ในพื้นที่ที่ไม่มีสัญญาณโทรศัพท์หรืออินเทอร์เน็ต เพราะมันทำงานได้โดยไม่ต้องพึ่งพาโครงสร้างพื้นฐานของเครือข่ายที่รัฐควบคุม เพื่อน ๆ สามารถใช้ Meshtastic ได้อย่างอิสระ ใครได้ลองกันแล้วเป็นยังไงก็อย่าลืมทักกันเข้ามานะครับ จะ DM ผ่าน meshtatic นี้หรือ nostr ก็ได้ หากเพื่อน ๆ มีข้อสงสัยหรือติดปัญหาอะไรก็ทักมาถามกันได้ ไว้พบกันใหม่นะครับ :)
-
@ e97aaffa:2ebd765d
2024-09-22 09:50:04Sim, é verdade, permitiu aumentar a qualidade de vida das pessoas, mas as consequências são tremendas. É verdade que nós temos uma qualidade de vida melhor que a dos nossos avós, mas este aumento da qualidade de vida é insustentável. Se nada for feito, os nossos netos terão a mesma qualidade de vida dos nossos avós, vão retroceder.
Na minha opinião existem duas causas que explicam esse crescimento nos últimos 50 anos, o crédito e a produtividade.
Crédito
O principal factor é o endividamento, o sistema FIAT transformou a sociedade e os governos dependentes de dívida, altamente endividados, o viver muito acima das suas possibilidades, com uma alta preferência temporal.
No momento em que fazemos um crédito é bom, as nossas contas bancárias ficam com mais dinheiro, podemos comprar muitos bens, a curto prazo ficamos com mais liquidez, mais “ricos” mas é uma ilusão.
A longo prazo temos um problema, a dívida tem que ser paga e não existe dinheiro para pagar, a única maneira é a austeridade, será necessário baixar o custo de vida para pagar a dívida do passado.
Na prática, o crédito é a antecipação das receitas, é o gastar hoje as receitas do futuro. Só que as pessoas do futuro não terão receitas, serão gastas para pagar as dívidas do passado, vão viver do quê?
Este é o problema, os políticos responsáveis pelo crescimento, hipotecaram o futuro dos seus netos, o viver acima das possibilidades é insustentável.
Se nós olharmos para a qualidade de vida, no período entre os 20 e 30 anos, o período da emancipação, nas diversas gerações: Quem tinha essa idade na década de 1970/1980 foi o principal beneficiado; Os jovens adultos da década de 2000 começaram a notar os primeiros problemas. Hoje em dia, os jovens entre 20 e os 30 anos já estão com muitas dificuldades económicas, em construir uma família, adquirir uma casa, o custo de vida está insuportável. O problema é que ainda vai agravar-se, as próximas gerações, ainda será pior que as atuais.
As dívidas dos países não diminui, só aumenta, os governos só rolam a dívida, apenas estão a adiar o problema, um dia vai rebentar.
Produtividade
O desenvolvimento tecnológico foi tremendo nos últimos 50 anos, ajudou para o aumento da produtividade e consequentemente, a melhoria salarial, melhoria na qualidade de vida das pessoas. Só que as pessoas apenas “receberam” uma pequena parte desse melhoramento, porque uma parte significativa desse aumento de produtividade foi absorvida pelos governos através da inflação da moeda.
Até 1971 (criação do sistema FIAT), o salário do trabalho acompanhou, o aumento da produtividade. Após 1971, acontece uma divergência entre a compensação e a produtividade.
Os governos ao desvalorizar a moeda afetam sobretudo os salários dos trabalhadores. Como as empresas têm uma maior “elasticidade”, permite-lhes mais rapidamente atualizar os preços dos produtos, corrigindo parcialmente a perda de valor da moeda. Enquanto a actualização do salário é muito mais lenta, prejudicando os trabalhadores.
O desenvolvimento tecnológico, que permitiu que o trabalhador produzisse mais, no mesmo espaço de tempo, essa mais valia, em vez de criar valor nas empresas e nos funcionários, foi essencialmente para os governos.
Neste momento estamos perante outro enorme salto tecnológico, que vai permitir um enorme aumento da produtividade, a AI. Se nada for feito, os governos vão absorver esses ganhos, possibilitando adiar o problema da dívida por mais uma década.
O sistema FIAT cria a iluminação que dá com uma mão, mas depois tira com a outra.
Quem tem poupanças mais elevadas consegue adquirir bens mais escassos, com uma melhor protecção contra a inflação, como o imobiliário, algumas ações e ouro.
Mas a classe trabalhadora, principalmente as pessoas com rendimentos mais baixos, acabam por guardar as suas poupanças em moeda. São duplamente afetados, no salário e na poupança.
Agora fica a pergunta, que é impossível responder: Se nos últimos 50 anos, não houvesse sistemas FIAT e se a produtividade tivesse sido repercutida nos salários dos trabalhadores, como estaríamos hoje em dia? Com melhor ou pior qualidade de dia?
A minha convicção é que em qualidade de vida estaríamos um pouco melhor, os governos estariam, sem dúvida nenhuma, muito melhor e as crianças não teriam o seu futuro hipotecado. As crianças de hoje, que serão os Homem de amanhã, ao responder a esta mesma pergunta, vão dizer: A qualidade de vida seria muito melhor.
É triste, mas é verdade, a nossa geração e especialmente a geração anterior priorizou o seu bem-estar em detrimento do bem-estar das futuras gerações, hipotecou o futuro dos seus próprios netos, com uma dívida que é impagável. Esses jovens, muitos ainda nem nasceram, terão que pagar os custos de bens ou de obras públicas, que nem existirão no seu “presente”, apenas vão pagar sem usufruir. -
@ c11cf5f8:4928464d
2024-09-22 08:16:25GM stackers! How are you all doing?
Let's hear some of your latest Bitcoin purchases, feel free to include links to the shops or merchants you bought from too.
If you missed our last thread, here are some of the items stackers recently spent their sats on.
originally posted at https://stacker.news/items/695835
-
@ cb86d908:d81e2f94
2024-09-22 02:31:01- เราต้องไปเอาที่อยู่ (Address) ที่ไว้รับ Sats ก่อน จะอยู่ในแอพ Wallet of satoshi ดังภาพ
- ถัดมาเราก็เอา Address ที่ Copy ไว้มาใส่ ใน Nostr เรา
- ในแอพ Whersotr ทำตามภาพได้เลยครับ
- บันทึกเสร็จเรียบร้อย เพื่อนๆก็สามารถ Zap ให้เราได้แล้วครับ
- จะมีรูปสายฟ้าและ Address ขึ้นที่โปรไฟล์เราครับ
siamstr #จับมือทำ #wherostr
-
@ 15d646fa:950987fc
2024-09-22 00:00:27https://image.3001.net/images/20240914/1726306425_66e558791fa49d030a58c.jpg!small
延迟退休终究还是落地了。
9月13日,第十四届全国人民代表大会常务委员会第十一次会议通过,同步启动延迟男、女职工的法定退休年龄,用十五年时间,逐步将男职工的法定退休年龄从原六十周岁延迟至六十三周岁,将女职工的法定退休年龄从原五十周岁、五十五周岁分别延迟至五十五周岁、五十八周岁。实施渐进式延迟法定退休年龄坚持小步调整、弹性实施、分类推进、统筹兼顾的原则。
那么对于广大的网络安全从业者们来说,延迟退休落地是该哭还是该笑呢?FreeBuf通过小范围的问卷调查活动收集了部分网安人的回答,发现了一些有意思的观点。
注:篇幅有限,大家共同反馈的共性观点这里不再叙述,只针对网络安全行业进行梳理。
先说说悲观点的
1、加班现象严重,年龄大了熬不动
大部分受访者都认为网络安全行业加班现象较为严重,而随着年龄持续增加,身体素质不断下降,越来越难以抗住加班。
《2023网络安全产业人才发展报告》数据显示,73%的网络安全从业者每周工作时间超40个小时。其中,33.8%的从业者每周工作41-50小时,22.2%每周工作51-60小时。因工作性质原因,网络安全从业者需要时刻保持警惕,随时应对可能或已经发生的网络安全漏洞和风险,因此工作强度较高,加班情况较为普遍。
2、技术更新太快,年龄大了跟不上
网络安全技术迭代速度非常快,这在当下的数字化+AI时代更加体现的淋漓尽致。随着数字化撰写加速,网络攻击的表面和深度都在不断变化,对于网络安全提出了新的需求。而AI大模型技术的广泛应用为网络安全领域提供了新型防御方式,同时也为攻击者提供了新的攻击工具、方法和路径。这对于年轻从业者来说接受度更高,但对于年龄较大的网安人却难以快速掌握。
同时,网络安全技术学习需要抱有极大的热忱与兴趣,保持对新的安全技术和研究成果的求知欲、好奇心,但随着年龄的持续增长,很多网安人都表示有种力不从心的感觉,也无法像以前一样融入社区和圈子之中。因此,当延迟退休落地后,网安人将面临更严峻的就业压力,也需要付出更多的汗水和努力。
再说说乐观点的
1、网络安全是一个相对稳定的行业
延迟退休,行业稳定性的含金量将会越来越高。和其他互联网、科技企业相比,网络安全行业的稳定性相对较高,可以一辈子持续深耕和发展。随着数字化进程的加速和网络攻击的增加,网络安全的重要性日益凸显,再加上如今已经上升为国家安全战略,将成为国家安全和经济发展不可或缺的一部分,行业稳定性将会越来越高。
同时网络安全市场规模持续增加。据中国信通院的统计测算,从2020年的1729.3亿元,到2022年的2200亿元,该行业市场规模连年扩大且不容小觑;从支出来看,据IDC数据显示,2021年中国网络安全相关支出为122.0亿美元左右,初步统计,2022年中国网络安全行业规模达到137.6亿美元,增长率为12.8%,行业增长较为稳定。
另外,网络安全就业广泛,网安毕业生可以在多个领域从事相关工作,包括政府机关、金融机构、电信公司、医疗机构等。网络安全领域也提供了从初级职位到高级职位的广泛职业发展机会,包括网络安全分析师、渗透测试专家、安全架构师、CSO等,完全可以满足大家在职业发展、晋升上的诉求。
2、网络安全行业没有35岁魔咒
和互联网行业存在35岁魔咒不同的是,网络安全行业对于人才年龄的限制远没有那么严苛,身边不乏年纪较大但依旧在企业安全岗位上发光发热的网安人。在笔者采访的诸多行业人物中,从业时间超过20年的不在少数,既有企业安全负责人、技术大佬也有安全创业者,他们也是引领网络安全行业发展不可忽视的力量。
《2023网络安全产业人才发展报告》数据显示,2023年,31-40岁的网络安全从业者占比最高,达到35.2%,是网络安全行业人才的重要组成部分。某种程度上来说,网络安全行业与医疗行业类似,经验和技术的积累使得资深专家在职场上的价值逐渐提升。
3、人才缺口大,尤其缺专家级人才
随着信息技术的飞速发展,全球范围内网络安全事件的日益增加,关键信息基础设施、重要数据和个人隐私都面临新的威胁和风险,网络安全人才缺口也越来越大。报告显示,网络安全专业人才缺口较大,目前全球有340万网络安全职位正在招聘但未能找到相应人才。
与此同时,网安行业更缺的还是具有实战攻防能力的专家级人才。据调研统计,用人部门在招聘时最关注的是网络安实战能力(60%),其次才是网络安全专业知识(45%)。企业更加需要的是具有实际操作能力,能够解决实际问题的安全技术人员。
除了那些天赋型选手,每一位优秀的网络安全专家都需要时间的积累。网络安全专家不仅要熟悉产品、熟悉网络攻防技术、熟悉黑客攻击手段,熟悉各种安全策略,还要具备优秀的理论基础,解决方案实践等,这些没有个十年左右的时间很难达到。
4、网络安全内容体系庞大,需要终生学习
干过网安的都知道,整个行业学科交叉现象十分严重,涉及计算机科学、网络技术、信息安全、通信技术、数学、密码学等多个领域,内容体系极为庞大。多学科交叉不仅提升了网络安全的复杂性和深度,也增加了网安人的学习难度,需要我们持续学习,终生学习。
一个最常见的现象是,Gartner、IDC,FreeBuf咨询,每年发布大量安全报告,各种新名词、新概念、新方向层出不穷,高频更新,令人应接不暇。哪怕只有6个月脱离网安学习,你会发现这个行业又出现了许多听都没听过的英文字母缩写,或者是又新出台了几部法规,企业安全合规要求出现了新的变化等。如果公司还有海外业务,那么所需的知识量还要上一个台阶......
但从这个角度来看,网安行业对于延迟退休的接受程度会更高,毕竟延不延迟网安行业依旧是要活到老,学到老。
与时间做朋友
其实,网络安全是一个与时间做朋友的行业,选择深耕网络安全,意味着选择了一条不断学习和探索的道路。随着技术掌握的越来越多,实战经验越来越丰富,行业的视野也会越来越开阔,很多以前不懂的问题会有一种豁然开朗的感觉,个人价值与竞争力也将不断上升。
网络安全也是一个很“实在”的行业,付出了时间、精力总会得到相应的技能与经验,而专业技能和丰富经验将会成为个人网安职业生涯中硬通货。
永远保持热爱,永远保持好奇,一路勇往直前,延迟退休只会成为你的加油站。
本文作者:流苏_, 转载请注明来自FreeBuf.COM
-
@ 7d33ba57:1b82db35
2024-09-21 18:25:3810 tips to help you take better mobile photos and videos
-
Clean Your Lens: Ensure your mobile camera lens is clean before shooting to avoid blurry or hazy images.
-
Use Natural Light: Whenever possible, shoot in natural light. It provides better color reproduction and enhances the overall quality of your photos and videos.
-
Rule of Thirds: Apply the rule of thirds by aligning your subject with the grid lines. This creates a more balanced and visually appealing composition.
-
Stable Shots: Keep your phone steady to avoid shaky videos or blurry photos. Use both hands to hold your phone or consider investing in a small tripod or stabilizer.
-
Focus and Exposure: Tap on the screen to set the focus and exposure before taking a shot. This ensures that your subject is sharp and well-lit.
-
Experiment with Angles: Try shooting from different angles to add variety and interest to your photos and videos. Don’t be afraid to get low or high for a unique perspective.
-
Mind the Background: Pay attention to what’s happening in the background. A cluttered or distracting background can take away from the main subject.
-
HDR Mode: Use High Dynamic Range (HDR) mode for scenes with a wide range of light and dark areas. HDR helps balance the exposure for better details in both bright and shadowed areas.
-
Edit Mindfully: Use photo and video editing apps to enhance your shots, but be mindful not to overdo it. Adjustments to brightness, contrast, and color can improve your images, but moderation is key.
-
Learn Your Camera Settings: Familiarize yourself with your phone’s camera settings. Many smartphones offer manual controls for exposure, white balance, and focus, allowing you more creative control over your shots.
Don’t be afraid to experiment and learn from your experiences. Additionally, stay updated on new features and apps that can further enhance your mobile photography and videography skills.
-
-
@ e83b66a8:b0526c2b
2024-09-21 16:29:23Here are some of the more interesting projects that I like:
Messaging:
https://www.0xchat.com/#/ - Private messaging - think WhatsApp
Xitter Like Clients:
https://damus.io/ - iPhone client
https://nostrapps.com/amethyst - Android client
https://primal.net/downloads - Android, iPhone & Desktop
https://shipyard.pub/posts - Schedule future posts
Interesting sites:
https://zap.stream/ - Video streaming
https://fountain.fm/ - Podcasting
https://wavlake.com/ - Music streaming
https://shopstr.store/ - Online shop
https://zap.cooking/recent - Cooking recipes
https://ostrich.work/ - NOSTR jobs board
NOSTR tools
https://nostr.band/ - Powerful search tool
https://nostr.wine/ - Powerful, but centralised paid relay
https://npub.pro/ - Website creation tool
https://nostr.build/ - Media and file storage
https://relay.tools/ - Build and curate your own relay
https://creatr.nostr.wine/subscriptions/new-user - Creator tools
List of NOSTR apps:
https://nostrapps.com/
-
@ 03742c20:2df9aa5d
2024-09-21 09:31:17ถ้าอยากเก็บข้อมูล Nostr ของตัวเองทั้งหมด นอกจาก Relay ที่เราสร้างเองได้แล้วยังมี Media Server ที่สำคัญไม่แพ้กันถึงแม้จะไม่เหมาะกับทุกคน แต่ถ้าอยากควบคุมข้อมูลทั้งหมดนี่คือคำตอเเลย
ผมแนะนำ Nostrcheck Server ที่ติดตั้งง่าย แถมใช้ Docker ได้ด้วยมันสะดวกสุดๆ
สิ่งที่ต้องเตรียม - เครื่องที่เปิดตลอด 24/7 - Docker - Domain (แนะนำจดกับ Cloudflare)
วิธีติดตั้ง Nostrcheck Server ด้วย Docker
ดาวน์โหลด Nostrcheck Server
git clone https://github.com/quentintaranpino/nostrcheck-api-ts.git
เข้าไปที่โฟลเดอร์ Nostrcheckcd nostrcheck-api-ts
สั่ง Build Containersudo docker-compose up -d --build
อนุญาต Firewall พอร์ต 3000sudo ufw allow 3000/tcp comment 'Allow for nostrcheck'
เท่านี้ก็มี Media Server แล้วแต่ถ้าอยากให้คนอื่นเข้าถึงได้ต้องทำยังไงล่ะ
วิธีออก Public โดยไม่ต้องมี Public IP ด้วย Cloudflare Tunnel
จดโดเมนกับ Cloudflare
ไปที่ Zero Trust คลิกไปที่ Network จากนั้นคลิก create a tunnel
ตั้งชื่อ Tunnet แล้วติดตั้ง Cloudflare Tunnel ลงเครื่อง (ผมเลือก docker)
เพิ่ม Public Hostname ใน Cloudflare Tunnel Subdomain: ตั้งชื่อที่ต้องการ Domain: เลือกโดเมนที่จดเอาไว้ Type: เลือก http URL: ใส่ localhost แล้วตามด้วย port หรือใส่ IP แล้วตามด้วย port ได้เช่นกัน
แค่นี้ก็เรียบร้อย! Nostrcheck Server ของคุณพร้อมใช้งานแล้ว
มาเริ่มใช้งานกัน
เปิด URL ที่เราสร้างคลิกที่รูปมุมขวาบนเลือก Settings แล้วเลื่อนลงมาจนเจอ Server secret key
คลิกเปิดตา Coppy ไปใส่ Nostr extension ผมแนะนำ AKA Profiles จดบันทึกไว้ได้เช่นกัน
ไปเพิ่ม Media Servers ใน Amethyst
หวังว่าแนวทางนี้อาจเป็นประโยชน์ปรับใช้ได้หลายอย่าง มีส่วนไหนผิดพลาดพูดคุยเสริมกัน ขอบคุณทุกคนที่แวะมาอ่าน
ไว้เจอกันใหม่ครั้งหน้าจะเป็นเรื่องอะไรรอติตามกัน
บ๊ะบาย
ลิงค์ Github: https://github.com/quentintaranpino/nostrcheck-server
siamstr #Nostr
-
@ 09fbf8f3:fa3d60f0
2024-09-21 07:44:42软件名称: OSSQ
这款软件打开时杀毒软件会报毒,大家忽略即可,如果实在不放心,大家可以先杀毒后再使用!
软件使用很简单,选择想要转换的版本,选择后点【开始转换】即可。
这里转换需要点时间,大家耐心等待,等转换成功了以后会跳出“版本切换成功!”的提示。
转换后再重启电脑,那么你的系统版本就转换成功了。 我自己电脑是Windows11,但我办公电脑是Win10,看看我原来的是专业版。
转换以后就变成了家庭版了。
这个软件在版本转换后,可能会出现“Win+X”和右键开始菜单失效的问题,这时候可以用作者开发的一款“菜单修复”软件进行修复。
下载地址:
蓝奏云: https://lepidus.lanzouv.com/b00zx2euef 密码:gomr
菜单修复工具: 蓝奏云: https://lepidus.lanzouv.com/b00zx2euij 密码:9dl6
-
@ a012dc82:6458a70d
2024-09-21 06:43:47Table Of Content
-
Factors behind the Rise in Bitcoin's Hash Rate
-
Implications of the Rise in Bitcoin's Hash Rate
-
Conclusion
-
FAQ
Bitcoin's hash rate has been skyrocketing lately, with the mining difficulty hitting all-time highs. This surge in hash rate has left many wondering about the reasons behind it and its implications for the cryptocurrency industry. In this article, we will explore the factors contributing to the rise in Bitcoin's hash rate and the implications of this development.
Factors behind the Rise in Bitcoin's Hash Rate:
Increase in the number of miners
One of the primary factors behind the rise in Bitcoin's hash rate is the increase in the number of miners. As the price of Bitcoin continues to surge, more and more people are entering the mining space, trying to capitalize on the opportunity to earn profits. This has led to an increase in the number of miners, which, in turn, has resulted in a surge in hash rate.
Improved Mining Hardware
Another reason for the increase in hash rate is the improvement in mining hardware. As the demand for Bitcoin continues to rise, mining hardware manufacturers are constantly innovating and improving their products to meet the demand. This has resulted in more efficient and powerful mining hardware that can process more transactions in less time, leading to an increase in hash rate.
Increase in Institutional Investment
Institutional investors are increasingly investing in Bitcoin, resulting in an increase in the overall hash rate. These investors have more resources and can afford to purchase high-end mining equipment, which leads to an increase in hash rate.
Halving
Bitcoin undergoes a halving event every four years, which reduces the reward for miners. This event is designed to control the supply of Bitcoin and maintain its value. However, it also has the effect of reducing the number of miners, which results in a drop in hash rate. After each halving event, it takes some time for the hash rate to recover, and this could be a contributing factor to the recent surge in hash rate.
Implications of the Rise in Bitcoin's Hash Rate:
Increased Security:
The rise in hash rate means that the Bitcoin network is becoming more secure. The higher the hash rate, the more difficult it becomes to launch a 51% attack, where an attacker gains control of the network. This increased security is good news for Bitcoin investors as it reduces the risk of a security breach.
Reduced Mining Rewards
As the hash rate increases, mining rewards become more difficult to obtain. This means that smaller mining operations may be forced to shut down, resulting in a more centralized mining ecosystem. This could be seen as a negative development as it goes against the decentralized nature of cryptocurrencies.
More Transactions
The increase in hash rate means that more transactions can be processed on the Bitcoin network. This is good news for Bitcoin users as it reduces transaction times and fees. With the rise in hash rate, Bitcoin is becoming a more practical payment method, which could lead to increased adoption.
Conclusion
The rise in Bitcoin's hash rate is a result of several factors, including an increase in the number of miners, improved mining hardware, institutional investment, and the halving event. While there are some potential drawbacks to the increase in hash rate, such as reduced mining rewards and a more centralized mining ecosystem, the benefits of increased security and faster transaction processing make it a positive development for the cryptocurrency industry. As Bitcoin continues to gain mainstream acceptance, it is likely that the hash rate will continue to increase, leading to further innovation and improvements in the network.
FAQ
What is Bitcoin's hash rate? Hash rate is the measure of the computational power of the Bitcoin network. It is the number of calculations that the network can perform per second.
Why is the hash rate important? The hash rate is important because it determines the security of the Bitcoin network. The higher the hash rate, the more secure the network becomes.
How is the hash rate calculated? The hash rate is calculated by counting the number of calculations that the network can perform per second.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 81870f53:29bef6a6
2024-09-21 01:07:32先週は、より積極的な0.50%利下げの可能性が高まる中、米国株が2024年以来最高の週を記録する中、貴金属相場が上昇を確保した。今週の経済イベントカレンダーの主要項目はFRBの金利決定で、水曜日の午後に予定されていた。
月曜日、金は2,584ドル付近の狭いレンジで取引されたが、投資家が水曜日の金利発表に備える中、銀は30.85ドル付近で推移した。 一方、利下げに対する楽観的な見方がウォール街に浸透したため、ダウ工業株30種平均は0.6%上昇し、記録的な終値となる41,628.22ドルを記録した。
火曜日、国勢調査局のデータにより、8月の米国の小売売上高は0.1%増加し、0.2%減とするウォール街予想を上回ったことが明らかになった。予想を上回った経済指標は、FRBがより保守的な0.25%利下げではなく0.50%利下げを追求するのではないかという疑念を投げかけている。その結果、株価はわずかに下落して火曜日の取引を終えた。その他の地域では、金は前取引で達成した過去最高値から反落し、終値は2,572ドルとなった。
今週の中央銀行連邦公開市場委員会の会合は水曜日、連邦準備制度理事会のジェローム・パウエル議長が4年ぶりの利下げを発表し最高潮に達した。パウエル議長は講演の中で、中央銀行が0.50%利下げし、指標となるフェデラルファンド金利を4.75─5%の範囲にすると発表した。
このニュースを受けて、非利回りの金は1%上昇し、史上最高値の2,598ドルを記録した。一方、銀は3%上昇し、ドル指数は14カ月ぶり安値の100.21まで下落した。大型利下げのニュースは、パウエル議長の発表直後にS&P500種とダウ工業株30種平均がともに史上最高値を更新する中、ウォール街全体でリスクオンムードに拍車をかけた。しかし、水曜日の取引は主要3銘柄平均がいずれも若干安で終了したため、株式市場の取引は不安定であることが判明した。
米国株は木曜日にFRB主導の上昇に急速に移行し、ダウ平均は初めて4万2000ドルを突破し、S&P500とナスダックはそれぞれ1日当たり1.8%と2.9%の上昇を確保した。同じ日、金は2,600ドルをわずか下回る過去最高値付近で推移し、銀はさらに3%上昇した。この通貨ペアは、最近の利下げニュース、地政学的懸念、ドル安という三重の追い風を享受した。
今朝株価が下落して始まった後、ダウはなんとか回復し、終値で42,000ドルを超え、新たな記録を更新した。 S&P 500とナスダックは両方とも昨日の終値を上回るまで反発することはできなかったが、主要3指数はすべて週次上昇を記録した。
貴金属市場は引き続き勢いを維持し、金が史上最高値を更新して好調な週を終えました。金は週間上昇率1.58%の2,635.92ドルで終了し、銀は0.84%上昇のオンス当たり31.39ドルで週間を終えた。
-
@ c73818cc:ccd5c890
2024-09-20 12:29:45😈 Tyler Durden lancia pesanti accuse contro Coinbase e BlackRock, coinvolgendo il mercato degli ETF e la trasparenza delle riserve di Bitcoin.
👁 Coinbase e BlackRock sono accusate di emettere Bitcoin “cartaceo”, una forma di debito non supportata da BTC reale. Le transazioni off-chain e l'assenza di prove sulle riserve mettono in discussione la trasparenza degli exchange, sollevando il timore di manipolazioni nel mercato istituzionale di Bitcoin.
👁 Il CEO di Coinbase, Brian Armstrong, ha negato le accuse, sostenendo che tutte le transazioni ETF sono regolate on-chain e sottoposte a revisione da Deloitte. Nonostante ciò, membri della comunità cripto continuano a esprimere dubbi sulla sicurezza del prodotto cbBTC e la sua gestione trasparente.
👁 La comunità cripto, supportata da voci come Justin Sun, solleva preoccupazioni sulla mancanza di audit esterni e su possibili interventi governativi. La questione del Bitcoin non verificato rimane centrale nel dibattito sulla sostenibilità a lungo termine degli exchange centralizzati.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Coinbase #BlackRock #BTC #Riserve #Trasparenza #Manipolazioni #ETF #cbBTC #Cripto #Bitcoin
-
@ 38ac7015:fe02463a
2024-09-20 10:00:13-
Do not become dependent on any person.
-
No one is going to stay with you forever.
-
The person who is your friend today might become your enemy tomorrow.
-
Your secrets are like bullets; if you give them to others, one day they will load those bullets into a gun and shoot you with them.
-
There are only three things you can always rely on and they will never disappoint you: your pocket, your health, and above all, your God.
-
Always keep your needs hidden from others.
-
Not everyone who talks to you with a smile loves you.
-
Not everyone who calls you "dear, beloved, or cherished" truly loves you (TV anchors call us "dear audience" daily, but they neither know us nor love us).
-
Take care of yourself; make your mind and heart the source of your happiness, and you will never regret it.
-
Be a little crazy and enjoy life, because wise people die early.
-
Pursue your small hobbies and passions, even if they seem insignificant to others.
-
Never seek support from anyone for yourself.
-
If you are kind and compassionate to others, never assume the world will treat you kindly in return.
-
One day, you will realize that you worried more than necessary, and that God had arranged everything for you in the best way, giving you things you never even hoped or wished for.
-
-
@ a012dc82:6458a70d
2024-09-20 05:55:35Table Of Content
-
Bitcoin Beach Wallet Rebrands as Global Shore Wallet
-
Feature-Rich Wallet for Enhanced User Experience
-
Partnerships to Drive Adoption and Education
-
Conclusion
-
FAQ
Bitcoin Beach Wallet, originally developed to support the Bitcoin community in El Salvador, has made significant strides since its inception. The wallet started as a grassroots project aimed at driving Bitcoin adoption in a small coastal town, and has now transformed into a global force. With a new name and a plethora of innovative features, the wallet is set to become a major player in the world of cryptocurrency.
Bitcoin Beach Wallet Rebrands as Global Shore Wallet
As part of the wallet's evolution, it has been rebranded as the Global Shore Wallet. This name change reflects the wallet's expanded focus beyond El Salvador, as it aims to promote Bitcoin adoption and financial inclusion in communities across the globe. The new name signifies a broader commitment to empowering individuals and businesses with a versatile cryptocurrency wallet that caters to their unique needs.
Feature-Rich Wallet for Enhanced User Experience
The Global Shore Wallet comes packed with features designed to enhance the user experience and promote widespread adoption. Some of these exciting new features include:
1. Multilingual Support
To cater to a global audience, the wallet now supports multiple languages, ensuring that users worldwide can navigate and use the wallet with ease.
2. Multi-Currency Compatibility
In addition to Bitcoin, the wallet now supports various cryptocurrencies, such as Ethereum, Litecoin, and more, making it a one-stop solution for users looking to manage multiple digital assets.
3. Lightning Network Integration
To facilitate faster, cheaper, and more scalable transactions, the Global Shore Wallet has integrated the Lightning Network. This upgrade allows users to make instant payments with minimal fees.
4. Advanced Security Features
The wallet offers cutting-edge security features, such as biometric authentication, two-factor authentication, and encrypted backups, ensuring that users' digital assets are well-protected.
5. Seamless Onboarding
The Global Shore Wallet simplifies the onboarding process with a user-friendly interface and step-by-step guidance, making it easy for new users to get started with cryptocurrency.
Partnerships to Drive Adoption and Education
To further its mission of promoting Bitcoin adoption and financial inclusion, the Global Shore Wallet team has entered into strategic partnerships with various organizations. These collaborations aim to provide educational resources and offer support to communities looking to embrace cryptocurrency.
Conclusion
The transformation of the Bitcoin Beach Wallet into the Global Shore Wallet marks an important milestone in the journey towards global cryptocurrency adoption. With a new name, cutting-edge features, and strategic partnerships, the Global Shore Wallet is poised to become a leading wallet solution for individuals and businesses around the world. By fostering financial inclusion and empowering users with the tools they need to thrive in the digital economy, the Global Shore Wallet is set to make a lasting impact on the cryptocurrency landscape.
FAQ
What was the original purpose of the Bitcoin Beach Wallet? The Bitcoin Beach Wallet was initially developed to support the Bitcoin community in El Salvador, focusing on driving Bitcoin adoption in a small coastal town.
What is the new name of the Bitcoin Beach Wallet? The Bitcoin Beach Wallet has been rebranded as the Global Shore Wallet.
Why was the name changed to Global Shore Wallet? The name change reflects the wallet's expanded focus on promoting Bitcoin adoption and financial inclusion in communities across the globe, beyond just El Salvador.
How is the Global Shore Wallet promoting Bitcoin adoption? The Global Shore Wallet is fostering adoption through its user-friendly features, educational resources, and strategic partnerships with organizations to support communities looking to embrace cryptocurrency.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 502ab02a:a2860397
2024-09-20 02:30:23มีเรื่องจะประกาศครับ ถ้าสามารถแชร์ออกไปได้ก็ยินดีมากครับ
เป็นความตั้งใจตั้งแต่ก่อนงาน Thailand Bitcoin Conference 2024 ว่าจะเป็นงานสุดท้ายที่ผมจะใช้คำว่า ขนมคีโต
ตลอดเส้นทางที่ผ่านมา หมวกอีกใบนึงของผมคือ การถ่ายทอดความรู้ที่ศึกษามาในแขนงโภชนาการ และคำถามตลอดกาลคือ "อันไหนเป็นอาหารคีโต"
จริงอยู่ครับก็ยินดีตอบให้ได้ แต่ลึกๆมันก็มีความขุ่นๆนิดๆว่า หากเป็นขวบปีแรกของคีโตก็ยังพอเข้าใจ แต่ขณะนี้ก้าวเข้าวปีที่ 8 แล้ว อีกไม่เท่าไรก็ 10ปีคีโตในไทยแล้ว สิ่งแรกที่คนคีโตมองหาเวลาซื้ออาหารคือ ฉลากคีโต
แล้วพอเจอบางสินค้าแปะป้ายคีโต แต่มีวัตถุดิบที่ต่างจากกูรูต่างจากเจ้าพ่อเจ้าแม่คีโต ได้บัญญัติไว้ ก็เกิดความสับสนวุ่นวายทะเลาะเบาะแว้ง ว่าตกลงมันเป็นอาหารคีโตหรือไม่
ผมเลือกทางนี้ครับ หักดิบไปเลย
ต่อไปนี้ผมจะไม่ใส่คำว่า คีโต ในชื่อเรียกอาหาร ต่อไปนี้จะไม่มีชีสเค้กคีโต ดาร์คชอคกานาซคีโต หน้าไก่คีโต บลาบลาบลา ที่มีคีโตเป็นชื่อเรียก อีกต่อไปครับ พอกันทีกับสิ่งนี้
ของกินทุกอย่างที่ผมทำ จะใช้ความเชี่ยวชาญด้านโภชนาการ ความสะอาด สุขอนามัย ฉลากสารอาหาร ใช้การคำนวนแบบเผื่อข้อผิดพลาด(บวก ไม่ลบ) ด้วยการใส่ Macro Nutrient ให้ในทุกเมนู !!!!
เพราะผมเชื่อว่า การกินคาร์บต่ำ เป็นการกินแบบ "ปกติ" การกินคาร์บมากก็เป็นการกินแบบ "ปกติ" เหมือนคนไม่ชอบกินผิก ไม่ชอบกินปลา ไม่ชอบกินเนื้อ อันนี้มันก็แค่คนไม่ชอบกินคาร์บสูงเกินไป แค่นั้นครับ เป็นการกินแบบปกติ ย้ำ เป็นการกินแบบปกติ คาร์บต่ำแบบคีโต เป็นการกินแบบปกติ ที่ควรเป็นมานานแล้วด้วย
การยัดทะนานคาร์บสูงมากๆ ในมุมมองผมคือ นี่แหละที่ไม่ปกติ
ทีนี้ความไม่ปกตินี้มันก็ไม่ผิดอะไรด้วย ถ้าคนกินไม่ปกติ นิยามไม่ปกติคือ ไม่ใช่คนทั่วๆไปเช่น นักกล้าม นักกีฬา ผู้ที่ใช้ "พลังงาน" สูงมากๆแลละต้องการใช้คาร์บ เพื่อการใดการหนึ่งโดยเฉพาะ ดังนั้นไม่มีอะไรที่ผิดเลยครับ ใครอยากกินอะไร กิน ตราบใดที่เรารู้ตัวเราเองว่าทำอะไร
ผมอยู่ในวงการธุรกิจทั้งอาหารและการโฆษณา เข้าใจดีครับว่าการแปะป้ายคีโต คือการช่วยให้คนตัดสินใจง่ายขึ้น เข้าใจง่ายขึ้น ช่วยในการขายให้สะดวกขึ้น แต่ ผมพอแล้วครับ เหรียญอีกด้านนึงของป้ายนีคือ มันไม่ได้ช่วยให้คนคีโต เรียนรู้การทำความเข้าใจด้านสารอาหารเท่าที่ผมคาดหวัง เพราะถ้าไม่มีป้ายพวกนี้ คนคีโตหลายๆคนถึงกับไปไม่เป็นกันเลยทีเดียว แล้วทุกวันนี้เหรียญมันออกด้านนี้ซะเยอะด้วย
นอกจากนี้ประเด็นที่หลีกไม่ได้คือ การหมอบคลานเข้ารับวัตถุดิบคีโตจากกูรู ซึ่งไม่เคยได้เหตุผลในการ "ห้าม" ของหลายๆอย่างเช่น สารหวานบางประเภท แครอท ฟักทอง(ตัวนี้มีคนถามและส่งมาให้ดูเยอะ เดี๋ยวจัดให้เคลียร์ๆ)
ซึ่งใครที่เลือกกินสิ่งนี้แล้วแชร์ความรู้ให้คนคีโตว่ากินได้ ก็จะโดนตรรกะวิบัติจากกูรูด้วยการแปะคำว่า "อยากกิน เลยชวนคนอื่นกิน ชวนคนให้ไม่เคร่ง" เป็นตรรกะวิบัติที่เรียกว่า Ad Hominem หรือ การโจมตีที่ตัวบุคคล นั่นเอง (ref : https://siripun.com/2023/06/09/logical-fallacies-2-ad-hominem ) ทั้งที่ถ้าจะนิยามคำว่าเคร่ง สิ่งที่กูรูให้ทำ ไม่สามารถมีคำตอบที่สร้างสมการสมดุลได้ (ทำไม A ได้แล้ว B ไม่ได้ถ้าเทียบบริบทเอามาชนกันชัดๆเลย)
จริงๆก็อยากรณรงค์ให้ผู้ประกอบการอาหารคีโต ร่วมโครงการนี้ แต่เข้าใจว่ามันคงไม่สามารถทำได้ เพราะอาจจะมองในมุมที่ต่างกัน ผมเข้าใจในสิ่งนั้นครับ แต่มุมของผมคือ การทำอาหารคีโตให้กลับมาอยู่ในประเภทอาหารปกติ จะยิ่งขยายมูลค่าตลาดออกไปได้มากกว่าทุกวันนี้
ตลาดคีโตมันซบเซา เพราะเราทำให้มัน "ประหลาด" ทำให้มันกลายเป็นของ "ไม่ปกติ" พอได้น้ำหนัก หุ่น ลูก สมปรารถนาแล้วก็ถวิลหาการ "ออกไปกินปกติ" นั่นคือการทำให้ตลาดหายไปเรื่อยๆเพราะพวกคุณเองครับ ผมกลับมองว่าทำให้คีโตคืออาหารปกติ แล้วกินกันไปตลอด ไม่มีการขอออกจากเผ่า หานเป็ดอะไรคือทางที่ดีกว่า ได้สุขภาพที่ดีกว่า
คีโตคือการกินปกติ ไม่ควรต้องมาแยกเป็นชนเผ่าอะไรเลย คีโตคือคนเมือง คนมีความรู้ คือ วิทยาศาสตร์ คือความฉลาดในการเลือกสารอาหาร อย่าไปยัดเยียดความ "ไม่ปกติ" ให้อาหาร "ปกติ"
ก็เลยคิดว่า ไม่เป็นไร ร้านคีโตร้านใดอยากร่วมเรายินดี แต่ถ้ามองว่าไม่เอาด้วยก็ยินดีเหมือนกัน เพราะการค้าเสรี อยากทำอะไรก็ทำได้ครับ ในส่วนตัวผม เราทำของเรา เราเริ่มของเราเลยก็ได้ เพราะเส้นทางที่ผ่านมา เราก็เดินอยู่ในเส้นทางของเราอยู่แล้ว และผมเชื่อใน Proof of Work ครับ ผมสามารถทุ่มแรงกายแรงใจ ลงในอาหาร ลงในการสอน ให้คนตระหนักถึง "สารอาหาร" มากกว่า "ป้ายฉลาก"
แล้ววันนึง มันจะส่งผลที่ impact ครับ ผมเชื่ออย่างนั้น Proof of Work สามารถส่งต่อได้ และ พลิกโลกได้ มานับต่อนับแล้ว
ทุกวันนี้ผมทุ่มเนื้อหาด้าน ฉลากอาหาร เพื่อให้คนหัดอ่าน รู้เท่า รู้ทัน มันก็ทำให้ผมยิ่งรู้สึกว่า ผมไม่ควรแปะคำว่าคีโต ลงไปเลย มันเหมือนไปสปอยให้คนลืมพื้นฐานสำคัญ
ไม่ใช่ว่าไม่ง้อคนคีโตนะ คนทำการค้าต้องยินดีกับทุกการค้าอยู่แล้ว แต่ผมกลับมมองว่า ตลาดของผมขอเป็นตลาดที่มีการอ่านฉลาก มีการหัดพิจารณาสารอาหาร ดูคาร์บเป็น เลือกวัตถุดิบที่เหมาะกับแต่ละคน มากกว่าวัตถุดิบที่ต้องได้รับการโปรดจากกูรู
ผมมองว่า คนกินคลีน คนกินไฮโปรตีน หรือแม้แต่แค่คนที่ไม่อยากกินน้ำตาล ก็จะสามารถกินอาหารที่ผมทำได้ ไม่โดนปิดกั้นจากป้ายคีโต ที่โลกประเคน mind set ให้ว่าต้อง high fat เท่านั้น
ซึ่งถ้าผมทำอาหารในแบบของผม + คนกินพิจารณาได้เองว่าสารอาหารเหมาะกับเขาไหม = การกินแบบมีความรู้จริง เหมาะกับตัวเองจริงๆ
ถือว่าเป็นอีกเส้นทางที่ผมต้อง fight for ครับ ถ้าสำเร็จ มันจะช่วยให้คนในสังคมหลุดกรอบ และมองสารอาหารได้ ดูแลสุขภาพได้ ด้วยพื้นฐานความรู้ที่มากขึ้นครับ ไม่ใช่ทางที่สบายแน่นอนครับ แต่พวกคุณจะได้ประโยชน์ติดตัวไปแน่ๆ
ถามว่าทำเพื่อการค้าใช่ไหม ก็ใช่ครับ การค้ามันคู่กับโลก ผมไม่ค่อยเข้าใจในมุมของการต้องการอะไรฟรีๆอยู่ตลอด ถ้าคุณเคารพใน value แล้วยินดีส่งต่อ value for value คุุณจะยินดีในการค้าที่ไม่ยัดเยียด (fiat) คุณจะยินดีในการส่งต่อ value ด้วยคุณค่า คุณจะยินดีในการมองคุณค่าของ "เวลา" ที่ผู้สร้างผู้ทำลงทุนลงไป (เวลาคือทรัพยการที่มีค่าที่สุดในโลก) แล้วถ้าคุณให้เกียรติกับสิ่งเหล่านี้ คุณจะไม่อยากได้มันฟรีๆ คุณจะกระดากใจที่จะหยิบมันมาเปล่าๆ นี่คือเหตุผลที่ผมไม่เคยมองว่า การทำการค้า มันจะเลวร้ายอะไร แต่ที่แน่ๆ ผมจะไม่ทำ FIAT keto ครับ ผมจะไม่เร่งเร้า ไม่ขู่เข็ญ ไม่ใช้ตรรกะประเภท "ของมันต้องมี" ผมจะแบไต๋แฟร์ๆด้วยสารอาหารครับ
แม้มันจะแลกมาด้วยการขาดโอกาส จากป้าย "คีโต" ก็ตาม แม้คนคีโตจะมองว่า ไม่มีป้ายคือไม่คีโตก็ตาม แม้จะไม่ได้รับการรับรองจากกูรูใดๆ ว่า "คีโตกินได้" ก็ตาม ถ้าจะให้สังคมมีการเรียนรู้สารอาหารขึ้นได้ ผมยอม
pirateketo #ตำรับเอ๋ #siripun #siamstr
-
@ c73818cc:ccd5c890
2024-09-19 19:34:39🥱 Il Parlamento britannico presenta un disegno di legge per garantire tutela legale agli asset digitali come Bitcoin, NFT e crediti di carbonio, mirando a mantenere il Paese all'avanguardia nella regolamentazione cripto.
🥱 Nuova legislazione per asset digitali
🥱 Il Parlamento del Regno Unito ha introdotto il Property (Digital Assets etc) Bill, che mira a riconoscere legalmente Bitcoin e altri asset digitali come proprietà personale. Questa legge risolve una lacuna legale esistente, dove le risorse digitali erano escluse dal diritto immobiliare, lasciando i possessori in una zona grigia dal punto di vista legale.
🥱 Protezione contro frodi e contenziosi
🥱 La nuova legge classifica gli asset digitali come una terza categoria di proprietà, offrendo protezione legale più solida contro frodi e furti. Questo quadro normativo aiuterà i tribunali a gestire controversie complesse, come accordi commerciali e divorzi che coinvolgono risorse digitali.
🥱 Ruolo strategico del Regno Unito nel settore cripto
🥱 Heidi Alexander, Ministro della Giustizia, ha evidenziato l'importanza della legge per mantenere il Regno Unito competitivo nei servizi legali legati alle criptovalute. Questo aggiornamento legislativo attrae nuovi investimenti e rafforza la posizione del Paese come leader globale nella regolamentazione delle tecnologie emergenti.
🥱 Impatti economici e prospettive future
🥱 Oltre alla protezione legale, la legge punta a favorire la crescita economica, mantenendo la City di Londra competitiva sulla scena globale. Con un settore legale del valore di 34 miliardi di sterline, il Regno Unito si posiziona come pioniere nella regolamentazione cripto, attirando nuove aziende e investimenti nel settore blockchain.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Parlamento #RegnoUnito #UK #Inghilterra #PropertyBill #regolamentazione #Cripto #Bitcoin
-
@ f196850e:79178e07
2024-09-19 15:53:40https://forex-strategy.com/2024/09/19/an-attack-on-belarus-will-be-the-beginning-of-the-third-world-war/ An attack on Belarus will be the beginning of the Third World War
usa #belarus #russia #ukraine #war #politics
-
@ c73818cc:ccd5c890
2024-09-19 14:55:34🐹 Ebi.xyz, piattaforma DEX su Arbitrum One, gestirà l’airdrop di Hamster Kombat, previsto per il 26 settembre 2024, coinvolgendo oltre 300 milioni di utenti.
🧙♀️ Con la sua innovativa struttura off-chain, Ebi.xyz consentirà agli utenti di riscattare rapidamente i token di Hamster Kombat, che potranno poi convertire o mantenere come posizioni aperte. L'airdrop sarà disponibile anche su exchange centralizzati come Binance e Bybit, garantendo ampia accessibilità agli utenti.
🧙♀️ Hamster Kombat, grazie ai suoi 300 milioni di utenti attivi e un sistema airdrop diversificato, sta emergendo come leader nel settore Web3. L'integrazione con Ebi.xyz ha potenziato la crescita della piattaforma, dimostrando l'importanza delle soluzioni decentralizzate nella gestione degli asset crittografici.
🧙♀️ Ebi.xyz offre agli utenti pieno controllo sui propri fondi, grazie alla sua natura non-custodial basata su smart contract. Con l'introduzione di nuovi strumenti come “FUD Markets” e leaderboard competitive, la piattaforma sta ridefinendo l'accesso e il trading nel mondo cripto.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Link per iscriversi ad Hamster Kombat: https://t.me/hamstEr_kombat_bot/start?startapp=kentId740914800
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #AirDrop #HamsterKombat #Ebixyz #DEX #Telegram #Token #HMSTR #Exchange #Web3 #Hamster #Cripto #Bitcoin
-
@ 52adc2ef:9f4bc0ba
2024-09-19 09:54:56สวัสดีครับ
ผมว่าจะลองเขียนบทความหรืออะไรที่มีประโยชน์ ในสิ่งที่ตัวเองได้รู้และมาเเชร์ หลังจากได้ฟัง
'Stoic' ปรัชญาเปลี่ยนชีวิตและพัฒนาการทำงานของ 'ทอย DataRockie' มีช่วงนึงพูดไว้ว่า
คนไทย consume กับ social media ลำดับต้นๆ ซึ่งหลายคน consume อย่างเดียว จะเป็นได้แค่ effect ของส่วนที่เรา content ที่เราเสพ แต่ถ้าเราสร้าง content ที่มี value เราก็จะเป็น เหตุ ที่มี effect กับคนอื่น สร้างเเรงกระเพื่อมส่งต่อไป
รู้สึกว่าน่าสนใจ เพราะก็เป็นหนึ่งในคนที่รับสารมาตลอด ไม่เคยลองที่จะ create ขึ้นมา เพราะเขิน ไม่ค่อยได้โพสอะไรอยู่เเล้ว บวกกับ คิดว่ารู้ไม่พอ เเต่คนเราก็น่าจะมีความรู้อะไรที่รู้ดีกว่าคนอื่นเค้าบ้าง
คิดว่าลองเริ่มดู ก็คงไม่เสียหายอะไร หวังว่าน่าจะเป็นประโยชน์กับใครก็คนใดคนหนึ่งครับ
siamstr
nostr
-
@ aadab488:d4152ab5
2024-09-19 09:05:58In today’s data-driven world, mastering data analysis is essential for students and professionals alike. R Studio, a powerful integrated development environment for R programming, offers robust tools for statistical analysis, data visualization, and reporting. However, navigating its complexities can be challenging for beginners. This is where R Studio assignment help becomes invaluable, providing you with the support you need to excel in your coursework and projects.
Understanding the fundamentals of R and its application in data analysis is crucial for success. R Studio enables users to perform complex data manipulations, create stunning visualizations, and develop predictive models. Yet, with its vast array of packages and functions, students often find themselves overwhelmed. Seeking expert assistance can streamline the learning process and enhance your understanding of key concepts. Whether you are struggling with data importation, cleaning, or analysis, professional guidance can make a significant difference.
When searching for R Studio assignment help, look for platforms that offer tailored support for your specific needs. Experienced tutors can provide step-by-step guidance, helping you grasp the intricacies of R programming. With their help, you can learn to write efficient code, understand data structures, and apply statistical methods effectively. Furthermore, personalized assistance allows you to tackle your R Studio assignment help with confidence, ensuring that you meet deadlines while achieving high-quality results.
One reliable resource for expert support is myassignmenthelp.expert. This platform connects students with experienced professionals who specialize in R programming and data analysis. By utilizing their services, you can benefit from one-on-one sessions that focus on your unique challenges. Whether you need help with a specific assignment or want to deepen your overall understanding of R Studio, this resource can provide the guidance you need.
Moreover, collaborating with experts not only helps you complete your assignments but also builds your skills for future projects. As you work through real-world data analysis scenarios with professional support, you will become more adept at using R Studio independently. This hands-on experience is invaluable, equipping you with the tools to analyze data effectively and make informed decisions in your academic and professional career.
In addition to personalized tutoring, many platforms offer a wealth of resources, including tutorials, sample assignments, and practice exercises. These materials can further reinforce your learning and provide additional context to the concepts you study. When combined with expert assistance, they can lead to a comprehensive understanding of R Studio and its applications in data analysis.
In conclusion, R Studio assignment help is an essential resource for students looking to master data analysis. With the complexities of R programming, seeking expert support can alleviate stress and enhance your learning experience. By leveraging platforms like myassignmenthelp.expert, you can gain access to knowledgeable tutors who can guide you through your assignments and help you build essential skills. Embrace the opportunity to learn from the best, and watch your confidence and expertise in data analysis grow exponentially.
Other related resources: https://www.btsny.org/post/jaimie-nawaday-joins-beat-the-streets-wrestling-board-of-directors?commentId=6f289e26-e795-400c-90c9-b7a19bf3c094 https://www.thtrehab.com/profile/steve-williamaustin1997/profile https://more9ja.com/members/steve1997/profile/
-
@ a012dc82:6458a70d
2024-09-19 07:35:12Table Of Content
-
The Psychology of Scarcity
-
Trust in Decentralization
-
The Power of Network Effects
-
The Role of Intrinsic Motivation
-
Anchoring and Adjustment Heuristics
-
Conclusion
-
FAQ
Bitcoin has been the talk of the town since its inception in 2009. While most people primarily view it as a digital currency, it offers much more than that. In this article, we will examine the various aspects of Bitcoin that set it apart from traditional currencies, focusing on behavioral economics. By understanding these unique features, we can better appreciate the true value and potential of Bitcoin in the world's financial landscape.
The Psychology of Scarcity
The limited supply of Bitcoin, capped at 21 million coins, contributes to the perceived value of the cryptocurrency. This scarcity can drive increased demand, as people are generally drawn to scarce resources. This phenomenon is well documented in behavioral economics, and it can lead to irrational decision-making, fear of missing out (FOMO), and even price manipulation.
Trust in Decentralization
Bitcoin operates on a decentralized network, meaning no central authority or government can control its supply or value. This aspect appeals to many users who have lost faith in traditional financial institutions due to corruption, mismanagement, or economic instability. From a behavioral economics perspective, the trust in decentralization can lead to a preference for Bitcoin over conventional currencies.
The Power of Network Effects
The value of Bitcoin is further enhanced by its growing network of users, developers, and investors. As more people adopt and use the cryptocurrency, its utility and demand increase, further driving up its value. This positive feedback loop is a classic example of network effects in behavioral economics, and it helps explain the rapid growth and adoption of Bitcoin.
The Role of Intrinsic Motivation
Bitcoin's open-source nature and the pseudonymous identity of its creator, Satoshi Nakamoto, have fostered a sense of community and intrinsic motivation among its supporters. This shared sense of ownership and the desire to contribute to the success of the project can drive innovation, development, and adoption of the cryptocurrency. Intrinsic motivation is a powerful force in behavioral economics, often leading to better outcomes than extrinsic rewards.
Anchoring and Adjustment Heuristics
Bitcoin's highly volatile nature can be attributed, in part, to cognitive biases like anchoring and adjustment. People often anchor their expectations of Bitcoin's value to a previous reference point, such as an all-time high or low. As new information emerges, they adjust their valuation, sometimes leading to overreactions and significant price swings. Understanding these heuristics can help explain the often unpredictable behavior of Bitcoin's price.
Conclusion
Bitcoin is more than just a digital currency; it is a complex financial ecosystem that can be better understood through the lens of behavioral economics. By analyzing the psychological factors that drive its value and adoption, we can gain valuable insights into the cryptocurrency's potential and the unique role it plays in our global economy. As the world continues to evolve, so too will Bitcoin and the fascinating interplay between human behavior and digital finance.
FAQ
How does scarcity influence Bitcoin's value? Bitcoin's limited supply creates a sense of scarcity, driving demand and leading to increased value and potential irrational decision-making.
Why is decentralization important for Bitcoin? Decentralization eliminates central authority control, appealing to users who distrust traditional financial institutions and prefer a more trustless system.
How does the psychology of FOMO influence Bitcoin adoption? Fear of missing out (FOMO) drives people to invest in Bitcoin to avoid feeling left out, potentially resulting in impulsive decision-making and increased demand.
How do cognitive biases affect our perception of Bitcoin's value? Cognitive biases like confirmation bias and herd mentality can lead to irrational beliefs and expectations about Bitcoin's value, influencing investment decisions.
Can behavioral economics explain the appeal of Bitcoin for speculative investors? Yes, factors like scarcity, network effects, and cognitive biases can make Bitcoin an attractive option for speculative investors seeking high returns.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 725e450c:f7600b23
2024-09-19 04:49:36In today’s fast-paced academic world, students often find themselves juggling multiple responsibilities—attending lectures, preparing for exams, participating in extracurricular activities, and, of course, completing assignments. The constant pressure to maintain a high GPA can be overwhelming. That’s where an assignment helper becomes a vital asset in boosting your grades and easing academic stress. visit here for more information.
- Expert Guidance and Subject Knowledge One of the primary reasons you need an assignment helper is the access to expert knowledge. Professional assignment helpers specialize in various academic fields, including finance, engineering, law, and more. They possess deep subject expertise, ensuring that your assignment is well-researched, accurate, and in line with academic standards.
Assignments often require a thorough understanding of complex concepts, and not all students have the time or resources to fully grasp every topic. An assignment helper can fill in those gaps, offering insight and knowledge that you may not have had time to master. This can significantly enhance the quality of your work, leading to better grades.
- Time Management Balancing assignments with other academic tasks can be daunting, especially when deadlines pile up. Late submissions or rushed work can affect your overall academic performance. An assignment helper can save you time by managing your workload and ensuring timely completion of high-quality assignments.
By outsourcing assignments to a reliable helper, you can focus on other important academic tasks, such as exam preparation or internships, without sacrificing the quality of your coursework. This balance is key to maintaining good grades throughout your academic journey.
- Customized and High-Quality Work Every assignment has unique requirements based on the subject, topic, and academic level. Assignment helpers provide tailored solutions that meet these specific needs. They follow your guidelines closely, ensuring that the assignment reflects your personal style while adhering to academic standards.
Additionally, professional helpers prioritize quality. They use credible sources, present coherent arguments, and ensure the work is free from plagiarism. This level of detail and personalization not only improves the quality of your assignments but also ensures that you meet the expectations of your professors.
- Reducing Stress and Anxiety Academic pressure can be stressful, especially when you’re struggling to keep up with deadlines or complex assignments. The anxiety of not performing well can negatively impact your mental health and, ultimately, your academic performance.
Hiring an assignment helper allows you to delegate some of this workload, giving you peace of mind. With the assurance that your assignments are in capable hands, you can reduce stress and focus on maintaining a healthy academic-life balance.
- Improved Grades and Academic Performance At the end of the day, the primary goal of every student is to achieve better grades. An assignment helper can provide the edge you need to reach this goal. Their expertise ensures that your assignments are of the highest quality, addressing key concepts, formatting requirements, and the specific expectations of your professors.
By submitting well-researched and professionally written assignments, you stand a better chance of securing higher grades. This, in turn, boosts your overall academic performance and helps you stay ahead of the competition.
- Learning Opportunity Engaging with an assignment helper is not just about getting the work done—it’s also a valuable learning experience. Professional helpers often provide detailed explanations, well-structured arguments, and examples that you can learn from. By reviewing the completed assignments, you gain deeper insights into how to approach similar tasks in the future.
This not only helps improve your grades in the short term but also enhances your academic skills in the long run, making you a better student overall.
Conclusion In a competitive academic environment, students need all the support they can get to excel. Assignment helpers offer a practical, effective solution for boosting grades and managing academic pressure. From expert guidance to time management and stress relief, the benefits of hiring an assignment helper are clear. By investing in professional assistance, you can enhance the quality of your assignments, reduce academic anxiety, and ultimately achieve the grades you deserve.
-
@ a03b38f8:2c7ce1f0
2024-09-19 03:04:13You are Giving Away a Lot of Data with those Pictures
You post pictures on nostr and other social media. You send pictures to friends and sometimes sorta friends. I hate to tell you this but you are giving away a lot more personal data than just what's on the image of the picture.
It all comes down to the metadata. The term Metadata refers to descriptive information about a picture, image, or file. This set of information is so vital as it reveals everything about a picture.
Metadata is key as it explains the privacy and security dangers that you are exposing yourself to everytime you share that file. And not just pictures, but text documents, PDFs and Videos.
What data is in Pictures?
EXIF Data (Exchangeable Image File Format): This is a standard that specifies the formats for sound, images and ancillary tags used by scanners, smartphones and other smart devices.
EXIF contains so much more personal information than you can imagine.
It tells the geolocation of where the picture was taken and it gives the timestamp of when it was taken.
So that creepy guy who follows your accounts knows all your favorite lunch spots because you like to post pictures of your food.
Additionally the metadata contains a description or title of the image. Any tags or keywords associated with the image, author information, and any custom metadata from any image editing software that might have been used including more timestamps, system information, and log of any edits.
So yes your Bumble date knows you are trying to catfish them with that 5 year old picture you doctored up with AI.
Uses in Open Source Intelligence
Open Source Intelligence or OSINT is a fancy term for cyber stalking someone. It is using nothing more than specialized knowledge and freely available information on the internet to find out all kinds of stuff about someone.
Using the GPS metadata and reverse image search of that picture posted online you figure out where that person is from and maybe a first name. Using that to narrow down your search criteria you find their Facebook and Instagram. Now you have their last name, how they spend their time, friends, and maybe where they work. Searching free data brokers you find their address and phone number. Public records tell you how much they paid for their house and Google street view gives you a view of the house from the street.
So other than being a creep, what else is metadata used for?
Analysis of metadata helps to trace the origin and history of digital files. Digital Forensics will know when those files were created, accessed, or modified. Forensics then uses this for additional context about files and other data stored on a computer or network, this information is useful because it provides information that may not be immediately clear from the file itself. Remember your OPSEC rules and be a Nemo when necessary.
There is some good news. (And bad)
Luckily the more popular services out there such as Facebook and Instagram do not display the metadata of the users. You cannot check the metadata of pictures as it does not allow you to download pictures or copy the image link. Although that doesn't mean the companies themselves do not have access to that data.
This is not the case with services like Tumbler and most image hosting or storage services. When pictures are uploaded to cloud services like dropbox or google drive anyone with access to these images can also access the metadata.
Okay I am terrified, how do I remove metadata from pictures?
Thankfully there are several options to take care of this. Most operating systems have methods built in. (see below for instructions for Windows and MacOS). Tails and QubesOS has Metadata Cleaner software preinstalled. There are several online tools that also scrub metadata from pictures. (Shout out to nostr.build)
Windows
-
Right Click the image file and select properties
-
Click the details tab
-
Click Remove Properties and Personal Information
-
Choose the level of metadata removal desired
MacOS
-
Open the image in the preview
-
Go to Tools
-
Click EXIF tab
-
Select Remove EXIF file
How to remove EXIF data after capture on phones
Let's be honest that most of your photos are taken and reside on your phone now of days.
On iPhone you have to open the Photos app, select the image, tap on 3 dots and select Adjust Date & Time and Adjust Location. You can also get the adjust setting by clicking the little i at the bottom of the picture.
On android it is much the same way. Open Gallery, select image, tap 3 dots, choose details, then the pencil to remove location and timestamp, save.
On Graphene OS no worries, remove EXIF data after capture is an existing setting in the camera and is enabled by default.
It is a total pain that you have to do this each and every time to every picture. But I hope you now realize how important that metadata can be and why you shouldn't just be sharing it with the world.
-
-
@ bfdbcc80:5a8e5326
2024-09-19 02:58:06We hold these Truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.
-
@ c73818cc:ccd5c890
2024-09-18 17:36:17🙈 Un nuovo prodotto assicurativo approvato dalla CBUAE protegge i gestori patrimoniali Web3 dalle perdite di asset digitali causate da hacking, frodi o danni.
🐫 La Banca centrale degli Emirati Arabi Uniti ha autorizzato un’assicurazione contro il rischio di custodia, sviluppata da OneDegree e Dubai Insurance. Questo prodotto protegge gli exchange e i custodian da eventi di hacking o frodi interne.
🐫 Robin Scott, dirigente di OneDegree, ha spiegato che l’assicurazione copre il rischio di perdita d’accesso agli asset digitali dei clienti, offrendo una soluzione di sicurezza richiesta da molte autorità di regolamentazione globali.
🐫 Le aziende con sede negli EAU ora possono acquistare questa assicurazione on-shore. Scott prevede che il numero di richieste crescerà con l’aumento delle licenze per le società di asset digitali.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Banca #EmiratiArabi #Dubai #Assicurazione #Custodia #OneDegree #Insurance #Exchange #EAU #Cripto #Bitcoin
-
@ f196850e:79178e07
2024-09-18 15:56:44https://forex-strategy.com/2024/09/18/did-kamala-harris-know-the-trump-debate-questions-in-advance/ Did Kamala Harris Know the Trump Debate Questions in Advance?
trump #debate #usa #politics #harris #kamalaharris
-
@ c73818cc:ccd5c890
2024-09-18 13:47:36💀 Elizabeth Warren e altri senatori chiedono alla Fed un'azione decisa, tagliando i tassi di 75 punti base per prevenire un rallentamento economico.
🎩 Nella lettera inviata a Jerome Powell, i senatori avvertono che l'inazione potrebbe aggravare la situazione economica, danneggiando in particolare il mercato del lavoro. Il taglio dei tassi è visto come un passo necessario per sostenere la ripresa e mitigare i rischi di recessione.
🎩 Le aspettative per un taglio dei tassi sono diffuse, ma l'entità rimane incerta. Gli investitori speculano su un taglio tra 0,25% e 0,50%, mentre i senatori chiedono un'azione più drastica. Un taglio di 75 punti base potrebbe migliorare il sentiment del mercato e aumentare la liquidità.
🎩 Con l'inflazione in calo e segnali di debolezza nel mercato del lavoro, i senatori ritengono che la Fed debba agire rapidamente. Un taglio più deciso potrebbe avere un impatto positivo su azioni e criptovalute, rafforzando l'economia e favorendo gli investitori.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Powell #Senatori #FED #FOMC #TaglioTassi #Economia #Recessione #Inflazione #Cripto #Bitcoin
-
@ 3bf0c63f:aefa459d
2024-09-18 10:37:09How to do curation and businesses on Nostr
Suppose you want to start a Nostr business.
You might be tempted to make a closed platform that reuses Nostr identities and grabs (some) content from the external Nostr network, only to imprison it inside your thing -- and then you're going to run an amazing AI-powered algorithm on that content and "surface" only the best stuff and people will flock to your app.
This will be specially good if you're going after one of the many unexplored niches of Nostr in which reading immediately from people you know doesn't work as you generally want to discover new things from the outer world, such as:
- food recipe sharing;
- sharing of long articles about varying topics;
- markets for used goods;
- freelancer work and job offers;
- specific in-game lobbies and matchmaking;
- directories of accredited professionals;
- sharing of original music, drawings and other artistic creations;
- restaurant recommendations
- and so on.
But that is not the correct approach and damages the freedom and interoperability of Nostr, posing a centralization threat to the protocol. Even if it "works" and your business is incredibly successful it will just enshrine you as the head of a platform that controls users and thus is prone to all the bad things that happen to all these platforms. Your company will start to display ads and shape the public discourse, you'll need a big legal team, the FBI will talk to you, advertisers will play a big role and so on.
If you are interested in Nostr today that must be because you appreciate the fact that it is not owned by any companies, so it's safe to assume you don't want to be that company that owns it. So what should you do instead? Here's an idea in two steps:
- Write a Nostr client tailored to the niche you want to cover
If it's a music sharing thing, then the client will have a way to play the audio and so on; if it's a restaurant sharing it will have maps with the locations of the restaurants or whatever, you get the idea. Hopefully there will be a NIP or a NUD specifying how to create and interact with events relating to this niche, or you will write or contribute with the creation of one, because without interoperability this can't be Nostr.
The client should work independently of any special backend requirements and ideally be open-source. It should have a way for users to configure to which relays they want to connect to see "global" content -- i.e., they might want to connect to
wss://nostr.chrysalisrecords.com/
to see only the latest music releases accredited by that label or towss://nostr.indiemusic.com/
to get music from independent producers from that community.- Run a relay that does all the magic
This is where your value-adding capabilities come into play: if you have that magic sauce you should be able to apply it here. Your service -- let's call it
wss://magicsaucemusic.com/
-- will charge people or do some KYM (know your music) validation or use some very advanced AI sorcery to filter out the spam and the garbage and display the best content to your users who will request the global feed from it (["REQ", "_", {}]
), and this will cause people to want to publish to your relay while others will want to read from it.You set your relay as the default option in the client and let things happen. Your relay is like your "website" and people are free to connect to it or not. You don't own the network, you're just competing against other websites on a leveled playing field, so you're not responsible for it. Users get seamless browsing across multiple websites, unified identities, a unified interface (that could be different in a different client) and social interaction capabilities that work in the same way for all, and they do not depend on you, therefore they're more likely to trust you.
Does this centralize the network still? But this a simple and easy way to go about the matter and scales well in all aspects.
Besides allowing users to connect to specific relays for getting a feed of curated content, such clients should also do all kinds of "social" (i.e. following, commenting etc) activities (if they choose to do that) using the outbox model -- i.e. if I find a musician I like under
wss://magicsaucemusic.com
and I decide to follow them I should keep getting updates from them even if they get banned from that relay and start publishing onwss://nos.lol
orwss://relay.damus.io
or whatever relay that doesn't even know anything about music.The hardcoded defaults and manual typing of relay URLs can be annoying. But I think it works well at the current stage of Nostr development. Soon, though, we can create events that recommend other relays or share relay lists specific to each kind of activity so users can get in-app suggestions of relays their friends are using to get their music from and so on. That kind of stuff can go a long way.
-
@ a012dc82:6458a70d
2024-09-18 03:13:01Table Of Content
-
An Ideal Environment for Crypto Growth
-
Economic Impact of Bitcoin in Texas
-
Future Prospects
-
Conclusion
-
FAQ
The Lone Star State has witnessed a phenomenal rise in Bitcoin and cryptocurrency adoption in recent years. This article will explore the factors behind this surge, the benefits it offers to the local economy, and the potential implications for the future of Bitcoin and the broader crypto landscape in Texas and beyond.
An Ideal Environment for Crypto Growth
A. Energy Abundance
Texas boasts abundant and affordable energy resources, particularly from wind and natural gas. This has attracted a growing number of cryptocurrency mining operations, which require vast amounts of energy to maintain and secure the blockchain.
B. Regulatory Framework
Texas has embraced a relatively open regulatory environment for cryptocurrencies. The state government has shown a willingness to adapt existing regulations and create new ones to support the growth of the crypto industry.
C. Tech-Friendly Population
Texas has a tech-savvy population with a strong entrepreneurial spirit. This has led to the establishment of numerous startups and businesses focused on blockchain technology and cryptocurrency services.
Economic Impact of Bitcoin in Texas
A. Job Creation
The rise of Bitcoin and cryptocurrency-related businesses has created thousands of jobs in Texas. These range from mining operations to software development, financial services, and support roles.
B. Attracting Investment
The growth of the crypto sector in Texas has attracted significant investment from both domestic and international sources. This influx of capital has spurred the local economy and fostered innovation in the state.
C. Increased Tax Revenue
With more businesses and individuals engaging in cryptocurrency transactions, tax revenues have increased. This additional revenue can be used to improve public services and infrastructure in Texas.
Future Prospects
A. Becoming a Global Crypto Hub
As Texas continues to foster a favorable environment for cryptocurrencies, it has the potential to become a global hub for blockchain technology and digital assets. This could help attract even more talent and investment to the region.
B. Wider Adoption of Cryptocurrencies
The rise of Bitcoin in Texas could lead to broader adoption of cryptocurrencies throughout the state and beyond. As more people and businesses become familiar with digital assets, they may increasingly use them for everyday transactions.
C. Challenges and Risks
Despite the promising outlook, there are still challenges and risks associated with the growth of Bitcoin and other cryptocurrencies. These include regulatory uncertainty, potential environmental impact, and volatility in the crypto markets.
Conclusion
The rapid rise of Bitcoin in Texas is a testament to the state's favorable conditions and forward-looking approach to emerging technologies. With continued investment and innovation, Texas has the potential to become a global leader in the cryptocurrency space. However, it remains essential to address the associated challenges and risks to ensure a sustainable and responsible growth trajectory.
FAQ
Why has Bitcoin become popular in Texas? Bitcoin has become popular in Texas due to the state's favorable regulatory environment, its thriving energy industry, and a growing interest in alternative forms of investment.
Is Bitcoin legal in Texas? Yes, Bitcoin is legal in Texas. In fact, the state has taken steps to encourage the development of the cryptocurrency industry.
Can I use Bitcoin to buy goods and services in Texas? Yes, you can use Bitcoin to buy goods and services in Texas. Some businesses in the state have begun accepting Bitcoin as payment.
What does the rise of Bitcoin in Texas mean for the future? The rise of Bitcoin in Texas could be a sign of things to come, as more people become interested in digital currencies and more businesses begin accepting them as payment. It could also lead to increased investment in the cryptocurrency industry and further innovation in the field.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ a6e6a54b:8aca70c6
2024-09-26 04:41:21Outline
- Introduction.
- Setting the Ground with Definitions: UFO, UAP and The Phenomenon.
- About the Author: Luis Elizondo.
- Skeptical Approach.
- Non-Skeptical Approach.
- Spiritual-Metaphysical Component of UAP.
- Worldview Frameworks.
- Making Sense of UAP.
- The Stickiness of The Phenomenon.
- Possibilities for UAP.
- Spiritual-Metaphysical Beings.
- Human Nature.
- UAP Intentions.
- Psyop Hypothesis.
- Conclusions.
- References.
From Lights in the Sky to the Fallen
Expanding the Conversation from Imminent by Luis Elizondo
### 1. Introduction
Man’s mind, once stretched by a new idea, never regains its original dimensions. -Oliver Wendell Holmes.
During the past few years, there has been a resurgence of interest in the UFO-UAP topic. If you have been paying attention, you know by now that the phenomenon is real: there has been an acknowledgment of what people have been saying for years. However, if you are not aware of the current state of affairs, you might need to catch up. Imminent by Luis Elizondo [1] summarizes the latest events and his role in them. I think this book is not for UAP beginners, and I still consider myself as one. For this reason, it was not the book I was expecting, but it was the book I needed to challenge my approach to this topic. I had to make a mental shift in order to think about this issue more broadly. I will elaborate more on the challenges I faced later.
Luis “Lue” Elizondo explains his role as the Head of AATIP (Advanced Aerospace Threat Identification Program) run by the Pentagon and why he resigned due to the secrecy. As you can imagine, it is very difficult to make sense of someone else’s experiences, especially when they also involve the phenomenon. From my perspective, the book brings to the forefront yet another layer of this mystery —the spiritual and metaphysical component of UAP—, which is hard to process (it certainly was for me). I initially planned to write a review of the book, but I have decided instead that I will continue the conversation that Lue started, specifically about this aspect of UAP.
Keep in mind that whether you believe they live among us or think it is all nonsense, you may already have a strong bias that confirms your beliefs and dismisses any new information. This is part of what makes this topic so strange—most people seem to fall into one of two categories: either fully invested or completely indifferent. In my experience, the most common nuanced opinion among those who have not delved deeply into the subject but still want to appear open-minded is: “Of course, there are aliens somewhere in the universe, but it is ridiculous to think they have already visited us.” However, if you look closely at the discussions over the past few years, people are not necessarily talking about aliens visiting Earth—that is just one possibility being considered. I think claiming that aliens exist somewhere but have not shown up yet, and probably never will, is a comfort zone stance.
Furthermore, I am not inclined to convince anyone that this topic is relevant. But, if you already think that transparency is worth your time, then let’s think about the puzzle together!
Notes: 1. I think you should read the book, but if you prefer a summary and review of the key points made by Lue, I recommend watching Richard Dolan’s video: https://www.youtube.com/watch?v=uazfN6CqUeQ. 2. I have been careful with the quotes I am sharing here. Having listened to several hours of Lue’s interviews and podcasts, I have only included quotes he has publicly discussed. 3.
2. Setting the Ground with Definitions: UFO, UAP and The Phenomenon
I want clarify the meanings of UFO, UAP and the phenomenon, as I understand them:
- UFO: Unidentified Flying Object. This is a well-known acronym, often associated with flying saucers. It carries a lot of stigma, taboo, and conspiracy theories. Because of the recent surge of interest in the topic, the term "UFO" is not as commonly used anymore; instead, most people now refer to UAP. Additionally, the term UFO does not encompass the full range of the phenomenon.
-
UAP: Unidentified Anomalous Phenomena[^1]. It was previously defined as Unidentified Aerial Phenomena, but the phenomenon is not only aerial; it is transmedium (moving through air, space, and water—USO refers to Unidentified Submerged Object), and possibly transdimensional. Therefore, “anomalous” is a more accurate word, as it better captures the broader nature of the phenomenon.
-
The Phenomenon: This is the core of the issue and what we are trying to understand. The way that I see it, the phenomenon involves the interaction[^2] between humans and a non-human intelligence, which may be more advanced than us. The elements of interaction include:
Objects: These are observed in the sky, in the ocean, or coming from outer space. Objects can also be inserted into the human body. Examples include crafts, lights, and drone-like objects. These objects may appear tangible or not.
Entities or Beings: These are sometimes seen near or inside the objects, or on their own. They may communicate messages through unusual means. Their origin is uncertain—whether material or metaphysical in nature.
To summarize:
From a human perspective, the interaction with the phenomenon can be both material—occurring through devices, human senses, and visible changes in the body with biological effects—and psychological. Even more puzzling is that the phenomenon may enclose what some refer to as paranormal activity[^3].
Whatever the phenomenon is, it seems to have both material and non-material components. So, when we talk about evidence (photos, videos, vehicles, etc.) we might only be seeing one side of the coin, not the whole picture. I am being very deliberate in using the terms material and non-material because I am referring to the materialistic interpretation of the universe. I will expand more about this later.
[^1]: As for the word "phenomena," I do not think it is necessary to use "UAPs" to refer to the plural form. However, it is very common to see “UAPs” used everywhere. I will just stick with "UAP" in this discussion. [^2]: If they are seen or detected, that counts as interaction. When I mentioned earlier that some people say that “life exists somewhere else in the universe”, they are missing the point. The life forms that might exist elsewhere, which we do not yet know about, are not interacting with humans. [^3]: Some suggest that a subset of what we call paranormal activity can be caused or related to the phenomenon. Therefore, in the end, certain instances of paranormal activity could have a material explanation.
3. About the Author: Luis Elizondo
Luis Elizondo was recruited as a senior intelligence officer to help establish counterintelligence and security for the Advanced Aerospace Weapons System Applications Program (AAWSAP), which later became the Advanced Aerospace Threat Identification Program (AATIP). This program was focused on “unconventional technologies” (p. 6), “unusual phenomena” and investigated unidentified aircraft, specifically ones that seem to display beyond-next-generation technology and capabilities—what we now call unidentified anomalous phenomena, or UAP, or what were long referred to as UFOs (p. 8).
Some interesting details discussed at the podcast Theories of Everything with Curt Jaimungal [2] include: * Lue still keeps his security clearance. * Lue’s book went through a year-long review process by the Pentagon, resulting in certain parts being redacted.
Due to these factors, some speculate that he could be a disinformation agent. However, I do not agree with this notion, as other whistleblowers[^4] have come forward and support some of Lue’s claims. Additionally, Lue’s coming out appears to have caused an internal struggle within the Pentagon. It is very confusing to say the least.
[^4]: Lue does not view himself as a whistleblower but rather as a “patriot”. The fact that he retains his security clearance and continues to work as a government consultant makes people wonder who is really behind this disclosure movement. He has stated that: I would never in a million years violate my security oath. The damage inflicted by people such as Bradley (now Chelsea) Manning and, later, Edward Snowden arguably did more harm than good. Yes, the truth got out, but people lost their lives, and intelligence was compromised in the process (p. 193).
In my opinion, the most important claim made by Lue is the following: Unidentified craft with beyond-next-generation technology—including the ability to move in ways that defy our knowledge of physics and to do so within air, water, and space—have been operating with complete impunity all over the world since at least World War II. These crafts are not made by humans. Humanity is in fact not the only intelligent life in the universe, and not the alpha species… While there are valid reasons for secrecy around some aspects of UAP, I do not think humanity should be kept in the dark about the fundamental fact that we are not the only intelligent life in the universe. The United States government and other major governments have decided its citizens do not have a right to know, but I could not disagree more. You might be thinking this all sounds crazy. I’m not saying it doesn’t sound crazy, I’m saying that it’s real (pp. 1-2).
4. Skeptical Approach
In seeking truth you have to get both sides of a story. -Walter Cronkite.
Before sharing my opinions, assuming that the claims made by Lue and others are true, I need to outline some of the reasons for skepticism about the information being presented (in his book and in general during this disclosure process):
-
Lack of evidence: Lue has not provided concrete evidence, only his personal testimony. The Pentagon denies his claims.
-
Quality of evidence: The evidence that is presented is often of poor quality: blurry pictures and out of context videos that could be anything.
- Lue Elizondo’s Credentials: Right after the release of the book, there was considerable debate on #UFOTwitter regarding his position at AATIP.
- Government secrecy: Many think that it is impossible for a government to keep a big secret like this one from the public for so many years. They argue that the cover-up and secrecy are just conspiracy theories.
- Persistent Claims of Imminent Disclosure: Ufologists keep claiming, for decades, that disclosure is just about to happen any day now.
- Questionable Sources: A lot of the reported encounters come from people who might be unstable, seeking attention, or trying to scam others. Even those who seem genuine might be misinterpreting what they experienced.
5. Non-Skeptical Approach
The eye sees only what the mind is prepared to comprehend. -Henri Bergson.
The goal here is not to focus on the skeptic view. I am well aware that one can just say “Show me the evidence”, and move on if no one points to anything convincing and irrefutable. Also, given the fact that there are many other relevant issues affecting our daily life—like inflation, climate change, geopolitical instability, wars, and surveillance— dedicating mental energy to the UAP issue seems like a waste of time. It is totally reasonable to set this discussion aside due to other priorities.
However, I think it is unfair to dismiss the UAP issue as unscientific, nonsense and full of fraudsters (and there are definitely some of those) without spending a decent amount of time trying to understand what it is really about before criticizing it. Ridiculing a subject you do not know much about and do not understand is not scientific. In my opinion, one of the best critics in this area is Dr. Michael Shermer^5. He is a well-known skeptic with a deep knowledge of various UFO cases, has read a vast amount of information and talked to experiencers and witnesses. I recommend following his work.
In the previous section, I mentioned that some people think it is impossible for a government to keep a big secret[^6] like this for so long. I agree with that perspective and it seems that whistleblowers are starting to come forward. Not just one, but several whistleblowers with military backgrounds have been sharing their stories. It is up for you to decide how trustworthy you think they are. They have appeared in interviews, podcasts and some have even testified before the US Congress. While it is possible that they could all be lying or working together, I am going to assume for now that this is not the case so I can focus on the information they are providing.
[^6]: Some people believe that if there was anything significant to the UAP issue, we would have seen it revealed in Wikileaks by now. Interestingly, the “Podesta emails” include exchanges between Tom DeLonge and John Podesta, both of whom are mentioned in the book because of their interest in the topic.
Sometimes it is important to state the obvious: if something is engaging humanity, we do not need any government to tell us whether it is real or not. As Dr. Avi Loeb^7, Head of the Galileo Project^8, puts it: The sky and oceans are not classified and we can survey them ourselves [3]. People all around the world have been sharing their experiences on this topic for years. Sure, some of these people might be fraudsters, attention seekers, or simply confused, but others might be recounting genuine experiences of events that truly happened to them (even if we do not agree on their nature). That is why the testimonies of whistleblowers who have encountered unusual phenomena during their military service are very significant. Their credibility and training to identify anomalies while staying objective make their accounts worth considering.
There are also people who have had more intriguing encounters with the phenomenon, often referred to as experiencers[^9]. If you’re a good listener, you might have heard some unusual stories from people you know, and you might even know someone who falls into this category. For those who might be unaware, experiencers do exist, and many of them choose to stay quiet. As Dr. Garry Nolan^10, Executive Director of the Sol Foundation^11, points out: I think that what [ridiculing] does is a disservice to people who come forward with stories because they have a double trauma, they have the trauma of seeing something they do not understand and doesn’t fit with their worldview, and then they have the trauma of everyone making fun of them [4]. [^9]: I think this term was originally reserved for abductees, but recently, I have heard it used more broadly to refer to anyone who has had an experience related to the phenomenon. So, I’ll use “experiencers” in this broader context.
6. Spiritual-Metaphysical Component of UAP
It is not the answer that enlightens but the question. -Eugène Ionesco.
Worldview Frameworks
To ensure we are all on the same page, let’s take a moment to discuss Materialism, which is the predominant worldview among scientists and philosophers for explaining the nature of reality.
Materialism holds that the universe is entirely physical and governed by the laws of physics.
Reductive Materialism refers to the notion that all mental states—such as emotions, beliefs, perceptions, desires—can be reduced to physical phenomena, hence, mental states correspond to physical states. Most Materialists identify with Reductive Materialism.
Eliminative Materialism takes a step further by suggesting that mental phenomena do not exist at all.
Mental phenomena is an interesting case of study because it seems to be something different. However, most scientists argue that mental states can be explained through materialistic means, suggesting, there is no need to postulate another substance[^12] or property. Nevertheless, consciousness does not seem to be reconciled in a materialistic way due to its subjective nature and we still lack a clear definition of it. This is one of science's greatest mysteries, sparking extensive debate among philosophers, psychologists, and neurologists. In recent decades, computer scientists have also joined the conversation, due to the advances in Artificial Intelligence. I mention this because, as we explore the unknown characteristics of the phenomenon later, some have proposed that moving beyond a materialistic interpretation might be necessary, especially since the phenomenon seems to interact directly with human consciousness.
[^12]: Cartesian dualism divides the world in two parts: the physical and the mental, leading us to the mind-body problem—how does the interaction occur? We have shifted toward a form of monism, assuming that the world is only made of physical stuff (materialism), thus dismissing the mind-body problem, by claiming that the mind is material (reductionism). However, phenomenal consciousness—the realm of subjective experiences or qualia—seems to escape materialism, drawing us back to reconsider dualism and other flavors of it. This scientific challenge has been famously formulated as the Hard Problem of Consciousness by the philosopher Dr. David Chalmers.
Professor Dr. Mark Harris, physicist and theologian, in his essay Faith and physics states that: Physics is widely said to have a unique ability to shine light on physical reality at its most fundamental level. But in order to do so, physicists must make many assumptions. Indeed, the widespread assumption that physics is the most fundamental of the natural sciences, and that all others relate to it, is a consequence of reductionism, a metaphysical belief which can’t itself be established empirically in any direct way. Moreover, whether theorists or experimentalists, most physicists assume a form of realism –in spite of the fact that quantum physics has led to various anti-realist challenges– and a strong belief in the uniformity of nature, that physical reality is systematic, regular and patterned everywhere, and that these patterns may be understood rationally (the idea that is often expressed as the ‘laws of nature/physics’). This requires reliance on physical models to explain or summarise observations. A model is effectively a scientific metaphor, or an analogy, a way of explaining something we don’t understand in terms of something we do… The next assumption is that the uniform patterns we think we see in nature, which we try to describe using models, are universal. This means that we can eliminate local variables. For instance, in an experiment we discard the vast array of data we observe which are not universally systematic in favour of those (usually much sparser) data that are. Note that this means that we inevitably bring theoretical expectations to the lab: we can’t perform an experiment without having a pre-conceived theoretical framework already in place. This is often summarised by the famous phrase of N. R. Hanson that, ‘All data are theory-laden’. In other words, our observations come with theoretical baggage which already goes some way towards interpreting them [5].
Hence, the scientific lenses through which we understand reality are also grounded in suppositions or metaphysical beliefs because we cannot prove: materialism, realism (reality exists independent of the observer), determinism and reductionism, and that all reality can be understood by rational means. These notions certainly help us effectively interpret, understand and predict the physical world we are familiar with. There is a common belief that if something appears to be outside this worldview, it is either because: 1) We have not yet discovered the scientific explanation for it, or 2) It simply does not exist. I find the first possibility compelling, as we should indeed strive to understand the world around us. However, if we encounter phenomena that truly[^13]defy scientific explanation and challenge our established notions of reality (such as the concept of God), dismissing them as non-existent might reflect a personal bias or attachment to a specific worldview rather than an objective search for truth. I do not think that we should just abandon ourselves to all possible explanations every chance we get, but if after a thorough examination of the issue following the scientific method we remain puzzled, maybe, it is time to consider alternative perspectives.
[^13]: We cannot be sure about this.
Making Sense of UAP
Once you find true knowledge, ignorance is no longer an option. And if the knowledge you find is unusual then strange becomes a way of life. -Thomas Campbell.
The UAP issue challenges our scientific understanding in two significant ways:
1. Behavior of UAP: The behavior of UAP do not align with our current understanding of physics. This discrepancy leads many to speculate that we might be encountering intelligence and technology far more advanced than our own. This idea often implies that these phenomena could originate from a more technologically advanced civilization, potentially from somewhere else in the universe. In this regard, Lue mentions the 6 observables that should be explained (p. 156): * Instantaneous acceleration. * Hypersonic velocity. * Low observability. * Transmedium travel. * Antigravity. * Biological effects. *
2. Interaction with Humans: The way experiencers describe their interactions with UAP could challenge our materialistic worldview. This aspect introduces what I refer to as the spiritual-metaphysical component.
When I used to think about the UAP issue, I never felt the need to consider anything beyond science. I was comfortable sticking to a materialistic interpretation of the world (although I do not subscribe to it as the ultimate explanation of reality), and this was reflected in my approach to the phenomenon—I would just ignore anything metaphysical. I was aware of some of the claims but they seemed too overwhelming to process. I also thought that once we understood ‘the observables’, we would be able to explain the rest. While I have not completely changed my perspective on how to study this topic, I am now open to the idea that we need to explore the spiritual-metaphysical side in parallel.
As I was reading and Lue mentioned Robert Bigelow^14 in the first few pages, I thought to myself “Oh no, please don’t go there…” But sure enough, he did touch on the paranormal aspects later in the book. I was disappointed and felt he might be making a mistake: if he wanted to draw attention to this topic from a broader audience, focusing only on concrete data—such as sensor readings, the capabilities of the crafts, and how they seem to defy our understanding of physics—would be more effective. Introducing the more unusual aspects of the topic might turn off physicists and the scientific community, potentially leading them to dismiss the discussion.
To be fair, Lue does not imply that the phenomenon cannot be explained materialistically and it is spiritual in nature. In fact, he references Arthur C. Clarke’s idea that “any sufficiently advanced technology is indistinguishable from magic”, and he appears frustrated with the attitude of some Christian fundamentalists in government regarding this topic. But I will address this in more detail later.
I believe that Lue is intentional with his choice of words and the information he presents as he retains his security clearance. Early in the book, he mentions: Over time, my colleagues and I gained insight into how these mysterious UAP operate (p. 2). From this, I concluded: * He is signaling to a certain group. The book is not meant for beginners looking for a general overview of the UAP issue. * The spiritual-metaphysical aspect of the phenomenon is so significant that it cannot be ignored. * He may be an experiencer himself (he refers to personal experiences), and by acknowledging them, he is validating others, encouraging them to come forward.
Now that the spiritual-metaphysical part of this issue was brought front and center, I had to confront it as well, even though I had been mentally resisting it.
Remote Viewing and Orbs
Lue dedicates a whole chapter to remote viewing: Recruits were trained to spy upon enemies, but not in the usual way. Stargate trained “supersoldiers” to spy on hard targets using their psychic gifts. No, I am not kidding, this was an official US government program. They called the highly controversial technique “remote viewing.” The program, pioneered at Stanford University in the late 1960s, was led by none other than Hal Puthoff, whom I met at the dinner meeting I described earlier. Hal had been a Stanford University researcher and an employee of the NSA when he and his colleague Russell Targ were approached by the CIA and told that Russia had a remote-viewing program. The US needed to catch up and beat their efforts. That’s how it all started. Extrasensory perception had won over supporters in government who were initially dubious, then shocked that the technique worked. No one understood the mechanism. The CIA didn’t care why it worked; the only thing that mattered was that it did (p. 33). This whole story is really captivating but I was under the impression that it was unnecessary for the reader who is only interested to learn about UAP.
It turns out that Lue connects his involvement in AATIP to some unusual incidents that were occurring to him, his family and colleagues. He explains that they started seeing orbs in their homes: I was shocked to find that a lot of my colleagues and I began experiencing firsthand some of these orbs at our homes...The object behaved as if guided by some intelligence. It parked itself in the air, then drifted off down the hall before disappearing entirely (p. 68).
For those of you who do not know about orbs this is how he describes them: One of the most common types of UAP that are often reported is what we call orbs, which are small, luminous balls of light or, in some cases, smooth and metallic spheres. This is nothing new. In World War II, orbs were reported regularly in and around Allied and Axis aircraft, so much so that they were nicknamed “foo fighters” (p. 67). The orbs have been reported: by commercial pilots or military pilots or by eyewitnesses on the ground, particularly around military test ranges and sensitive US military facilities. This is not just a military phenomenon. Now, with the pervasiveness of home security systems and advancements in cell phone cameras, private civilians are capturing these orbs, just like the military is (p. 67). At this point, I was quite surprised because I remembered being part of a conversation with some colleagues in an academic setting where they expressed how much they would like to study orbs. I had no idea what orbs were, and I had never heard about them before, let alone their potential connection to UAP. Reading that chapter made a lot of things from that old conversation click into place. I wish I could go back and ask more questions about orbs, but they sounded too esoteric for my taste back then, and I was not in the right mindset to show genuine curiosity.
There is another interesting point he makes about orbs: The classification of these orbs really varies quite a bit. There are different colors and sizes; some of the colors reported were white, yellow, blue, red, and green. Reports I have seen suggested the blue orbs in particular had a very negative biological consequence, meaning if you got close to one of these, you could expect to be injured (p. 67). This example highlights that the phenomenon is not entirely harmless.
The way I see it, the connection between remote viewing and orbs in the book (not that these two are necessarily related) is that they might both be some kind of surveillance mechanism and ways to collect intel (this much information we have with remote viewing in a military context). This raises interesting questions about the nature of both remote viewing and orbs, as we venture into the blurry area between physics and metaphysics. I was under the impression that remote viewing was debunked, but Lue says that it works and is still used by the CIA, which does not care why it works but just that it does. What is going on here?
Stickiness of The Phenomenon
At the beginning of Lue’s involvement in UAP related work, he was warned that: “You should be prepared for the possibility that some of that strangeness will impact your personal life. These portfolios are sticky” (p. 12). Later, he linked this initial warning to his experience with orbs. I had heard about the Hitchhiker^15 effect but it took me a while to make the connection.
In a particularly eye-opening section of the conversation about Imminent in the podcast hosted by Post Disclosure World, the guests Christopher Sharp and James Iandoli, clearly highlight the concept of stickiness: If you engage with the phenomenon the phenomenon engages back. They raise an intriguing argument against widespread disclosure or confirmation of UAPs: There is this idea that we should not disclose because if we disclose that’s going to open a door for the phenomena to start engaging us in a much more proactive and unambiguous way. Do we want to all wake up at 3 am and see green orbs in our bedroom like Lue Elizondo and his family experience?[6]. Isn’t this a fascinating question?
There does seem to be a reactive aspect to the phenomenon. Personally, I lean towards the idea of transparency. After all, many of us have wondered whether we are alone in the universe and if human intelligence is the highest form. While the stickiness of the phenomenon might be a consequence of this new knowledge, we would eventually learn how to manage it. However, it is easier said than done. No one wants to live in fear, and this reactive part of the phenomenon appears to exacerbate that emotion. Additionally, in times of collective anxiety, there is always the risk of powers emerging “for our protection”—as Winston Churchill famously said, “Never let a good crisis go to waste.”
On the other hand, how deeply do you need to engage with the topic for it to become sticky? I am not sure. I have not had any experience myself.
I have noticed a common pattern among those who have opened up to me about their experiences: they often express confusion, shame, and fear. Many of them wish to forget what happened to them entirely. None of the experiences shared so far have been described as positive or exciting. But I recognize I cannot draw broad conclusions.
Possibilities for UAP
We sometimes get all the information but we refuse to get the message. -Cullen Hightower.
This classification is where things start to get even stranger. Physicist Dr. Harold Puthoff (mentioned several times by Lue), in his paper titled “Ultraterrestrial Models”, published in the Journal of Cosmology, states: It is currently unknown whether the phenomenon is exclusively extraterrestrial, extradimensional, crypto-terrestrial, demonic/djinn, proto/ancient human, time-travelers, etc., or some combination or mutation of any or all of these. However, it appears highly likely that the phenomenon per se is not constituted exclusively of members of the current human population [7]. At this point, I do not even want to speculate on what we are dealing with. The current information available to the public makes it almost impossible to even guess.
Professor Dr. Kevin Knuth[^16], physicist and member of the Advisory Board of the Sol Foundation, in his podcast appearance with the Scientific Coalition for UAP studies shares his thoughts to the very interesting question: How do you empirically study something where the very definition of just kind of a question mark, we don’t know what it is, it’s a phenomenon, it’s a thing, it's an object in the traditional sense at all? [Answer]: The first thing we need to do is to develop some kind of taxonomy. We need to come up with a way to classify things whether it's based on appearance, behavior and situation… We are faced with the difficulty in that there is a stigma attached to one of the hypotheses of what some of these things might be: the extraterrestrial hypothesis, which to me I don’t actually see very unlikely anymore, I think that’s actually very probable. But once you develop some kind of taxonomy then you can start to tease apart what you’re looking at and what you’re trying to study. These things aren’t clearly not all alien spacecraft: some of them are weather balloons, atmospheric phenomena that we don’t know anything about, pictures of birds…. It’s a very interesting and complicated problem, there is a lot to be discovered here. They are not just one thing… I’ll sometimes joke, I’m only interested in the ones that are craft, you cannot always tell which ones are craft and which ones aren’t, it’s not that simple…. We’re in a position where we really don’t know much at all and it really is smart to keep all the hypotheses on the table: the natural phenomena, the craft phenomena, the extraterrestrial hypothesis, the ultraterrestrial hypothesis, time travelers (from the past and future). There’s a lot of possibilities and there could be several of these hypotheses being true, which can be confounding and it'll be difficult to sort things out [8].
[^16]: https://www.albany.edu/physics/faculty/kevin-knuth https://thesolfoundation.org/people/
I know I mentioned things were getting weird, but now they are about to get even weirder. Lue recounts a conversation that left him stunned: “Lue, you know we already know what these things are, right?” …“It’s demonic,” he said to me. “There is no reason we should be looking into this. We already know what they are and where they come from. They are deceivers. Demons.” I couldn’t believe what I was hearing. This was a senior intelligence official putting his religious beliefs ahead of national security. (p. 84, 85). I guess you are not disappointed by how bizarre things have become with this twist.
I was not entirely surprised by this interpretation. I agree with Lue that a senior officer’s religious beliefs should not be more important than national security. The real question is whether this officer arrived at this conclusion purely based on his religious beliefs, or if there is additional information that is being withheld from the public and from special agents like Lue, who were investigating this topic from within the government.
Spiritual-Metaphysical Beings
Believe those who are seeking truth. Doubt those who find it. -André Gide.
Tucker Carlson shared his views, and it is worth noting his perspective because of his significant influence on public discourse. In this conversation he appears with another important public figure, Joe Rogan. Also, what Carlson says is how I expect many people to react and interpret the nature of the entities associated with the phenomenon.
Carlson says: They are spiritual beings, it’s a binary, they are either team good or team bad… The template that you’re using to understand this is, science fiction or an advanced race of beings from somewhere else but the template that every other society before us has used is the spiritual one. There is a whole world that we can’t see that acts on people, the supernatural world, it’s acting on us all the time for good and bad. Every society has thought this before ours, in fact, every society in all recorded history has thought that until, I'll be specific, August 1945 when we dropped the atom bombs in Hiroshima and Nagasaki, and all of the sudden the West is just officially secular, we’re God, there is no God but and that’s the world we have grown up. But, that’s an anomaly, no one else has ever thought that… Once you discard your very recent assumptions about how the world works, well, that kind of seems like the obvious explanation [9]. I applaud Carlson for openly talking about this, especially bringing up the spiritual beings interpretation. However, amidst the confusion, we should apply caution when listening to people who emphatically tell us with certainty what they are.
On the other hand, Dr. Avi Loeb expresses his stance on this discussion: Shawn asked whether I believe that UAPs have a spiritual component. I explained that spirituality or consciousness are likely an emergent phenomenon of complex systems, like the human brain and advanced AI systems. Their behavior is difficult to predict because they have a large number of degrees of freedom and are influenced by input from uncontrolled environments. Whether there are intelligent UAPs remains to be documented by the Galileo Project. If such UAPs exist, I would add psychologists to our research team, because they are trained to deal with intelligent systems [3].
We can analyze the nature of these beings from different angles: 1. Non-Materialistic Point of View: I have not gone into a deep level of study of the UAP beings —commonly known as aliens—but I have heard people talk about these entities. They seem to be embodied although their appearances vary. When they interact with humans, some people report both physical and psychological effects, such as body marks, paralysis, telepathic communication, missing time, memory loss, and fear. This does not suggest they are intrinsically spiritual beings, such as angels and demons (the fallen ones) from the Bible. These entities seem to have a dual nature. But one could argue that angels and demons are spiritual in essence and they also have the ability to materialize, and this observation would lead us into theological territory. This shows how easy things get messy when trying to relate something unknown with something else that we think we know. 2. Materialistic Point of View: Let’s forget all the spiritual stuff and demons, nothing of that exists, and even if it does, these entities could just be material. In this case I would say pretty much what Lue keeps repeating “any sufficiently advanced technology is indistinguishable from magic”. Maybe these creatures have learned how to access our consciousness in a way that we do not even think it is possible.
In my opinion, we are dealing with a mix of different types of entities although I cannot say anything about their ontology. I would not rule out the spiritual beings, demons, or dual nature entities interpretation. For those who have experienced encounters with these beings, sharing their experiences is crucial so we can gather enough data to better understand and categorize them[^17]. But unfortunately, there is always the fear of ridicule. We need to understand what is and isn’t part of the phenomenon. I would also like to hear what other religions and traditions think.
[^17]: Esoteric groups have already developed some taxonomy, but the information they have gathered falls into the category of revelation (by the beings themselves) rather than an accumulation of data.
Reality is merely an illusion, albeit a very persistent one. -Albert Einstein.
For example, Dr. John E. Mack^18, a renowned psychiatrist from Harvard who tragically passed away in a car accident in 2004, made significant contributions to the field. I first encountered his work through a documentary about the Ariel School UFO landing. Dr. Mack was deeply interested in speaking with the children who witnessed this traumatic event and sought to understand it. His book, Abduction, explores UFO abductions and encounters with these beings. It is important to point out that he was also a well-regarded expert on nightmares.
In an interview, journalist Ralph Blumenthal^19, who wrote a biography about Dr. Mack titled The Believer, noted that Dr. Mack's research highlighted fundamental differences between experiences of the "old hag syndrome" and UFO abductions. The former often involves reports of an evil presence that sits on the bed and causes suffocation, while abductees typically describe being given information telepathically and undergoing medical procedures.
Although these accounts are disturbing, they provide valuable insights by helping us distinguish between similar but distinct experiences. However, the question of the ontology of these beings and their origins still remains unresolved. Blumenthal adds: What are we to draw from this? Well, first of all, there is a whole kind of anomalous experiences that seem to operate in a world that we do not recognize, another reality, that penetrates our world, as John Mack said, somehow, in ways we can’t explain, we have a clear idea of reality, we think we do; reality is what you can see, smell, taste, and touch, knock on the table, feel it... So maybe there are other dimensions, aspects to the universe that we don’t understand” [10]. In addition, Professor Dr. Garry Nolan, whom I mentioned earlier, says the following: It’s interesting, religions have been dealing with extra dimensions and non-human intelligences for centuries: angels and demons, the spirits of the forest, the jinn of the Quran, etc. Where is heaven and hell? It’s another dimension. Are heaven and hell even in the same dimension? Are they different places altogether? Religion struggled with these ideas and the human mind can already encompass the possibility that they exist and had done so since the most primitive of men. That’s amazing to me [4].
This naturally leads us to ask: Are these realities and dimensions “real”? And more importantly, What do we understand by “real”?
About experiencers, Lue expresses that: In the end, abductees report feeling that these beings did not care one way or another if they lived or died. Many experiencers reported feeling completely vulnerable, helpless, and afraid. As a former special agent, if a witness reported being whisked away against their will, I would consider that an act of kidnapping, a federal crime. And if the witness said they were touched against their will, I would consider that assault, yet another crime in human terms (p. 173). I totally agree with Lue on his opinion right here.
I now think it is a mistake to rely solely on physicists, astronomers, and engineers for answers, yet that is where most people tend to focus. The phenomenon we are dealing with is not just about lights in the sky, mysterious crafts, or extraterrestrial beings. The problem is far more complex, and narrowing the scope to only the physical aspects limits our understanding. To fully grasp what is happening, we need insights from a much broader range of perspectives—psychologists, psychiatrists, philosophers, theologians, heads of different religions, anthropologists, and historians. Each of these fields offers a piece of the puzzle, whether it is understanding human consciousness, exploring ancient interpretations of similar phenomena, or delving into the spiritual implications. It is only by bringing together all of these viewpoints that we can begin to form a more complete picture of the UAP phenomenon.
Human Nature
When the student is ready, the teacher will appear. Ancient Buddhist proverb.
I also believe that we need to start looking inwards and understand our true nature—what makes us humans.
- *Materialistic Point of View: We have the poetic words of the physicist Sean Carroll, PhD: I want to argue that, though we are part of a universe that runs according to impersonal underlying laws, we nevertheless matter. This isn’t a scientific question — there isn’t data we can collect by doing experiments that could possibly measure the extent to which a life matters. It is at heart a philosophical problem, one that demands that we discard the way that we’ve been thinking about our lives and their meaning for thousands of years. By the old way of thinking, human life couldn’t possibly be meaningful if we are “just” collections of atoms moving around in accordance with the laws of physics. That’s exactly what we are, but it is not the only way of thinking about what we are. We are collections of atoms, operating independently of any immaterial spirits or influences, and we are thinking and feeling people who bring meaning into existence by the way we live our lives* [11].
- Non-Materialistic Point of View: Professor Mattias Desmet, PhD, expert on the Theory of Mass Formation expresses that: Young science, too, starts from a belief that the object being studied can be fully understood by means of logical reasoning. Facts are logical—how could they not be? However, the further the logical analysis of the phenomenon under investigation is carried, the more clearly one sees the emergence of a core that is intrinsically illogical and inaccessible to the human mind. And just like with a child, that moment gives rise to an awareness of the relativity of all logic as well as a heightened sensitivity to forms of language that don’t aim to be logically understood but lead to a more direct affinity, to resonance with the object (poetry, mysticism, etc.). In the same way, man also has to come to know himself as a psychological being, as a confluence of subjective experiences, thoughts, feelings, especially as they arise in relations with others. The ability to sense one’s own experience and to put it into words and to express it in relation to another is what constitutes the core of our existence as human beings… we exist as human beings when we can give something of our individuality to another through full speech—a kind of speaking in which something of the human being we are vibrates and resonates. It is through the art of full speech—which is the art learned, for example, in psychoanalytic therapy—that we are able to realize a real connection with others and the world around us (without thereby losing ourselves) [12].
If we truly understand who we are and how it feels to relate to each other in our human form, I think that we would be able to recognize what is not us and perhaps discern what kind of entity or intelligence is trying to engage with us. However, if we do not fully grasp our own humanity and the ways in which we are interconnected, how can we even begin to comprehend a non-human intelligence that might be more advanced than we are?
One of the most intriguing insights we have so far about the phenomenon is the possibility that this intelligence is reactive. This is one of the reasons why we need to start talking about our experiences with it. We may be part of a transformational process without even realizing it, and I also believe that this intelligence is being affected by our interaction—it is a two-way street. This is, of course, speculation.
For example, in the Christian worldview, Jesus was a non-human intelligence that transfigured His divinity when He adopted human form, altering His essence through His humanity and interactions with people. He is now both God and human. So, how are we planning to influence this other intelligence?
This process of understanding who we are and our purpose in the universe is entirely subjective, and/or revealed. This is a different kind of knowledge, —more like wisdom—, and, in my opinion, it cannot come from science. How could it? This is why I am now more inclined to consider the phenomenon from perspectives beyond the scientific. The wisdom and knowledge humanity has acquired over thousands of years will be crucial when addressing this subject.
7. UAP Intentions
Lue begins his book by discussing the Colares UAP case in Brazil during the 1970s. If you research about what happened you will see that the phenomenon engaged with humans in a very harmful way. This contradicts the belief held by some in the UFO community that these entities are here to help humanity. This belief is often linked to numerous reports of sightings near nuclear weapon sites and facilities, with the suggestion that they are trying to warn us about the dangers of nuclear technology. Moreover, Lue also talks about a case in 1982 in Ukraine: UAP flew over Byelo Air Base in the former Ukrainian Soviet Socialist Republic. Seconds later, the launch sequence for the base’s missiles switched on without any human ever entering the launch codes. Operators frantically rushed to shut the system down but could not. When the launch sequence reached its very last rung, it shut down of its own accord (p. 54). Moreover, he says that: “Adults taking matches out of the hands of children,” some say. That’s a nice hopeful thought, but reality has proven us incorrect. At no time have UAP stopped our nuclear ambitions. As examples: They did not stop us from dropping atomic bombs on Japan. UAP did not stop us from making the leap from atomic to nuclear weapons. UAP did not stop the disasters at Three Mile Island, Chernobyl, or Fukushima. UAP did not stop the proliferation of nuclear technology from getting into the hands of more nations. Most recently, UAP have not interfered with North Korean, Indian, or Pakistani nuclear testing. And switching on nuclear missiles? That is not so benevolent (pp. 54-55).
Also, Lue on multiple occasions throughout the book expresses his concerns about national security: Humanity acts as if no one else is watching us, like we are alone. But a more advanced intelligent life is likely observing us. Humanity needs to become more aware of our place in the universe and the potential consequences of our actions. Regardless of their motivation, if this tech is cracked by another nation-state with bad intentions it will be an existential threat to our nation and the planet as a whole. Those are the urgent national security concerns and urgent concerns for humanity at large (pp. 168-169).
Regarding national security, I do not believe we have enough information to assign benevolent or malevolent intentions to UAP yet. Additionally, if this is a non-human intelligence, we cannot necessarily think about it in terms of human-like intentions or motivations aimed at accomplishing a specific purpose.
That being said, I appreciate the fact that someone who was in charge of studying UAP from a national security perspective, shares his concerns and makes evaluations based on his background and experience. UAP should be closely monitored. I believe that the US Congress has already briefed on this matter specifically, and they are requesting yearly reports.
8. Psyop Hypothesis
To test a first-rate intelligence is the ability to hold two opposed ideas in the mind at the same time, and still retain the ability to function. F. Scott Fitzgerald.
We are facing a trust crisis.
A frequent argument among UAP skeptics is that the recent surge of interest in this topic could be part of a psyop (psychological operation), with the ultimate goal of instilling fear in the population to justify increased surveillance and control. This is a valid point, I have been thinking about this a lot. While I personally believe that the phenomenon is real and engaging with humans, I could also see a scenario where the phenomenon could be exploited—weaponized, even—with half-truths to serve nefarious purposes.
The pressing question then becomes: How can we discern what is real from manipulation?
After reflecting on the book, now I believe that bringing up the spiritual-metaphysical component of the phenomenon was a clever move. At the beginning I thought it was a total mistake, but I have changed my mind. If the phenomenon is used by a government or an elite group for control and manipulation, they would need a common narrative that influences people’s behavior and convinces them that they know and possess ‘the truth’. This approach might work for the material component of the phenomenon but clearly not for the spiritual-metaphysical side. What could be more diverse than people’s spiritual and metaphysical beliefs (and non-beliefs)?
If we start talking to one another about the strange experiences related to UAP, asking for opinions about their meaning and nature, and even disagreeing on interpretations, then two things could happen: 1) Through the process of open discourse, we are more likely to approach the truth, and 2) It becomes much harder for a powerful group to control the narrative. Even if such a group possesses hard evidence and attempts to use certain elements of truth to steer the public toward a specific outcome, open discussion could counteract that influence.
Regarding evidence, there is always an element of trust involved. Imagine that we are finally shown, by “official channels”, a vehicle displaying non-human capabilities: What would convince you that it is “real” and not fabricated to provoke a reaction? Who would need to validate the evidence for you to believe it? The government? Which government (don’t they all have secret programs)? Independent scientists? Scientists affiliated with institutions or organizations? And what kind of institutions or organizations are truly trustworthy?
I believe that a government or elite group can never have control of what is most intimate to a human: their subjective experiences and the meaning they attach to them which is an individual process. This is why we should not allow a particular faith, tradition, or worldview to dominate or lead the discourse related to the spiritual-metaphysical aspects of the phenomenon. Even if you believe there is no such component, you should still have a voice. This is what we, the people, can control—because we are not the ones trying to reverse-engineer retrieved craft in our backyard, but we may have an intuition about the kind of intelligence we might be dealing with. Therefore, we need to start having these conversations, open to all hypotheses, so when disclosure happens (if it does), whether real or fake, it will not catch us off guard.
9. Conclusions
The opposite of a correct statement is a false statement. The opposite of a profound truth may well be another profound truth. -Niels Bohr.
Lue was a human who found himself in a very strange position. His decision to come forward has been complicated to digest because he is not the usual whistleblower we are used to seeing. Unlike many, he still retains his security clearance and speaks carefully, only about what is not classified. This unique position makes Lue different from typical whistleblowers. Even for those who are not interested in the UAP topic, Lue argues that it is still worth considering how taxpayer money is being used and whether resources are being properly allocated to investigate these sightings and encounters. Whether or not you are personally invested in this subject, the implications for national security and public accountability are real concerns that deserve attention. By coming forward, Lue has opened up a wide range of discussions, not only about the nature of the UAP phenomenon itself but also about the role of transparency in government and the public’s right to know.
Personally I find this topic fascinating. There are many angles to explore and here I chose to focus on the dual nature of the phenomenon, with special attention to the spiritual-metaphysical component. I understand this can also be frightening given all the possibilities we are faced with when considering the phenomenon’s nature. I have faith in humanity, and whatever we find on the other side, I am sure we can handle it. Moreover, during this time of many questions and very few answers, we should learn to embrace the discomfort of not knowing.
Despite the fear of the unknown, there is also the potential for great discoveries. If we are to fully engage with the phenomenon, we have to address not just the external mystery, but also the internal one: it seems like the phenomenon interacts with us on a deeply personal and psychological level, challenging our established ideas about the nature of reality. Understanding ourselves might be a crucial step toward understanding whatever this phenomenon represents because we are the ones extracting meaning. Maybe it is not just about figuring out what the phenomenon is, but why it engages us in the way it does—and that starts with a deeper exploration of our own human experience.
If this topic resonates with you, there are many ways to keep the conversation going: ask others for their thoughts, share your own experiences, and explore the multiple perspectives surrounding the issue. The more we talk openly about UAPs, the harder it will be for any narrative—governmental or otherwise—to control our reactions. This is not just about the phenomenon; it is about our collective right to transparency, understanding, and the courage to face the unknown together as a species.
There are many topics I would have liked to cover, and I know I am only scratching the surface of what has been discussed for years—but at last, I have arrived.
10. References
[1] Elizondo, Luis. Imminent: Inside the Pentagon's Hunt for UFOs: the Former Head of the Program Responsible for Investigating UAPs Reveals Profound Secrets (p. 19). HarperCollins. Kindle Edition.
[2] Pentagon’s UFO investigator breaks two year silence:
[3] For the Love of the Unfamiliar by Avi Loeb: https://avi-loeb.medium.com/for-the-love-of-the-unfamiliar-9d9a7612bd8e
[4] Garry Nolan on UFOs, Neil deGrasse Tyson, and Eric Weinstein:
[5] Pritchard, Duncan; Harris, Mark. Philosophy, Science and Religion for Everyone (pp. 17-18). Taylor and Francis. Kindle Edition.
[6] Elizondo’s Imminent Round Table:
[7] Ultraterrestrial Models by H. E. Puthoff, Ph.D.: https://thejournalofcosmology.com/Puthoff.pdf
[8] Kevin Knuth on Studying Scientific Anomalies, Simulating Star Systems, & Possible UAP Origins:
[9] When Tucker Carlson Changed His Mind on Aliens:
[10]: The Harvard Psychiatrist Obsessed with Alien Abduction:
[11]Existential Therapy from the Universe: Physicist Sean Carroll on How Poetic Naturalism Illuminates Our Human Search for Meaning: https://www.themarginalian.org/2016/05/31/sean-carroll-the-big-picture/
[12] Desmet, Mattias. The Psychology of Totalitarianism (p. 223, pp. 225-226). Chelsea Green Publishing. Kindle Edition.
-
@ 38ac7015:fe02463a
2024-09-17 19:11:49- Si te pasas el tiempo persiguiendo mariposas, se irán volando. Pero si dedicas tiempo a crear un jardín bonito, las mariposas vendrán. No persigas, atrae.
- No preguntes como iniciar. Inicia y luego pregunta como mejorar.
- No busques secretos cuando lo que necesitas son repeticiones.
- La mitad de los problemas de esta vida pueden atribuirse a decir que SÍ demasiado rápido y no decir que NO lo suficientemente pronto.
- Mantén tu atención totalmente centrada en lo que realmente te concierne, y ten claro que lo que pertenece a los demás es asunto suyo y no tuyo.
- Puede parecer difícil al principio, pero todo es difícil al principio.
- Cambia. Pero empieza despacio, porque la dirección es más importante que la velocidad.
-
@ c73818cc:ccd5c890
2024-09-17 19:11:08😟 Indagini aperte sulle nomine della SEC sotto la guida di Gensler, sospettato di aver favorito candidati per motivi politici
😞 Accuse di favoritismo nelle assunzioni
😟 Una lettera inviata dai comitati della Camera accusa Gensler di aver scelto dipendenti della SEC in base alle loro affiliazioni politiche. Il caso più eclatante riguarda il dott. Haoxiang Zhu, la cui nomina avrebbe coinvolto rassicurazioni sul suo allineamento politico.
😞 Potenziali violazioni della legge federale
😟 Secondo i legislatori, l’assunzione di Zhu potrebbe violare il Civil Service Reform Act del 1978, che vieta la discriminazione nelle assunzioni basata sull'affiliazione politica. L’indagine riguarda numerose assunzioni effettuate sotto la guida di Gensler.
😞 Un clima politico incandescente
😟 Mentre Gensler affronta le critiche per le sue scelte di personale, continua a essere al centro delle polemiche per la sua gestione della regolamentazione delle criptovalute. Il suo futuro alla SEC potrebbe essere incerto, con possibili cambiamenti in arrivo dopo le elezioni.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Gensler #GaryGensler #SEC #Assunzioni #Indagini #Accuse #KamalaHarris #Cripto #Bitcoin
-
@ df478568:2a951e67
2024-09-26 02:11:59One way to mitigate the risk of a Password breach is to stop using passwords and start using randomly generated passphrases. A passphrase is a combination of words. A good example can be found on the EFF dice words website. For most applications, they suggest using 6 words randomly chosen by rolling 5 dice. Each word has a corresponding combination of 5 numbers from. 1-6. In other words, they are generated by dice(That's D6 dice for all the nerds out there)Here is an example of a strong passphrase that is easy to memorize.
pacifist-area-unfiled-demeaning-rundown-oblivion
It would take a computer about 200 ocrodecillion years to brute force this passphrase so it is highly unlikely to get cracked before the sun goes all supernova.
Here's how it works: - Step 1: roll 5 dice
- Step 2: Find the coresponding word: In this example, our dice rolls are 2-6-1-3-1
- Step 3: Find the coresponding word in the eff dice roll list:
- Repeat this 6 times.
- Step 4: Write this down on paper. I like waterproof paper made by Rite in the Rain. This is not an affiliate link. I don't make any money off of them. I just like them because they are waterproof and easy to hide. You can also etch the password on military grade steel.
- Step 5: Use this password password for your passphrase manager like Vaultwarden.
Each character is really a binary number so your passphrase is just a big random number to the computer. This number is hashed with SHA256 or something. If you're really smart, you can calculate this with a pencil and paper, but I use computers and calculators. Xorbin is one of the easier tools, but this can be done in bash using the hash library too. Be aware, typing an actual passphrase you use into any website might be a phishing scam. Don't try to use this for anything you are worried about losing.
Here is the hash we get from the 6 words above:
a41c5312e2957462f9f81597088c1c943c11e864b462cddf49dc55145707b69a
Sweet, Sweet Salt
. If you don't want to hassle with running your own server, bitwarden does the same thing. Last I checked, they only charged $10.00 a year for the premium plan, but it might have changed. They both allow you to: - Create passwords and passphrases. - Add special characters, numbers and capital letters. - Check if your password was pwned.
For example, "password1" was breached 3,339,722 times. If this is your password, you might want to change it.
"Blink-182" was breached 1,810 times. This password would meet most policies. It has a capital letter, special character and a 3 numbers. Where did we go wrong? Blink 182 is a popular punk band. Of course 1,810 people and one hacker thought of this. Think your safe if you change a number? Think again. "Blink-183" was pwned 16 times. Changing the numbers are also not a good idea due to possible dictionary attacks.
I run my VaultWarden using Start9 and it is also available on Umbrel and Yunohost
Let's try our six word passphrase we created earlier.
"pacifist-area-unfiled-demeaning-rundown-oblivion"
This password was not found in any breaches. It should be safe to use. Well...except I put it on the clear net, but you get the idea.
Other Risks
Okay, we have a strong password, but that's not the only threat. A bad guy could trick us with a spear phishing attack or someone installs a keylogger onto our computer. Now what do we do? Be prepared like a boyscout. This is where it's a good idea to use 2fa or two-factor authentication. I like Aegis There are others like Google Authenticator or physical devices like YubiKeys, but I like Aegis becauseyou can create backups. YubiKeys were cool, but this happened and I'm not sure if that's been resolved yet.
Securing your login with 2fa means one password us an insufficient amount of information to gain access to your account. The attacker would need to pwn the password and your phone to gain access. While not impossible, this is much more difficult.
Here's a Dad joke created by the Duck Duck Go's free AI chatbot.
`Why did the password go to therapy?
Because it was feeling a little "insecure".`
✌️ https://marcleon.work/pgp
862,887
-
@ f196850e:79178e07
2024-09-17 18:14:34https://forex-strategy.com/2024/09/17/why-is-it-necessary-to-reduce-the-population-of-the-earth-the-real-reason/ Why is it necessary to reduce the population of the Earth? The real reason!
usa #georgia #population #billgates #wef #politics #climatechange
-
@ 4c96d763:80c3ee30
2024-09-17 17:18:16Changes
Ken Sedgwick (2):
- Supply default timeline for mobile app if empty
- Read android args from config file on device
William Casarin (17):
- Merge 'Supply default timeline for mobile app if empty' (#285)
- args: add --textmode
- args: add datapath argument
- img: remove loading spinners
- split is_mobile to is_narrow and is_oled
- android: launch with initial options
- Switch to Columns
- fix some rebase issues
- fix crash in selected columns
- Flexible routing
- Merge 'Read android args from config file on device' #298
- accounts: use column nav for account management
- cleanup: remove account switcher widget
- nav: fix accounts nav animations
- ui: hook up relay management view
- Merge 'Accounts and Relay nav #307'
- Merge 'display kind 6 repost impl #302'
kernelkind (11):
- remove global popup conception
- narrowize account management view
- narrowize account login view
- add RoutableWidgetState conception
- add LoginState to app
- make AccountManagementView stateless
- implement stateful account management view
- fix flickering on account switch
- cargo update
- kind 6 repost impl
- add suggested changes
pushed to notedeck:refs/heads/master
-
@ c73818cc:ccd5c890
2024-09-17 16:51:16🌟 Il piano di stimolo economico cinese potrebbe influenzare drasticamente Bitcoin e il mercato globale delle criptovalute, creando nuove opportunità e rischi per gli investitori.
🌟 Voci insistenti indicano che la Cina sta preparando un massiccio piano di stimolo da 1,4 trilioni di dollari per rilanciare la propria economia. Un'iniezione di capitale di tale portata potrebbe svalutare la valuta cinese, spingendo gli investitori a rifugiarsi in asset come Bitcoin per proteggere i loro fondi.
🌟 L’aumento della liquidità globale grazie allo stimolo cinese potrebbe favorire l’adozione di criptovalute su larga scala, rafforzando la posizione di Bitcoin. Se Pechino dovesse allentare le sue restrizioni sulle criptovalute, questo potrebbe scatenare una maggiore adozione del Bitcoin in Asia e influenzare i mercati internazionali.
🌟 Il piano di stimolo rappresenta sia un'opportunità che un rischio per gli investitori in criptovalute. Mentre potrebbe portare Bitcoin a nuovi livelli, la volatilità del mercato resta alta. Gli investitori dovrebbero adottare un approccio prudente, diversificando i loro portafogli e monitorando attentamente le decisioni della Cina.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Cina #Dollari #Moneta #Economia #Pechino #Restrizioni #Asia #Cripto #Bitcoin
-
@ f196850e:79178e07
2024-09-17 14:52:34https://forex-strategy.com/2024/09/17/trump-and-kennedy-are-revolutionizing-the-food-industry-if-elected/ Trump and Kennedy are revolutionizing the food industry if elected
usa #trump #kennedy #food #politics
-
@ c73818cc:ccd5c890
2024-09-17 12:20:27🌟 L’ex CEO di FTX denuncia pregiudizio giudiziario e irregolarità nel processo
🌟 Sam Bankman-Fried, fondatore dell’exchange FTX, ha fatto appello contro la condanna per frode e la sentenza a 25 anni di carcere. Bankman-Fried accusa il giudice Kaplan di pregiudizio e sostiene che non gli è stata data la possibilità di presentare una difesa adeguata. Il ricorso, depositato il 12 settembre, punta a ottenere un nuovo processo.
🌟 Nel ricorso di 102 pagine, Bankman-Fried denuncia il pregiudizio del giudice e il rifiuto di ammettere prove che avrebbero dimostrato la possibilità per i clienti di FTX di recuperare i fondi. Secondo il fondatore di FTX, queste decisioni hanno distorto la percezione del processo, impedendogli di difendersi correttamente.
🌟 L'appello sottolinea anche il conflitto di interessi dello studio legale Sullivan & Cromwell, coinvolto nel fallimento di FTX. Bankman-Fried accusa lo studio di averlo spinto a dimettersi come CEO e di aver collaborato con i procuratori, influenzando negativamente l’esito del processo.
🌟 Condannato per frode e riciclaggio di denaro, Bankman-Fried lotta per ribaltare la sua sentenza, ma le possibilità di successo sono ridotte. La sua ex collaboratrice, Caroline Ellison, ha testimoniato contro di lui e attende la sua condanna, prevista per il 24 settembre, dopo aver cooperato con la giustizia.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #SBF #SamBankmanFried #SamBankmanFraud #FTX #Frode #Riciclaggio #Binance #CZ #Ellison #CarolineEllison #Cripto #Bitcoin
-
@ cb084639:2f16502a
2024-09-17 10:09:23รีวิวงาน #TBC2024 สไตล์ #Richter
เรื่องมันเริ่มมาตั้งแต่ช่วงที่ทาง
npub1ejn774qahqmgjsfajawy7634unk88y26yktvwuzp9kfgdeejx9mqdm97a5
ประกาศขายตั๋วงาน TBC2024 และได้ยินมาว่า จะเปิดรับ อาสาสมัครมาช่วยงาน ตั้งแต่วันนั้นก็คิดมาตลอดว่าอยากจะช่วยงานแต่ไม่รู้จะช่วยอะไรดี อย่างน้อยก็ช่วยทำในสิ่งที่ช่วยได้แล้วให้คนที่เราไปแทนได้ไปทำหน้าที่ที่ดีกว่า ก็ถือว่าเป็นการสนับสนุนส่วนหนึ่ง ก็ยังดี เพราะภาพจากปีที่แล้วมันลอยเข้ามา เราเองก็มางานคนเดียวไม่รู้จักใครเลย ได้เห็นพี่นิวและคุณนิ่ม ที่อยู่ร้านขายเสื้อแบบยุ่งมากๆ ถ้ามีคนมาช่วยเพิ่มก็คงดี พอดีเลยที่ทีมงานจับเราลงตำแหน่งนี้ จึงมีโอกาสได้มาช่วยงาน และรู้สึกเป็นเกียรติที่ได้ร่วมงานครับ ขอบคุณทุกคนที่ได้มาเจอกันในงาน ผมอาจจะไม่ได้พูดถึงทุกคนแต่ แค่มองตากันก็เข้าใจแล้ว เจอกันเยอะมากๆ ถ้าใครได้ผ่านร้านขายเสื้อก็จะเจอผมอยู่ตรงนั้น มีเพื่อนๆแวะเวียนมาทักทาย พูดคุย มาป่วน 😄😄 ประโยคที่ส่วนมากจะได้ยินเวลาผมทักทายไม่ใช่ว่าชื่ออะไรนะ ผมจะถามว่า กินข้าวยัง กินอะไรหรือยัง มันอาจจะเป็นคำง่ายๆ แต่มันแฝงไปด้วยความห่วงใยกัน บางคนเห็นไกลๆได้แต่สบตาแล้ว พยักหน้าให้กัน เหมือนทุกคนในงานเป็นเพื่อน เพื่อนที่พูดจาภาษาเดียวกัน ไม่รู้จะบรรยายออกมายังไงมันรู้สึกดี อิ่มเอมไปหมด ได้แนะนำสินค้า ได้มองเห็นกลุ่มเพื่อนคุยกันสนุกสนาน มันเป็นบรรยากาศที่ดีเลยทีเดียว เอาเป็นว่าเป็นประสบการณ์ที่ดีมากๆ เมื่อเทียบกับปีที่แล้วเลยแหละครับ ขอบคุณ อ.ตั๊ม แม่โบว์ npub1ejn774qahqmgjsfajawy7634unk88y26yktvwuzp9kfgdeejx9mqdm97a5
ที่ให้โอกาสได้ร่วมงาน ขอบคุณเฮียโต้ง สำหรับหนังสือและขนมแสนอร่อยที่เอามาให้เราได้จับจ่ายกัน ขอบคุณ เพื่อนทุกคนที่เข้ามาทักทายกัน ขอบคุณลูกพี่สมนึกหัวหน้าแก๊งค์ร้านเสื้อ พี่แองจี้ แฟนพี่สมนึก แฟนพี่ตั้ม และทีมงานน้องเอิ้น ที่ช่วยขายของ รักทุกคน
siamstr #siamstrog #nostr
-
@ a012dc82:6458a70d
2024-09-17 07:03:14Table Of Content
-
Nostr: A new player in the social media space
-
The Problems with Existing Social Media Platforms
-
How Nostr is Different
-
The Features of Nostr
-
The Benefits of Nostr
-
The Future of Nostr
-
Conclusion
-
FAQ
Social media has been an integral part of our lives for more than a decade now. From Facebook to Instagram, and Twitter to Snapchat, social media platforms have revolutionized the way we communicate and interact with each other. However, as these platforms continue to grow, they have also become breeding grounds for misinformation, hate speech, and cyberbullying. The need for a new social media platform that addresses these issues has never been more pressing. Enter Nostr, a new social media platform that promises to revolutionize the way we interact with each other. In this article, we explore why Nostr might be the future of social media as we know it.
Nostr: A new player in the social media space
Nostr is a new social media platform that has been making waves in the social media space. Founded in 2021, Nostr aims to be a platform that is different from the rest. Unlike other social media platforms, Nostr focuses on creating a positive and safe environment for its users. The platform is designed to encourage meaningful conversations and connections between users.
The Problems with Existing Social Media Platforms
Existing social media platforms have several problems that have been well documented. The platforms have become echo chambers, where people are only exposed to information and opinions that align with their own beliefs. This has led to a rise in polarization and the spread of misinformation. Additionally, social media platforms have become breeding grounds for hate speech, cyberbullying, and harassment. The lack of moderation on these platforms has allowed these problems to fester and grow.
How Nostr is Different
Nostr is different from existing social media platforms in several ways. Firstly, Nostr is designed to be a positive and safe environment for its users. The platform has a strict code of conduct that prohibits hate speech, cyberbullying, and harassment. Additionally, the platform has a robust moderation system in place that ensures that users who violate the code of conduct are dealt with swiftly.
Secondly, Nostr is designed to encourage meaningful conversations and connections between users. The platform is designed to be an antidote to the echo chamber effect that is prevalent on existing social media platforms. Nostr users are exposed to a variety of opinions and viewpoints, which helps to broaden their horizons and foster meaningful connections.
The Features of Nostr
Nostr has several features that set it apart from existing social media platforms. These include:
1. Privacy: Nostr is designed to be a privacy-first platform. Users have complete control over their data, and no data is shared with third parties without the user's explicit consent.
2. Moderation: Nostr has a robust moderation system in place that ensures that the platform is a safe and positive environment for its users.
3. Groups: Nostr has a group feature that allows users to connect with like-minded people and have meaningful conversations.
4. News Feed: Nostr's news feed is designed to be a diverse and engaging space. Users are exposed to a variety of opinions and viewpoints, which helps to broaden their horizons.
The Benefits of Nostr
Nostr has several benefits that make it an attractive alternative to existing social media platforms. These include:
1. Positive Environment: Nostr is designed to be a positive and safe environment
2. Privacy: Nostr puts privacy first and ensures that users have complete control over their data. This is in contrast to other social media platforms that have faced criticism for their handling of user data.
3 . Meaningful Connections: Nostr's emphasis on meaningful conversations and connections makes it an attractive alternative to existing social media platforms. Users are exposed to a variety of opinions and viewpoints, which helps to foster connections and broaden horizons.
4. Diverse News Feed: Nostr's news feed is designed to be a diverse and engaging space. Users are exposed to a variety of opinions and viewpoints, which helps to combat the echo chamber effect that is prevalent on other social media platforms.
The Future of Nostr
Nostr has the potential to be the future of social media as we know it. With its focus on creating a positive and safe environment for users, Nostr addresses the problems that have plagued existing social media platforms. Its emphasis on meaningful connections and diverse perspectives helps to combat the echo chamber effect that is prevalent on other platforms.
Nostr's privacy-first approach and robust moderation system set it apart from other social media platforms. As users become more concerned about their privacy and the impact of social media on their mental health, Nostr's approach may become increasingly attractive.
Conclusion Nostr may be the future of social media as we know it. With its emphasis on creating a positive and safe environment for users, Nostr addresses the problems that have plagued existing social media platforms. Its focus on meaningful connections and diverse perspectives helps to combat the echo chamber effect that is prevalent on other platforms. As users become more concerned about their privacy and the impact of social media on their mental health, Nostr's approach may become increasingly attractive. If Nostr continues to grow and develop, it may become a significant player in the social media space.
FAQ
Is Nostr available worldwide? Yes, Nostr is available worldwide.
How does Nostr differ from other social media platforms? Nostr is different from other social media platforms in several ways. It focuses on creating a positive and safe environment for users and encourages meaningful conversations and connections between users. Nostr also has a privacy-first approach and a robust moderation system.
Is Nostr free to use? Yes, Nostr is free to use.
Can businesses use Nostr for marketing purposes? Yes, businesses can use Nostr for marketing purposes, but they must follow the platform's advertising guidelines.
Does Nostr have a mobile app? Yes, Nostr has a mobile app available for both iOS and Android devices.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 502ab02a:a2860397
2024-09-17 03:02:24เหนื่อยกาย อาบน้ำก็หาย ความประทับใจ มันจะประทับไปอีกนาน
น้ำนี่มีประโยชน์กับมนุษย์สูงมาก โดยเฉพาะน้ำใจ
Thailand Bitcoin Conference 2024 ที่ผ่านมา 2 วัน 14-15 september 2024 block 861367 เป็นงานที่ตอนนี้ผมนั่งตกตะกอน บันทึกไว้ใน long form ของ YakiHonne ที่ต้องขอบคุณมากๆ เพราะคุณ Wendy มาที่บูธผม หลังจากแนะนำตัว ผมบอกว่าใช้ YakiHonne อยู่ คุณ Wendy ถามว่า user ชื่ออะไร พอเปิดแอพถึงแค่หน้า feed ที่มีรูปผมกลมๆเล็กมุมขวาบน ยังไม่ทันกดเมนู profile เพื่อแสดงชื่อ คุณ Wendy ก็ชี้รูปแล้วบอก i know you ทันที ซึ่งน่าตกใจและประทับใจมากๆ
ใน YakiHonne ผมมีหัวข้อ ”เจอนี่“ ที่เอาไว้บันทึกเรื่อง เจอนี่ อยู่แล้ว การที่ได้เจอ ชาวบอทคอยน์,ทุ่งม่วง และ Wendy จึงเหมาะกับคอลัมน์ เจอนี่ที่สุดแล้ว
หลังจากแผน Mission unknown ลุล่วงไปได้ มี error ไว้ให้แก้บ้างซึ่งวางแผนสองไว้แล้ว แต่ก็เหนือความคาดหมาย จาก Mission unknown กลายเป็น Mission Impossible ไปด้วยการทำ world records ของตัวเอง 2 วันซ้อนคือ 64ก้อน ภายใน 2 ชั่วโมงในวันแรก และ 80ก้อน ภายใน 50นาที (8:30-9:20) วันที่สอง
เรื่องเค้ก เดี๋ยวไปสวมหมวกกุ๊กเขียนในตำรับเอ๋บนสื่อมาร์กนะครับ ในนี้ผมอยากบันทึกเรื่องคอมมูทุ่งม่วงมากกว่า
ต้องขออภัยที่ไม่ได้แทกหรือระบุชื่อใคร เหมือนตอนซื้อสติกเกอร์อะครับ ผมรักพวกคุณเท่าๆกันหมดเลย กลัวว่าเอ่ยชื่อไม่หมดผมเองจะเสียใจ
ครั้งนี้เป็นครั้งแรกที่ผมได้เจอชาวทุ่งม่วง ขอบคุณที่แนะนำตัวกันด้วยชื่อในทุ่งม่วง ไม่งั้นนี่ผมต้องไปไม่เป็นแน่ๆครับ โชคดีที่ชาวทุ่งม่วงมารวมกระจุกตัวที่ตลาดสายฟ้า ขอบคุณ มิก ที่เป็นแม่เหล็กดูดคนไว้ไม่ให้ไปไหน จนฝั่งทุ่งม่วงคาเฟ่ของเรา กลายเป็นจุดรวมพลคนทุ่งม่วงไปเลย
ตามที่ตั้งใจไว้ครับ ว่าชีวิตผมหลังจาก 31 กรกฎาคม 2567 จะเป็น chapter ใหม่ ของการใช้ชีวิต ผมจะพยายามหลอมรวมทรัพยากรที่มีค่าที่สุดในโลกที่เรียกว่า “เวลา” มาใช้จ่ายให้คุ้มที่สุด หลังจากที่เลือกหันหลังให้อาชีพที่หลายๆคนมองว่ามั่นคง แต่มันดูดเวลาผมไปแทบจะหมดตัว จนตัวเองมองว่า ทรัพย์ในมือเราแท้ๆ จริงๆแล้วเวลามันอยู่ในกระเป๋าเรา ตัวเราเองไม่ใช่เหรอที่หยิบมาจ่ายออกไป เราเลือกจะจ่ายให้กับอะไรไม่รู้ แทนที่จะจ่ายให้คนที่เรารัก นี่มันสุรุ่ยสุร่ายนี่หว่า
ดังนั้น
ผมกลับมาใช้บั้นปลายชีวิต ด้วยการจ่ายที่มีคุณค่าขึ้น ผมเรียกการใช้จ่ายนี้ว่า spend time ยิ่งเหลือน้อยยิ่งต้องใช้แบบมีคุณค่า ผมไม่ได้ออมเวลามาตั้งแต่วัยรุ่น ผมเลยไม่มั่งคั่งในเวลา นี่จะ 50 อยู่รอมร่อ ถ้าคำว่า make saving great again ไม่ผ่านหูผ่านตามา ผมคงไม่ save time เพื่อเอาไป spend time ที่มีคุณค่าได้ครับ เรียกว่า กลับตัวยังทันในวันที่มีลมหายใจ จึงเลือกที่จะ ประหยัดเวลาเพื่อเอาไปใช้จ่ายกับสิ่งที่มีคุณค่า
ความอบอุ่นที่ได้รับจากคอมมูนิตี้ มันมีพลังมากๆเลยครับ ไม่ผิดกับที่คาดไว้หลังจากได้อ่านมาจากหลายๆอีเวนท์ที่เกิดขึ้น
เหมือนที่ยืนคุยกับหมอเอก กับ คุณริช ครับว่าภาพความสำเร็จของงานมันแสดงออกมาทางหน้างานนี่ละครับ ความครึกครื้น การพูดคุยกัน sats สะพัด มันเหมือนเราเห็นภาพอนาคตได้ในวันนี้ บรรยากาศแห่งน้ำใจ บรรยากาศการใช้บิทคอยน์แลกสินค้าที่มาจากความตั้งใจในการทำ ผมมั่นใจเลยว่า สินค้าตลาด lighting ล้วนเกิดจากอิทธิบาท4 แม้แต่ฝั่งเบียร์ มันมาจาก passion ทั้งนั้นเลย ภาษาบิทคอยน์อาจเรียกว่าตลาดนี้เป็นศูนย์รวมของ proof of work
นึกถึงตอนวัยรุ่น เวลาคนมีไฟมารวมกัน มันคือพลังระดับ ดวงอาทิตย์
ถ้ามันเป็นแบบนี้ตลอดไป ก็ไม่มีอะไรที่ภายในทุ่งม่วงนี้ ที่ทำไม่ได้แล้วหละครับ
ยินดีและปรีดา ที่ได้พบทุกท่านจริงๆครับ ทุกท่านกลายเป็นตัวหนังสือที่ออกมาโลดแล่นบนโลกจริงๆ ภาพในหัวตอนนี้เวลาเห็นตัวหนังสือก็จะฝังหน้าลงไป embed เรียบร้อย เหมือนแต่ละ block ที่ฝังเหตุการณ์เอาไว้
ท้ายสุด ด้วยความนิยมชมชอบในงานของกันและกัน พ่อมดคริปโต ได้มอบการ์ด prototype จากบอร์ดเกมส์ Age of Bitcoin Boardgame ให้ผมเป็นที่ระลึก ก่อนรับรางวัลที่ 1 กิจกรรม geyser ทำให้เป็น rare item ในทันที ขอบคุณ ชับบี้ มากๆครับ
ขอบคุณพี่ป้ำ เป็นพิเศษสำหรับ DM ตอนก่อนเตรียมงานและการสนทนาภาษา baker ในงานครับ
ถึงทีม Right Shift ทุกคนครับ "ผมเป็นอีกคนที่มีความสุขนะครับ" ผมในฐานะที่อยู่วงการโฆษณา ประเภท below the line และ ออกาไนเซอร์ มาก่อน ยืนดูงานแล้ว ต้องขอขอบคุณที่เหนื่อยกันนะครับ break the leg จริงๆ
ปล. ด้วยว่าส่วนตัวความจำระยะสั้นผมแย่มาก ผมมักจำด้วยภาพ ใครที่ผมได้มองหน้าบ่อยผมจะ match ชื่อไปกับหน้าด้วยเลย แต่งานนี้ information overload ทั้งขายของ ทั้งทักทาย ประกอบกับนอนน้อยมากด้วย ผมจำใครไม่ได้บ้างก็โปรดให้อภัยครับ คิดเลขยังเครื่องคิดเลขเลย
ถ้าได้เจอตามท้องถนน เรียกทักกันด้วยนะครับ ผมยินดีและอยากคุยครับ ส่วนถ้าผมเดินผ่านคุณไปทักเลยนะครับ เพราะนอกจากความจำสั้นแล้วสายตายังยาวด้วยครับ
-
@ 862fda7e:02a8268b
2024-09-16 22:59:38I was in some sort of nice romantic building and I met this nicer middle aged blonde woman who looked a lot like one of my old teachers. We got to chatting and things started moving quickly, we were going to have sexy lesbian sex but she told me she wanted me to shave my vagina before we started. I said fine, went to a bathroom and started shaving. If it meant I was going to slang some tang, I was gonna do it. It took me a long time to complete this daunting task, as I've mantioned many times before, I have a very thick and dense bush. I also wanted to make sure no hair was left behind, if my sweet lesbian lover saw that I had a hair on my vagina, she would probably freak out and call me disgusting for having a feature that naturally grows on me.
Anyways, I finished shaving my vagina and went to go meet her. Sadly, she decided to not have lesbian sex with me anymore since I took too long and she had some time to think about it. I got screwed without getting screwed. And now I had a gross hairless vagina.
I think I know why this dream occured. It's because my so called "fans" have judged me on my fan page for having hair on my vagina. Yes, I sometimes maintain it and keep it trimmed, sometimes. But sometimes I just let it go if I'm too lazy. Now the lesbians in my dreams want me to shave, and even at that, they still don't want to have sex with me. One time I remember cumming from a wet dream I had, which is very rare for me to do. I was watching 2 Japanese chicks dressed up in the school girl uniform scissor, and I remember waking up with a hard clit and it pulsated. I felt embarassed waking up, because I didn't even voluntarily masturbate but I still climaxed.
-
@ c73818cc:ccd5c890
2024-09-16 19:55:07🤕 In nome della protezione dei minori, l'Europa discute un regolamento che potrebbe obbligare le piattaforme digitali a monitorare le comunicazioni private, sollevando gravi preoccupazioni sulla privacy.
😮💨 Un Regolamento Controverso
🤕 Il Csar, proposto dalla Commissaria Ylva Johansson, prevede che i colossi digitali come Facebook e Google siano obbligati a scansionare i messaggi privati per individuare contenuti legati alla pedopornografia. Questo solleva dubbi sull’impatto sulla privacy dei cittadini europei.
😮💨 Critiche sulla Proporzionalità
🤕 Le autorità per la protezione dei dati, tra cui il GEPD, hanno espresso serie preoccupazioni riguardo al rischio di sorveglianza di massa e all’eventualità di falsi positivi, che potrebbero portare a un’intrusione ingiustificata nelle vite private degli utenti. Oltretutto vediamo usare un qualcosa di non criticabile dall'opinione pubblica, che quindi lascia campo libero all'obiettivo principale delle istituzioni, sorvegliare i cittadini.
😮💨 Lotta alla Crittografia
🤕 Le agenzie investigative spingono per ridurre la crittografia end-to-end, considerata un ostacolo alle indagini. La proroga della deroga ePrivacy fino al 2026 e le pressioni delle autorità suggeriscono che la privacy online potrebbe essere seriamente compromessa in futuro.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Csar #Meta #Google #Facebook #Instagram #SocialMedia #Privacy #Crittografia #Messaggi #Sorveglianza #Bitcoin