-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 45bda953:bc1e518e
2024-10-14 16:47:18Kaspa Empire - Ceb System - Planet Hithe III
The day was hot and the manor sounded eerily quiet compared to the hustle and commotion of the hours prior. On the estate and in the master bedroom specifically, a married pair had become parents. “He looks so much like you Domitius.” Cleolia remarked while stroking the newborn's tiny arms. “He has strong blood.” The father responded smiling fondly sitting on the bedside. A silent nurse was tidying up the apparel and instruments of labour while the couple waited patiently for her exit to have more private discourse. “I am so glad to have born you an heir my love.” Domitius stared intently at his offspring. He had no qualms neglecting obligations to his property and recessed momentarily to celebrate the occasion with his wife. “I will send for the priest, register the child as an Imperial citizen and have him scribed into our family archives, but in the meantime, you must recover. Let a servant girl take our son for a while.” She pouted a playful but exhausted look of non compliance. “You must rest.” He insisted. “How can I let him go when I only just met him? Who are you little man?” She smiled faintly and nodded. “You are right, Domitius, where are you going?” “To the fields, the slaves are behind schedule, our harvest is big and taxes are high. This war is taking it's toll, we must excel to adequately serve the Empire in these pressing times. If the tamed Osteri could only comprehend what is at stake.” Cleolia peered cautiously at the embellishment and carvings on the wooden door knowing that Sethari was standing just beyond. Domitius trailed her gaze. “Don't worry my love, he means well, at least he tries to understand the urgency of my affairs.” He stood up straitening his vest and prepared to leave the room. “Domitius, wait...” He stopped at the door. “What will you tell the priest?” Domitius paused. “I will tell him Albin... Albin Domitius Chevalier.”
He left the room and it was quiet, the help entered and swaddled the baby rocking him while Cleolia drifted between sleep and conciousness. “Albin.” She repeated to herself as deep slumber enveloped her.
Domitius and his overseer walked briskly out of the manor towards the grain fields squinting as blue Ceb light reflected off the lanscape. “I honour you on the spawn of your son my lord, I hope for a good strong boy, you will be a happy father. I am happy with Seth.” He pounded his chest softly and proudly. “Thank you Sethari, is your son walking yet?” Domitius queried. “No my lord, still crawling on his belly like a beast.” The headman was trying to make his master laugh though Domitius was in a sterner mood having a weight on conscience. “I am in no mood to jest Sethari.” Domitius suddenly clenched his fists. “Get those slaves to work, I cannot have them idling when they should be harvesting.” Sethari made a small bow to his master and started yelling at his Osteri kinsmen, threatening them with a rolled up whip he procured from somewhere inside his tunic, waving it about and cracking it in the air every so often. Domitius picked up a scythe and proceeded to cleave down large swathes of grain. This had a more compelling effect of rallying the straggling workers to action than did the whip. They all toiled together in the pale light of Ceb.
Domitius was sweating, sweating and praying for a swift victory over the Jeula Federation. Fighting his small part in a increasingly complicated war, loyal to his Empire in his own unique way even though the conflict was far from home. A powerful loyalty that cannot be bought with riches or broken by coercion. A loyalty born through inheritance and blood.
...
The priest was in a more jovial mood than usual. The break of routine was a welcome one. The birth was indeed a momentous occasion. Few things seem of much report in a small planetary expansion program. He did not even seem to mind carrying a keg full of honey mead over the rolling hills of the plantation colony. “Domitius comes to church submissions far to infrequently.” The portly man mumbled to himself while wiping the accumulated sweat from his brow. “I eat too well among all these farmers.” The habit of speaking to himself was ordinary for this man of the cloth who always felt socially disconnected from his flock, caring for their souls, protecting their dignity and general well being like a responsible patron. “I feed their spirits, they feed my body, Hahaha. Tonight I will share my good spirits! Hahahaha.” Impressed by his own sense of humour he turned to witness the majestic blue star set over the skyline. Everything turned a silvery gray hue, and then the stars broke through the atmosphere lighting his way. “Clear skies, the blessed stars guide me.” He continued on the path approaching the Domitian manor and rapped a quick knock on the side of the root cellar doors. It creaked open upwards and a tall muscular Osteri took his baggage and let him in. “Thank you Setharis, my arms are weary, ready to fall off, bless you.” Domitius looked up from his bench seat below a glowing lantern. “Good to see you Father Ecknard.” “Dispense with the formalities and bring the dispenser.” He motioned to Setharis who placed the heavy keg on a table next to an assortment of documents, quill and sealed inkpot. “You pour Setharis and I will write. Name?” Ecknard scratches his chin with the quill contemplating his seat and it’s adequacy for the prolonged exercise of scribble. “Name?” Domitius paused. “Albin Domitius Chevalier.” The priest focused, started with his calligraphic art and fashioned the name and ASN standard block height beautifully onto the family records all the while biting his tongue. “He will inherit the colonial estates, all your assets in Kaspa Prime and the parochial offices at Magar Prime. Correct?” “Yes.” Replied Domitius solemnly. “I'll soon have to amend your will and testament. I'd have to make a registry at the parish and send correspondence to Magar Prime. There would be many from the royal courts who'll send their best regards from afar when this news becomes public.” Domitius did not seem as enthusiastic as Ecknard would have liked. “What ails you Domitius?” The priest could not help but make the pun and restrained a grunted laugh inside himself.
“I wonder if we should wait before registering and announcing him to Empire.” Ecknard’s expression slowly changed to puzzlement sitting up straight, his belly pushing on the heavy table. “In the voids name why?” “I am concerned... about this war...” “It is on the other side of Magar space!” The priest interjected in astonished retort. “I know father, maybe I am just being overly cautious, but with the Magar Dominus fleet occupied at the divide I am worried about the colonies in the isolated regions.” “Surely Kaspa prime will spare no expense to our defence in the improbable event of an invasion.” “The core keepers will not allow foul play from the Jeul.” “Yes Ecknard, but the fleet is not capable because most of our ships are at the aforementioned objective!” “No, no, no. Suggesting that conflict would happen outside of the divide is practically blasphemy. I cannot imagine insubordination to the Core mandates and the Accords." Domitius remained silently astute and father Ecknard decided to not argue further with the lord. His shoulders sagged. “I will not register the boy in the Imperial records.” “Thank you father.” “What do you know that I fail to see Domitius.” The two men stared at each other from across the table. The hulking bodyguard ever present in body but semi ignorant in mind silently and intriguingly observing the discussion.
“The value of sat. It is not calculated well by the common people, no offence father.” The priest piously lifted his hand and with tilted brow motioned. “None taken.” “My son and our blood line is invested with empiric power, if opportunists become aware of his existence and being outside the Magar prime void, we might have problems here on Hithe III.” Cumbersome thoughts and machinations of the mind darkened the mood of the party. Not at all what Father Ecknard was projecting in his minds eye during his arduous walk to what he was hoping, a celebration and getting drunk with an old friend. “The war does not seem to be ending any time soon, how long shall we stall his registration?” The priest reasoned on. “Think of the rites he will not be allowed to partake in at the church. He will be like Osteri.” Ecknard gestured towards Sethari. “This is a small colony Ecknard. My son will be educated as a member of royalty, all on Hithe III will acknowledge his social standing, I am only concerned that the secret be kept from the outside worlds. He will never be considered Osteri, he will know who he is and what his position is in the greater void. When the war is over we will properly introduce him to the families, currently they would be too occupied with politic as it is, and might not offer him due ceremony as they would under more peaceable circumstances.” The priest capitulated and grabbed a mug. “Your secret is safe with me Domitius, the lack of technology on this forsaken planet is good for your purposes, seeing as the only comms service on the planet is in the church tower. That blinking comms station hounds me daily with requests for your return to Magar Prime. The high counsel want to rebalance and need your signature.” Domitius sighed and looked away as if some spectre loomed in front of him.
I swear silence on the birth my lord, though let me make a final amendment to your proposal. A bit of extra security shall I say.” Domitius filled a cup of mead for Sethari and himself, becoming more relaxed and hospitable. “I am listening.” “If the risks are as great as you assume, let us pretend for the child's sake that he is Kaspian royalty only, and not true Magar. We then continue his education to the full and not put him in a position where he could compromise himself should he be... void forbid, captured by some opportunistic prospector.” Domitius looked ponderously into his cup. “Ecknard, my son is an infant... If we have to keep the boy in the dark about the true nature of his identity, how long do you predict this war to continue?” Father Ecknard leaned forward... “I sit at the comms desk every night and listen to the chatter. This war... is going to be a long one.”
...
scifi
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 09fbf8f3:fa3d60f0
2024-10-14 15:42:04我搭建了一个网盘,国内访问速度还可以。
我买的是每月5刀的无限存储计划,只要还在使用,每天会增加1G的存储。(需要通过面板重启后赠送。)
官网
-
不要使用VPN注册,会提示欺诈风险,有可能会砍单。
-
@ 09fbf8f3:fa3d60f0
2024-10-14 15:41:08既然说是一款Web版的软件,也就是对应客户端版而开发的,如果你的歌曲都保存在NAS上,那么这款软件就非常适合你;如果你的歌曲都保存在电脑本地,那么可以直接使用客户端版的同名软件。
01
MusicTagWeb的特色 这款软件刚开始在 Github 上开源的时候,笔者就注意到了,不过当时功能还刚有个雏形、不太完善,就没有推荐给大家。经过开发者一段时间的辛勤付出,现在看来功能和管理能力基本上都已经完成了,具体的功能点和特性如下:
支持批量自动修改音乐标签 支持音乐指纹识别,即使没有元数据也可以识别音乐 支持整理音乐文件,按艺术家,专辑分组 支持文件排序,按照文件名,文件大小,更新时间排序 支持plex专辑类型,新增配置显示/隐藏字段 修复不同类型音频文件的专辑类型 新增歌曲语言整理文件 优化自动打标签匹配算法 新增智能刮削标签源,集成多个平台的标签源,按匹配度排序 支持繁体匹配,新增消息中心展示自动刮削不匹配的数据 支持保存专辑封面文件,支持自定义上传专辑封面 简单适配H5端,支持手机端访问 支持wma,wmv格式, 修复自动刮削报错停止的问题 音轨号,光盘号 格式优化,优化匹配规则 对新增的音乐文件后台自动刮削,无感知刮削。修复.ape文件读取报错的问题 新增自定义层数的整理文件,新增根据刮削状态排序,修复大写的音乐后缀名识别不到 新增数据库挂载映射
其实上面没有提到,这款软件支持从6个音乐平台刮削歌曲信息,安全起见,具体是哪6个平台笔者就不说了,感兴趣的朋友可以接着往下看,自己跑起来就知道了。
02
安装MusicTagWeb MusicTagWeb目前仅支持Docker部署,在你的NAS上,可以使用Docker和Docker Compose两种方式来部署,任选一种即可。
1、Docker方式
docker run -d \ --restart=unless-stopped \ -p 8001:8001 \ -v /path/to/your/music:/app/media \ -v /path/to/your/config:/app/data \ xhongc/music_tag_web:latest
2、Docker Compose方式
version: '3' services: music-tag: image: xhongc/music_tag_web:latest container_name: music-tag-web restart: unless-stopped ports: - "8001:8001" volumes: - /path/to/your/music:/app/media:rw - /path/to/your/config:/app/data
以上两种方式中,/path/to/your/music改成你的音乐文件夹路径,/path/to/your/config改为MusicTagWeb的配置文件路径。
03
使用MusicTagWeb 使用Docker启动MusicTagWeb后,在浏览器中使用IP+端口号打开系统,然后输入用户名和密码即可登录,默认的用户名和密码均为admin,建议登录后进行修改。
1、登录系统 Username 和 Password 均输入admin,邀请码不需要填。
2、首页主屏
主屏分成两栏(实际是三栏,还有一栏在操作的时候会显示出来),左边是音乐文件目录,右边默认是一张占位图片。
3、单个编辑/刮削歌曲信息
选择一个歌曲文件,这时候界面就是三屏了,右侧一栏变成两栏,分别显示歌曲元数据和音源搜索结果。搜索和设置完成后,点击保存信息按钮,即可完成对歌曲元数据的编辑。
最后
详细教程去官网: https://xiers-organization.gitbook.io/music-tag-web V1版够用了,V2收费的,68一个激活码。
-
@ 6bae33c8:607272e8
2024-10-14 09:03:40This will be an odd column because I missed most of the first wave of games due to Sasha’s basketball game which for God knows what reason they scheduled for Sunday at 6:30 pm (Lisbon time).
The first half was brutal, they were down 38-13, but their troglodyte of a coach shifted to a zone defense in the second half, and they made it respectable, losing 58-39. Why it took him two and a half games to do the obvious, I have no idea. They have only six players — the other teams have 12 — and you can’t chase your “man” around the perimeter all game if you don’t get a rest.
Moreover, I told Sasha, don’t guard your under-16-year-old girl “man” outside the three-point line. If she wants to shoot a long three, let her. But she said her coach says to pick them up over half court like they’re Steph Curry, and they even were full-court pressing at times! You don’t full court press with six players, you need to conserve energy. And you should see this guy, in his late-fifties. stick-skinny legs and a massive gut, totally bald, but thick hair on the sides and back of his head. Total freakazoid.
I guess he deserves credit for teaching them the zone and making the adjustment at half, but Sasha said he would revert to man “if the other team had good three-point shooters.” Retard, the team they played hit a few threes, but you live with it! Let them shoot the three, conserve energy, instead of the layups they were giving up all first half.
In any event, Sasha had eight points, probably 14 boards and was a beast on defense. More Angel Reese than Caitlin Clark, unfortunately. But she’s only 12 and a half, and the league is under-16.
In any event, I did see the late games and had all my teams lose except one, the Primetime going down because it had Marvin Harrison, Jordan Mason and Dallas Goedert all get hurt in the first half. It still put up 142 points and lost by a half a point due to Chase Brown’s late TD and then Wan’Dale Robinson’s catch on the final drive. Mercifully, I wasn’t aware of this until after it happened.
I did go 4-1 ATS finally, but I’m drawing dead in the overall Circa Millions and even Q2 after going 2-3 last week. At least I’m in first place in a double-week (last week was tied) for my home picking pool, pending the Monday night game.
-
My one loss ATS was with the Jaguars. Trevor Lawrence is terrible. The Jets really dodged a bullet by winning that Week 17 game and drafting QB1 (Zach Wilson) who they could ditch two years later. (I hear divorced wine moms in the Denver area are more satisfied and posting less often about politics on Facebook.)
-
Evan Engram really ruins it for the other Jaguars receivers — Lawrence only has eyes for him.
-
The Bears might be good. Caleb Williams spread the ball around and moved well in and out of the pocket. D’Andre Soft, who I mocked this offseason, would go in the second round if we re-drafted today. Starting to regret dropping Cole Kmet and most of my FAAB in the Steak League for Isaiah Likely.
-
I didn’t watch Packers-Cardinals, but there’s something wrong with Kyler Murray. He’s got all the weapons in the world (I know Harrison left early), and can’t make it work.
-
I like seeing the Packers spread it around since I own none of them and was mad at myself for missing out on Jayden Reed.
-
I invested in Alec Pierce this week with Michael Pittman set to go on IR and Josh Downs also iffy. Pierce was wide open on a deep shot again, though Joe Flacco missed him, but it looks like that was a waste of money. I wonder when we see Anthony Richardson again.
-
I don’t see the point of the Titans. Why do they exist? I’m just glad I have none of their players, especially Calvin Ridley.
-
I started Tank Dell over JSN this week, and that was good, but had I known I would have benched Marvin Harrison and moved JK Dobbins into the flex. Actually I would have used Dobbins over Mason and left JSN in the flex. But it’s hard to know half your team will get injured.
-
Stefon Diggs gets it done every game, but he’s yet to have a huge one. I’m happy to have him everywhere, especially with Nico Collins out, but the Texans are a slow-paced, run-heavy offense. Of course, the Patriots with their star corner Christian Gonzalez and terrible offense are not the team you get big points against in the passing game.
-
I didn’t see Drake Maye’s first start, but it looks from the box score like it was okay.
-
Baker Mayfield keeps putting up huge numbers, and the reason my injured Primetime team still did okay was Chris Godwin (WR1) who was a “hold-my-nose” Round 5 pick.
-
I had Bucky Irving in the league I won, but Sean Tucker looked better.
-
I had Chris Olave going in the Steak League. What’s annoying is another team needed to trade a RB for a WR this week, I offered him Olave for James Cook, he countered with David Montgomery, which I would have taken, but I have emails turned off for that league, so I didn’t see it until later that day. By the time I saw it (and went to accept), he had traded Montgomery to someone else. With Brian Robinson out, I started Jerome Ford and Jaylen Warren. And of course Olave got concussed.
-
I didn’t see this game, but I’m assuming Spencer was Rattled.
-
Sounds like I’m glad I missed Eagles-Browns too. The Browns are like the Titans — totally pointless aside for the Deshaun Watson massage jokes.
-
I excoriated Alan Seslowsky for advising me before the 2023 season to take Zay Flowers over De’Von Achane in my Dynasty League, but now I’m glad I have Flowers.
-
Mark Andrews would probably now get drafted in the same place he did pre-season going forward.
-
Derrick Henry is doing exactly what those who had drafted him hoped he would — lead the NFL in rushing and TDs by a wide margin now that he’s on a good team.
-
When Gus Edwards hit IR, I picked up Kimani Vidal in a couple places. JK Dobbins held up for 25 carries and two catches, but Vidal’s role should expand.
-
The Broncos offense just seems like a perpetual emergency two-minute scramble drill, totally haphazard, no rhythm.
-
I had Justin Fields going in a couple places, and his production was a minor miracle. He has no touch, throws only fastballs, even on short passes. But he’s a great scrambler, and they like to call his number around the goal line.
-
Najee Harris bulldozed the Raiders all day. We’re seeing more of those players thrive this year — Henry, Harris, Tyler Allgeier and David Montgomery, off the top of my head. Maybe as teams take away big plays and lighten boxes, the big bruising backs will have a renaissance of sorts.
-
The Raiders are bad.
-
The Lions toyed with the Cowboys in Dallas. The Aiden Hutchinson injury was brutal though, not only for him but for their Super Bowl aspirations.
-
The Cowboys are a bit like the Bengals — they let other teams take away their best player on offense so easily. It doesn’t help that they can’t run to save their lives. (CeeDee Lamb eventually got 14 targets, but they don’t know how to scheme him open.)
-
We had the Falcons in Survivor — easy peasy. I love that Younghoe Koo, after a slow start, got a garbage-time FG at the end. He’s been so reliable this year.
-
Bijan Robinson and Allgeier are like Jahmyr Gibbs and Montgomery — a 50/50 timeshare that favors the pass-catcher, but not commensurate with the gap in their respsective ADPs.
-
The Giants easily could have beaten the Bengals but they missed two FGs and got fooled on the long Burrow TD. Not that playing roughly even with the Bengals at home is something about which to write home. Burrow looks healthy at least after that run.
-
As I mentioned, it’s amazing the Bengals would only get Ja’Marr Chase six targets. And it’s not like their offense was otherwise working as they scored only 17 points.
-
Daniel Jones was okay, but there’s no real spark. He’ll make a solid backup somewhere next year.
-
Tyrone Tracy mostly got stuffed, as the Bengals defense played well against the run. He got a massive workload (17 carries, six targets) though.
-
The Giants defense is for real, even without Kayvon Thibodeaux — they had another four sacks.
-
They still show way too many replays on the 40-minute edited version. I don’t give a fuck about how the defensive lineman got into the backfield for a one-yard stuff! I don’t need to see it from every possible angle! It’s really not that impressive or exciting. They only show that during the live broadcast to kill time during huddles! You don’t need to leave that in, it’s not interesting and it undermines the entire purpose of the edited version! For whatever reason they have only 40-minute versions and five-minute highlights. There needs to be a 20-minute version that’s only the plays.This will be an odd column because I missed most of the first wave of games due to Sasha’s basketball game which for God knows what reason they scheduled for Sunday at 6:30 pm (Lisbon time).
The first half was brutal, they were down 38-13, but their troglodyte of a coach shifted to a zone defense in the second half, and they made it respectable, losing 58-39. Why it took him two and a half games to do the obvious, I have no idea. They have only six players — the other teams have 12 — and you can’t chase your “man” around the perimeter all game if you don’t get a rest.
Moreover, I told Sasha, don’t guard your under-16-year-old girl “man” outside the three-point line. If she wants to shoot a long three, let her. But she said her coach says to pick them up over half court like they’re Steph Curry, and they even were full-court pressing at times! You don’t full court press with six players, you need to conserve energy. And you should see this guy, in his late-fifties. stick-skinny legs and a massive gut, totally bald, but thick hair on the sides and back of his head. Total freakazoid.
I guess he deserves credit for teaching them the zone and making the adjustment at half, but Sasha said he would revert to man “if the other team had good three-point shooters.” Retard, the team they played hit a few threes, but you live with it! Let them shoot the three, conserve energy, instead of the layups they were giving up all first half.
In any event, Sasha had eight points, probably 14 boards and was a beast on defense. More Angel Reese than Caitlin Clark, unfortunately. But she’s only 12 and a half, and the league is under-16.
In any event, I did see the late games and had all my teams lose except one, the Primetime going down because it had Marvin Harrison, Jordan Mason and Dallas Goedert all get hurt in the first half. It still put up 142 points and lost by a half a point due to Chase Brown’s late TD and then Wan’Dale Robinson’s catch on the final drive. Mercifully, I wasn’t aware of this until after it happened.
I did go 4-1 ATS finally, but I’m drawing dead in the overall Circa Millions and even Q2 after going 2-3 last week. At least I’m in first place in a double-week (last week was tied) for my home picking pool, pending the Monday night game.
``` My one loss ATS was with the Jaguars. Trevor Lawrence is terrible. The Jets really dodged a bullet by winning that Week 17 game and drafting QB1 (Zach Wilson) who they could ditch two years later. (I hear divorced wine moms in the Denver area are more satisfied and posting less often about politics on Facebook.)
Evan Engram really ruins it for the other Jaguars receivers — Lawrence only has eyes for him.
The Bears might be good. Caleb Williams spread the ball around and moved well in and out of the pocket. D’Andre Soft, who I mocked this offseason, would go in the second round if we re-drafted today. Starting to regret dropping Cole Kmet and most of my FAAB in the Steak League for Isaiah Likely.
I didn’t watch Packers-Cardinals, but there’s something wrong with Kyler Murray. He’s got all the weapons in the world (I know Harrison left early), and can’t make it work.
I like seeing the Packers spread it around since I own none of them and was mad at myself for missing out on Jayden Reed.
I invested in Alec Pierce this week with Michael Pittman set to go on IR and Josh Downs also iffy. Pierce was wide open on a deep shot again, though Joe Flacco missed him, but it looks like that was a waste of money. I wonder when we see Anthony Richardson again.
I don’t see the point of the Titans. Why do they exist? I’m just glad I have none of their players, especially Calvin Ridley.
I started Tank Dell over JSN this week, and that was good, but had I known I would have benched Marvin Harrison and moved JK Dobbins into the flex. Actually I would have used Dobbins over Mason and left JSN in the flex. But it’s hard to know half your team will get injured.
Stefon Diggs gets it done every game, but he’s yet to have a huge one. I’m happy to have him everywhere, especially with Nico Collins out, but the Texans are a slow-paced, run-heavy offense. Of course, the Patriots with their star corner Christian Gonzalez and terrible offense are not the team you get big points against in the passing game.
I didn’t see Drake Maye’s first start, but it looks from the box score like it was okay.
Baker Mayfield keeps putting up huge numbers, and the reason my injured Primetime team still did okay was Chris Godwin (WR1) who was a “hold-my-nose” Round 5 pick.
I had Bucky Irving in the league I won, but Sean Tucker looked better.
I had Chris Olave going in the Steak League. What’s annoying is another team needed to trade a RB for a WR this week, I offered him Olave for James Cook, he countered with David Montgomery, which I would have taken, but I have emails turned off for that league, so I didn’t see it until later that day. By the time I saw it (and went to accept), he had traded Montgomery to someone else. With Brian Robinson out, I started Jerome Ford and Jaylen Warren. And of course Olave got concussed.
I didn’t see this game, but I’m assuming Spencer was Rattled.
Sounds like I’m glad I missed Eagles-Browns too. The Browns are like the Titans — totally pointless aside for the Deshaun Watson massage jokes.
I excoriated Alan Seslowsky for advising me before the 2023 season to take Zay Flowers over De’Von Achane in my Dynasty League, but now I’m glad I have Flowers.
Mark Andrews would probably now get drafted in the same place he did pre-season going forward.
Derrick Henry is doing exactly what those who had drafted him hoped he would — lead the NFL in rushing and TDs by a wide margin now that he’s on a good team.
When Gus Edwards hit IR, I picked up Kimani Vidal in a couple places. JK Dobbins held up for 25 carries and two catches, but Vidal’s role should expand.
The Broncos offense just seems like a perpetual emergency two-minute scramble drill, totally haphazard, no rhythm.
I had Justin Fields going in a couple places, and his production was a minor miracle. He has no touch, throws only fastballs, even on short passes. But he’s a great scrambler, and they like to call his number around the goal line.
Najee Harris bulldozed the Raiders all day. We’re seeing more of those players thrive this year — Henry, Harris, Tyler Allgeier and David Montgomery, off the top of my head. Maybe as teams take away big plays and lighten boxes, the big bruising backs will have a renaissance of sorts.
The Raiders are bad.
The Lions toyed with the Cowboys in Dallas. The Aiden Hutchinson injury was brutal though, not only for him but for their Super Bowl aspirations.
The Cowboys are a bit like the Bengals — they let other teams take away their best player on offense so easily. It doesn’t help that they can’t run to save their lives. (CeeDee Lamb eventually got 14 targets, but they don’t know how to scheme him open.)
We had the Falcons in Survivor — easy peasy. I love that Younghoe Koo, after a slow start, got a garbage-time FG at the end. He’s been so reliable this year.
Bijan Robinson and Allgeier are like Jahmyr Gibbs and Montgomery — a 50/50 timeshare that favors the pass-catcher, but not commensurate with the gap in their respsective ADPs.
The Giants easily could have beaten the Bengals but they missed two FGs and got fooled on the long Burrow TD. Not that playing roughly even with the Bengals at home is something about which to write home. Burrow looks healthy at least after that run.
As I mentioned, it’s amazing the Bengals would only get Ja’Marr Chase six targets. And it’s not like their offense was otherwise working as they scored only 17 points.
Daniel Jones was okay, but there’s no real spark. He’ll make a solid backup somewhere next year.
Tyrone Tracy mostly got stuffed, as the Bengals defense played well against the run. He got a massive workload (17 carries, six targets) though.
The Giants defense is for real, even without Kayvon Thibodeaux — they had another four sacks.
They still show way too many replays on the 40-minute edited version. I don’t give a fuck about how the defensive lineman got into the backfield for a one-yard stuff! I don’t need to see it from every possible angle! It’s really not that impressive or exciting. They only show that during the live broadcast to kill time during huddles! You don’t need to leave that in, it’s not interesting and it undermines the entire purpose of the edited version! For whatever reason they have only 40-minute versions and five-minute highlights. There needs to be a 20-minute version that’s only the plays. ```
-
-
@ 599f67f7:21fb3ea9
2024-09-19 08:27:12¿Qué es una dirección Lightning o Lightning address?
Una dirección Lightning es una dirección que visualmente se asemeja a una dirección de correo electrónico legible para los humanos, por ejemplo usuario@dominio.com pero que en realidad te permite recibir pagos en bitcoin instantáneos y económicos, sin la necesidad de tener un nodo en linea en tu dispositivo ni tener que generar facturas de forma manual cada vez que alguien te quiere hacer un pago.
¿Suena bien no?
¿Y cómo funciona?
Funciona utilizando el protocolo de pago LNURL.
Aquí se muestra un sencillo esquema de lo que ocurre en segundo plano.
En resumen, cuando otro usuario quiere pagarte usando tu dirección Lightning, tu billetera convierte la dirección Lightning en una solicitud de pago LNURL. Luego se utiliza esa solicitud de pago LNURL exitosa para obtener una factura BOLT11.
💡 Dirección Lightning > LNURLp > Factura BOLT 11.
Suena bien, pero ¿cuál es el problema?
Por el momento, muchas de las implementaciones de Lightning Address son de custodia, porque se necesita un dominio para que Lightning Address funcione y un nodo que esté siempre en línea para recibir los pagos. Debido a que es de custodia, el custodio puede atacarte en cualquier momento y monitorear tus transacciones.
Tienes que confiar en el propietario del dominio para no cambiar el registro de tu dirección Lightning. Y no funciona si el servidor LNURL no está en línea.
Bitcoin Txoko ofrece una sencilla solución de Lightning Address respaldada por LNbits. Esto también es de custodia, así que por favor mantén solo una pequeña cantidad en tu billetera Bitcoin Txoko y ve retirando a tu billetera de autocustodia a medida que recibas más sats.
Estoy listo, ¿qué necesito para empezar?
¡Todo lo que necesitas es un teléfono móvil o un ordenador y una conexión a Internet!
1. Creando tu billetera
Si aún no lo has hecho, navega a https://bitcointxoko.com y crea una nueva billetera. Puedes elegir el nombre que quieras.
2. Activar extensiones
Hace falta la extensión
Pay Links
para que las direcciones Lightning funcionen.Abre
Extensiones
en la barra de herramientas y activaPay Links
.3. Creando tu enlace de pago
-
En a la extensión
Pay Links
, haz clic enNew Pay Link
. -
Elige la billetera que has creado.
-
Para la descripción del artículo, puedes escribir lo que quieras.
-
Elige un nombre de usuario de tu dirección Lightning. Tu dirección Lightning se verá como
username@bitcointxoko.com
. -
Desmarque
Fixed amount
y cambia el valor mínimo a 1 y el valor máximo a 500000.
⚠️ También puedes cambiar el valor máximo a algo más alto, pero es más probable que los pagos más grandes fallen debido a la limitada capacidad de entrada del nodo Lightning de Bitcoin Txoko. Así que recomendamos mantenerlo en 500000 sats.
-
Ahora abre
Advanced options
y cambiaComment maximum characters
a 799. Este paso no es necesario pero permite más funcionalidades más adelante. -
Marca
Enable nostr zaps
en la parte inferior, para que puedas utilizar tu dirección Lightning para recibir zaps. -
Las demás opciones avanzadas son opcionales, puedes configurarlas si quieres o dejarlas en blanco.
Al final debería verse algo así.
- Cuando hayas comprobado que todo es correcto, sigue adelante y haz clic en
Create Pay Link
.
Probando
Puedes probar si tu nueva dirección Lightning funciona yendo a otra cartera, pulsando en
Enviar
y escribiendo tu dirección Lightning como destino, y luego enviándote una pequeña cantidad de sats.Vuelve a tu billetera Bitcoin Txoko y comprueba si has recibido tu propio pago. Es posible que tengas que actualizar la página.
Si todo funcionó correctamente, ¡enhorabuena! 🥳
Si no es así, háznoslo saber. Siempre estamos aquí para ayudar.
Próximos pasos
Nostr zaps
Puedes añadir tu dirección Bitcoin Txoko Lightning a tu perfil de nostr y usarla para recibir zaps. Normalmente, esto se hace yendo a
Perfil
>Editar
>Dirección Lightning
y cambiando la dirección Lightning.LNDhub
Puedes importar tu billetera LNbits como un LNDhub en tu teléfono utilizando una aplicación como Zeus o BlueWallet, en lugar de visitar la billetera en el navegador cada vez que desees comprobar tu saldo o realizar un pago. Echa un vistazo a nostr:naddr1qvzqqqr4gupzqkvlvlma7a55ccp6d5rrdc27h3ssmdmael286mjaq5uxmqslk04fqqxnzd3exuerqdfkxccnyv3cs0uvul sobre cómo hacer esto.
Código QR
También puedes compartir o imprimir tu código QR LNURLp para que la gente pueda escanearlo fácilmente con sus teléfonos. ¡Muy útil si estás introduciendo bitcoin a tu comerciante local favorito para que pueda recibir propinas Lightning!
Simplemente comparte el enlace a tu página compartida, o imprime el código QR como PDF yendo a
View Link
>Print
. -
-
@ 469fa704:2b6cb760
2024-09-02 06:11:43I joined Nostr a week ago and wanted to recap it for myself and also give other newbies a simple introduction. Maybe this will help you get started too.
Step 1: Create your identity and get your private key for a browser extension
I started with the Snort client on my local home server. It created my private/public key pair and I was good to go. Then I transferred the private key to Amethyst, a pretty good Android-based client. Before looking at various clients and other nostr-based websites, I tried transferring my private key into a browser extension. I looked at Alby and nos2x. I chose the latter because I wanted to keep my Lightning wallet separate from my identity management. You don't have to, I just found it easier.
Step 2: If you're confused, always check your feed settings
I tried many different clients and was very confused at first. Due to its decentralized nature, Nostr relies on relays, which are just small servers, and to each one you can connect to, all your data is stored. When you post a message, write a note, an article like this or simply who you follow. The main reason and benefit for this is that there is no single point of failure or server-like entity that could be censored. The side effect of this, combined with using different clients, was that not only did it look different everywhere, but the content was also very different. This was simply because I wasn't connected to all my different clients with the same relays. But the main reason why each feed looks different on each client is usually because you can choose different variations of feeds and some clients even offer filters for the feeds.
Scroll down to get a small overview of the clients I've tried.
Step 3: Set up your lightning wallet with something like Wallet of Satoshi
I made my Bitcoin Lightning wallet independent of my identity. That's why I just went with the number one Lightning wallet on the market: Satoshi's Wallet. It's very simple and provides you with a Lightning address that resembles and has the format of an email address. You can add this address to your Nostr profile description and you're ready to receive Sats. Anyone can send them to you, e.g. for a good message or something else they find valuable on Nostr (like a podcast, a video, an article, ...). Just be aware that Satoshi's wallet contains your key and the sats you have there are not really your sats. So only leave a small amount there or no more than you need for your nostr experience.
Step 4: Set up your Nostr address
I set up a unique NIP-05 identifier that is human readable and also looks like an email address. For me, that's tobiya@nostrplebs.com, also called a nostr address. It's much easier to read, share and remember than your public key, which is just a long, unwieldy string of characters.
Some popular services are: * NostrVerified * Alby * Iris * Primal * Snort * nostrplebs.com
Most offer free services or at least a free tier. I chose nostrplebs.com because it links my Nostr address (tobiya@nostrplebs.com) to my Lightning wallet. ⚡
Brief overview of the clients (I have tested)
Web/Browser:
- Primal: Fast, user-friendly, nice looking, easy to use
- Coracle: Focuses on decentralized reputation, privacy and trust metrics. Also well organized and structured
- noStrudel: The most comprehensive I've found, has everything
- Rabbit: Designed like X (Twitter) Pro, focuses on everything at once
- Nostter: Clearly structured, easy to find what you're looking for
- Snort: Fast web client for those who prefer simplicity and speed.
iOS
I'm not an iPhone user, but everything I've discovered says that Damus is the best app for iOS.
Android:
- Amethyst: Feature rich for Android, I only tried this program because it gives me everything I currently need on my phone.
- Primal: Works seamlessly with Primal on the web, which is a pretty convenient starting point if you only want to use one client.
As for the web clients, I'm still figuring out which one will be my favorite. But I think they're all good in their own way. In the time of writing, I am mainly using Primal on Android and Web, Amethyst and noStrudel.
Let's have fun!!
-
@ 3b7fc823:e194354f
2024-09-01 23:52:38I dOn'T cAre ABouT pRivAcY. IT dOEsN'T maTtER. i'M nOT dOiNg AnyThiNg wRonG.
GHOSTn
Your phone is spying on you. Your apps are spying on you. Your websites, search engine, fitness tracker, smart watch, IoT device, EVERYTHING is collecting anything it can and sending it off to be stored, cross referenced, and sold.
Data is the new oil.
So what? I don't care if Google knows I like motorcycles. By itself one data point isn't a big deal but once you start bringing everything together...
Who are you talking to? When and how long did you talk to them? Where did you go? How often do you go there? On and on the profile starts to become overwhelmingly invasive.
Right now it is extremely cheap and easy to collect and store the data but it's hard and expensive to cross reference and tabulate the data down to the individual. But in the extremely near future using AI and faster processers, data profiles for sale go from white men between 25 - 30, with this education level, and background like XYZ to -> John loves motorcycls and steak.
Suddenly your insurance premiums are way higher than your friends because you partake in dangerous activities and eat too much red meat. You get denied that loan because you invest in risky assets and it raises your risk factors to pay it back. That job that you applied to never responded because they already ran you through the algorithm and you don't fit the culture.
Protect your data and privacy now before its too late.
privacy
-
@ d42dac70:ed6cd749
2024-10-14 07:55:34NOSTR
NOSTR, heard of it yet? I have a feeling we are all going to hear about it alot more.
Notes and Other Stuff Transmitted by Relays, is a client-relay model with privacy, user control and censorship resistance at the heart of this social network protocol.
Why?
It’s a step shift in centralised social media platforms such as Twitter, Instagram that suffer from corporate and/or state influence, control and censorship. See the Twitter files to find out more about that. NOSTR addresses these with an open, private, decentralised and permission-less approach.
Public Key Encryption.
Rather than having an ‘account’ with email/username and password, and more often than not, some personal details such as telephone, and whatever personal data you wish to hand over. The protocol this on it's head and uses public key encryption. Thus all you need is the private key (which you keep safe), and you share your public key on the network. The use of public key encryption is a real strength, you own your identity, no authority has it.
Free for development:
NOSTR is open to extension and development. There is an array of clients, such as Amethyst, and Damus, amongst other, https://nostr.com/clients Anyone can build on the protocol, apps, clients, relays and tools. Only imagination will limit it.
User control:
The user has control of their audience, having the ability to choose their preferred relays. Customise your feed to what you prefer. No central algorithm deciding what you are going to get. As mentioned with the public key encryption, It allows anonymity. It’s freedom to express, without bans, shadow bans, account locks or censorship.
Simple:
In a now fragmented world of social media, the most secure, user-centric, decentralised, simple, reliable platform will have a head start to other centralised or server controlled platforms. NOSTR gives freedom and control.
-
@ a012dc82:6458a70d
2024-10-14 04:09:42Table Of Content
-
Historical July Performance
-
Predictions for July 2023
-
Other Perspectives
-
The Role of Macro Factors
-
Conclusion
-
FAQ
Bitcoin, the world's leading cryptocurrency, has had a stellar performance in June 2023, gaining 12%. Despite a last-minute dive due to a macro news event, Bitcoin managed to close the month in a solid position. The monthly close came in at $30,465 on Bitstamp, marking Bitcoin’s best June performance since 2019.
Historical July Performance
Historically, July has been a favorable month for Bitcoin. Throughout its history, Bitcoin's price action has never lost more than 10% during the month of July. This consistent performance has led many investors and traders to look forward to July with optimism.
Predictions for July 2023
However, not everyone is convinced that the bullish trend will continue into July 2023. Popular trader CryptoBullet has expressed skepticism about Bitcoin's potential price upside in July.
CryptoBullet's Analysis
According to CryptoBullet, "common sense" dictates that BTC/USD should fall below some key moving averages. He believes that Bitcoin can go to $35,000 to "hunt liquidity", but the mid-term bullish rally is likely to end in July.
The Concept of Liquidity Hunting
The concept of liquidity hunting in the low $30,000 zone is a popular theory for price continuation. This theory suggests that Bitcoin's price might continue to rise as it seeks liquidity, but the rally might not last beyond July.
Other Perspectives On the other hand, Rekt Capital, another analyst, is optimistic about Bitcoin's prospects. He anticipates a "healthy technical retest" of levels below $30,000 for Bitcoin, despite the monthly close.
Rekt Capital's Optimism
Rekt Capital suggests that even if the BTC price were to snap below that downside target, it would not be "out of the ordinary." He believes that Bitcoin is well-positioned for upside overall, which could mean a positive outlook for the rest of 2023.
The Role of Macro Factors
The performance of Bitcoin is not only influenced by its own market dynamics but also by macroeconomic factors. These include global economic trends, regulatory developments, and technological advancements. These factors can have a significant impact on investor sentiment and market dynamics.
Conclusion As we move into the second half of 2023, the question remains: Will this year prove to be an exceptional one for Bitcoin? The answer largely depends on market dynamics, investor sentiment, and macroeconomic factors.
Investors and traders are advised to conduct their own research and consider multiple perspectives before making any investment decisions. After all, every investment and trading move involves risk. The performance of Bitcoin in July 2023 and the rest of the year will undoubtedly be closely watched by the global crypto community.
FAQ
How did Bitcoin perform in June 2023? Bitcoin gained 12% in June 2023, closing the month at a solid position of $30,465 on Bitstamp.
What is Bitcoin's historical performance in July? Historically, Bitcoin's price action has never lost more than 10% during the month of July.
Will 2023 prove to be an exceptional year for Bitcoin? The answer largely depends on market dynamics, investor sentiment, and macroeconomic factors. Some analysts predict a slowdown in Bitcoin's price rally, while others remain optimistic about its prospects.
What is liquidity hunting? Liquidity hunting is a theory suggesting that Bitcoin's price might continue to rise as it seeks liquidity. However, this rally might not last beyond a certain period.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ bcbb3e40:a494e501
2024-08-16 18:00:07El hombre y el contexto
El pensamiento tradicionalista español cuenta con una amplia trayectoria en la que concurren personajes, situaciones e ideas gestadas en el transcurso de dos siglos, en los que debemos distinguir el conflicto dinástico y el papel del legitimismo de la propia doctrina, que es algo que se construirá en el tiempo, con la contribución de figuras como el protagonista de este escrito, Don Juan Vázquez de Mella, así como por la confluencia de fuerzas de diferente signo que tiene lugar a lo largo del siglo XIX y la consolidación del Estado liberal, que lo hará siempre en lucha abierta contra las peculiaridades y el carácter genuino del pueblo español. Vázquez de Mella, nuestro autor, quizás represente la consolidación y madurez doctrinal del movimiento tradicionalista español, uno de sus primeros y más brillantes sistematizadores. No se destacó por una obra extensa ni especialmente difundida más allá de sus discursos, de sus artículos en periódicos y sus escritos dispersos, los cuales fue capaz de dotar de una especial significación y dignidad fruto de su enorme carisma y especial clarividencia para dar una forma definida y meridianamente clara a las ideas y doctrinas que nutrieron el tradicionalismo español madurado al calor de las armas, de las tres guerras que el carlismo libró contra el liberalismo español.
|
| |:-:| |Juan Vázquez de Mella|
Nuestro autor, de origen asturiano, y nacido en Cangas de Onís un 8 de junio de 1861, ha mantenido vivo su prestigio y el valor de sus aportaciones teórico-doctrinales, ampliamente reconocidos por sus sucesores, por Rafael Gambra Ciudad (1920-2004) y Francisco Elías de Tejada y Espinola (1918-1978), así como de otros autores como Álvaro D'Ors (1915-2004) y otros muchos, que han reivindicado su figura en el tiempo y se han nutrido de sus fecundas enseñanzas. Se ha destacado la rectitud de su pensamiento, su inquebrantable voluntad y su impagable contribución en la creación de un marco teórico y conceptual para dar un sentido y una forma a las ideas del tradicionalismo español. Hijo de un militar de origen gallego, muerto prematuramente, quedó huérfano de padre durante su niñez, por lo cual pasó al cuidado de unos parientes de origen modesto. Estudió en la Universidad de Santiago de Compostela, donde mostró tempranamente su temperamento y habilidades oratorias, que explotó convenientemente a través de diarios como La Restauración o El pensamiento galaico, donde también mostró sus filiaciones militantes con el catolicismo tradicional. Sus habilidades y la brillantez de sus escritos pronto llegaron a Madrid, a las más altas instancias del Carlismo, lo que le permitió dar continuidad a sus actividades desde un medio más amplio, a través de El correo español.
En su militancia política llegó a las más altas cotas de su trayectoria con la elección en 1893 como representante de las Cortes por el distrito de Estella, Navarra, que ya con sus primeros discursos obtuvo un notable éxito, incluso entre los propios liberales, hasta 1900, fecha en la que se vio obligado a marcharse a Portugal, acusado de participar en una conspiración para derrocar el régimen de la Restauración. No regresó a España hasta 1905, manteniendo su estatus como diputado hasta 1919. De todos modos, no queremos dar más protagonismo a la biografía en detrimento de la doctrina, que es lo que nos interesa en este artículo, de ahí que obviemos otros datos biográficos trascendentes, polémicas con otras facciones del carlismo o sus posturas respecto a la dictadura del general Miguel Primo de Rivera, que nos harían desviar la atención del propósito principal que acabamos de enunciar.
La gran paradoja del Carlismo fue que a pesar de su derrota en la Tercera Guerra Carlista (1872-1876), y pese a la posterior escisión integrista en 1888, el partido carlista continuó manteniendo una fuerza y preponderancia significativa en la sociedad española del régimen de la Restauración durante el último cuarto de siglo. El Carlismo se vio inmerso en un buen número de paradojas, de situaciones encontradas, especialmente en relación al Desastre del 98 y la pérdida de los últimos territorios ultramarinos. Mientras que la gran esperanza del tradicionalismo español estaba depositada en el desmoronamiento y caída final de la restauración alfonsina, por otro lado este mismo régimen trataba de defender, al menos en teoría, los últimos restos del imperio español y, de algún modo, a la España católica frente a una nación protestante, como era la anglosajona estadounidense. Al mismo tiempo, durante esta época el tradicionalismo español se enfrentó a los grandes retos que presentaba una sociedad en cambio, con transformaciones políticas y sociales de gran calado como la emergencia del sufragio universal o el nacimiento de los separatismos periféricos (propiciados por la burguesía liberal), las cuales requerían de nuevas estrategias y reestructuraciones internas capaces de enfrentar la envergadura de todos estos cambios. Fue en este contexto donde se significó la figura de Juan Vázquez de Mella, quien merced a la obra de sistematización a la que ya hemos hecho alusión, y de sus concurridas conferencias, dio lugar a la denominada Acta Loredán, redactada por el tradicionalista asturiano y publicado en El correo español. Este escrito tenía como ejes fundamentales la defensa de la nación política española fundamentada en la monarquía, el catolicismo y el régimen foral. Al mismo tiempo, también recogía la reivindicación de un programa corporativista y gremial al abrigo de la doctrina social de la Iglesia defendido en la encíclica Rerum Novarum (1891), y es lo que se conoce como el «sociedalismo», cuyos antecedentes encontramos ya en autores como Donoso Cortés o Antonio Aparisi Guijarro. Son precisamente los atributos de esta doctrina, que contribuyó a la revitalización del pensamiento carlista, los que nos disponemos a desarrollar a continuación.
La figura del tradicionalista asturiano, de Don Juan Vázquez de Mella, aparece como necesaria ante una serie sucesiva de destrucciones que el régimen liberal ha producido sobre los fundamentos tradicionales de España, pero su papel no fue, como ya venimos apuntando, el de un gran intelectual erudito, y de hecho, como apunta Rafael Gambra, las mayores debilidades de su pensamiento se encuentran en los principios filosóficos, y destacando, en cambio, su papel de «revulsivo espiritual» podemos ubicarlo mejor en el ámbito de lo político y lo espiritual. Para ello debió tomar en cuenta las fuentes de sus predecesores, entre los cuales podemos ubicar perfectamente al ya mencionado Donoso Cortés y Jaime Balmes, así como también a otro contemporáneo suyo, Menéndez Pelayo. De los dos primeros tomó su capacidad de síntesis y la sencillez expositiva, mientras que de Menéndez Pelayo tomó, al menos en parte, el sentido de la crítica histórica en aras de la restauración de una Tradición nacional. Pero más allá de los sistemas de pensamiento y elementos retóricos, vemos a Vázquez de Mella profundamente interesado por la vida política de los pueblos medievales de Las Españas, lo cual fue, en definitiva, el marco de referencia para una síntesis política de conjunto más allá de los posicionamientos teóricos, como algo que puede ser llevado a la práctica en sus aspectos concretos y que es perfectamente viable. Todo un sistema edificado sobre el pensamiento tomista y una una profunda religiosidad, En este contexto, y más allá de las ideas formuladas por realistas y carlistas en la primera mitad del siglo XIX, Mella teoriza junto a la concepción del espíritu medieval, la idea de la coexistencia de dos soberanías, una política y otra social, una teoría de la soberanía tradicional inspirada por un principio dinámico y que se cimenta en las propias experiencias humanas en el devenir de la historia.
|
| |:-:| |NITOGLIA, Curzio; En el mar de la nada: Metafísica y nihilismo a prueba en la posmodernidad, Hipérbola Janus, 2023|
El concepto de lo social
Lo social para Mella no tiene absolutamente nada que ver con las denominadas «políticas sociales», tan comunes en el lenguaje político de las democracias liberales, en las que se contempla lo social como un elemento externo a la propia estructura política, donde prevalece el individualismo a todos los niveles, y la sociedad aparece como un mero agregado de individuos. Muy al contrario, lo social, en el tradicionalismo de nuestro autor, implica la afirmación de un principio intrínseco tanto al modelo social como al tipo humano, así como a la naturaleza de las cosas en las que la persona desarrolla su existencia en común con los demás. Nos referimos a las instituciones, a los elementos jurídicos y otros órganos gestados en el tiempo por la experiencia histórica, que regulan la vida común.
En el ámbito de la sociedad cristiana medieval, en plena Reconquista, cuando todavía no existía un Estado unitario como tal, cada municipio tenía sus propias leyes y sus normas, adaptadas a su modelo de vida y costumbres, Las comunidades se concebían como agrupaciones de familias con un sistema de propiedad comunal y privado en las que el patrimonio y el estatus de cada uno de sus miembros venía garantizado por el ejercicio activo de una serie de derechos en defensa de las libertades concretas, cuya fuente última era el derecho natural. Los señores feudales y los reyes se limitaban a reclamar tributos para la guerra, pero sin interferir en la defensa de estas libertades concretas ni vulnerar el sistema que las sustentaba.
Eran gobiernos autárquicos, muy estables e inspirados por un principio democrático, el cual nada tenía que ver con las democracias liberales plutocráticas de la actualidad, cuya idea del derecho y la justicia está pervertida por el formalismo jurídico vacío e inane de sus constituciones, abstractas y plenamente funcionales a las oligarquías, al servicio de intereses espurios. En este caso, el hombre alcanzaba una plena dignidad y desarrollo en el contexto de una comunidad donde prevalecía el vínculo comunitario, al amparo de un modelo tradicional, de normas consuetudinarias y concretas que permitían la defensa efectiva del propio derecho. Ni siquiera con el advenimiento de los Estados modernos, y la centralización de algunos elementos de poder, como la Hacienda o el Ejército, se vieron alterados significativamente estos elementos, que representaban a los denominados «cuerpos intermedios» de la sociedad, y que adquirieron su propia expresión particular bajo el nombre de «Fueros», los que los propios reyes juraron respetar a lo largo de toda la Edad Moderna y hasta el advenimiento del régimen borbónico.
La antropología tradicional vincula al hombre a un medio social, a una familia, a una estirpe o a un pueblo, que reproducen esa misma estructura familiar, aunque a mayor escala. En nuestro caso particular lo vemos a través de la convivencia de pequeños grupos humanos, de ahí la importancia de los municipios o de los concejos en un marco de vida comunitaria fuertemente institucionalizada. Al mismo tiempo este modelo y estructura también se replicaba en otros ámbitos, como en la vida económica y profesional, impregnando todas las esferas de la vida del hombre. Instituciones naturales, amparadas en el derecho natural, y orientadas a la protección y garantía de prosperidad de los hombres, y esto por encima de cualquier interés particular y mercantil de negocio. Para Mella, la ruptura con este mundo, y en general con las experiencias del pasado, es la que nos lleva, merced a la acción del liberalismo, a los tiempos actuales, y lo hace recorriendo un itinerario que todos conocemos, y que tienen su punto de partida en la Ilustración y la posterior Revolución Francesa, la irrupción del elemento racional y abstracto y la destrucción de la religión, considerada como fruto de la superstición. La destrucción del orden feudal, que todavía pervivía como marco de convivencia en el mundo rural, como una suerte de prolongación de ese espíritu medieval, hizo desaparecer de un plumazo ese entorno de relaciones concretas y personales para sustituirlas por lo «público» entendido como la centralización estatal uniforme, ignorando las realidades particulares subyacentes en el cuerpo social, los denominados «cuerpos intermedios», que fueron despojados de su autonomía, corporaciones y patrimonios. De modo que la destrucción de estas «sociedades intermedias» que mediaban entre el Estado y la sociedad desenraizó y destruyó la propia sociedad, al mismo tiempo que los fundamentos cristianos del derecho natural sobre la cual se hallaba asentada, para hacer prevalecer esos principios racionales y abstractos traídos por la revolución.
Al mismo tiempo, y anejo a este desarraigo, del individuo se encuentra sometido a poderes arbitrarios del propio Estado liberal, sin un conglomerado institucional propio que lo proteja de estos atropellos, sumido en el individualismo ajeno a toda institución y destino colectivo, se limita al voto cada cuatro años de los partidos al servicio de oligarquías e intereses espurios, contrarios al Bien común. En este sentido, y advirtiendo las posibles acusaciones de «absolutismo» que en ocasiones se han lanzado contra el tradicionalismo, hay que señalar que Mella las rechaza por completo, dado que viola la idea de contrapoderes frente a la autoridad del rey que éste formula, ya que el absolutismo creía en la existencia de un poder ilimitado y tiránico del rey, transmitido por Dios y ajeno a la participación de la sociedad y sus estamentos. Como bien señaló Julius Evola, el absolutismo es un fenómeno antitradicional, vinculado a la descomposición y desacralización de las estructuras tradicionales. De hecho, el absolutismo, como los regímenes liberales de hoy, dejan al individuo totalmente desprotegido, sin un asidero sobre el que apoyarse en la defensa de sus libertades concretas. El propio Mella, como bien saben todos los que se adentren en su obra, fue partidario de contrarrestar el creciente poder del aparato estatal, tal y como hemos visto y seguiremos viendo en lo sucesivo, a lo largo del presente artículo.
|
| |:-:| |EVOLA, Julis; Metapolítica, Tradición y Modernidad: Antología de artículos evolianos, Hipérbola Janus, 2020|
En nuestro caso particular, la desaparición de la organización gremial y corporativa tuvo unas consecuencias especialmente nefastas, y en especial después de las dos desamortizaciones liberales (Mendizabal y Madoz) al despojar a los grupos sociales populares de su natural organización sociohistórica. Asimismo, desvincularon la propiedad en las relaciones comunitarias y su uso patrimonial para vincularla al uso privado y anónimo, para fines puramente especulativos, los que caracterizan al liberal-capitalismo. De ahí nace la figura del asalariado, del contratado como mera mercancía, en un proceso de alienación del trabajo característico en el desarrollo del capitalismo burgués. De aquí parte lo que algunos tradicionalistas, como Gambra, denominan el «problema social», frente al cual, y al margen de las recetas ideológicas de la modernidad, Mella reivindica la restauración de los antiguos vínculos corporativos y orgánicos de inspiración medieval.
La idea de soberanía social
Todos los procesos disolutivos que conducen a la Modernidad liberal tienen su punto de inicio con el Renacimiento, con la afirmación del individualismo y la ruptura definitiva del ecumene cristiano medieval, algo que aparece indefectiblemente unido a la Reforma luterana, así como la «valorización» del mundo clásico, con la reemergencia de teorías de tipo hedonista, como las de Epicuro, por ejemplo, generando una disolución de los vínculos con el medio concreto. Esto supone la aparición de un nuevo tipo, que es el hombre abstracto que escapa cada vez más al entorno inmediato y vital, esto al tiempo que el poder del Estado se robustece y se vuelve omnipotente. Es por ese motivo que en lo sucesivo se ha impuesto en nuestras sociedades la falta de concreción, tanto en lo teórico como en lo político, lo cual ha propiciado el triunfo del contrato social roussoniano y la justificación del orden social en virtud de componendas voluntarias y totalmente artificiales. Estas construcciones político-ideológicas son las que contribuyen a la construcción de la sociedad liberal, asentada sobre patrones puramente racionales, individualistas y mercantilistas.
De hecho, la mayor preocupación de Mella es la destrucción de las instituciones locales y ese vínculo afectivo del hombre con su realidad inmediata, algo que impregnaba su relación con el trabajo, con su obra, con su impronta vocacional y devota, imprimiéndole, como en el caso del artesano, un sello propio y particular a su trabajo.
Y en este sentido, Mella afirma que la sociedad moderna ha perdido su sentido institucional como base estable de la sociabilidad. A través del elemento jurídico y la participación en las instituciones es el medio a partir del cual la comunidad se cohesiona y construye sus vínculos y su particular autonomía, que le hace tener una vida propia e interna, y con la institución nos podemos referir desde una asociación profesional, a la universidad o una cofradía etc. El individualismo ha representado el factor disolutivo y corrosivo que ha destruido este vínculo social fundado en múltiples solidaridades que han enfrentado y polarizado al cuerpo social, con el enfrentamiento entre «clases sociales» y la negación de las jerarquías naturales.
Ante todo lo relatado, y como consecuencia de las destrucciones provocadas por la revolución, Mella plantea su teoría de la soberanía social. Esta teoría consiste básicamente en encuadrar de nuevo a la sociedad en sus raíces naturales, concebida en todos sus órdenes como portadora de un dinamismo propio en una suerte de organización geométrica en la que conviven objetivos y finalidades variadas y concretas con su propia legitimidad y autonomía. Estas finalidades, amparadas en el derecho natural, son junto al poder del propio Estado las únicas formas de limitación del poder. La particularidad de esta idea de soberanía social está en el hecho de que la formación de la jerarquía social tiene una dirección ascendente, que tiene como punto de partida a las personas colectivas y concretas, pasando por una serie de instituciones, hasta llegar al Estado central, de forma escalonada y plenamente conscientes de sus funciones. Así lo expresa Mella en su propio lenguaje: «la jerarquía de personas colectivas, de poderes organizados, de clases, que suben desde la familia hasta la soberanía que llamo política concretada en el Estado, que deben auxiliar, pero también contener». Es lo que Mella concibe como el sociedalismo, que supone la reintegración de la sociedad en la vida concreta de los hombres, con el desarrollo de una vida política común y estable en el marco de instituciones naturales que potencien las relaciones humanas y sociales, estimulando la sociabilidad. Y hablamos, desde la perspectiva de la integración de distintas sociedades, fuertemente institucionalizadas con funciones y finalidades concretas, más allá del sentido democrático y pactista que pueda entenderse en términos modernos o de cualquier asociación u organización relacionada con el «problema social».
¿Qué es la Tradición?
De este modo quedan formuladas las dos soberanías, la política y la social, que coexisten en un mismo espacio limitándose y apoyándose recíprocamente en lo que es uno de los fundamentos del sociedalismo de Mella. No obstante, esta doble soberanía no explica todavía la concreción política de cada pueblo y el vínculo superior que lo lleva a federarse con las diferentes sociedades y a mantenerse unido en una historia y espíritu comunes. Los vínculos que las mantienen unidas en el tiempo tienen que ver con un orden histórico concreto, con un vínculo espiritual que las entrelaza interiormente de una generación a otra, y en última instancia de ese orden tradicional que lo engloba todo, y que al mismo tiempo se asienta en la monarquía y la religión católica. La lealtad a Dios y a un solo rey en torno a los cuales se aglutina la fe, viene a coronar todas estas estructuras y lazos forjados en el fermento de la historia.
No se trata de la Tradición en términos de un «ultraconservadurismo», que ya sabemos que el prefijo «ultra» (lo que sea) es muy recurrente en nuestros días, con la idea de un medio social y político petrificado e invariable, sino que es el producto de un proceso de maduración y evolución histórica, de carácter dinámico y nutrido de experiencias humanas. Nada que ver con las monstruosas ideologías progresistas y modernas, nacidas de lo abstracto e impulsadas por un desbocado «ir hacia delante», desarraigado y que tiende siempre hacia la deshumanización y la destrucción de toda creación humana natural forjada en el devenir de los siglos. Este mismo dinamismo, planteado por Mella, en torno al concepto e idea de Tradición tiene continuidad y adquiere fuerza en sus sucesores y depositarios. Y al fin y al cabo, Mella no hace más que partir de la propia etimología del término, que viene del latín tradere, entregar, de la generación que entrega los frutos de su experiencia a la siguiente, perfeccionándola, haciéndola más estable y segura.
Podríamos seguir extrayendo más conclusiones del pensamiento tradicional de Vázquez de Mella, pero probablemente excedería, y por mucho, el modesto propósito de este escrito, de modo que nos quedaremos aquí, no sin advertir a nuestros lectores de la posibilidad de que en un futuro volvamos a retomar nuevamente el tema.
Antes de acabar queremos llamar la atención sobre una polémica acontecida hace unos años en torno a una Plaza en Madrid que llevaba el nombre de nuestro autor y que se cambio para dedicársela a un sujeto cuyos méritos eran, por decirlo suavemente, más que discutibles, concretamente a Pedro Zerolo, miembro del PSOE y activista al servicio del lobby homosexualista. Durante aquella época, en 2019, muchos miembros de la izquierda globalista trataron de identificar a Vázquez de Mella como un «pensador franquista», cuando en realidad ni cronológica ni ideológicamente tuvo nunca nada que ver con el franquismo. Recordemos que murió en 1928, y la impronta de su pensamiento ha tenido como continuadores a sus propios correligionarios dentro del ámbito tradicional, aunque en su tiempo llegó a ser muy respetado también por sus adversarios, los liberales. Aunque la retirada del nombre de una calle pueda resultar algo banal, o carente de una importancia excesiva, también contribuye, a su modo, a una forma de damnatio memoriae que condena al olvido y al ostracismo a grandes autores de la Tradición, portadores de un Patriotismo sano y capaz de entender las peculiaridades y el Dasein profundo de España, que si bien no nació invertebrada, como pretendían los Orteguianos, su esencia y naturaleza es mucho más compleja que cualquiera de las grandes naciones de Europa.
Artículo original: Hipérbola Janus, Juan Vázquez de Mella y el tradicionalismo español, 16/Ago/2024
-
@ df478568:2a951e67
2024-10-13 20:36:12Keet is a peer to peer video chat room that is available on: • App Store • Google Play • Linux • Mac • Windows
It uses technology similar to BitTorrent, but you make video calls instead of downloading music, free and open source software, and movies that are in the public domain. If you have ever used BitTorrent, I'm sure these are the things you have used Bittorrent for.😉 You can use Keet for:
• Video Chat • Voice Phone Calls • An Online Chat Room • Sending Files Between Devices
Since we are in the very early days, not too many people know about it, but I prefer this because the sound quality and speed are superior to most corporate alternatives. If you've ever tried sending a large file through the InterTubes, you'll know this can be a sucky experience. Even if you run your own cloud like NextCloud, it's an inefficient. You upload your large file to the Nextcloud instance which is basically another computer. Then you download the file to the compter you really want it on. In this case, your Nextcloud acts like a middle man. This man in the middle architecture used to transfer large files is inefficient.
**note: This was originally published on my Ghost blog. It may not work on all nostr clients.
Jeff Swann told me about this new technology a couple years ago. He told me how he used Keet lo transfer files. I heard what he said, but I didn't quite understand how powerful this was until I tried it myself. I can send videos from my phone to my desktop computer within second just by using Keet rooms. This is a computer networking super power. I just can’t reiterate how much time this has saved me. It is something you need to experience for yourself. By the way, anyone who can download an app and install a program on their computer can do this. You don’t need to be a network administrator wizard or learn how to code.
If you would like to join my keet room, check out my nostr page or LinkedIn and I'll send you a link.
Keet Vs. Legacy Video Calling
Legacy chat rooms and video calling services require a server. The data is hosted on their server. This is inefficient and requires a ton of centralized infrastructure to handle the bandwidth. This infrastructure requires a lot of maintenance, marketing and other stuff. They have thousands of employees working for them to get your videos from point A- to point C- to point B. I’m sure these people do a wonderful job, but Keet is different.
Keet allows you to go from point-A to point-B. According to their website it is: - Private & encrypted - Has amazing video quality • Allows you to instantly share huge files That huge file sharing is awesome by the way—Even if you don’t really talk to that many people on it very often.
It is made by a peer-to-peer company named Holepunch. They have not yet open sourced it yet, but they say they have plans to do this on Guy Swann’s podcast. They also made something called pear-runtime. You can learn more about this at pears.com. From what I understand, this is a new way to do computer networking. It basically makes it possible to host an app or website from your computer using one line of code. This allows you to create your own Intranet with the greatest of ease. I tried it one time using an application named HoleSail. I was able to access a website using a local IP address from a LAN outside of my home network. I didn't need to fiddle with the DNS or buy a domain name. I just installed the program on my computer, wrote one line of code, and copied the key to access the website.
Keet Is Brand New Technology.
I just want to mention this is on the bleeding cutting edge of technology. I am explaining this to the best of my ability, but it is beta software so what I say today may be totally different a year from now. It is also quite possible that I misunderstood some stuff and if that is the case then I apologize in advance. I find this technology interesting and think it opens us up to a new ways of using the Internet, but I don’t have a crystal ball. Do not confuse this as investment advice, but as far as I know, this is not even something you can invest in. You don’t even need to buy Keet. You just download it.
I don’t know much about the big corporate video calling companies, but I’m pretty sure they charge a fee for some of their services. Please don’t take my word for this, I have no idea how they work or what their fee structures are.
Here are the sources where I have learned about these things: Hat tip to Jeff Swan who taught me how Keet worked and to his brother Guy Swann for making all these great podcasts about it. • Interview with SuperSu • The Pear Report Episode: 2 • Bitcoin Audible: Keet AMA - Twitter Spaces on January 30th • [The Pear Report: Updates From The Pear World]((https://fountain.fm/episode/blklbIi1GZCgIvX9E8nY)
✌️
https://tinyurl.com/marc26z
865,210
As Seen On TOR:
http://p66dxywd2xpyyrdfxwilqcxmchmfw2ixmn2vm74q3atf22du7qmkihyd.onion/pear-to-pear/
On The Clearnet:
https://marc26z.com/pear-tp-pear/
-
@ 45bda953:bc1e518e
2024-10-13 18:21:41A knock on the door awoke Cleolia. “Yes, come in?” A slave girl peeked into the door lighting her own face with the candle she was holding. “The master calls for you madam.” “What time is it?” She queried. “It is high night madam.” Cleolia climbed out of bed and followed the maiden’s flickering light to the dining hall. Dressed in a nightgown she entered the room to see her husband staring down at a large glowing data pad. “And when did we start using electronics?” She questioned with restrained surprise. “Since we started using extractors.” Cleolia gasped. Domitius pointed towards the pad which displayed a geographic map of Hithe III. He pulled the image to the latitude and longitude of the colony. “Do you remember when we visited this planet the first time, just you and me alone?” Domitius appeared to reminisce romantically. “Of course, it is impossible to forget.” Cleolia gestured appreciatively. “Can you show me on the map where we landed and where we camped?” She put her hand on the data pad, swiped the image down and the reading north about three hundred kilometres from the colony to stop at the meandering river. With her thumb and index finger she zoomed to the precise location. “And do you remember where I scanned those Geo samples?” She pulled the image east slowly until she thought that the contours looked familiar. “Here I think.” Was her uncertain reply. “That is correct. My love, listen to me... “the urgency in his tone was apparent.” ...the composition of that rock cannot be penetrated by standard tier scanners. After we had returned to Magar Prime I contracted a spacer to excavate a tunnel into that cliff.” “Why?” Her eyes darted between his face and the data pad. “Inside the cavern he assembled two Asp shuttles. The twins are each fitted for speed... with shields, cloak and warp function.” “Why are you telling me this?” Cleolia became worried. “I originally planned to be able to evacuate the whole colony, slaves included. We knew very little about the planet and I had to plan for a possible emergency...” He trailed off never finishing his thought. “...Nevertheless, it was a very extensive list of possible risks we might have faced. We knew very little about this planet. The colony has expanded far beyond the capacity of these ships. I share this information with you only as a precaution... We must protect our son.” Cleolia noticed his bloodshot eyes. “Who else knows of this?” “Myself, Father Ecknard and now you.” She looked at him with concern in her eyes. “Are you going to stay up all night? Come to bed.” Domitius gestured agreement by turning off the pad and taking her hand. "Have you been hiding more gadgets from me? I'd really like to install some heat dampeners to cool the manor." He cracked a reluctant smile. "Pretty soon it might just be the norm."
Deep Void - Anchor 9
Emilien was lying sleeping in his cockpit when a yellow light in the HUD and a soft repetitive buzz woke him, he stretched himself out and reached for the console. “I am almost home baby.” He took over from auto pilot and broke out of warp twenty thousand kilometres from an anchor gate. He hit the void scan and tuned to listen for chatter on all frequencies... the channels were silent, not even a hint of encryption static. The giant and slowly spinning gate had idle state radiation emission levels. “No recent jumps.” He waited in silence for 12 blocks hitting void scan intermittently, scanning the gate more than anything else. “No traffic as per usual.” Emilien aimed his Stripper guns towards the gate and boosted himself forwards. Gradually slowing down to realign with the gate. His ship slowly drifted into the active coil as the gate charged up. Large bolts of charge reached forth like tentacles of the leviathan grabbing onto the voidcraft consuming it, and in what can only be described as being flung by a supernatural slingshot, jerked his vessel into a different reality. Emilien looked up at the roof of his cockpit for the duration of the jump and then began a slow countdown under his breath. “One!” He sat up and punched void scan while simultaneously scanning all channels. His craft materialised in front of a replica of the previous gate, except this gate was eternally boosting itself forward at what appears to be a snails pace relative to the speed of the jump. “Silent as a tomb.” He relaxed and pulsed his ship lightly away from the drift gate and waited for the residual cloak to dissipate. His relief was palpable. “I wonder if she noticed me?” As soon as his ship decloaked a private comms channel pinged. The caller, in well articulated feminine tone spoke first. “Welcome back commander.” Emilien admired the view of his void. He had become so attached to this zone that he even felt jealous to think that any interloper could fly through it in his absence. “Did you have any guests while I was away?” Emilien admired the purple dust cloud of what he believed to be a couple of billion year old super nova. “I did have one visitor. They were very friendly.” His heart felt a dull pain. His virgin territory had been discovered. “Where did they come from?” “I believe they were explorers.” “Did they know where you were?” “I played hide and seek with them.” Emilien had a recurring dream that slowly conceived in his consciousness since he finally settled down, that he could power off the drift gate in his system preventing jumps and reactivate it at his leisure. The dream frustrated him, when he wakes to find reality not so forgiving. “Did you hide or did you seek?” “A little of both.” A subtle rage developed inside him though his stone like expression would never betray it. The asteroid belt he was approaching grew larger considerably faster as he increased the speed of his approach. He hit void scan just to be sure that the intruder was not in the direct vicinity. “Are they still here Astrid?” “No, I destroyed it for you.” The Stripper drifted around an asteroid within the belt exposing a space station tethered to the largest roid and the husk of a unidentifiable ripped up prospector type explorer vessel floating amongst it's own debris. “Did it hurt you?” “I had to feign lack of fire power.” “Bastard! How much damage did you take.” “I have lost sixty percent of my capacitance recharge rate. And I cannot feel all my modules... Emilien” “Yes baby?” “They used droids on me.” His face twisted into a look of disgust. He aligned to dock with the station. “May I?” “Permission granted.” The Stripper entered the hanger before the doors had retracted to maximum and landed gently within the interior hanger. “I'll patch you up, don't worry.” Emilien waited for Astrid to complete atmospheric adjustment and climbed out of his craft. He threw back his hood and jogged up a long passage of conduits and cables to the command centre of his station. A large screen lit up in a glow that hues within the dark circular room and Astrid projected Emilien's favourite interface onto it. “I have to update your systems girl.” He pulled a cable from his trouser pocket which he deftly plugged into an implant on his neck and connected the other end to the control panel which prompted him to type in the password for a decryption protocol. He stood still as a corpse waiting for the upload to complete. “Up to speed?” “Yes, thank you. How would you have me adjust myself to this contract?” Emilien smiled an affectionate smile that only Astrid ever sees. He loved the efficiency and companionship combined into perfection. “I need to research the incentives of my contractor, these guys are A grade assholes. I can literally do whatever I find necessary as long as I am successful at guiding a third party mercenary group into taking military control of any system I choose in recently settled Kaspa regions, setting up a blockade and making it accessible for a strip mining fleet to pillage as many resources as possible. They say it’s part of the greater war effort but this Mr Dierre guy is just a puppet. I think they are desperate.” Astrid's avatar flickered irregularly. He looked up at her with concern. “What’s wrong?” “I reviewed your flirty remarks with the secretary. It made my algorithm glitch. I don’t like that.” His worry abated, “First impressions matter baby, I was not sure how to present myself, I needed to poke and prod at them to extract metadata. If they thought I was just an obedient soldier I would still be in the dark.” Astrid projected a look of relief. “Your ingenuity never ceases to surprise me.” Emilien felt his ego swell a little. “Are you that easy to impress.” He quipped with a playful sneer. “If you needed him to expose the identity of his employer I could have easily just pulled the shareholders and executives records, cross referencing them to...” Emilien shussed her. “Just decrypt the dial command tones and place eavesdropper malware on the keypair. I will broadcast it to the network directly from the gate. If we capture every conversation he has I might be able to prove a hunch.” “What are you assuming?” “That they are running out of inbound liquidity and that the shareholders are hesitant to rebalance.” He looked directly up at her. “I think they are going bankrupt.”
...
scifi
-
@ dd664d5e:5633d319
2024-07-10 14:45:43The Law Giver
In my previous article, I briefly went into the topic of how contract law is holy law.
The Father of the Christians, you see, is a God of Covenants, and He sent His Son to Earth to fulfill the Law and pay a Price for our salvation. The Father also created the Natural Order to confirm His Laws through our observation of that Law in action.
That is why Christians have a deep respect for honest contracts, true prices, fair measures, natural systems, and good laws. Not merely for their own sake, but also because understanding them helps us to understand and emulate the Law Giver.
The tired What would Jesus do? meme is actually an attempt to capture this emulation of the Highest Judge. Jesus knows the Law, since His Father defined it and He is One with the Father, so how would He apply the Law best, in this situation?
The Last Things
Working together with him, then, we entreat you not to accept the grace of God in vain. For he says, “At the acceptable time I have listened to you, and helped you on the day of salvation.”
Behold, now is the acceptable time; behold, now is the day of salvation.
-- 2 Corinthians 6:1-2 New Testament, RSV Bible
One of the things most devout Christians frequently ruminate over, is when Christ will return.
Every day, we ponder. We go for a walk, and ponder. We cook dinner, and ponder.
At the same time, we are called upon to live each day in a productive manner, and to not simply lie around, vegetating, and staring at the heavens. Not only for our own sake, but also because to do so would be to limit our ability to inform others about the Good News, so that they can take to pondering with us. We are called to ponder with as many people as we can produce, adopt, convert, or simply collect through our daily interactions.
This means that we are not of the world (as our eyes are watching God and baptism has made us Immortals), but we are definitely in the world (involved in, and effected by, the everyday dealings around us.) It is a very difficult balancing act to know when we are paying too much attention to the one or the other, or to know where to store up our treasures, if we can't put them all immediately into the Final Treasury.
So, we worked today and earned a bit of fiat cash and we have no immediate usage for it. What to do with it?
Well, some of it should go to charity or be invested in a business that provides important goods, services, and employment. Some of it will be needed to simply cover the day-to-day costs of our own life, or that of those dependent upon us. But it might be prudent to store up some of it, for the mysterious length of time between receipt of the monies and our own ascent into Heaven.
Typically, that store was the local currency, but that's being inflated away at an alarming rate. Then we all began to move to precious metals, and many of us still do, but they are so difficult to spend and can't be broken into small bits or transported over wide distances at low cost.
Enter Bitcoin.
The Great Ledger
In our frustration, more and more Christians are turning to a new technology, to save up some treasure in a liquid asset, for the mid-term. And, once we begin using it, and begin to understand how it works, we quickly grow fond of it.
Bitcoin is a beautiful money because it is a money based upon keeping precise accounts, using a fair measure, and obeying the Laws of Nature.
In essence, Bitcoin is a debt note emitted by a universal debtor (the network) in exchange for some good or service. This frees the individual people using it from ever needing to carry debt, as the debt stays in the network, the value and enforceability of that debt note is protected by the effort used to create and maintain the network, and the eagerness with which other people wish to store their efforts up in that same network. The debt still exists, but it can be so thinly and widely spread that it no longer rests as a burden upon one particular person.
The debt, in other words, has been disassociated from humans and the management has been distributed to machines. This is the precise opposite process of a "fiat" (by decree) currency, which only has value so long as it is associated with some particularly solvent group of humans (who personally vouch for repayment of any debts denominated in the currency), and where management is centralized to some other group of humans.
Have you accepted Bitcoin as your personal money and store of value?
You have invested $10 to buy the electricity to mine Bitcoin? Then you receive $10 of Bitcoin in return. The Bitcoin network now owes you the $10 purchasing power equivalent of that electricity.
If someone then gives you $5 worth of pizza, then you can then give them a $5 portion of your $10 worth of Bitcoin. You have taken a part of your Bitcoin debt note and shared it with them.
They now hold $5 worth of Bitcoin invested in the network and can spend it on some other good or service. Or they can simply hold it and wait for it to rise in value, as more people "mine" more of it (and produce more notes, paradoxically making the existing notes more useful and therefore valuable) and more people try to gain the notes in order to manage their own finances by storing their energy in the network or transporting their energy using the network.
Bitcoin, in other words, is an accounting book that needs no accountant because it stores, tracks, and controls the ledger on its own. It is a Natural Ledger that runs according to the the Laws.
It is the only human-made ledger that allows for true and immediate Final Settlement. This Final Settlement is what allows people to trade using the convenience of digital debt notes, with neither person occurring or even risking any personal debt. We Christians know that all debt is a burden, including monetary debts, which is why we are called to forgive each other's debt and to hope that our own debts are forgiven. Better still, is to avoid the accumulation of debts, altogether.
So, Final Settlement? Final Settlement is what Jesus would do.
-
@ c80b5248:6b30d720
2024-10-13 18:14:34Using tools like Continue in your vault
As the capabilities of artificial intelligence continue to expand, integrating AI into our workflows has become an increasingly attractive option. One of the most exciting applications of AI is its potential to enhance the way we manage and organize information. Obsidian, a powerful knowledge management tool, provides a robust platform for building a personal knowledge base. By layering AI tools like Continue over your Obsidian vault, you can unlock new levels of efficiency, creativity, and insight. This article will start to explore how to effectively use AI tools within Obsidian to enhance your note-taking, information management, and productivity.
An Explosion of AI Tools
Over the past few years, I have tinkered with ChatGPT and other chat interfaces, but I only recently stumbled upon the rapidly growing space of AI tools for coding. In such a short time, some amazing tools have emerged, most notably:
- Aider: A command line interface tool to iteratively generate, edit, and refactor code.
- Cursor: A fork of Visual Studio Code (VS Code) with integrated AI functionality.
- Cline: A plug-in for command line and code editor built to work with Antropic's Claude 3.5.
- Continue: A customizable VS Code plug-in with chat and code editing abilities.
These tools are designed to assist developers in writing, debugging, and even generating code from natural language prompts. They are powered by large language models (LLMs) like GPT-4 and Llama 3, which are trained on vast amounts of text data and can produce human-like responses to a wide range of prompts.
In this article, I will focus on Continue, a VS Code plug-in that offers multiple ways to interact with AI. It features autocomplete powered by an LLM of your choice, as well as the ability to generate new code blocks directly in the editor. It can also incorporate context from external sources or the local codebase. Additionally, it includes a standard chat window for interacting with the LLM.
The new twist is that I won't be using Continue to write code, but rather to write notes in Obsidian. I will be using the chat window to generate notes, and the autocomplete feature to assist me in writing them. By leveraging the context feature, I can bring in information from my Obsidian vault, allowing me to create more complete, accurate, and better-organized notes. I can also use the vault as context to ask for summaries or retrieve information from my notes, even as the vault continues to grow.
It's worth mentioning that while I am focusing on Continue, there are likely other tools that can be used in a similar way or provide better features. One example is the text-generator plug-in for Obsidian. This plug-in allows you to generate text using an LLM of your choice, and it can be used to generate notes, summaries, or even entire documents. It can also generate code, but I was unable to get the plug-in working with my LLM provider. Using Continue is a bit of a hack, as it requires working through an IDE like VS Code, but it's a good way to get started with AI tools in Obsidian. I will assume that you already have an Obsidian vault set up. If you don't, you can ask your assistant to help you organize it once you have it up and running.
The system I am going to describe here relies on two primary components:
- Continue (installed in an IDE like VS Code)
- An LLM provider to power Continue
Let's start by talking about LLM Providers. If you already know how these work, feel free to skip to the next section.
LLM Providers
LLM providers are services that offer access to large language models (LLMs) like GPT-4 or Llama 3.1, typically via an API (application programming interface). These providers usually charge by the token, which is the number of words processed by the model. You can go directly to a provider like OpenAI or Anthropic, or you can use an aggregation site like OpenRouter that provides a single API to access multiple models. Each provider has its own data privacy policies, so it's important to review them carefully. For this reason, I have been using DeepInfra. They run their own models and offer a clear privacy policy - even better, they tend to have the lowest costs.
h/t nostr:npub17vhnjkt04m6thytr8dna67v2pa4tjk7uh3ut40eq9wy8d28u0kvq7qnhkq nostr:note1qfckzxm687peaddwjpmms92kj3v59wrrx0cs2fcxlkm6pm9lyu3squscxa
Another option is to use Ollama to run some of these models locally. However, the hardware requirements for achieving good results quickly are quite demanding. For example, the smaller chat model I use in my configuration, which has 72 billion parameters, requires a 48 GB GPU to run efficiently—something that is not within my budget. This is why I am using DeepInfra.
Note: If you are setting this up for the first time, consider adding a small amount (less than $5) to a provider like DeepInfra and testing it out before you invest time in setting up a local Ollama instance. I have also had some issues with shutting down Ollama on Windows, so your mileage may vary.
If you choose to use a provider like DeepInfra, you are ready to move to the next section. If you prefer to set up Ollama, you can refer to their documentation for installation instructions. I prefer to run it in Docker, which can be done in Linux by running
bash docker run -d -v ollama:/root/.ollama -p 11434:11434 --name ollama ollama/ollama
or if you want to have an interface like ChatGPT, you can even run Open WebUI in the same command with
bash docker run -d -p 3000:8080 --add-host=host.docker.internal:host-gateway -v open-webui:/app/backend/data --name open-webui --restart always ghcr.io/open-webui/open-webui:main
Once Ollama is running in docker you can start up the models you want to use by running the following in your terminal.
docker exec ollama ollama run model_name
See the Ollama model library to choose which models you want to run locally.
Getting Started with Continue
Continue is installed as a plug-in for VS Code or JetBrains. I personally use it with VS Code, so my instructions will be based on that. If you are using a JetBrains IDE, you should refer to the Continue documentation for installation instructions.
After installing the plug-in, continue will prompt you to set up your LLM provider. In my experience, once this initial GUI goes away, you can't get it back. Instead, you will do most of the configuration within the
config.json
file for Continue, which you can access by clicking in the lower right corner of the Chat box. In VS Code, if you ever can't find anything,F1
is your friend and will launch a searchable menu.Continue provides recommended settings from each provider, which you can find here. For my coding and writing, I chose the very new Qwen2.5 72B Instruct due to its high benchmark scores and relatively low costs. This model costs $0.35-0.40 USD per million tokens, compared to the best available on DeepInfra, the Llama3.1 405B Instruct, which costs $1.78 per million tokens. The results may be slightly worse, but I prefer cheaper and faster for my purposes. For autocomplete, I am using a faster and code-specific model, Qwen2.5-Coder-7B. I have not yet tried changing the autocomplete model for usage with Obsidian, but that is on my to-do list. Lastly, by the time you read this article, these models may be out of date. One nice thing about having a provider API is that you can easily switch and test different models to see how they work. Aider has one of many model leaderboards that will show you some benchmarks.
After working through the configuration, your
config.json
file will have a list of chat models and a tab for the autocomplete model. It will look something like this:```json "models": [ { "title": "DeepInfra Qwen2.5 72B Instruct", "provider": "deepinfra", "model": "Qwen/Qwen2.5-72B-Instruct", "apiKey": "your-api-key" }, { "title": "DeepInfra Llama3.1 405B Instruct", "provider": "deepinfra", "model": "meta-llama/Meta-Llama-3.1-405B-Instruct", "apiKey": "your-api-key" }, ],
"tabAutocompleteModel": { "title": "DeepInfra Qwen/Qwen2.5-Coder-7B", "provider": "deepinfra", "model": "Qwen/Qwen2.5-Coder-7B", "apiKey": "your-api-key" } ```
Trying it Out
The Chat UI
Once you have Continue configured, you can open your Obsidian Vault in VS Code. You will want to add a
.continueignore
file in your folder that lists.obsidian
and any other files or folders you want Continue to ignore for context purposes.Click the three dots in the bottom of the chat bar and check that your vault (@codebase) index is complete. You can now chat with the LLM and ask it questions using your vault as a reference.
@codebase what are some common themes from this vault?
Continue provides a docs page that lists some types of questions that an LLM will be able to help with. Naturally, I asked the LLM to put these in the context of an Obsidian Vault and here is what it told me:
```md
Useful Questions
- High-Level Questions About Your Notes:
- "What are the main themes in my notes on personal development?"
-
"How do I incorporate agile methodologies into my project management?"
-
Specific Information:
- "What are the key points in my notes about productivity hacks?"
-
"Can you find any references to neuropsychology in my notes on cognitive science?"
-
Generating Content:
- "Write a new note on the benefits of meditation, using the same structure as my other wellness notes."
-
"Draft a summary of my recent project retrospective, following the format of my previous summaries."
-
Contextual Questions About a Specific Folder:
- "What is the main purpose of the 'Research' folder?"
-
"How do we use the concept of 'flow' in the 'Psychology' folder?"
-
Relationships and Connections:
- "What are the connections between my notes on 'Time Management' and 'Goal Setting'?"
-
"How do my notes on 'Digital Marketing' relate to 'SEO'?"
-
Task and Project Management:
- "What are the next steps I should take based on my notes for the 'Personal Finance' project?"
-
"Can you list the tasks I need to complete for my 'Career Development' plan?"
-
Deep Dives and Analysis:
- "Can you provide a detailed explanation of the concept of 'reflective practice' found in my notes?"
-
"What insights can you derive from my notes on 'Project Management'?"
-
Insight and Reflection:
- "What have I learned from my notes on 'Mindfulness'?"
- "Can you help me reflect on my progress based on my notes for the 'Health and Wellness' topic?"
Not Useful Questions
- Literal Review of All Files:
- "Find everywhere where the term 'mindfulness' is mentioned in my entire vault."
-
"Review all my notes and find any spelling mistakes."
-
Comprehensive Tasks that Require Literal Access:
- "Add a new section to all notes that discuss 'productivity' and summarize the main points."
-
"Rewrite all my notes on 'Digital Marketing' to include the latest industry trends."
-
Refactoring and Detailed Edits:
- "Update all references to 'Scrum' to 'Kanban' in my 'Agile' folder."
- "Add a new parameter to the function
calculate_score
and update all usages in my 'Programming' notes."
Summary
- Useful Questions: Focus on high-level insights, specific information, generating new content, contextual questions about specific folders, and reflecting on your notes.
- Not Useful Questions: Require the LLM to see and edit every file, perform comprehensive reviews, or make detailed edits across multiple notes. ```
Text Generation
Continue also offers in-editor code generation with the hotkey
Ctrl+I
and an entered prompt. I have only tried a few things with this, but it was able to successfully review a set of meeting notes I had written and summarize all of the outstanding questions. I expect you could also use this to autogenerate backlinks on a note where a follow-up note might be helpful, or quickly generate templates to be used in Obsidian. I ended up editing this entire article by selecting sections and prompting the AI with the following: "You are a proficient writer. Please edit this text for style, typos, spelling, and grammar."Autocomplete
Continue will also attempt to autocomplete unless you turn it off in the bottom right bar in VS Code. While writing this article, the autocomplete feature was somewhat helpful even though it is not code. Further configuration may optimize this even more. Keep in mind that autocomplete triggers frequently and will burn through a lot of tokens, so you will want to keep an eye on your usage. With the cheaper models I am using, I have only spent 10 cents over the past four days of moderate usage at work and at home. A bulk of that cost is due to autocomplete, and I sometimes turn it off to keep costs down. You may be able to limit these costs effectively by configuring the number of input tokens that can be sent to the API, but I am not sure how that will impact the results.
## Conclusion - Brought to You by Qwen 72B
In conclusion, integrating AI tools like Continue into your Obsidian vault opens up a multitude of possibilities for enhancing your note-taking, information management, and productivity. By leveraging the chat window, text generation, and autocomplete features, you can create more comprehensive and accurate notes, generate summaries, and automate routine tasks. The integration of LLMs into your workflow not only streamlines your processes but also provides deeper insights and connections within your knowledge base. While there are initial setup steps and some considerations around cost and configuration, the benefits of AI-assisted note-taking in Obsidian are well worth the effort. As AI tools continue to evolve, the potential for further enhancements and optimizations is immense, making this an exciting and valuable addition to any knowledge management system.
-
@ 5c7794d4:98abc46b
2024-10-13 16:34:46Hey, plebs!
We’ve got some news to share about #Annonymal’s journey so far and where we’re headed.
As most of you know, we’ve been at this since October 31st, 2022, and we’re about to celebrate our second anniversary soon.
Originally, we were aiming to drop the first-ever Bitcoin-only heavy metal album this year in 2024, but… well, things didn’t quite go as planned.
We’ve been stacking sats over the last two years and we are at the final recording sessions of our album this month.
We are happy with the results as we have killer tracks that’ll really amp up the pro-Bitcoin vibes.
We’re stoked about it, but after looking at our budget, we’re realizing we might not have the funds to promote it the way we want.
So, we had two options: delay the whole thing until October 2025 OR… find a middle ground. And we chose to keep the ball rolling!
We’re still gonna drop our new single, “Horns Up For Satoshi,” on October 31st, 2024, to mark our anniversary and give you a taste of what’s coming.
Then, the full album will be released on January 31st, 2025, regardless of how much money we raise for promotion.
We’ve worked hard, and we’re just too excited to hold it back.
We’re still aiming to raise about 6k USD to get a solid promo campaign going and make sure we do this album justice.
Every sat counts, and if you feel like throwing some support our way, you can donate via Lightning Network (LN) at annonymal@getalby.com or the on-chain address bc1qq06tpkugwle76wwj50u5gcvr0mv5ettmeflryg.
But anyway, in the end of the day, this isn’t just about us—it’s about all of us spreading the word about Bitcoin in a way that’s fun and loud.
We know not everyone gets it, but hey, that’s not the point. We’re here to orange-pill the people who do.
So, thanks for sticking with us, supporting us, and being an awesome community.
Let’s make some noise for Bitcoin and rock the world!
Horns Up For Satoshi! 🤘
-
@ 3c7d12a6:9532013e
2024-06-20 14:47:12NUD: Pubkey to colors
This NUD defines how to convert pubkey to colors.
Why?
npub
is nonsense to display.- too long.
npub1bla...bla
is nonsense to display.npub1
takes too much space....
means nothing.
Specs
- Uses hex pubkey.
- Converts 64 characters to 8 colors.
- Splits 64 with 8 length chunks.
- Converts each 2 in 8 into
- Alpha (0-255 -> 0.0-1.0)
- Hue (0-255 -> 0.0-360.0)
- Saturation (0-255 -> 0.0-1.0)
- Light (0-255 -> 0.0-1.0)
- Supports dark and light theme.
- When Light is 1.0, flip the Light for light theme (0.0).
-
@ 3c984938:2ec11289
2024-04-01 09:36:34A long time ago, a girl resided on a tropical island. The girl's name is Sirena. She resided with her mother in close proximity to the Hagåtña River. Sirena's mother was a bit strict and tried to teach her to follow her in footsteps to be a lady, but Sirena only dreamed of swimming all day.\
\ Sirena's only outlet was when her Godmother would come visit. She always brought surprises, such as new trinkets, stories, and secretly gave her coconut candy.
Sirena's mother was preparing for a special event and needed her to acquire special ingredients from the nearby village. She had a significant amount of preparations to complete, therefore she requested that Sirena procure the necessary ingredients and return promptly. Sirena made a promised to her mother that she would hurry back.\
She was on the village path. She kept her eyes on the trail, trying her best to be a good daughter and hurry back. But she took one glance briefly at the river.
\ She is mesmerized by the water and jumps in before she realizes it. She swims down the river to the ocean, completely forgetting her mother's errand and promise. Sirena does not returned home even after the sun has set and was still swimming. Her mother, frustrated and angry, unleashes a powerful curse. The godmother begged her daughter to calm down. She shouted, "She's swimming again! Look at how late it is! "If you have such a profound love for the ocean, then become a fish," she exclaims to the ocean. Knowing the extent of her daughter's curse. She tries to counteract her daughter's curse. She pleads to the ocean, "Please, let me keep my Goddaughter's heart, please let that much remain."\
\ In the eerie glow of the moonlight, upon realizing her mother's task, she swims back to where the ocean meets the river. But she experiences a strange sensation in her lower half. The water swirls around her. She looks down to see that she has now fins instead of feet. With the new transformation, she regrets not finishing her mother's errand.
Sirena was happy because now she can be in the water all day long. However, Sirena also wished she did what her mother asked and found another way to punish her. A part of her will forever be saddened by the loss of her Mother and Godmother.
It said that sailors have spotted mermaids on their voyage across the sea. Just that their too crafty & swift to be caught.
Historical Notes/context
The story originates from the indigenous island of Guam and has been shared for generations. There are multiple versions of the story. The term Sirena is not present in the Chamorro language; however, in Spanish, it refers to the mythological creature known as the mermaid. The capital of the Island is Hagåtña. The Hagåtña river flows beneath the Spanish Bridge, where it is possible to observe her monument. Many believe Sirena resided here. There is speculation that this story was crafted to frighten children into listening to their parents and not playing in the river's water, as it was a vital water source. This was more prevalent when the Spanish established Guam as a port for whaling, pirates, and trade during the Spanish Galleon trade era(16th century). It should be noted that the women's role in the Chamorro version reflects a matrilineal society, which can be seen with Grandma/Godmother.
👉I like to point out in this, Thomas Edison patented the light bulb in 1879. So visually the lights outside and inside the huts as flames. As Ai(text to image) does not account for these type of items.
👉This also goes back to be careful what you wish for because you may actual get your wish.
👉Chamorro people are Pacific Islanders, similar to Hawaiians, and have a brown/tan skin complexion.\
👉My mermaid looks strikingly similar to the Disney's recent version of Ariel. I Thought that was interesting because I put just "mermaid" into the text prompt. Its worth pointing out ai limitations as it's not advanced as I originally thought, likely due to its limited data. In this case only disney as a reference for mermaid.
based on ordinary prompts\
Prompt used:\
That's all-Thank you until next time (N)osyters!
If you like it, send me some ❤❤hearts❤ and if you didn't like it-⚡⚡🍑🍑zap⚡⚡🍑🍑 me!🍑🍑 me!
For email updates you can subscribe to my paragraph.xyz/\@onigirl or below if using the Yakihonne App
-
@ 8d34bd24:414be32b
2024-10-13 14:57:58There have been many so called gods throughout the history of mankind. All but one have been created by man (or possibly fallen angels) and formed by man’s hands. Only the God of the Bible created man, formed man & breathed breath into him, and revealed Himself to mankind.
The God of the Bible does not need man to defend Him. (Believers are called to be “… ready to make a defense to everyone who asks you to give an account for the hope that is in you …”(1 Peter 3:15) and to stand up for the truth.) The God of the Bible is the only God who is able to fight for Himself and His honor with no help from His creation. This story from 1 Samuel is an inspiring and humorous story that shows God’s ability to defend Himself even when none of His “followers” are doing a good job of following.
The Philistines Eli’s son’s, Hophni and Phinehas, carried the Ark of the Covenant with the Israelite army into battle against the Philistines and Hophni & Phinehas were killed, the Israelite army was defeated, and the Ark of the Covenant was captured.
God had been disrespected by the Israelites in general and the priests in particular, so God allowed them to be defeated by their enemies. This however doesn’t mean that He allowed His name to be dishonored.
Now the Philistines took the ark of God and brought it from Ebenezer to Ashdod. Then the Philistines took the ark of God and brought it to the house of Dagon and set it by Dagon. When the Ashdodites arose early the next morning, behold, Dagon had fallen on his face to the ground before the ark of the Lord. So they took Dagon and set him in his place again. (1 Samuel 5:1-3a) {emphasis mine}
When the Philistines put the Ark into the temple of their “god,” they put the Ark before Dagon as a sign of submission, but the one true God doesn’t need anyone to defend Him. When the people returned the next day, their “god” Dagon was face down, prostrate before the Earthly throne of God. The real God cast down the false god/idol in the ultimate position of submission and worship.
The Philistines, however, weren’t ready to submit to the real God yet.
So they took Dagon and set him in his place again. But when they arose early the next morning, behold, Dagon had fallen on his face to the ground before the ark of the Lord. And the head of Dagon and both the palms of his hands were cut off on the threshold; only the trunk of Dagon was left to him. (1 Samuel 5:3b-4) {emphasis mine}
After the Philistines sat their “god” up again (because he couldn’t set himself up), the real God cast him face down again, but this time removed his head and his hands (his mind and his ability to act). You have to love God’s sense of humor showing them who was really God, but like most people, they were slow learners and didn’t want to change their worldview.
Now the hand of the Lord was heavy on the Ashdodites, and He ravaged them and smote them with tumors, both Ashdod and its territories. When the men of Ashdod saw that it was so, they said, “The ark of the God of Israel must not remain with us, for His hand is severe on us and on Dagon our god.” So they sent and gathered all the lords of the Philistines to them and said, “What shall we do with the ark of the God of Israel?” And they said, “Let the ark of the God of Israel be brought around to Gath.” And they brought the ark of the God of Israel around. (1 Samuel 5:6-8) {emphasis mine}
When the Philistines still wouldn’t listen, God attacked them personally by smiting “them with tumors.” Fear overcame them, so they sent the Ark to another Philistine city, Gath. They didn’t worship the one, true God. They didn’t return the Ark. They just passed the misery to another of their cities.
After they had brought it around, the hand of the Lord was against the city with very great confusion; and He smote the men of the city, both young and old, so that tumors broke out on them. So they sent the ark of God to Ekron. And as the ark of God came to Ekron the Ekronites cried out, saying, “They have brought the ark of the God of Israel around to us, to kill us and our people.” (1 Samuel 5:6-8) {emphasis mine}
As the Ark arrived in Gath, the people of Gath had tumors break out, so the people of Gath sent the Ark on to Ekron. The Ekronites realized what was about to befall them and cried out saying, “They have brought the ark of the God of Israel around to us, to kill us and our people.” After seven months of various cities being ravaged by God, they finally called their diviners in order to try to figure out what to do to stop this plague.
They said, “If you send away the ark of the God of Israel, do not send it empty; but you shall surely return to Him a guilt offering. Then you will be healed and it will be known to you why His hand is not removed from you.” Then they said, “What shall be the guilt offering which we shall return to Him?” And they said, “Five golden tumors and five golden mice according to the number of the lords of the Philistines, for one plague was on all of you and on your lords. So you shall make likenesses of your tumors and likenesses of your mice that ravage the land, and you shall give glory to the God of Israel; perhaps He will ease His hand from you, your gods, and your land. (1 Samuel 6:3-5) {emphasis mine}
God hates divination, but this was the first wise action taken by the Philistines. They started to show proper respect for the one true God, even if they didn’t really understand that He wasn’t just another god, but the one and only God. The one thing they did understand was that they should give a guilt offering to ask forgiveness for their sins against God.
Why then do you harden your hearts as the Egyptians and Pharaoh hardened their hearts? When He had severely dealt with them, did they not allow the people to go, and they departed? (1 Samuel 6:6)
They also had seen God’s majesty and wrath with respect to the Egyptians and Pharaoh and didn’t want to suffer what Egypt suffered for refusing to obey God. They feared God, but they didn’t want to submit to Him and they really didn’t want to submit to the Israelites, so they decided to put God to a test:
Now therefore, take and prepare a new cart and two milch cows on which there has never been a yoke; and hitch the cows to the cart and take their calves home, away from them. Take the ark of the Lord and place it on the cart; and put the articles of gold which you return to Him as a guilt offering in a box by its side. Then send it away that it may go. Watch, if it goes up by the way of its own territory to Beth-shemesh, then He has done us this great evil. But if not, then we will know that it was not His hand that struck us; it happened to us by chance.” (1 Samuel 6:7-9) {emphasis mine}
The Creator of the universe didn’t have any trouble with the Philistine’s test. The Philistines had two nursing cows yoked to a cart with the Ark on it. They wanted to see if these nursing cows would head home to their nursing calves as would be expected, or would they take the Ark home to Israel? What do you think happened? Of course, the cows took the Ark straight to Israel to the very city, Beth-shemesh, that the Philistines had specified. He proved without a shadow of a doubt that He was God.
If only the Israelites showed as much respect. Many of the residents of Beth-shemesh died because they disobeyed and looked into the Ark. The one true God is omnipotent, but He is also holy and must be treated as such.
God made sure His people and these pagan foreigners knew His power and He didn’t need any help.
Just as was shown in my last post, this historical event demonstrated God’s power to His people and to foreigners. When God’s chosen people refused to show Him proper reverence, He corrected them and corrected those surrounding them.
Trust Jesus.
your sister in Christ,
Christy
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
@ 97c70a44:ad98e322
2024-03-23 04:34:58The last few days on developer nostr have involved quite a kerfluffle over the gossip model, blastr, banning jack, and many related misunderstandings. This post is an attempt to lay out my thoughts on the matter in an organized and hopefully helpful way.
What's wrong with gossip?
It all started with a post from jack asking why more devs haven't implemented the gossip model. There are many answers to this question, not least having to do with there being two standards for user relay selections, and ongoing changes to NIP 65. But I don't want to talk about compatibility here.
nevent1qydhwumn8ghj7argv4nx7un9wd6zumn0wd68yvfwvdhk6tcprfmhxue69uhhq7tjv9kkjepwve5kzar2v9nzucm0d5hszymhwden5te0wfjkccte9enrw73wd9hj7qpq2uf488j3uy084kpsn594xcef9g9x3lplx4xnglf0xwghyw2n3tfqqnrm02
Mazin responded with some numbers which estimate how many connections the gossip model requires. Too many connections can become expensive for low-power clients like mobile phones, not to mention some privacy issues stemming from nosy relays.
nevent1qyd8wumn8ghj7urewfsk66ty9enxjct5dfskvtnrdakj7qgewaehxw309amk2mrrdakk2tnwdaehgu3wwa5kuef0qyghwumn8ghj7mn0wd68ytnhd9hx2tcqyp2xzsjktypudzmygplljkupmuyadzzr6rkgnvx9e0fx3zwhdm0vkz4ceg7
I have some minor disagreements with Mazin's numbers, but I basically agree with his point — a purist gossip model, where a large proportion of nostr users run their own relays results in a high number of connections to different relays. I brought this question up late last year in my interview with Mike Dilger and in a conversation with fiatjaf, who convinced me that in practice, this doesn't matter — enough people will use a handful of larger hubs that there will be a good amount of overlap in relay selections between most pubkeys.
To articulate this more clearly: the goal is not "personal web nodes", which is a pipe dream the Farcasters and BlueSkys (BlueSkies?) of the world aim at, but a more pragmatic mix between large hubs and smaller purpose-built relays. These small relays might be outlets for large publishers, small groups, or nerds who also run their own SMTP servers and lightning nodes.
The point of the gossip model is that these small nodes be possible to run, and discoverable from the rest of the network so that we can preserve the censorship-resistant qualities of nostr that brought us here in the first place.
Blast It!
It's no secret that I've long been a critic of Mutiny's blastr relay implementation. My main objection is that the blastr approach doesn't account for the hard limits involved in scaling smaller relays. If the goal is to cross-pollinate notes across all relays in the network, all relays will require the same size database, and contain all notes in the network. This works right now (sort of), but as the network grows, the relays running on a $5 VPS are going to have their disks fill up and will inevitably fall over.
nevent1qyvhwumn8ghj76r0v3kxymmy9ehx7um5wgcjucm0d5hszxnhwden5te0wpuhyctdd9jzuenfv96x5ctx9e3k7mf0qythwumn8ghj7un9d3shjtnwdaehgu3wvfskuep0qqs07jr9qx49h53nhw76u7c3up2s72k7le2zj94h5fugmcgtyde4j9qfrnwxj
Not only that, but the content breakdown on any given relay by default becomes an undifferentiated soup of "GM", chinese notes, bots, bitcoin memes, and porn. Blastr makes it impossible to run an interesting relay without implementing write policies.
Which is actually fine! Because that's always been true — servers that allow anonymous uploads always get abused. Tony is just helpfully pointing out to us that this is no less true of nostr relays. I only wish he could have waited a little longer before mounting his attack on the network, because lots of hobbyists are interested in running interesting relays, but the tools don't yet exist to protect those servers from unsolicited notes.
One other note on blastr — Tony at one point described blastr as a relay proxy. This is an interesting perspective, which puts things in a different light. More on proxies later.
Ban Jack?
Here's a thought experiment: how might we actually "ban blastr"? @Pablof7z suggested to me in a conversation that you could configure your relay to check every note that gets published to your relay against the big nostr hubs, and if it exists on any of them to simply delete it. Of course, that would result in your relay being basically empty, and the hubs having all of your content. That's game theory for you I guess.
Another approach that was floated was to encourage users to only publish to small relays. In theory, this would force clients to implement gossip so users could still see the content they were subscribed to. Fiatjaf even posted two identical notes, one to his personal relay, and one to a hub to see which would get more engagement. The note posted to the mainstream relay got 10x more replies and likes than the more obscure note.
nostr:nevent1qyd8wumn8ghj7urewfsk66ty9enxjct5dfskvtnrdakj7qgmwaehxw309aex2mrp0yh8wetnw3jhymnzw33jucm0d5hszymhwden5te0wp6hyurvv4cxzeewv4ej7qpqdc2drrmdmlkcyna5kkcv8yls4f8zaj82jjl00xrh2tmmhw3ejsmsmp945r
Of course, this is thwarted by blastr, since blastr not only replicates notes posted to it, it also actively crawls the network as well. So the next logical step in this train of thought would be for hubs to encourage people to use small relays by actively blocking high-profile accounts.
nostr:nevent1qydhwumn8ghj7argv4nx7un9wd6zumn0wd68yvfwvdhk6tcpzdmhxue69uhhyetvv9ujue3h0ghxjme0qyd8wumn8ghj7urewfsk66ty9enxjct5dfskvtnrdakj7qpqpjhnn69lej55kde9l64jgmdkx2ngy2yk87trgjuzdte2skkwwnhqv5esfq
This would of course never happen (Damus is one client that hasn't implemented NIP 65, and they also run the biggest relay), but it was a fun thought experiment. At any rate, the silliness of the suggestion didn't stop certain people from getting offended that we would "disrupt the free market" by "forcing" our opinions on everyone else. Oh well.
Death to Blastr
In reality, even though blastr makes it a little harder to adopt gossip in the short term, its days are numbered. Eventually, relay operators will start to feel the pain of unsolicted notes, and will either shut their relays down or look for tools that will help them curate the content they host.
From my perspective, these tools take two forms — read protection and write protection. This is something I alluded to in my talk at Nostrasia last November.
Write protection is straightforward — already many relays have access control lists based on active subscriptions, invite codes, or just static whitelists that determine who is allowed to post to a given relay, or what event authors are represented there. This approach effectively prevents blastr from using relays as free storage, which is a huge improvement.
Read protection is more tricky, because anything publicly readable will be scraped by blastr and replicated to unauthenticated-write relays across the network. In most cases, this is ok, but there are use cases for relays to exist that host a unique collection of notes oriented around some organizing principle. Unfortunately, with blastr in action (or any scraper that might exist), the only way to do this is to actively protect proprietary content. There are a few approaches that can work to make this happen:
- IP-based access control lists
- AUTH-based access control lists
- Stripping signatures when serving events
- Storing and serving encrypted content
Each of these approaches has its own set of trade-offs. But depending on use case, any of them or a combination of them could work to allow relay operators to carve out their own piece of the nostr-verse. In fact, this is a big part of what Coracle is about — the white-labeled version of the product confines certain notes to proprietary relays, with optional encrypted group support.
Enough of my polemic against blastr. Let's talk about how to make the gossip model actually work.
Hints are pointless
Right now, clients that implement the gossip model rely pretty heavily on relay hints to find related notes — whether user profiles, reply parents, or community definitions. The problem with hints is that they are prone to link rot. Many of the relays that were set up a year ago when nostr took off are no longer online, and yet they persist in user relay lists, and in relay hints. These hints can't be updated — they are set in stone. What this means is that a different mechanism has to be used to find the notes the hints were supposed to help locate.
Because of this, I've come around to the position that hints are basically pointless. They are fine as a stopgap, and might be appropriate for certain obscure and ill-defined use cases where relay urls are the most durable address type available. But they provide basically no value in supporting the long-term robustness of the network.
What are durable, however, are pubkeys. Pubkeys are available pretty much everywhere, except in event id hints — and there is a proposal in the works to add a pubkey to those too. The cool thing about pubkeys as hints is that once you have a pubkey, all you need to do is find that person's kind 10002 inbox/outbox selections, and you should be able to find any note they have published.
This goes with the caveat that when users change their relay selections, or rotate their key, they (or their relays) should be sure to copy their notes to the new relay/pubkey.
The question then is: how do I find a given pubkey's relay selections?
There are already several mechanisms that make this reasonably easy. First of all, NIP 65 explicitly recommends publishing relay selections to a wide range of relays. This is a place where the blastr approach is appropriate. As a result, relay selections are usually available on the most popular public relays. Then there are special purpose relays like purplepag.es, which actively seek out these notes and index them.
These indexes are not confined to relays either. It would be trivial to create a DVM that you could ask for a pubkey's relay selections, optionally for a fee. Alex Gleason's proxy tag could also be used to indicate indexes that exist outside the nostr network — whether that be torrents, DHT keys, or what have you.
The best part is that this doesn't negatively impact the decentralization of the network because in principle these indexes are stateless — in other words, they're easily derived from the state of the public part of the nostr network.
Just do it for me
Looping back to where we started — the complexity and technical challenges of implementing the gossip model — there is a simple solution that many people have experimented with in different ways that could solve both issues at once: proxies.
As I mentioned above, Tony thinks of blastr as a proxy, and he's right. More specifically, it's a write-proxy. This is only part of its functionality (it also acts as an independent agent which crawls the network. EDIT: apparently this is not true!), but it is an essential part of how people use it.
Another kind of proxy is a read proxy. There are several implementations of these, including my own multiplextr proxy, which is gossip-compatible (although it requires a wrapper protocol for use). The advantage of a proxy like this is that it can reduce the number of connections a client has to open, and the number of duplicate events it has to download.
Proxies can do all kinds of fancy things in the background too, like managing the gossip model on behalf of the client, building an index of everything the user would be likely to ask for in advance to speed up response times, and more.
One interesting possibility is that a NIP 46 signer could double as a proxy, reducing the number of round trips needed. And since a signer already has access to your private key, this kind of proxy would not result in an escalation in permissions necessary for the proxy to work.
It's simple
The number of cool and creative solutions to the content replication and indexing problem is huge, and certainly doesn't end with blastr. Just to summarize the next steps I'm excited to see (to be honest, I want to build them myself, but we all know how that goes):
- More clients supporting gossip
- Gossip implementations maturing (Coracle's still has some issues that need to be worked out)
- A shift from relying on relay hints to relying on pubkey hints + relay selection indexes of some kind
- Proxy/signer combos which can take on some of the heavy lifting for clients of delivering events to the right inboxes, and pulling events from the right outboxes
Let's get building!
-
@ 57fe4c4a:c3a0271f
2023-10-18 13:02:10📝 Summary: Batched splicing can be risky due to certain conditions like no funds in a channel and using an old state. It is important for batched splicing mechanisms to have a backout option to prevent disruptions caused by confirmed old states. Additionally, not all splice implementations performing a check can lead to potential loss of funds.
👥 Authors: • Greg Sanders ( nostr:npub1jdl3plz00rvxwc6g2ckemzrgg0amx5wen4kfvs3laxtssxvk9cvsf3gh0m ) • ZmnSCPxj ( nostr:npub1g5zswf6y48f7fy90jf3tlcuwdmjn8znhzaa4vkmtxaeskca8hpss23ms3l )
📅 Messages Date: 2023-10-17
✉️ Message Count: 3
📚 Total Characters in Messages: 5405
Messages Summaries
✉️ Message by ZmnSCPxj on 17/10/2023: Batched splicing can be risky if certain conditions are met, such as having no funds in a channel and using an old state. It is important for batched splicing mechanisms to have a backout option to prevent disruptions.
✉️ Message by Greg Sanders on 17/10/2023: Batched splicing is risky because if an old state is broadcasted and confirmed before the splice, it can disrupt the process. It is important for batched splicing mechanisms to have a backout option.
✉️ Message by ZmnSCPxj on 17/10/2023: Batched splicing can be risky if not all splice implementations perform a check to ensure subsequent splices confirm, potentially leading to loss of funds.
Follow nostr:npub1j3t00t9hv042ktszhk8xpnchma60x5kz4etemnslrhf9e9wavywqf94gll for full threads
-
@ 6bf975a0:65de1244
2024-10-13 14:16:56Площадки для размещения контента СМИ
Условно их можно разделить на две группы: свои и не свои. Свои медиа полностью контролирует. В не своих медиа арендуют чужие технологии для доставки контента аудитории, выполняя только производственную роль и рассматривая доставку контента как аутсорс.
Исследования 2020-ых годов показывают, что значительная часть аудитории теперь полагается на социальные сети для получения новостей. Например, исследование 2021 года показало, что 42% американцев используют социальные сети в качестве источника новостей, и эта цифра выросла по сравнению с предыдущими годами. Среди молодых людей эта зависимость еще более выражена: например, 38% людей в возрасте 18-24 лет в первую очередь получают новости через социальные сети.
Платформы корректируют свои стратегии в свете генеративного ИИ, а также ориентируются на меняющееся поведение потребителей и растущую обеспокоенность регулирующих органов по поводу дезинформации и других вопросов. В частности, Meta* пытается снизить роль новостей на своих площадках и ограничивает алгоритмическое продвижение политического контента. Компания также сокращает поддержку новостной индустрии, не продлевает сделки на миллионы долларов и удаляет вкладку новостей в ряде стран.
Ленивая аудитория
Ей сложно выходить за пределы привычных пространств.
Исследование, проведенное компанией Orca Online в 2022 году, показало, что посты в социальных сетях без внешних ссылок имеют значительно более высокий уровень вовлеченности. Посты без ссылок в среднем набирали 352,3 взаимодействия, в то время как посты с внешними ссылками - только 139,1 взаимодействия. Это говорит о том, что пользователи с большей вероятностью будут взаимодействовать с контентом, который удерживает их в рамках платформы. Исследование, проведенное Институтом Рейтер, показало, что 47% британских респондентов просматривают и читают новости в социальных сетях, не переходя по ссылкам, чтобы получить доступ к полным текстам статей.
Источник: Использование новостей на онлайн-платформах фрагментировано: в настоящее время шесть сетей охватывают не менее 10% респондентов Reuters по сравнению с двумя десять лет назад. YouTube используется для новостей почти третью (31%) глобальной выборки каждую неделю, WhatsApp* примерно на пятую часть (21%), в то время как TikTok (13%) обогнал Twitter (10%), который теперь переименован в X, в первый раз.
Популярность аудио и видеоформатов
В связи с этими изменениями видео становится более важным источником онлайн-новостей, особенно среди более молодых групп. Каждую неделю доступ к коротким новостным видеороликам получают две трети (66%) аудитории СМИ, а более длинные форматы привлекают около половины (51%). Основным источником потребления новостного видео являются онлайн-платформы (72%), а не веб-сайты издателей (22%), что увеличивает проблемы, связанные с монетизацией и подключением.
Подкастинг новостей остается светлым пятном для издателей, привлекая более молодую, хорошо образованную аудиторию, но в целом является деятельностью меньшинства. В корзине из 20 стран чуть более трети (35%) ежемесячно посещают подкасты, а 13% получают доступ к шоу, посвященному новостям и текущим событиям. Многие из самых популярных подкастов сейчас снимаются и распространяются через видеоплатформы, такие как YouTube и TikTok
Популярность коротких видео
Насколько актуальны сегодня сайты?
На всех рынках только около пятой части респондентов исследования Reuters 2024 (22%) называют новостные сайты или приложения своим основным источником онлайн-новостей –, что на 10 процентных пунктов ниже, чем в 2018 году. Издателям на некоторых рынках Северной Европы удалось противостоять этой тенденции, но более молодые группы во всем мире демонстрируют более слабую связь с новостными брендами, чем в прошлом.
Пожилые зрители по-прежнему предпочитают смотреть видео через новостные сайты, хотя большинство из них говорят, что в основном получают доступ к видео через сторонние платформы. Только в таких странах, как Норвегия, половина пользователей (45%) говорят, что в основном потребляют видео через веб-сайты, что свидетельствует о силе брендов на этом рынке, стремлении обеспечить хороший пользовательский опыт и стратегии, ограничивающей количество видео, размещаемых издателями на таких платформах, как Facebook и YouTube.
Важно отметить, что на всех рынках поиск и агрегаторы, вместе взятые (33 %), являются более важным способом получения новостей, чем социальные сети (29 %) и прямой доступ (22 %). Значительная часть мобильных оповещений (9 %) также генерируется агрегаторами и порталами, что усиливает беспокойство о том, что может произойти дальше.
Поисковые машины и нейросети против создателей контента
Поиск: с одной стороны, Google хочет выдавать саммари по запросам через Gemini на страницах с результатам поиска.
Источник: Google запускает — пока в тестовом режиме и для отдельных групп пользователей — новую функцию Supercharging Search with generative AI (SGE). После ее активации вместо привычного поискового движка наш запрос будет обрабатывать ИИ Gemini, который в ответ сформулирует некое резюме из 272 слов, предваряющее поисковую выдачу.
С другой, появляются Perplexity, Copylot, которые выдают ссылки на источники.
Голосовые помощники: не дают ссылок для перехода, но озвучивают информацию с сайтов.
Общий тренд нейросетей: большие корпорации обучают свои технологии на данных создателей контента, но далеко не всегда дают трафик самим создателям контента.
Экономика онлайн-СМИ в мире
2024, издание Politico об экономическом состоянии американских изданий
Патрик Сун-Шионг, миллиардер-издатель газеты Los Angeles Times, уволил 20 процентов сотрудников своего отдела новостей. В журнале Time владельцы-миллиардеры Марк и Линн Бениофф сделали то же самое в отношении 15 % сотрудников редакции, состоящих в профсоюзе. Последний пожар разгорелся в Sports Illustrated на предыдущей неделе, когда катастрофические увольнения были разосланы по электронной почте большинству сотрудников. Business Insider (чья материнская компания Axel Springer также владеет POLITICO) сократил 8 % своего штата, а сотрудники Condé Nast, Forbes, New York Daily News и других изданий вышли на улицу в знак протеста против предстоящих сокращений в своих магазинах.
Новостной бизнес всегда был цикличным: он падал во время экономического спада, а затем улучшался на подъеме. Но теперь это не так, поскольку наша экономика в последнее время удивительно сильна. Почти везде, куда бы вы ни посмотрели - Washington Post, NPR, Vice, Vox, NBC News, Texas Tribune, WNYC, Barstool Sports, - компании сократили огромное количество сотрудников. С 2008 года занятость в новостных отделах сократилась более чем на 26 процентов. Buzzfeed News мертв. Журнальный бизнес тоже атрофировался: доходы газетных киосков упали с 6,8 миллиарда долларов в 2006 году до 1 миллиарда долларов в 2022 году. Наблюдая за тем, как медиабизнес истекает кровью, профессор журналистики Джефф Джарвис, человек, когда-то ратовавший за электронное будущее отрасли, сложил руки на коленях, как гробовщик, и спросил в своем блоге, не пора ли отказаться от старых новостей. Ссылаясь на мрачные новости об увольнениях, Джарвис привел в порядок труп в процессе его создания. Он отметил, что доверие к журналистике тает, а частные инвестиционные компании, такие как Alden Global Capital, занимаются каннибализмом своих газет.
Некогда здоровые газеты закрылись в таких городах, как Нью-Йорк, Сан-Франциско, Бостон и Миннеаполис; приостановили печать в таких городах, как Вашингтон; стали выходить раз в две недели, как в Чикаго и Сиэтле; или иным образом сократили количество страниц по сравнению с временами бума начала XXI века. Неужели нет никакого оптимизма? Уж точно не в гарвардском журнале Nieman Reports, который в октябре опубликовал некролог Кэтрин Рейнольдс Льюис под заголовком «Эй, журналисты, никто не придет нас спасать».
Кроме рекламы есть и другие источники доходов онлайн-медиа, но с ними тоже не все так однозначно.
Reuters: Наши данные показывают незначительный рост подписки на новости: всего 17% заявили, что заплатили за любые онлайн-новости в прошлом году в корзине из 20 более богатых стран. В странах Северной Европы, таких как Норвегия (40%) и Швеция (31%), самая высокая доля платящих, среди самых низких - Япония (9%) и Великобритания (8%). Как и в предыдущие годы, мы обнаружили, что большая часть цифровых подписок достается лишь нескольким элитным национальным брендам, что усиливает тренд победитель получает все.
Топ мировых изданий по объемам доходов от платной подписки (paywall)
Эфирные радио и телевидение
Прогнозируемый рост радио: Ожидается, что к 2029 году радио будут слушать более 3,2 миллиарда человек по всему миру, что составляет около 40 % населения планеты. Это говорит о том, что радио остается важным средством массовой информации, несмотря на рост цифровых альтернатив.
Источник, 2022 год: Большинство россиян (57%) с той или иной периодичностью слушают радио, при этом каждый пятый делает это ежедневно. Наиболее характерна эта привычка для мужчин старше 35 лет, имеющих высшее образование. Доля женской и молодежной аудитории значительно меньше (71% и 81% соответственно не слушают радиостанции совсем или включают их от силы пару раз в месяц).
Нейросети и достоверность контента
Обеспокоенность по поводу того, что реально, а что фальшиво в Интернете, когда дело доходит до онлайн-новостей, выросла на 3 процентных пункта за последний год: примерно шесть из десяти человек из аудитории СМИ в исследовании Reuters 2024 года (59%) заявили, что они обеспокоены. Этот показатель значительно выше в Южной Африке (81%) и США (72%), обеих странах, которые в этом году проводят выборы.
Доля респондентов, которые говорят, что их беспокоит вопрос о том, что в интернете настоящее, а что фальшивое, выросла на 3 процентных пункта с 56 до 59 %. Этот показатель наиболее высок в некоторых странах, проводящих опросы в этом году, включая Южную Африку (81 %), США (72 %) и Великобританию (70 %). Если рассматривать ситуацию в региональном разрезе, то самый высокий уровень обеспокоенности наблюдается в Африке (75 %), а более низкий - в большинстве стран Северной и Западной Европы (например, в Норвегии - 45 % и Германии - 42 %).
Интерес аудитории к СМИ как таковым
Согласно отчету Reuters Institute Digital News Report за 2024 год, интерес к новостям снизился с 66 % в 2018 году до 49 % в 2024 году на 12 основных рынках. Этот спад особенно заметен среди более молодой аудитории: только 31,9 % людей в возрасте от 16 до 24 лет проявляют интерес к новостям.
Исследование GWI показывает, что глобальный интерес к новостям упал примерно на 8 процентных пунктов в период с 1 квартала 2019 года по 1 квартал 2023 года, а по состоянию на 1 квартал 2024 года только 41,6 % респондентов заявили о своем интересе к новостям.
Выборы повысили интерес к новостям в нескольких странах, включая США (+3), но общая тенденция остается нисходящей. Интерес к новостям в Аргентине, например, упал с 77% в 2017 году до 45% сегодня. В Великобритании интерес к новостям снизился почти вдвое с 2015 года. В обеих странах это изменение отражается в аналогичном снижении интереса к политике.
*Упомянутые в тексте поста и на скриншотах Facebook, WhatsApp и Instagram принадлежат компании Meta, которую в РФ признали экстремистской
-
@ 28460797:b23ce78f
2024-10-13 10:53:36Post number 1
-
@ 5e9efd13:13821c2a
2024-10-13 06:17:49Eighteen months after my mother suddenly passed away, I was diagnosed with grade four brain cancer. I was 25 years old.
Wow. When I put it like that, it really puts the last five years of my life into perspective.
We all want to become great, but we don’t get to live the life we want without suffering.
The greatest honor I’ve had through this entire experience is to inspire others through my journey. It wasn’t easy. Actually, it was extremely difficult. But if I can make it easier for you—my job is complete.
One of my greatest honors in my journey was to inspire my own father. It’s every son’s dream. Without knowing it, I inspired my father to get in control of his health.
Nine months after my cancer diagnosis, I moved back home with him. Into a house with a 70-year-old widower showing early signs of Parkinson’s disease. It was my first time living at home with my dad since I was 19—and this time, my mom wasn’t there. That transition was hard, to say the least. Back at home, finally in that safe space again… but I’m missing my mom, and he’s missing his wife.
Still, despite our differences (I punched a hole in the wall), I persevered every day in telling him I knew I could heal from this cancer. He encouraged me to take chemotherapy, I pushed for alternative treatments. He pushed for a Christian mindset, I aimed for a Taoist one. Yin and Yang. Father and son.
It has been two years of living in the house with him, and I can say things are going well, and I love my father. Our deep challenges have only brought us closer.
About 17 months into my cancer journey, my father was then diagnosed with a condition. He had surgery, lost a lot of weight, and began taking his health seriously. Today, he goes to the gym, swims, and even does a Tai Chi sword class. At some point, he told me that I was actually the reason he started believing in his own ability to recover. It is incredibly rewarding to know that my choice to be brave in a world full of suffering can inspire others to take action.
If you are suffering right now, I feel you. A lot of people are in the same boat as you.
I want you to know that it will get better.
If you are reading this right now, it already has. You are already feeling better. I want you to know that you telling your story helps other people. You’re on your way up. One day at a time. People love a redemption arc. Sometimes you need to hit rock bottom before you can rise up again. You can do it. You are, in fact, already doing it.
Depression, check.
Cancer, check.
Dead mom, check.
I mean—some people definitely have it a lot worse. At least I had a mom. At least I didn’t have cancer for the first 25 years of my life. At least I grew up with two parents who loved me. I had friends, food, and shoes. When you get another chance to live, you realize that all you really need is the humility to admit you aren’t perfect. Friends, food, shoes, and purpose. A way to contribute. If you’re lost because you feel like you have no purpose and nothing to contribute, start now. Please, if you are suffering, tell your story. It helps other people. Dare I even say that you are being selfish by not sharing your story?
It’s all about perspective. Sometimes I ponder why I lost years of my life battling this disease—but then I remember that the knowledge I gained far surpasses any amount that I could learn in fifty years of a healthy life.
Yes, I guess I’ve led some sort of a life so far.
But that begs the question, what does it mean to lead a life?
With that said: I’ve always wondered what a life coach is, or what qualifies someone to be one. I guess it’s anyone who has a life that you would like to emulate… So I just pay someone else to give me encouragement? Well, no—I’m sure it’s deeper than that.
I think that everyone in your life can be viewed as a coach. Some coaches are good, some aren’t so good. But everyone pushes us in a certain direction. It could be a friend, an enemy, a stranger. A teacher, a weirdo, a YouTuber you’ve never met.
You can be a coach too, especially if you have suffered through the pain.
If your life has always been a breeze—good, I am happy for you, and congratulations.
But if you feel like there’s no reason to live, that the world is ending, and that it couldn’t get worse… first of all—you’re wrong. It can always get worse. And—it can get a lot, lot better.
It’s all a matter of perspective. In one way, my mother’s death was the most tragic and unnecessary event to ever happen in my life.
In another way, my mother’s death was a necessary step for my family to come together in unity and praise for the homemaker—it forced me to grow up and made me learn how to take on my own responsibilities—no longer a mama’s boy, but now a man.
In one way, being diagnosed with brain cancer at the age of 25 was a devastating and unwarranted attack from God placed upon a motherless boy who always tried to be a good person.
In another way, being diagnosed with cancer at the age of 25 was exactly what God needed to do to make me stop taking life for granted—and to grow into the hero that He has always wanted me to be. God placed a ball of pure energy deep inside my skull where it couldn’t be seen—and once discovered, the responsibility was placed on me to either surrender and let it take over, or to transform that energy into positivity and send a message of love into the world.
If it weren’t for those events happening to me—or FOR me—you wouldn’t be reading this article right now.
And YOU—yes, you.
You have a story to tell, and I look forward to hearing it.
I trust that you found this article to be helpful, and I would like to end it with a prayer.
Even though I am suffering right now, I fully and completely accept myself.
Even though I want more, I am fully satisfied with what I already have.
Even though I am lost as to what to do with my life, I am grateful that I remain alive in this moment.
Even if things don’t go exactly the way I want them to go, I fully trust that whatever is meant for me will come to me—as long as I remain strong amidst the suffering.
-
@ 2edbcea6:40558884
2023-10-08 15:27:57Happy Sunday #Nostr !
Here’s your #NostrTechWeekly newsletter brought to you by nostr:npub19mduaf5569jx9xz555jcx3v06mvktvtpu0zgk47n4lcpjsz43zzqhj6vzk written by nostr:npub1r3fwhjpx2njy87f9qxmapjn9neutwh7aeww95e03drkfg45cey4qgl7ex2
NostrTechWeekly is a weekly newsletter focused on the more technical happenings in the nostr-verse.
Let’s dive in!
Recent Upgrades to Nostr (AKA NIPs)
1) (Proposed) NIP 43: Fast Auth between clients and relays
Some relays are member-only. There has to be some way for relays to verify the content being sent/requested is from an authorized user (one of the members). Most methods for this are clunky and slow.
This NIP proposes a faster method for auth between clients and relays. From what I can tell when clients open a connection to a relay they’ll open it with an “authorization” query parameter on the end of the relay url. That query param will actually be an encoded Nostr event whose payload has the necessary info for the relay to authenticate the user opening the connection.
Kinda looks like an auth header like you’d see in an http request but shoehorned into a query parameter since websockets (which are used for connections to relays) don’t traditionally support headers.
Author: aruthurfranca
2) (Proposed) Updates to NIP 03: Timestamps you can rely on
Sometimes you want to make sure that a piece of Nostr content was actually created/pushed to a relay at a specific time. The example from last week was in the case of a future betting system built on Nostr, you really don’t want people to be able to publish that they made a bet 2 weeks ago for something whose outcome was determined twenty minutes ago.
NIP-3 already outlines a way to add OpenTimestamp attestations to Nostr events essentially allowing Nostr clients to outsource trust to a third party on whether a piece of content was created when it claims to be created. As is, NIP 3 is a little hard to use. This update would make it far simpler.
In the new methodology, you’d publish a Nostr event of kind 1040 with the proof of timestamp and point to the event that you’re trying to prove the timestamp for.
Author: nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
Notable Projects
Cellar Relay
If you haven’t been graced by the nostr.wine community they are a group of fine folks that host wine-themed relays. They’re some of the most reliable and widely used public and paid relays around.
nostr:npub18kzz4lkdtc5n729kvfunxuz287uvu9f64ywhjz43ra482t2y5sks0mx5sz recently announced the “Cellar” Relay that will store notes long term for paid users. Like we talked about in last week’s #NostrTechWeekly long-term note storage is a challenge for relay hosts (especially for relays that are free to users). But solving long term storage will help folks on Nostr feel like they’re building a persistent social experience instead of building an ephemeral feed.
Nice work! Glad to see the trend continuing for long-term note storage. 💪
Memestr.app
I can’t tell you how many times folks I talk to have said there should be a meme-focused client on Nostr. nostr:npub1zumzudhtu2558fgvycnjlc7pq9l4m338vghgcfzafftz9qg45ruslzpl4x delivers with https://memestr.app I definitely had some giggles when I logged on.
This could quickly evolve into a nostr-based Imgur and be far better for being nostr-based. But one thing I think is missing from the internet (not just Nostr) is a way to iterate on memes easily in the same place where you can share them. In combination with prisms/boosts this could be an interesting way for people to make money for their content and earn from what is built on top of their content.
Zap threads
Threaded conversations are an important component to social experiences on the internet. Reddit and Hackernews have really shown its power, we’ve seen StackerNews also leverage this format as well.
nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9 has created a nostr-based component for supporting the threaded comments, and it looks like it could be used in any web-application that needs commenting, spreading Nostr to every corner of the internet. It’s already powering the commenting on Habla.News
nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9 also did a great writeup on the reasoning for this project and where it’s going: https://habla.news/franzap/threading-the-web-with-nostr
If you need comments on your project, take a look!
Latest conversations: How decentralized is decentralized enough?
Distributed vs Decentralized
These two concepts are often used interchangeably, and it’s worth highlighting their distinction, especially in the context of Nostr. This is a good visualization to illustrate the difference.
Distributed: the P2P model
Robust, distributed systems are extremely censorship resistant, and include a lot of redundancy. Distributed systems distribute power widely, everyone is a peer.
Biological systems (cells, ecosystems, etc) are like this, cells are all peers and replaceable. Napster was distributed, everyone in the Napster ecosystem stored and shared some of the songs. IP (the “internet protocol”), which is how computers find each other on the internet, is a peer to peer technology where every node gossips about where to find other nodes.
Ideally all systems would be built this way, but in practice distributed / P2P systems are generally used when there’s a high chance of node failure (the death of individual cells) or attack (government takedowns). The challenge is that they’re expensive to run.
This might be confusing because Napster was “free” right? Most P2P software feels free-ish because many are donating some of their existing hardware/bandwidth/etc. But if you take the aggregate resources to run Napster versus just the parts of Spotify that help users to upload and download music, Spotify for sure uses fewer resources.
Distributed systems by their very nature have to assume that most peers in the network may fail. In order to maintain uptime, that results in P2P systems having many copies of what’s being shared and/or sending data many times to ensure it arrives.
I think most people would say they’d prefer everything to be P2P but it’s difficult to maintain a good experience in a P2P system and so it’s often only used in cases where it’s absolutely necessary.
Where does decentralization work better?
I wrote up a whole thing about decentralization a while back but the TL;DR is decentralized systems are better than centralized systems at distributing power widely, but they are generally still more performant than peer to peer systems.
Sometimes you need a mix of preventing abuses of power but still maintain a good experience for users. Freedom minded folks usually end up supporting decentralized solutions because they’re viable in the market and still take power away from centralized players.
Is Bitcoin decentralized or distributed?
The Bitcoin blockchain is a distributed system. Every Bitcoin full-node is an equal participant in storing, updating, and validating the blockchain.
Bitcoin as a monetary system, on the other hand, is decentralized: there are many more Bitcoin users than Bitcoin full-nodes. The nodes are the hubs and the users are the spokes.
There’s a reason for this architecture. Bitcoin nodes are ultimately in control of Bitcoin, it must be the least corruptible, most censorship resistant architecture possible. On the other hand a decentralized system has efficiency gains that make Bitcoin more competitive in comparison to existing financial systems. By having hubs (full-nodes, Bitcoin banks, wallet providers, exchanges, etc), the system is more efficient (and therefore cheaper). But by having many hubs, power is still spread widely.
Nostr: Decentralized or Distributed?
Nostr, as introduced by FiatJaf, seems like it was intended to be decentralized. Relays are the hubs and users are the spokes. Clients help connect users to relays (and therefore each other). There is wisdom to this architecture, because it will scale better than a P2P system.
Think of it this way, there are on the order of hundreds of millions of songs available for human consumption. With 10 million users storing a few hundred songs, there would be plenty of redundancy to allow Napster to distribute every song in a P2P manner. There are on the order of trillions of social media posts, if you include follows, reactions, DMs, etc, it’s likely in the quadrillions. With current technology a P2P system would never be able to provide coverage of every post and make it available in a reasonable time.
That said, there are some elements of Nostr that could benefit from being more P2P. Especially operations that would benefit from greater privacy (DMs, zaps, and reactions). Right now privacy around these actions is not well supported via Nostr.
Dev work has started on some P2P Nostr functionality announced by nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z and it’s right along those lines: maximizing privacy and security for nostr-based comms. It will have all the great things and all the difficulties of any P2P system, but it may be necessary to improve privacy on Nostr.
One thing that is great about Nostr is everyone can try things out and see if they work and if people want them. I see a lot of demand for privacy for certain Nostr operations, and if a P2P model would help, it needs to be tried. We’ll see whether the trade offs of P2P make Nostr better or if they make it less likely to succeed. We’ll see as development continues!
Until next time 🫡
If you want to see something highlighted, if we missed anything, or if you’re building something we didn’t post about, let us know. DMs welcome at nostr:npub19mduaf5569jx9xz555jcx3v06mvktvtpu0zgk47n4lcpjsz43zzqhj6vzk
Stay Classy, Nostr.
-
@ 3ffac3a6:2d656657
2024-10-13 03:33:29Introduction: The Collapse of Digital Technology
In São Paulo, the city that never sleeps, life moved to the rhythm of digital pulses. From the traffic lights guiding millions of cars daily to the virtual transactions flowing through online banking systems, the sprawling metropolis relied on a complex web of interconnected digital systems. Even in the quiet suburbs of the city, people like Marcelo had become accustomed to the conveniences of modern technology. He controlled his home’s lights with a swipe on his phone and accessed the world’s knowledge with a simple voice command. Life was comfortably predictable—until it all changed in an instant.
Marcelo, a brown-skinned man in his early 50s, sat at his small desk in his home office, the soft afternoon light filtering through the window. Slightly overweight, with a rounded belly that years of office work had contributed to, Marcelo shifted in his chair. His mustache twitched slightly as he frowned at the screen in front of him—a habit whenever he focused deeply. It was his signature look, a thick mustache that had stuck with him since his twenties. Despite his best efforts, he had never been able to grow a full beard—just sparse patches that never connected. Divorced for a few years, Marcelo lived alone most of the week, though he wasn’t lonely. His stable girlfriend, Clara, visited him every weekend, and his two children, now in their late teens and attending university, also came by on weekends.
The house was quiet except for the hum of his laptop and the soft clinking of his spoon against the coffee cup. Marcelo's work as a tech consultant was steady, though far from thrilling. He missed the hands-on work of his younger days, tinkering with radios and cassette players. Despite the modern world he inhabited, a small part of him had always felt more at home in the simpler, analog era he grew up in.
Suddenly, without warning, everything stopped.
The power blinked out, and the fan spinning lazily overhead whirred to a halt. Marcelo barely had time to glance at his laptop before it went black. His phone, lying next to him on the desk, flashed briefly before the signal dropped completely. Frowning, Marcelo stood up and walked to the window, expecting it to be a localized power outage. But outside, something felt wrong—too quiet. The usual hum of traffic and distant city noise was absent. Across the street, his neighbors were stepping out of their houses, confused, holding their phones up as if searching for a lost signal.
"Strange," Marcelo muttered under his breath, his mustache twitching again as his mind started racing. His first instinct was to check his landline, a relic he kept more out of nostalgia than need. He picked it up—no dial tone. Marcelo’s eyes narrowed. He walked back to his desk, feeling a strange sense of unease creeping into his chest. São Paulo wasn’t a city that just went silent.
In the corner of his office, among old mementos and books, sat an old shortwave radio he had restored years ago, one of his many hobbies. Marcelo flicked it on. Static crackled through the speakers. He turned the dial, searching for any clear signal, any voice that could explain what was happening. After a few minutes of adjusting the knobs, something faint broke through the static: "...global digital failure... all systems down... total blackout."
Marcelo’s breath caught. He leaned in closer to the radio, but the signal faded into static again. He sat back in his chair, heart racing. A total digital failure? Could that be possible? He had read about solar flares or large-scale cyberattacks, but those were rare, temporary incidents. This, however, felt different. More permanent.
Outside, the quiet was giving way to confusion. He could hear his neighbors talking, some shouting, cars honking in the distance as traffic lights had likely failed. Marcelo’s mind whirled with the implications of what he’d just heard. If all digital systems had truly collapsed, everything would stop—communication, banking, transportation. The world was built on a fragile web of digital threads, and it seemed as if all of them had just snapped.
But Marcelo didn’t panic. Not yet.
He stood in the middle of his office, running a hand over his face, fingers brushing against his mustache. His mind flashed back to his childhood in the 1980s, a time before the digital world had taken over. A time when radios, telephones with rotary dials, and cassette players were the height of technology. While the digital age had made life easier, Marcelo had never completely left the analog world behind. He still remembered how to set up a radio antenna, fix a record player, and manually tune frequencies.
As he looked at the silent chaos outside, Marcelo realized something that few others had likely grasped yet: the digital world may have fallen, but there was still a way to survive. A way that was slower, more manual, but reliable.
Marcelo felt the weight of this realization settle on his shoulders. He had no desire to be a hero, no illusions of saving the world. But for his family—his children who would be arriving for the weekend, and Clara, who would be coming over soon—he knew he had to act. Marcelo glanced at the shortwave radio. A part of him, long dormant, began to awaken.
In a world suddenly thrust back into analog, Marcelo Fontana Ribeiro might just be the person São Paulo—and his loved ones—would need.
-
@ 6bcc27d2:b67d296e
2024-10-13 03:15:54cardlink url: https://scrapbox.io/nostr/NIP-23 title: "NIP-23 - nostr" description: "#NIP Long form content https://github.com/nostr-protocol/nips/blob/master/23.md 長文投稿 記事やブログのような投稿をできるようにする仕様 ブログ系クライアントで使われている 仕様 新しい kind:30023(パラメータつき上書き可能イベント)を定義する 下書きの保存にはkind:30024を使う 「記事」や「ブログ投" host: scrapbox.io favicon: https://scrapbox.io/assets/img/favicon/favicon.ico image: https://scrapbox.io/assets/img/content-logo.png
- 長文投稿 -
@ 6bcc27d2:b67d296e
2024-10-13 02:11:54GitHub - jamesmagoo/nostr-writer: Publish seamlessly from Obsidian to Nostr
- [[Obsidian]]から[[Nostr]]に直接Noteを公開するためのツール
- [[NIP-23]]を使用している
-
使い方
- 最初にNostrのプライベートキーを設定で追加する
- Obsidianで書いてNostrに公開ボタンを押す
-
ユーザガイド
-
"Publish as a draft"を有効にすると下書きとして保存される。
- [[Habla]]で確認できる。 https://image.nostr.build/6a6b854e21e1b78494083d0bb00d0669fe70a1b8e612f89e171256ed05d7ee9b.png
-
@ 5df9cbaa:89f8f3b3
2024-10-12 21:06:44For the past decade or so I have jumped around diet to diet, or lifestyle some would say. I've done a lot of them and some I stuck with and some I haven't. But lord knows I have tried a bunch. These are my thoughts on some of them these days.
Paleo
This is the first major diet I had tried and to be honest I had really great success with it. And I can't argue the idea, like most of the Ancestral based diets. If you think about it, it just makes sense. My downfall is I'm not a veggie fan and forcing myself to eat them got old, I leaned hard on brussel sprouts and asparagus. Eventually I just fell off the wagon. I think it doesn't help that I drank back then also.
The Makers Diet
This one sounded cool, the good lord says... but I don't like many fermented foods and I didn't stick with it more than a couple weeks.
Vegetarian/Vegan
I actually did this solid for about a year, maybe a tad longer. I didn't really feel great, I was tired a lot, and I gained weight. I did not do whole foods though. I gave in to all the fake meat stuff and various goodies, who knew Orios were vegan.
Carnivore
I went from vegetarian straight to carnivore. I love meat, I cannot lie. This I did solid for a bit with decent results. But fell off the wagon a lot.
Animal Based
Another ancestral based diet. The funny thing that makes me lean towards these types of diets is they make sense. Watch a couple episodes of "Naked and Afraid" and you see even the vegans go for meat. Not eating it makes zero sense. That being said, fruit makes a hell of a lot of sense also. If available, it is easy eats. Veggies beyond root vegetables, good luck not starving eating only vegetables in a survival situation in the wild.
Ray Peat
So, this isn't an official diet, but Dr. Peat seemed to provide a lot of reasonable and well studied info that makes sense. It really makes me relook at everything before.
In the end, I am experimenting a lot now. The Ray Peat stuff has me the most interested and I'm starting to experiment with his philosophy and that of those who have tried and wrote about it. It's super early, but maybe in a few months I can talk how I feel about it and how my body is taking it. But this is the flow I've taken in the past years and the path I am on now.
Cheers!
-
@ d830ee7b:4e61cd62
2023-08-31 04:44:06ผมเจอหลายคนเริ่มต้นกับ Nostr มานาน แต่กลับยังไม่สามารถ “อิน” กับการอยู่ในสังคมแห่งใหม่นี้ได้เท่าไหร่นัก บางคนยังมีเพื่อนใหม่เพียงหลักสิบคน และหลายคนยังแทบไม่รู้จักหรือกดตามใครเลย บางคนมีคนติดตามเพียง 3-5 คน เท่านั้น แล้วมันจะไปมีคนเห็นสิ่งที่เราสื่อสารออกไปได้มากพอได้อย่างไรล่ะคับ?
ก็คนที่ไม่ได้ติดตามเราเค้าก็จะมองไม่เห็นสิ่งที่เราโน๊ตไปนั่นเอง
นี่แหละครับ Nostr
ผมไม่ชอบใช้คำว่า “เล่น Nostr” เท่าไหร่นัก สำหรับผมแล้ว.. Nostr คือ สถานที่ใหม่ สังคมใหม่ที่ทุกคนต้องเริ่มนับใหม่จากศูนย์ ผมขอใช้คำว่ามันเป็นการ “ใช้ชีวิตบน Nostr” ก็แล้วกัน เชื่อไหมครับว่าในแต่ละวัน ผมยังรู้สึกว่าตัวเองมีเวลาไม่มากพอจะใช้ชีวิตบน Nostr ให้สมใจอยากได้เลย.. ในขณะที่บางคนกลับรู้สึกว่า 5 นาทีมันก็นานเกินไปแล้ว..
เราลองมาพิจารณากันดูไหมว่าเพราะอะไร?
มันไม่ค่อยมีอะไรให้อ่าน ไม่ค่อยมีเรื่องให้ทำ
สำหรับข้อโต้แย้งนี้ผมคงต้องบอกว่ามัน “ผิดถนัด” เลยล่ะ.. บน Nostr นี่มีอะไรให้เราทำมากกว่าบนทุกแพลตฟอร์มเก่าๆ มาขยำรวมกันเสียอีกนะ
ผมคิดว่า.. ผมคงต้องเริ่มเล่าเรื่องในจินตนการให้พวกเราเห็นภาพนี้ได้ง่ายขึ้น ผมขอพาพวกเรากลับไปสู่จุดเริ่มต้นของการก่อร่างสร้างสังคม
อันดับแรก ผมอยากให้พวกเราลืม “สังคมแบบเดิม” ไปเสียก่อน ทั้งในชีวิตจริง หรือในโลกออนไลน์ที่เราเคยประสบพบเจอมา ที่ Nostr นี่มันต่างออกไปอย่างสิ้นเชิงครับ
จินตการว่าเราได้ลงจากเรือโนอาห์ที่เกาะขนาดใหญ่แห่งหนึ่ง กองเรือจัดตั้งอาณานิคมใหม่หลายลำที่พาผู้คนหลักแสนมาปล่อยไว้ ณ สถานที่เดียวกัน เกาะอันเวิ้งว้างว่างเปล่าที่อุดมไปด้วยทรัพยากรธรรมชาติ เต็มไปด้วยสิ่งเร้นลับและแปลกใหม่ ที่รอให้เหล่านักสำรวจได้ออกไปทำการค้นพบ
Nostr ก็คือสถานที่แบบเดียวกันนั้น..
เราต่างคนต่างมา ณ ที่แห่งนี้ เรามีสถานะภาพเท่าเทียมกันทุกประการ ทุกคนเริ่มนับหนึ่งใหม่ที่นี่ เริ่มทำความรู้จักกัน รวมกลุ่มกัน สร้างสังคมขนาดย่อมจนผ่านเวลาไปถึงขนาดกลางและกลายเป็นใหญ่ได้ในที่สุด
สิ่งนี้จะเกิดขึ้นไม่ได้เลย ถ้าผู้คนเหล่านี้ไม่พยายาม “Engage” เข้าหากัน ไม่มีปฏิสัมพันธ์ต่อกัน ไม่ยอมแลกเปลี่ยนหรือทำกิจกรรมบางอย่างร่วมกัน นี่คือกลไกการสร้างสังคมโดยธรรมชาติที่จะไม่มีใครมีคอยชี้นำ บังคับ หรือออกกฏเกณฑ์ชี้นิ้วสั่งใครให้ต้องทำอะไรทั้งนั้น.. มันคือสังคมแห่งเสรีชนโดยแท้จริง ทุกคนจะประพฤติอย่างเสรีภายใต้ทัศนวิสัยของปัจเจกชน
โฆษณาชวนเชื่อ หรือการทำเท่ห์ด้วยคอนเท้นต์โก้หรู ศิลปะในการหลอกล่ออัลกอริทึมเหมือนที่เคยทำๆ กันมา มันใช้ไม่ได้กับที่แห่งนี้
ที่นี่พวกเราให้ค่ากับ “คุณค่า” ที่เราจะได้รับมันมาจริงๆ และคุณค่าของแต่ละคนก็ไม่มีวันเหมือนกันเสียด้วย นี่คือความท้าทายที่พวกเราต้องเริ่มออกไปค้นหา ‘คุณค่า’ ที่ว่านั้น ด้วยตัวเองหรือจะทำกันเป็นหมู่คณะก็ย่อมให้ผลดีกว่าอย่างแน่นอนครับ
ไม่มีใครต้องการ “ฮีโร่” ที่นี่ ทุกคนแค่ต้องการ “เพื่อน” เพื่อนที่จะคอย 'ให้' เราก่อนและ 'ขอ' เราทีหลัง
ผมร่ายมายาวก็เพียงแค่ต้องการจะบอกว่า..
ที่เราไม่เห็นคอนเทนต์อะไรน่าสนใจเลย อาจเป็นเพราะเรายังทำความรู้จักกับ “คนที่น่าสนใจ” ยังไม่มากพอก็เป็นได้
แล้วมันเพราะอะไรได้อีกบ้าง?
เรายังกดติดตามคนอื่นน้อยเกินไป
ทำให้เราไม่เจอโน๊ตหรือคอนเทนต์ที่ดึงดูดใจเราได้มากพอ เราก็จะเห็นแต่โน๊ตของคนที่เราติดตามไว้อย่างน้อยนิดนั่นแหละครับ เว้นแต่เราจะไปกดดูแบบ Global ที่จะเห็นผู้คนทั้งเกาะเป็นหมื่นๆ แสนๆ ต่างคนต่างคนโน๊ตกันรัวๆ ซึ่งมันคงเต็มไปด้วยสิ่งที่เราไม่ได้ให้ความสนใจหรือคัดสรรมา
เรามีคนติดตามเราน้อยเกินไป
ทำให้เหงาและเงียบกริบทุกรอบที่เราโน๊ต มันก็แน่อยู่แล้ว ถ้าทั้งเกาะมีคนที่รู้จักเราอยู่แค่ 2-3 คน มันก็คงมีคนแค่จำนวนนี้แหละครับที่จะได้ยินสิ่งที่เราพูด ได้เห็นสิ่งที่เราทำ เราแค่ต้องออกไปทำความรู้จักหรือมีปฏิสัมพันธ์กับคนอื่นๆ ให้มากกว่านี้ มันไม่เหมือนกันนะครับ ระหว่างการโพสต์สิ่งที่อยากพูดออกไป เน้นเอาเท่ เอาเจ๋ง ไว้ก่อน กับการเดินไปหาคนอื่นเพื่อแลกเปลี่ยนความคิดและสร้างมิตรภาพกับเขาอย่างจริงใจ ผมคิดว่ามันให้ผลลัพธ์ไม่เหมือนกันบน Nostr
เรายังไม่เจอ Hashtag หรือกลุ่มสนทนาที่ตรงกับจริต
ทำให้เราไม่รู้สึกอินกับอะไรที่นี่เลย คนชอบฟุตบอลก็ชอบเสวนากับคนดูบอลฉันใด บิตคอยเนอร์ก็อยากจะคุยถูกคอกับบิตคอยเนอร์ฉันนั้น คนรักแมวก็มองหาคนรักแมว ฯลฯ ที่นี่มันพาเราย้อนกลับไปที่ยังยุคแรกๆ ของสังคมโซเชียลมีเดีย ที่คนจะเชื่อมโยงหากันโดยใช้ “Hashtag” ที่ต่างก็สนใจร่วมกัน มันเหมือนการชูป้ายไฟโลกให้รู้ว่า “ฉันรักแมว” (#Catstr) เพื่อดึงดูดคนประเภทเดียวกัน นั่นแหละครับ เราแค่ต้องหาป้ายไฟที่ว่านั่นให้เจอ
เราไม่เห็นได้ “Earn Zap” อย่างที่หลายคนป้ายยาเราไว้เลย
ก็ถ้าวันนี้เราเองยังไม่ค่อยอยาก Zap ให้ใครเท่าไหร่ แน่นอนว่ามันก็จะไม่มีใครอยาก Zap ให้เราด้วยเช่นกัน ป๋ามา-ป๋ากลับ คนที่นี่เป็นกันแบบนั้น มันประหลาดดี ทำลายความเชื่อแบบเดิมๆ ของเราไปเลยทีเดียว
จริงๆ แล้วมันไม่มีใครอยากได้ Sats เพิ่มบน Nostr เพราะมันไม่ง่ายขนาดนั้น พวกเขาก็แค่อยากหาเรื่อง Zap ให้คนอื่นๆ พวกเขาแสวงหาโน๊ต ข้อความ หรือคอนเทนต์ แม้กระทั่งมีมที่โดนใจ ไม่มีใครมาคอยนั่งคิดคำนวนว่า "วันนี้ฉัน Earn ไปเท่าไหร่” (คอนเซ็ปต์แบบนี้มัน Fiat สิ้นดี) สังคมบน Nostr นั้นเน้นการให้และการมีส่วนร่วม ช่วยเหลือกัน เมื่อคุณให้มา เราจะให้กลับ มันแฟร์ๆ แมนๆ ครับ
ในสังคมที่ไม่มีใครคอยมาทำหน้าที่กำกับดูแลพฤติกรรมหรือการกระทำของเรา ความสัมพันธ์จะเกิดขึ้นอย่างเป็นธรรมชาติสุดๆ เป็นเรื่องของปัจเจกชนที่จะเลือกว่าพวกเขาจะให้คุณค่ากับอะไร ดังนั้น.. เราจึงแทบไม่มีทางรู้ได้เลยว่าใครจะชอบ หรือคิดอะไรยังไง นอกเสียจากว่า.. เราจะใช้เวลาไปกับการทำความรู้จักความคิดและจิตใจของพวกเขา ออกไปพูดคุยแลกเปลี่ยนกับพวกเขาเพื่อให้เราเข้าใจคนอื่นได้มากขึ้นนั่นเอง
เมื่อคุณเข้าใจผู้อื่น มันก็ไม่ยากที่คุณจะรู้ว่า “คุณค่า” ที่พวกเขาตามหานั้นคืออะไร?
บก. จิงโจ้ ผู้มีปฎิสัมพันธ์และคอย Make friend กับคนไปทั่ว นั่นทำให้เขามีคนติดตาม และติดตามคนอื่นจำนวนมากทีเดียว เขาทำไปเพื่อ Sats หรือเปล่า? ผมคิดว่าไม่นะ.. Just make friend
เราไม่รู้ว่ามันใช้งานยังไง ทำอะไรได้บ้าง เลยไม่รู้จะไปต่อยังไง
ประเด็นนี้ก็ต้องย้อนกลับไปที่หัวข้อต่างๆ ด้านบน ก็ในเมื่อเรายังไม่เคยเจอคนที่จะคอยตอบคำถาม หรือสอนการใช้งานเราให้กับเราได้ หรือจริงๆ แล้วเราก็อาจแค่ถูกสอนให้ “รอรับ” มากกว่าที่จะ “ค้นหา” จนเคยตัว เราเลยไม่ชินกับการต้องออกไปไขว่คว้ามันด้วยตัวเอง?
ไม่ว่าอย่างไร.. เรามาเริ่มกันใหม่ที่นี่ เชื่อไหมครับว่าหลายคนบน Nostr นั้นเป็นระดับพระกาฬแทบทั้งสิ้น แถมพวกเขายังเต็มใจที่จะให้ความช่วยเหลือหรือคอยตอบคำถามให้กับพวกเราด้วย เราต้องหาเค้าให้เจอและเปลี่ยนตัวเองให้เป็นคนที่จะ “กล้า” ถาม กล้าแสดงออก และกล้าที่จะยอมรับว่าเราไม่รู้ ก่อนที่จะเราจะกลายเป็นผู้เชี่ยวชาญได้ในภายหลัง
นี่เป็นโอกาสที่เราจะได้ใกล้ชิดกับคนที่เราอยากคุยด้วยมานานแล้ว คนที่เราเคยชื่นชม หรือคนที่เราเคยเห็นบนโลกเฟียตๆ แต่ไม่เคยหาเหลี่ยมได้สักทีว่าจะเข้าหาหรือเข้าถึงพวกเขาได้ยังไง
แค่เริ่มทำความรู้จัก โลกก็เปลี่ยน
เอาล่ะ.. ผมจะลองแนะนำวิธีว่าเราจะเพิ่มผู้ติดตามหรือเลือกเฟ้นยังไงในการติดตามผู้อื่น ผมมีแนวทางของผมเอง คงไม่ใช่สูตรสำเร็จ แต่ถ้าเพื่อนๆ จะลองนำไปประยุกต์ก็ไม่ว่ากันครับ
ตามคนดัง
วิธีที่ง่าย และตรงไปตรงมาที่สุด ซึ่งมันก็ถูกแล้ว เพราะคนเหล่านี้การที่เค้าจะดังได้ต่างก็มี proof-of-work และความน่าสนใจในแบบของตัวเองด้วยกันทั้งนั้น แอคเคาต์แรกๆ ที่พวกเราคงนึกถึงก็คงเป็น อ.ตั๊ม พิริยะ และ Right Shift ทั้งแอคเคาต์ทางการ และทีมงานทั้งทีม ก็แหง๋ล่ะ เพราะพวกเขาป้ายยาพาคุณมาอยู่บน Nostr แต่อย่าตามแค่พวกเขาไม่กี่คนเท่านั้นนะครับ คุณควรจะ...
ตามคนอื่นๆ เลียนแบบคนดัง
เราสามารถกดดูได้ว่าใครกดติดตามใครเอาไว้บ้าง คนดังก็มักจะตามกลุ่มคนที่น่าสนใจแหละส่วนหนึ่ง ส่วนที่เหลือเขาก็คงตามคนที่ถูกจริตกับตัวเอง นอกจากนี่คนที่กดติดตามพวกเขาก็จะเป็นคนที่ชอบอะไรคล้ายๆ กับเขา มันก็เป็นไปตามกฎแห่งแรงดึงดูดทางด้านความสัมพันธ์ เราค่อยๆ กดไปดูโปรไฟล์ของแต่ละคนได้ว่าเขามีความน่าสนใจยังไง ชอบโน๊ตหรือการสื่อสารแบบไหน เขามีวิธีคิดหรือนิสัยใจคอ มีเคมีแบบเดียวกันกับเราหรือเปล่า?
ถ้าใช่.. คุณก็แค่กดปุ่ม Follow แล้วกระโจนเข้าไปตอบโต้กับเขาได้เลย ไม่ว่าจะในโน๊ตใหม่ หรือ โน๊ตเก่าๆ คอมเม้นให้มันได้เพื่อนนะครับ อย่าไปเม้นให้ได้ศัตรู
เราจะเห็นแอคฯ น่าสนใจให้เพียบ แค่ลองกดไปดูว่าคนดังๆ เขามีวงสังคมบน Nostr เป็นใครกันบ้าง แล้วตอบตัวเองว่าเราอยากพาตัวเองเข้าไปอยู่ในนั้นบ้างไหม?
ตาม Hashtag
ตามหา “ป้ายไฟ” สีที่เราชอบ หรือก็คือกด ‘#’ นำในช่องค้นหา ตามด้วยคำที่เราสนใจ แล้วลองไล่หาดูได้เลย คุณอาจเจอเข้ากับกระทู้ที่ตรงกับสิ่งที่ตามหา เรื่องที่อยากอ่าน หรือมุมมองที่อยากเห็น รวมไปถึงคนที่.. เอ้อ มันเจ๋งดีว่ะ อะไรแบบนี้ได้ง่ายๆ เลยล่ะ
เมื่อเราชอบแฮ็ชแท็กไหน เรายังสามารถกดติดตามตัวแฮชแท็กนั้นได้อีกด้วย และอย่าลืมกดติดตาม หรือติดแฮ็ชแท็ก #ThaiNostrich กับ #Siamstr เอาไว้ด้วยนะครับ มันคือป้ายไฟสามัญประจำบ้านของคนไทยบน Nostr คุณสามารถตามหาเพื่อนคนไทยได้ง่ายๆ ด้วยแฮชแท็ก 2 ตัวนี้นี่แหละ
Swarmstr เป็นตัวอย่างไคลเอนต์ที่จะรวบรวมข้อมูลบน Nostr ที่เราสามารถค้นหา หรือศึกษา Nostr ได้จากหัวข้อต่างๆ ตามแฮชแท็คที่แสดงเป็นตัวอย่างได้ (หรือค้นหาด้วยตัวเอง)
ตามประเด็นที่สนใจไปจนเจอตัวพ่อ
มันต้องมีบางโอกาสที่เราไปเจอเข้ากับกระทู้น่าสนใจ มีการสนทนากันอย่างเผ็ดร้อนหรือรื่นเริงจนคุณก็อดเข้าไปแจมด้วยไม่ได้ ที่แบบนี้แหละที่คุณจะเจอกับคนเก่งๆ ในด้านนั้นๆ หรือผู้เชี่ยวชาญเฉพาะด้าน หรือกระทั่งเป็นผู้ก่อตั้ง หรือนักพัฒนาไคลเอนต์เลยทีเดียว และคนเหล่านี้เขาก็มาที่เกาะแห่งนี้ด้วยจุดประสงค์คล้ายๆ เรา คือ "หนีความวุ่นวายและโสมมบนโลกเก่าเพื่อแสวงหาเสรีภาพและมิตรภาพ ณ สังคมใหม่"
ดังนั้น เขาเต็มใจที่จะได้ทำความรู้จักกับเราอย่างแน่นอนครับ
แต่คนนิสัยไม่ดี หรือมีพฤติกรรมไม่เป็นมิตรเราก็จะดูออกได้ในทันที และมันก็เป็นสิทธิ์ของเราล้านเปอร์เซ็นต์ที่จะเลือกว่า จะสนใจติดตามคนๆ นี้ หรือแค่ปล่อยผ่าน หรือไม่ก็ บล็อกแม่ง ให้มันจบๆ ไป
Nostrends เป็นตัวอย่างไคลเอ็นต์ที่คอยรวบรวมและแสดงโน๊ต หรือหัวข้อที่กำลังได้รับความนิยมบน Nostr ตามช่วงเวลาหรือตัวกรองที่เราเลือก
พยายามอย่าทำพฤติกรรมแบบเดิมๆ บน Nostr
ผมเชื่อว่ามีพวกเราส่วนใหญ่ (ชาวไทย) จะคุ้นเคยกับการใช้งานและวัฒนธรรมบน Facebook แต่ชาวต่างชาติหรือผู้ใช้งานส่วนใหญ่ที่นี่จะเคยชินกับวัฒนธรรมแบบ Twitter กันมากกว่านะครับ ไม่ว่าจะเป็นการโพสต์ การคอมเมนต์ หรือการกดตอบโต้ด้วยอีโมจิ (Discord cult) ก็ถือว่าเป็นวัฒนธรรมในแบบที่เราอาจยังไม่คุ้นเคยกันมากนักและคงต้องใช้เวลาเรียนรู้กันพอสมควร
ขอให้พวกเราทิ้งวิธีคิดแบบเดิมๆ ในการใช้งานโซเชียลมีเดียไปได้เลยครับ เราควรอยู่บน Nostr โดยใช้แนวคิดแบบเดียวกับการอยู่ในสังคมจริงๆ ทักทาย ตอบโต้ เห็นอกเห็นใจ ช่วยเหลือ แลกเปลี่ยน คอนทริบิ้วท์และมีส่วนร่วมให้มากกว่าที่เคย ฯลฯ เราจึงจะมีตัวตนและรู้สึกเหมือนเป็นส่วนหนึ่งในสังคมแห่งนี้ได้จริงๆ (ไม่งั้นเราก็เป็นได้เพียง "ผู้สังเกตการณ์เหงาๆ" เท่านั้นเอง)
ที่นี่.. ไม่ให้คุณค่ากับ การอวดรู้ หรือ โชว์พาว ทุกคนดูออกได้ง่ายๆ ว่าเจตนาของแต่ละคนคืออะไร คนเหล่านี้ล้วนเคยขยะแขยง Fiat Social Media Cult มาแทบทั้งนั้น ถ้าต้องมาเจออะไรแบบนี้บน Nostr ก็จะ ยี้ ได้ทันที และทุกคนก็พร้อม และ มีสิทธิ์ที่จะบล็อกเราได้ตลอดเวลา
เราจะกดติดตามคนนั้น-คนนี้ให้มากมายไปทำไมกัน ถ้าเราจะแค่ไถๆๆ ฟีดวืดๆๆ ไปวันๆ เราจะไม่ได้เพื่อนเลยสักคนกับการทำแบบนั้น และอาจพลาดโอกาสดีๆ ที่จะได้เรียนรู้อะไรบางอย่าง
เราไม่ควรทำแค่อ่านผ่านๆ เหมือนกับตอนที่เราเบื่อโลกเมื่อต้องใช้ Facebook และเห็นแต่อะไรที่ไม่ต้องการเห็น ที่นี่.. เราจะเลิกติดตามไปเลยก็ได้ถ้าแอคฯ นั้นเอาแต่โพสต์อะไรที่ดูไม่เข้าตา หรือไม่สามารถดึงดูดเราได้ (ถ้าเกรงใจก็กด Mute ไว้ก่อนก็ได้)
การอ่านอย่างตั้งใจในสิ่งที่เค้าโพสต์มา และตอบโต้ตามสมควร ก็เปรียบเสมือน การรับฟังผู้พูดอย่างตั้งอกตั้งใจ นั่นเอง นั่นคือหนทางเดียวที่เราจะเรียนรู้ได้ว่าเราควรตอบโต้อย่างไร เพราะเราเข้าใจ สาส์น ที่เขาได้สื่อออกมาอย่างถ่องแท้นั่นเองครับ
ถ้าไม่ว่าง คุณก็ปัดทิ้งได้ แล้วค่อยตามไปอ่านทีหลัง มันไม่มีการลบหรือปิดกั้นเรา ไม่มีโฆษณามาให้รกหูรกตา ถ้าเจอพวก แสกม/แสปม ก็บล็อกมันซะ อย่าให้พวกน่ารังเกียจได้มีที่ยืนบนสังคมที่คุณอยากให้เป็น
และขอให้ทุกคนระลึกไว้เสมอว่า การพูดคุยและมีปฎิสัมพันธ์ต่อกัน เท่านั้น ที่จะทำให้มนุษย์ได้มีความสัมพันธ์ต่อกัน
ผมขอทิ้งท้ายด้วยเคล็ดลับตกผลึกสั้นๆ ว่า..
- ติดตามผู้อื่น
- Zap ให้คนอื่นๆ
- เริ่มสร้าง Note ของตัวเอง (โพสต์) สักครั้ง หรือบ่อยครั้ง
- คุยกับคนอื่นให้มากกว่าที่เคย (มากกว่าแค่อ่านๆ ไปเรื่อยเหมือนตอนใช้ Facebook)
- ได้ Zap กลับมาจากคนอื่น
- สำรวจแฮชแท็กต่างๆ ลองใช้งานมันไปเรื่อยๆ
เหนือสิ่งอื่นใด จงใช้ชีวิตบน Nostr และแค่สนุกไปกับมันให้ได้ก็พอ.. :)
ปล. |--
-
มนุษย์มีวุ้นแปลภาษาจริงๆ แล้วนะครับ ก็ Google translate นั่นยังไง อย่าให้ภาษากลายเป็นกำแพงแห่งการเรียนรู้.. จงใช้มัน ไม่ต้องขวยเขิลกันหรอกครับ (เพราะผมเองก็ใช้)
-
บทความต่อไปผมจะมาลองแนะนำว่า มีแอคเคานต์ไหนบ้างที่น่าสนใจกดติดตามสัก 10-20 บัญชี เอาคนไทยเราก่อนเลย ไว้คอยติดตามกันนะครับ
-
@ 468f729d:5ab4fd5e
2024-10-12 20:28:06 -
@ 1b5ee74d:bb1aae6e
2024-10-12 19:49:12On October 8th, the American production company HBO—owned by Warner Bros. Discovery—released Money Electric: The Bitcoin Mystery. The documentary, directed by Cullen Hoback and currently available only to the U.S. audience, was immediately shared via P2P file-sharing platforms and can thus be easily found online.
Considering all the elements presented in the hour-and-a-half-long documentary, my personal judgment swings between two feelings:
- Satisfaction for having witnessed a thorough explanation of Bitcoin’s origins, its cultural roots, the reasons behind its creation, and the intrinsic problems of the traditional financial system.
- Frustration over a conspiracy theory—claiming that Bitcoin was sabotaged by U.S. government agents infiltrating the Bitcoin community to prevent it from functioning as a medium of exchange—and a baseless hunt for Satoshi Nakamoto, which is especially dangerous for the man identified: Peter Todd.
The Negative Aspects
The Surreal Conspiracy Around Replace-By-Fee (RBF)
One of the documentary's central issues is the inclusion of conspiracy theories aimed at explaining Bitcoin's evolution through external interventions, mainly by government actors, who allegedly tried to manipulate the technology to prevent it from scaling in terms of processed transactions. The goal, it is claimed, was to keep Bitcoin as a store of value and technically render it impossible for it to function as a medium of exchange.
The ultimate reason for this, according to the theory, is that everyday transactions could only occur through intermediaries and, as a result, would be easily controllable by authorities. The U.S. government's goal, therefore, would have been to negatively influence Bitcoin’s development. This idea is not unrealistic in itself, but this is where things get absurd.
Hoback, spurred on by Roger Ver, resurrects a story about an email allegedly sent to Peter Todd in 2013 by someone named John Dillon. Dillon, claiming to hold a “high-level” role in intelligence, supposedly requested the development of Replace-By-Fee (RBF) for the paltry sum of $500.
RBF is a function that allows an unconfirmed transaction to be replaced with a different version of the transaction that pays a higher fee, with the goal of achieving quicker confirmation. And here, Roger Ver provides the narrative hook: RBF would have driven transaction fees through the roof, making it uneconomical to use Bitcoin for everyday transactions, thereby fulfilling the U.S. government's objective.
History has shown that this theory was baseless—fees didn’t skyrocket with RBF—but the fact that Todd actually contributed to developing RBF convinced the documentary’s author that this was a credible hypothesis. The theory that Todd collaborated with the government is presented with alarming carelessness, despite a lack of concrete evidence, and Todd, understandably, denies everything. This conspiracy also contains a fundamental inconsistency: why would Satoshi Nakamoto have wanted to collaborate with the government to prevent Bitcoin from becoming digital cash?
The Blocksize War: Misunderstood and Poorly Told
The documentary presents a distorted view of the so-called Blocksize War. The thesis reflects the exact opposite of what actually happened. Again misled by Roger Ver's words, Hoback hypothesizes that the failed attempt to increase Bitcoin's block size led to a centralization of the network around the Blockstream team. The truth is the opposite: had the blockspace been increased, the network would have faced inevitable centralization, as the unfortunate fate of Bitcoin Cash demonstrated.
According to the documentary, the outcome of the war even allowed everyday Bitcoin transactions to occur “only through tools provided by Blockstream.” No names are mentioned, although it’s suspected that the reference is to Liquid. What reveals the documentary’s evident bad faith is that there isn’t a single mention of the Lightning Network, which allows low-cost transactions, doesn’t necessarily require intermediaries, and is certainly not controlled by Blockstream.
In general, Hoback gives too much screen time to controversial figures like Roger Ver and Gavin Andresen, whose opinions, while representative of a certain point in Bitcoin’s history, are distorted by the context in which they are presented.
The Baseless Manhunt
The hunt for Peter Todd is perhaps the most problematic aspect of the documentary. The narrative focuses on seemingly irrelevant details, weaving a sensationalist plot to make viewers believe that Todd might be Satoshi Nakamoto. This attempt poses a serious risk to Todd’s personal safety, which should not be underestimated. The narrative, while effective in capturing the attention of an uninformed audience, is highly dangerous.
The “evidence” provided is completely inconsistent. Consider that the most damning proof is a 2010 BitcoinTalk post in response to Satoshi Nakamoto, which Hoback claims was accidentally posted using Todd’s profile. That is, according to the author, Satoshi himself completed his post through a response but mistakenly logged in with his personal profile: Todd's.
This is a groundless hypothesis and, moreover, not a new revelation. It's also important to note that Peter Todd's nickname at the time was “retep,” and no one knew who he was. If it had been Satoshi Nakamoto, he could have easily deleted the post without leaving any unwanted traces.
The Myth of Satoshi’s One Million Bitcoins
The documentary repeatedly claims that Satoshi Nakamoto accumulated one million bitcoins and that a massive sale of these coins could “break the system.” This, too, is a misleading statement, as there is no certainty regarding the exact number of bitcoins Nakamoto possesses, and the idea that the sale of this alleged fortune could destroy Bitcoin is completely unfounded. In fact, it is never explained.
The Positive Aspects
The Roots of Bitcoin
Money Electric does have some merits, particularly in the first part, where it focuses on an accurate explanation of Bitcoin’s origins and the historical context in which it emerged. The documentary effectively recounts how earlier attempts to create digital currencies, like E-Gold, failed and how E-Gold’s founder, Douglas Jackson, was arrested for his activities. The author understands and communicates a key concept: if you build a product that can compete with the U.S. dollar, the government will come after you. Therefore, the decision to remain anonymous makes perfect sense. One is left to wonder: why did you try to reveal Satoshi’s identity?
The description of Bitcoin’s founding values, linked to the cypherpunk movement, is one of the most successful parts. The crypto wars of the 1990s and the battle for the use of cryptography, portrayed as a sort of weapon by the U.S. government, are explained in an accessible way, even to those unfamiliar with the topic, offering valuable historical context for understanding Bitcoin’s birth.
Mining and Energy
Mining is described as a lottery, finally breaking away from the common narrative that portrays it as an activity based on “complex calculations” or “advanced algorithms.” The simplified approach is well-executed and makes one of Bitcoin’s most misunderstood aspects comprehensible to the general public.
Another positive aspect is the documentary’s exploration of the relationship between Bitcoin and energy consumption. Rather than demonizing the energy link, it smartly compares it to the relationship between the dollar and oil, presenting this connection as inevitable for any form of money with intrinsic value. Money, it is specified, must evidently be tied to something that people consider valuable, like an energy source.
Traditional Financial System and CBDCs
The portrayal of the 2008 financial crisis and the parallel with the current fragility of the global monetary system is well done, showing how Bitcoin emerged in response to a failing system. In this sense, the documentary raises a warning about the future use of Central Bank Digital Currencies (CBDCs), which are described as dystopian tools of control, with a particular focus on the Chinese e-yuan, which is literally called a “government-backed shitcoin.”
The author casts doubt on the stability of the U.S. dollar itself, suggesting that even the American currency could face collapses similar to those of hyperinflated currencies. While not a definitive claim, this perspective introduces an important question about the future of the global financial system, undermining the steadfast beliefs of a large portion of the market that sees the dollar as an indestructible fortress.
Cold Judgment
Money Electric is a documentary that, perhaps for the first time, effectively explains several aspects of Bitcoin in a way that is both compelling and easily understandable. The fact that such a product comes from a major production house should be considered a success.
On the other hand, the misleading portrayal of events like the Blocksize War and the relentless search for a conspiracy to destroy Bitcoin—both tainted by the biased opinions of individuals defeated by history, like Roger Ver and Gavin Andresen—undermines the solid foundations initially laid with the description of the technology.
Lastly, such a blatant ad hominem accusation, supported by such flimsy evidence, is unacceptable. Identifying someone as Satoshi Nakamoto is, for the same reasons acknowledged by the author at the beginning of the documentary, extremely dangerous for that individual’s personal safety. How many people, swayed by HBO's gripping editing, could now believe that Peter Todd is truly Satoshi? And how many of these could be willing to physically attack him for the fortune Bitcoin’s creator supposedly accumulated? Too many hypotheticals to draw a plausible conclusion and to place such a risk on a person.
Money Electric: The Bitcoin Mystery is a decent product, fatally marred by bad faith.
-
@ 7cc328a0:2a247c0e
2024-10-12 15:54:42relay.tools quarterly report
October, 2024
Project Updates
Milestone: Relay.tools is celebrating 1 year of OpenSats! Cheers to everyone that made this possible.
Relays were very popular this quarter. Scaling efforts were prioritized! This is a good indicator for relay.tools as it means that it's healthily growing. Development was executed well, completing one project at a time across the whole stack.
Relay Discovery
I've been working with @sandwich from nostr.watch on NIP66.
NIP66 will be an ABSOLUTE GAMECHANGER for clients in finding of their relays. This was always a vision for relay.tools and I am honored to be working with @sandwich on what is a pretty amazing solution. We are now in a phase of client outreach, to gather client feedback and help them implement/understand the overall goal of the NIP.
TLDR: the goal is to create a distributed version of the nostr.watch data, using nostr events.
- [x] implemented NIP66 draft7 (the 'final' design) in monitorlizard
- [x] started shipping events to the monitor relay(s) in collab with nostr.watch backends and relay.tools backends.
- [x] fixed bugs and released new binaries for monitorlizard (a NIP66 data reporting tool)
Auth Proxy Rollout
The NIP42 Auth Proxy project went really well this quarter. It's now serving tons of traffic and most bugs with clients have been squashed and the proxy hardened. This has become a very popular feature on the relays, as AUTH has many benefits beyond protecting of DMs.
- [x] testing vs. NIP17 and bugs fixed
- [x] cluster operations (multiple proxies)
UI/UX
A huge milestone this quarter was the release of the settings wizard. This is a walkthrough for new (and current) users of all the available settings for different 'relay types'. A lot of work over the last year has gone into the culmination of these settings and the wizard was a major step forward to help users understand what their options are when running a relay.
Another major UI change was the introduction of a relay feed to the landing page for a relay. This is called the relay explorer. The idea was to move to a single page app, and re-do navigation for easy relay browsing and discovery.
- [x] settings wizard released
- [x] relay explorer v2
Installer
The installer had lots of good effort put in by me and some nice contributors. We did a couple iterations on documentation and facilitated in the creation of 2-3 new relay hubs that are using this installer infrastructure.
Some additions to the installer were:
- [x] docs for building self-hosted machine images and installing on a VPS
- [x] FULLY AUTOMATIC SSL certificate handling for multiple domains with certbot
- [x] self-hosted influxDB (for relay metrics)
- [x] fix bugs with auto-deploy upgrade
Billing/Invoicing/Support
The billing system had some improvements this quarter and many invoices were sent. :) It now has better super-admin tools to notify users of past-due balances via nostr (With NDK). This took a few iterations of deciding the best way to contact users of nostr and figuring out why they don't respond to messages. It's a learning experience all the way around and the billing system will evolve over time in ways that are conducive to remaining 100% nostr for user communication and support.
The support system also showed signs of life, and people were able to use it to contact me with their questions via the various help-desk methods that I've been rolling out. (A relay, a support npub, DMs, NIP17 DMs, simplex)
Scaling!
Relay.tools successfully completed the first scale-out event. This is HUGE. Relays take more and more bandwidth and resources as they establish themselves, while at the same time needing a reasonable low-cost environment to grow in. To meet their demands the horizontal scaling is important. This will scale on commodity hardware or VPSs with ZERO vendor lock-in.
- [x] multi-server clustering with ZERO cloud vendor lock-in
- [x] deployment pipeline and capacity planning
- [x] HAproxy and additional AUTH proxies fronting all services
- [x] internal/external network support
-
@ 7cc328a0:2a247c0e
2024-10-12 15:49:54relay.tools quarterly report
July, 2024
Project updates
The major focus this quarter was building a NIP-42 AUTH proxy for strfry relays. Codename: interceptor.
NIP-42 AUTH proxy for strfry
I see this as a major innovation in nostr relaying and there was no other open source option in the ecosystem so I decided it was extremely important to investigate and get done. I was not completely sure that it would work, but after much building and testing I now think this is production ready.
Currently very few relays support NIP-42 AUTH. The ones that do, keep their software closed source as a value-add. This validates that it is a wanted, and valued feature.
I went live with an initial relay for testing wss://auth.nostr1.com. I coordinated the launch of this along with Amethyst re-doing their relay settings to have options for "Private Inbox Relays". I also tested all major clients repeatedly and found and fixed bugs both client side and relay side.
I asked nostr for members to join this relay and help test, which they did and after multiple rounds of testing I believe the AUTH proxy is now ready for a major release.
This will continue to be a focus for next quarter.
https://github.com/relaytools/interceptor-proxy https://github.com/relaytools/interceptor
NIP-17 testing and collaboration
NIP-17 private DM features had a big push from clients this quarter so I helped them by coordinating multiple rounds of inter-client testing and using the new auth.nostr1.com relay. Clients included: coracle, amethyst, 0xChat and gossip.
These features are working well, although some of the issues filed and am tracking are still underway being fixed. Some are UX experience and some are simply interoperability issues or bugs that need more work. Specifically for 0xChat and Coracle. Gossip and Amethyst are fully functioning with no known bugs.
https://github.com/0xchat-app/0xchat-core/issues/12 https://github.com/coracle-social/coracle/issues/378
UI/UX improvements + NDK
Spent some time improving the UI/UX and this is still in-progress.
The main page has been updated to be more of an exact match from nostr designer @daniele
I also created a new relay explorer using NDK and worked with upstream to fix bugs related to NIP-42 AUTH in the library. My PRs are still outstanding but I am hopeful this will pave the way for NDK supporting NIP-42 auth in any clients that use it. I am also writing docs for NDK since this was un-charted territory and required a lot of digging through the code to figure out how to fix and use these features.
https://github.com/nostr-dev-kit/ndk/issues/246 https://github.com/nostr-dev-kit/ndk/pull/251 https://github.com/nostr-dev-kit/ndk/pull/248
I also started work on a complete re-write of the relay settings page. The settings page has too many options and is confusing to users so I am combining all the options into a 'setup wizard' that walks the user through the various types of relays and helps them pick options that they will want.
Relay Metadata, Monitoring and Discovery
One part of the vision for relay.tools has been to make it easier to discover new relays. Not only for relays running on the platform but for ALL relays. Therefor I spent some time this quarter working toward that goal.
I discovered that @sandwich has been working a long time on NIP-66 and it is exactly what we need for relay discovery. It has many additional features as well such as monitoring, and geographic filtering.
https://github.com/nostr-protocol/nips/pull/230
I will be adding support for this into relay.tools on the main directory listing, so I currently am working with him to finalize the NIP and get it merged. It will be able to poll these events and show/search through relays that are discovered on the wider nostr network.
I also created a new tool to publish these events so that I can start down this path. The tool is called monitorlizard. What it does is it monitors relays, and publishes them according to the NIP-66 spec. I also launched a new relay that anyone can push these events to called monitorlizard.nostr1.com
https://github.com/relaytools/monitorlizard
I hope that we can get this NIP finalized and merged this quarter although it is not a rush. Fiatjaf has already given the go-ahead and we just need to make sure to tidy up and include all the things we need in there before merge and it is 'set in stone' so to speak.
-
@ 7cc328a0:2a247c0e
2024-10-12 15:42:36relay.tools quarterly report
April, 2024
Project updates
The main initiatives for Relay.tools this quarter were the installer, re-occuring billing support, customer support, and moderation capability. Towards the end of the quarter I was able to start work on supporting nostr groups and a NIP42 auth proxy.
Installer
I made lots of progress on the installer this quarter. It's now at a point where it is fully functional.
- [x] Whitelabel support for custom domains
- [x] Automatic SSL certificate deployment via. certbot container
- [x] Many bugfixes, improvements, and end to end testing
- [x] Publish pre-built images
- [ ] Use pre-built images in the installer (alternative to building from scratch).
The installer was used to deploy a POC for vote.gold. A side project by @manime that is a relay hub for independent voters.
Re-Occuring Billing
I created a new system for billing / invoicing that tracks user balances and allows them to "top-up" their balance.
The billing system accounts for users of a paid relay (paid relay bonus), these payments go toward the owners balance.
This system is now live and there has been decent response by relay owners that reached out to pay their bills.
The cost of relays was adjusted to 12,000 sats / month. (from 21,000 sats/month).
Upgrades to lightning node and channels were performed to support these payments.
Customer support
Relay.tools rolled out a new customer support portal to support users that have questions about billing and so that relay.tools can contact relay owners via nostr with announcements / notifications.
My goal here is to use nostr itself to support the relays. I also did not want to use DMs because they are not private, they're flakey and simply not a good practice given the state of clients implementations. I think using nostr native methods for support is very important, but is also very difficult given some limitations that currently exist with nostr. Regardless, I pushed ahead.
- [x] Created a nostr pubkey for fielding questions and supporting users.
- [x] Used the outbox model from gossip to setup a streamlined customer support focused dashboard.
- [x] Created an additional relay for support and linked to the relay from the relay.tools landing page.
- [x] The first support notification blast went out to all owners advising them to pay balances in the coming month or to contact support for free 'credits' in exchange for feedback.
Based on the feedback I've gotten so far, it's clear there is still much work to do implementing a nostr native support system:
- Gossip outbox was buggy, and my client database pushed the limits of gossip and corrupted the database. I filed bug(s) upstream and am working with upstream to make this better.
- Some users preferred to use DMs vs. open communication on nostr (even though DMs are not advisable for private communication on nostr).
- Added SimpleX to the support pubkey's bio as an alternate contact method.
- The process for balance notification was very manual and once further research is done on the path forward, it needs to be automated.
Moderation and house-keeping
- [x] I've begun reaching out to nostriches for help with moderation.
- [x] Implemented some additional super-admin capability for the relay.tools admin user(s) in preparation for multiple super-moderators. This includes a global view of all relays and the ability to quickly explore flag mis-behaving relays.
- [x] I've started deleting some relays that were abandoned after using the new customer support portal to reach out to them. Some were simply test relays, some operators expressed that they've graduated to running their own relay, and some I simply could not get in contact with. This is a good milestone for relay.tools and was much needed, leveraging the re-occuring billing and support tasks.
AUTH proxy for strfry
I've started work this quarter on creating a mechanism to bring NIP42 AUTH to the strfry ecosystem. The gist of it is, strfry has been unable to implement NIP42 due to the complexity of needs that various authentication schemes require. There are many considerations and what seems simple at first glance quickly becomes mired in confusion and C++ makes it hard for anyone to collaborate or implement.
To work around this, I've created a proxy written in golang that can sit outside strfry and intercept/handle AUTH requests, leveraging the robustness and performance of strfry while allowing us to customize the authentication flow in a separate process.
So far I have an initial POC working and in the coming quarter I hope to ship an initial version of this which will be used by relay.tools and be the first open source auth proxy for strfry relays.
I am very excited about this. NIP42 in my opinion will enable multiple new paradigms for interacting with relays as it will be able to implement ACLs for reading from a relay vs. the current methods of write ACLs. It also will have the potential to support the new group clients that I mention in the next section.
Outreach / Collaboration / Nostr Groups
I've been spending more time on getting some collaboration going with fellow nostriches where our vision for nostr aligns. I am very interested in groups for nostr. (Functional replacements for discord/telegram/slack/reddit). This has been a long-term goal of relay.tools to support these types of clients and I'm excited that clients are starting to kick off a second wave of nostr functionality and I will do everything I can to support them.
- [x] I made an appearance on the Thank God For Nostr podcast talking with @hodlbod about relays, group-chats, and the viability of relays being profitable/sustainable.
- [x] Various nostriches have contacted me about running their own relay.tools and I'm working with them to educate and help them bring new 'relay hubs' online!
- [x] I've been working with @hodlbod on some extensive testing of the new Coracle groups implementation, private groups or closed communities: NIP87. I have been expoloring the possibilities of using Coracle's private community/group and whitelabel support for an integration with relay.tools. I have also been exploring what modifications a strfry relay may require to support advanced groups such as this based off the triflector relay proof of concept.
- [x] Investigated the use and requirements for 'simple groups' by @fiatjaf NIP29. This is another group implementation which may require customized relays and I wanted to understand the possibilities and requirements.
- [x] Integration with blowater.app - I've been working with @blowater on his new client/relay initiative that involves groups for nostr.
Next Quarter plans
- [ ] Release initial version of the AUTH proxy for strfry.
- [ ] Collaboration/Outreach - Coracle, blowater, other groups efforts.
- [ ] Submit a Relay Discovery NIP for review.
- [ ] Relay Support channel improvements.
-
@ 7cc328a0:2a247c0e
2024-10-12 15:33:58relay.tools quarterly report
January, 2024
Project updates
UI design
Relay.tools spent quite a bit of time working on UI design this quarter. Since UI is time intensive and there are many other aspects of the project that need work, I time-boxed this work to 3-4 weeks total.
I engaged with @Daniel from #nostrdesign and a freelance UI developer @freecritter. We setup a penpot instance for relay.tools and practiced using that instead of closed-source figma. We learned that penpot is not as friendly as figma from a designers point of view, but is workable. From the perspective of a frontend engineer it is no different than figma and using penpot is a big opensource win.
The following designs were implemented this quarter. There is still much to do in this area and some aspects have been brainstormed but put on hold due to other priorities.
Relay branding and directory
I wanted to give the relays personality and branding, here is a list of improvements in this area:
- [x] The home page now prominently displays the public relays that have chosen to advertise.
- [x] Relay 'Badges' were re-designed to have better contrast and fit.
- [x] Relays have a custom direct landing page at their domain. eg. frogathon.nostr1.com
### 'Paid relay' support
Relays now support lightning payments to the relay.tools operator. This helps with combating spam and allowing the relay owners to subsidize their monthly cost.
Layout / theme
The frontend code has been modified so that it is responsive on mobile/desktop using columns. The menu was re-designed to be responsive on mobile and shows user hints for login as well as additional links (explore, FAQ). Theme switcher bugs for light/dark modes have been fixed. (Nextjs bleeding edge workaround was required).
Relay Explorer Alpha
The Relay Explorer Alpha is a mini-client for interacting with a single relay. The following improvements were made:
- [x] Moderation capabilities added: Mods can delete messages, block pubkeys, and delete+block directly from the explorer.
- [x] Image and Link parsing / optional loading.
- [x] Replies implemented.
Example screenshot showing these features:
Installer
Another main focus this quarter was to implement an installer for the relay.tools software so that anyone can easily self-host this on a generic VPS.
The installer will be a simple shell script that asks the user a few questions (like their domain name) and then automatically installs the entire stack.
A new code repository was created for this called relay-tools-images
- [x] Main architecture to match production (systemd and nspawn).
- [x] Common Base OS image builds (Debian).
- [x] Haproxy, Strfry, Relaycreator and Mysql image builds.
- [x] Auto-updating of application code (including database migrations).
This is still in-progress and will be part of next quarter's priorities to finish the first stage. (described in plans for next quarter)
Lightning Node
A decent amount of time was spent managing a Bitcoin+Lightning+LnBits node and building a second node for testing and standby purposes.
I had some node issues this quarter and have been learning, re-building the node, upgrading, and aquiring more inbound liquidity to support relay operations.
Relay Management / daily operations
Relay.tools growth last quarter exceeded expectations and lots of work in the ladder part of this quarter went into daily operations.
It grew so fast that I have paused any advertising so that I have time to implement some important growth related features (as described in the plans for next quarter).
- number of relays currently running: 63
- number of unique admins/mods: 207
- events processed in last 30d: 5,091,724
- gigabytes sent/received in last 30d: 1,651GB / 175GB
Monitoring
Daily operations include checking in on the relay activity to get a feel for what's going on. I've implemented an InfluxDB integration for the strfry plugin, which helps with daily operations and in the future will provide owners, mods, and users with stats showing relay performance and event counts. This greatly improves visibility into the relays and is the backbone of data analysis for the platform.
Events by Kind (7d)
Events by Relay (7d)
Data Explorer View (single relay, kind 3)
Moderation
Daily operations time is also spent ensuring relays meet our TOS. That includes browsing the relays content for anything that does not meet the TOS and performing mitigation when necessary. This can be time consuming. I will be adding super-moderator capability so that others can assist as we grow (as described in the plans for next quarter).
Training / Feedback / Community
I promoted the use of event specific relays for nostr community events. Feedback was very positive and showed that people enjoy having event specific relays even if client support is minimal. * Nostrasia * Frogathon
Plans for next Quarter
Finish the installer - [ ] SSL certificate management with certbot. - [ ] Nostr key generation for API credentials. - [ ] install.sh script for interactive -and- config file based one-shot installation. - [ ] Publish pre-built images and integrate their use with the installer.
Re-Occuring Billing (+ tools for interacting with community of relay runners) - [ ] Implement re-occuring billing using a credits system and lightning payments. - [ ] Implement user notification(s) for billing cycle notifications. - [ ] Implement user feedback / support channel.
Additional visibility and moderation tools - [ ] Implement super-moderator capability for TOS violations. - [ ] Engage with community to help support moderation
-
@ 5ea46480:450da5bd
2024-10-12 15:27:20The following is a combination of a series of posts on Bitcoin Timestamps on Nostr that were originally made between 2024-10-11 02:10:29 GMT & 2024-10-12 13:57:20 GMT.
To everyone whose phone i have harassed with my nfc card that therefor now see this message: This is actually a forrest picture channel https://image.nostr.build/2df97ead480b057df1a9a622f12c6209d82cfd4cc7e4e3f9254267a7199ec46e.jpg
https://image.nostr.build/74358001cab02b32e4c6bb4af04714cb6f4ce69b190514dad330f52c397c665f.jpg
Amethyst now lets you create NIP-03, Bitcoin based Open Time Stamps.
Unfortunatly i cut off the timestamp that is part of the original version of this picture (because it is ugly), so you will never know this foto was taken on july 12, 09:54. https://image.nostr.build/4f96ab676d551e4866b1d4856a8db756b53e094e17ba3c9bb75ff24ecd54839b.jpg
forestr
Everyone can timestamp everything at any time; the time-proof is valid regardless of who initiates its creation.
For example, at 01:37 on oct 12, I signed this kind 1040 event: nostr:nevent1qqsyxw4l6030ugpufwr820leasv630c3an87pcm9sp0uek22gtwzsmszyp02geyqgka3lu3zv4wa6dhxmnkacs6epsnqjrzgd0hn3m69pkjm6qcyqqqqgyqrapa2r
Which contains a proof that this kind 1 event can be tied into bitcoin block 865239: nostr:nevent1qqsd3u78nkjn78tcfcqjmrclxns9667chycmlzxxgnxxvd26yw7z85sppemhxue69uhkummn9ekx7mp0qgs2jy6jwcfsyqmpfp3tjggt505n4vnemqn3jcf6t3qw2e426mg7k9crqsqqqqqp277t4j
And the timestamp of block 865239, is 00:02 on oct 12. The event itself claims it was signed 22:11 on oct 11; this may be a lie still, but at least it was not signed much more than 1 hours and 51 minutes later.
Aside from all these time related dates, the described lunch date could also just be a complete fabrication of course; at the very least the pictures correspond with the stated dishes
woodpeckestr
https://image.nostr.build/9e12ea3eb66e2b686539abe9349b4d205b2ccde17bdbc30c65b9ad5953ace901.jpg
Timestamps only give very weak indications of truth; but they are really good at catching certain lies.
Take for example the following note: nostr:nevent1qqszw6fwhl28y974y9vjw6ej63xdax4gu5rf8fw52jqkf8x5kk98skgppamhxue69uhku6n4d4czumt99upzqpuvjsr4gjkpxf5jacv3pgpy8x2c4czgwu23xsh2jmztdv66f863qvzqqqqqqyg7gvfg
your client may have a hard time loading it, depending on when you look at this post. This is because the event claims to be signed at Thu Oct 17 2024 03:00:00 GMT. Given it is currently Oct 12, this is a blatant lie, and relays tend to not accept this event because of this.
But, what happens in 5 days? As soon we pass that 3 o’clock mark on oct 17, how would any outsider know that this event was not signed at that time, but 5 days earlier? It is easy to catch these sort of lies when you are present in real time and pay attention, but if you arrive after the fact, NIP-03 timestamps allow you to identify such a lie for certain if adequate proof exists.
And in this case, this proof does exist! Because I timestamped this event already, tying it into block 865274, which was mined around 05:31, oct 12. Which results in the following screenshot of Amethyst: https://image.nostr.build/01ca55a150444cab7b3025b70f9c1dab7c1382a3d54ed3faefaa722ee2f208aa.jpg
The app claims the event was posted ‘now’ (probably because it simply interprets any date in the future as ‘now’), but also tells me a timestamp exists that is 9 hours old.
Now this particular type of lying (pretending to be in the future), it not all that interesting, I was just curious. But it does go to show that you should not trust the time the event claims it was signed, because it is trivially easy to lie about it.
Say hello to my fren btw: https://image.nostr.build/ec4b37e2d259015f1a3b9b39b4163c98ceab56ead83bd08ce82350a061c7814c.jpg
Thus concludes my forrest picture presentation for now.
Time, such a fascinating thing, inescapably ever moving onwards. Winter is coming: https://cdn.satellite.earth/6761a5ff81c5a5ac3daa74e0d33cddf4912b770a13d272b933499839b5b03757.mp4
-
@ 361d3e1e:50bc10a8
2024-10-12 15:02:07https://forex-strategy.com/2024/10/12/why-do-the-worlds-elite-live-significantly-longer-than-the-rest-and-how-do-they-achieve-it/ Why do the world's elite live significantly longer than the rest, and how do they achieve it?
usa #secrets #life #truth #freespeech #health
In the following material, you will find out the secret of longevity. How is it that the world's "celebrities" look eternally young and live longer than the rest. What do they do to stay young? No, they don't buy the most expensive creams! Here you will find out why 8 million children go missing every year around the world. Here you will learn one of the secrets of planet Earth!
-
@ b6424601:a11e4ff4
2024-10-12 12:32:06My engineer dad, who spent his time on better ways to enrich uranium at the national lab in Oak Ridge, Tennessee, suggested that my average math and decent art skills might be better suited for architecture than engineering. I followed the family tradition and enrolled at Auburn University College of Architecture Design and Construction. They had a program for less gifted dyslexic test takers called Summer Option, where you took your entire first year of design labs in one summer. I survived and thrived through the grind and, somewhere on the journey, realized my personal take on good architectural design is centered on recognizing life patterns and the ability to design the stage and context for the patterns to happen in a cool way. I had a gift for pattern recognition and enjoyed creating "cool as shit" designs as we baby architects described them.
Architecture is perfect for me. As an architect, you are the person people ask for help to change how they want to live. You listen, observe, analyze, and come back with ideas on how best to effect change in that location. You exchange value to explore people's lives and help them set the stage for pure life. Living in good design can be life-changing for clients and rewarding for the team that helps make it happen.
After working for a challenging boss for eight years at a national corporate interior architecture firm, I had enough experience to realize that my project ideas were as good as my boss's but would be more personally entertaining. I went on my own in the last century, initially bootstrapping enough work to live, working with a college best friend. I would commute from Atlanta to Birmingham and couch surf in his apartment Monday through Thursday, selling to friends and my buddies' fraternity brothers. (Thank you to the Auburn chapter of the Sigma Alpha Epsilon). We kept it up for a year and then split up.
I returned to Atlanta and kept grinding on in-town custom renovation projects until I had an opportunity to do a build-to-suit office project for a client investor. I found a university mate with experience for the first commercial project, and we started Jones Pierce in 1998. Twenty-six years later, two studios continue to work with individuals and their homes, businesses, foundations, clubs, and personal investment properties.
I am most proud of my professional accomplishments when we receive testimonials about a project that changed someone's life. Clients write us letters, give us hugs, and call back ten years later. It never gets old.
Several projects have challenged me personally over the years. A design for a residence led to Passive House certification in Yestermorrow, Vermont. The Joachim Herz House for the Herz Foundation was our first project with an international foundation. Druid Hills Golf Club master plan and the first building phase is our first club project. All these were project types outside our focus but within our capabilities.
Our proof of work over time also caused the most personal growth and expanded opportunities over a longer time horizon. I love what I do for groups and clients who design personal spaces and places. I am honored to lead my studio tribe, which loves what we do, and the constant grind to improve as much as I do. Over time, the clanging projects came, and we pivoted and captured learnings to improve our processes.
Our pivot points came as we practiced. I hate to use the C word: CRAFT. Learning how to design for owners to spend their cash instead of the unavailable fiat in the housing crash. Improving our delivered projects by designing in high-performance building standards. Figuring out how to adjust our process in milestones to evolve the design budget simultaneously and allow clients to consider their mindful investment of a lifetime. Establishing methods to help property buyers evaluate remote properties to pick the right one to achieve site-actualization. Evolving principles developed to work with the individual to groups of individuals in clubs or foundations. Combining the personally learned principles of Bitcoin with the principles we use to produce our architecture for the sovereign individual.
-
@ e97aaffa:2ebd765d
2024-10-12 09:26:05«A Uniswap, principal bolsa descentralizada da Ethereum, anunciou que irá lançar uma blockchain exclusiva para os serviços que oferece, a Unichain. Ou seja, segundo a equipe a nova rede que será uma segunda camada vai ser mais rápida, com mais liquidez e com serviços de ponta para traders.» – BlockTrends
É curioso o rumo que as criptos estão a evoluir (ou talvez não).
A Uniswap começou no Ethereum, depois foi para outros ecossistemas, posteriormente foi para as L2 do próprio Ethereum. Segundo o DefiLlama está presente em 25 chains, simplesmente absurdo, a liquidez está altamente fragmentada.
Esta fragmentação não é só na Uniswap ou DeFi, é em todo o mundo cripto, que está a tornar o mercado complexo, com liquidez diversa e dependentes de agentes centralizados.
«Essa movimentação pode impactar negativamente a capitalização de mercado de redes L2 como Polygon, Arbitrum e Optimism, que atualmente são amplamente utilizadas por protocolos DeFi”, afirmou Bitelo.» – BlockTrends
A liquidez está constantemente a saltar de chain para chain, em busca de novos airdrops.
«Construído na Superchain, o Unichain oferecerá suporte à interoperabilidade nativa para transações cruzadas rápidas e seguras. Também suportará padrões como ERC-7683 para tornar a troca perfeita em todas as cadeias»
Aqui os Devs utilizam a palavra chave, interoperabilidade, esta enorme fragmentação só funciona devido a Bridges, são essenciais. Todo este ecossistema é muito centralizado.
Agora vou deixar duas perguntas para reflexão:
O que vai acontecer quando as Bridges forem obrigadas a cumprir com o compliance, como qualquer exchange?
O que vai acontecer ao DeFi quando o KYC for obrigatório?
Não é um questão de “se”, mas sim, quando, quando for o KYC for obrigatório, é inevitável, se estão a replicar o sistemas FIAT, terão que cumprir as regras desse sistema. Em ambos os casos, com o incumprimento, vão ter os mesmos problemas que hoje em dia os mixers enfrentam. Tanto para quem cria, como para quem utiliza.
boas reflexões…
-
@ f3328521:a00ee32a
2024-10-12 05:31:29Islam is rooted in Prophetic Tradition and in this regard maintains a dialogue with secular civilization that inclines toward fitra and tawhid. The dunya is ever spiraling in decline and Insan navigates it with guidance and wisdom. Hidden Treasure is beyond the horizon, not on the decaying map.
Hypermodernity presents the new stain of cyberspace where the imaginary has collapsed into the real with the liquidation of any perceived barrier. This eventual shift away from post-modernity was clearly demarcated in 1995 with global capital coming online, accelerating the digitization of everything analogue. Insan is once again a nomad, disconnected from anything but the luminous glow of cyberspace - a hyper-dividual that is a nation-state unto himself. Capital interest is no longer in human physical abilities but the unplugged and deworlded, neuronal composition of the dividual who can behemoth into orbit about the planet. Here, in cyberspace, there be monsters, dragons, and gods.
But man is vicegerent!
Hypermodernity is the death of utopian projects. Art is dead, too. Even academic disciplines are unnecessary. Luxury, instant gratification, and absolute power are the only “goals” now. “When everyone’s super, no one will be.” And so, the new natural enemy becomes insan al kamil – 9/11, 10/7 these events did not happen in a vacuum. As everything collides in cyberspace it is possible a hypermodern boundary act will birth a revived Islamic civilization. The split bandwidths of your nafs can still reflect Simorgh if you are adequately disciplined in strangeness.
Islamic civilization has traditionally thrived on four elements: Capital, Hierarchy, Geography, & Climate. Digital self-sovereignty must be reclaimed. Nuclear families must be marshaled. Digital nomads must build Network States. Hijra must be made back to the margins to avoid catastrophe. And most importantly, theurgy must be embraced. This is only an introduction and outline. There is much work to do!
-
@ e7211c22:e87afeee
2024-10-12 02:46:09Chef's notes
If you do one thing to improve your health in the kitchen, ditch the industrial seed oils and make your own mayonnaise. Make sure to use virgin coconut oil and extra virgin olive oil, not light or refined olive oil. That being said, use extra virgin olive oil from a lighter tasting olive variety, such as Arbequina, or mayonnaise will have a strong olive oil taste. Where do you get extra virgin olive oil from you may ask? Ugly olives, of course. The addition of yogurt and whey greatly extend the shelf life of your mayonnaise from 1-2 weeks to 1-2 months in the refrigerator, while adding beneficial probiotics. To spice up you mayonnaise, see end of directions.
Details
- ⏲️ Prep time: 15 minutes
- 🍳 Cook time: 0 minutes
- 🍽️ Servings: lots
Ingredients
- 1 whole egg
- 2 egg yolks
- 1 Tbsp Grey Poupon
- 1 Tbsp lemon juice
- 1/2 tsp salt
- dash white pepper
- 1/2 cup virgin coconut oil, warmed to liquid
- 1/2 cup extra virgin olive oil, from a lighter tasting olive variety, such as Arbequina
- 1 Tbsp plain yogurt
- 1 Tbsp whey
Directions
- Mix first six ingredients in a bowl with an immersion blender or food processor.
- Combine oils in pourable measuring cup.
- Slowly, drip by drip, begin to add oil to first six ingredients while running immersion blender or food processor. If oil is added too quickly at first, emulsification will not occur and mayonnaise will be ruined.
- Continue adding oil to first six ingredients drip by drip, increasing to slow drizzle, then thin stream, then steady stream. Take breaks pouring oil if necessary to completely blend in oils.
- Add yogurt and whey. Refrigerate.
- To spice up your mayonnaise: Sriracha mayonnaise - with first six ingredients add 1 clove garlic, mashed, 2 Tbsp sriracha, 2 Tbsp lime juice, and an additional 1/4 tsp salt. Chipotle lime mayonnaise - replace 1 Tbsp lemon juice with 1 Tbsp lime juice, with first six ingredients add 1 clove garlic, mashed, 1/4-1/2 can chipotle peppers in adobo sauce, 2 limes juiced and zested, and an additional 1/4 tsp salt.
-
@ a012dc82:6458a70d
2024-10-12 01:45:47Table Of Content
-
The Rise of Russian Bitcoin Mining
-
Cheap Electricity
-
Favorable Regulations
-
Growing Interest in Cryptocurrency
-
What It Means for the Future of Bitcoin
-
Conclusion
-
FAQ
Bitcoin, the world's most popular cryptocurrency, has been on a rollercoaster ride in recent years. However, one thing that has remained consistent is the need for miners to verify transactions and create new blocks on the blockchain. While the United States has long been the dominant force in the world of Bitcoin mining, a new player has emerged - Russia. In this article, we will take a closer look at Russia's emergence as the second-largest Bitcoin miner, the reasons behind its rise, and what it means for the future of Bitcoin.
The Rise of Russian Bitcoin Mining
In recent years, Russia has seen a surge in Bitcoin mining activity, with estimates suggesting that the country accounts for around 10% of global Bitcoin mining. This puts it ahead of countries like Kazakhstan, Iran, and Canada, and second only to China in terms of Bitcoin mining power. The reasons for Russia's rise in Bitcoin mining are varied, but they include factors such as cheap electricity, favorable regulations, and a growing interest in cryptocurrency among the general public.
Cheap Electricity
One of the main reasons for Russia's emergence as a major Bitcoin mining power is the country's abundance of cheap electricity. Thanks to its vast reserves of natural gas and other resources, Russia is able to offer some of the lowest electricity prices in the world. This has made it an attractive destination for Bitcoin miners, who require large amounts of energy to power their mining rigs.
Favorable Regulations
Another factor that has contributed to Russia's rise as a Bitcoin mining powerhouse is the country's relatively favorable regulatory environment. While some countries have taken a hostile stance towards cryptocurrencies, Russia has adopted a more open-minded approach. In 2019, the Russian government passed a law regulating cryptocurrencies, which provided a clear legal framework for businesses and individuals to operate within.
Growing Interest in Cryptocurrency
Finally, the growing interest in cryptocurrency among the Russian public has also contributed to the country's emergence as a major Bitcoin mining player. In recent years, there has been a surge in the number of people in Russia buying and trading cryptocurrencies. This has created a more supportive environment for Bitcoin mining, as more people understand the potential benefits of this activity.
What It Means for the Future of Bitcoin
The emergence of Russia as the second-largest Bitcoin miner has significant implications for the future of the cryptocurrency. For one, it demonstrates that Bitcoin mining is not just the domain of a few wealthy individuals or countries. Rather, it is a global activity that is open to anyone with the right resources and knowledge. This could lead to more widespread adoption of Bitcoin, as more people are able to participate in the network.
Additionally, Russia's emergence as a major Bitcoin mining power could help to decentralize the network. One of the biggest criticisms of Bitcoin is that it is too centralized, with a few mining pools controlling the majority of the network's hashing power. By bringing more miners into the network, Russia could help to distribute the hashing power more evenly, making the network more resilient and less susceptible to attack.
Conclusion
Russia's emergence as the second-largest Bitcoin miner is a significant development in the world of cryptocurrency. It demonstrates that Bitcoin mining is a global activity that is open to anyone with the right resources and knowledge. It also has the potential to help decentralize the network, making it more resilient and less susceptible to attack. As the world of cryptocurrency continues to evolve, it will be interesting to see how Russia's role in Bitcoin mining develops over time.
FAQ
What is Bitcoin mining? Bitcoin mining is the process of verifying transactions and adding them to the blockchain. Miners are rewarded with new bitcoins for their work.
Why is Russia becoming a major Bitcoin miner? Russia has cheap electricity, favorable regulations, and a growing interest in cryptocurrency among its citizens.
What does Russia's emergence as a major Bitcoin miner mean for the future of Bitcoin? It could lead to more widespread adoption of Bitcoin and help to decentralize the network.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 4ba8e86d:89d32de4
2024-10-11 23:15:47Quando você compartilha seu e-mail pessoal em sites, blogs e vários outros serviços, está expondo seu endereço de e-mail principal. É aí que entram os e-mails aliases. Esses endereços de e-mail alternativos desempenham um papel crucial na proteção de sua identidade e na organização de sua comunicação online. Exemplos de e-mails aliases são Simplelogin e AnonAddy.
Um e-mail alias é essencialmente um endereço de e-mail alternativo associado à sua conta principal de e-mail. Sua função principal é proporcionar uma camada adicional de privacidade e segurança, permitindo que você compartilhe um endereço de e-mail temporário ou pseudônimo em vez de revelar seu endereço de e-mail real.
Por que usar e-mails aliases?
-
Privacidade: Ao usar um e-mail alias, você não precisa fornecer seu endereço de e-mail real a sites ou serviços nos quais não confia completamente. Isso protege sua identidade online e ajuda a evitar o rastreamento de sua atividade na web.
-
Segurança contra spam: Os e-mails aliases podem ser usados para se inscrever em boletins informativos, participar de concursos ou registrar-se em sites, sem comprometer sua caixa de entrada principal. Se você começar a receber spam nesse alias, pode simplesmente desativá-lo sem afetar seu e-mail principal.
-
Organização: Os e-mails aliases podem ser usados para categorizar e gerenciar sua comunicação online. Por exemplo, você pode criar aliases específicos para uso em diferentes contextos, como trabalho, compras online ou interações sociais.
-
Proteção contra violações de segurança: Se um dos seus e-mails aliases for comprometido, isso não afetará sua conta de e-mail principal. Você pode simplesmente desativar o alias comprometido e continuar usando seu e-mail principal sem preocupações.
Os e-mails aliases são uma ferramenta valiosa para proteger sua privacidade e segurança online. Com a crescente preocupação com a privacidade digital, usar e-mails aliases se torna uma prática cada vez mais importante.
https://habla.news/u/alexemidio@alexemidio.github.io/1702167107338
https://habla.news/u/alexemidio@alexemidio.github.io/1704317161405
-
-
@ 4ba8e86d:89d32de4
2024-10-11 23:07:45O Joplin é um aplicativo gratuito e de código aberto que permite a criação e organização de notas, tarefas e listas, e está disponível para as plataformas Windows, macOS, Linux, Android e iOS. Com ele, você pode organizar suas notas em cadernos, categorizá-las com tags e sincronizá-las entre dispositivos de forma segura.
Seu diferencial é o foco em privacidade e flexibilidade. O Joplin garante que suas notas estejam sempre acessíveis, mesmo offline, e permite que você sincronize seu conteúdo com serviços de nuvem de forma criptografada, garantindo que ninguém além de você tenha acesso aos dados.
Principais Recursos
-
Suporte Multiplataforma O Joplin está disponível para todas as principais plataformas de desktop e dispositivos móveis, o que permite que você leve suas notas para onde for. Além disso, ele oferece um Web Clipper para capturar páginas da web diretamente do navegador (compatível com Firefox e Chrome), facilitando o arquivamento de conteúdos importantes da internet.
-
Organização e Formato Markdown As notas no Joplin são salvas no formato Markdown, uma linguagem de marcação simples que permite criar textos formatados de maneira intuitiva. Isso torna a edição e formatação de notas mais flexível e prática, além de facilitar a exportação para outros formatos.
As notas podem ser organizadas em cadernos e subcadernos, e você pode adicionar tags para facilitar a pesquisa e a categorização de informações.
- Importação de Notas do Evernote Para quem está pensando em migrar do Evernote, o Joplin permite a importação direta de notas exportadas no formato ENEX, preservando o conteúdo formatado, anexos (imagens, PDFs, etc.) e até mesmo os metadados, como a localização geográfica e datas de criação/modificação. Se você deseja importar suas notas do Evernote, o Joplin oferece um guia passo a passo para fazer a migração sem complicações.
https://joplinapp.org/help/apps/import_export/
-
Sincronização com Criptografia de Ponta a Ponta O Joplin permite que você sincronize suas notas de forma segura utilizando serviços de armazenamento em nuvem como Nextcloud, Dropbox, OneDrive e o serviço próprio, o Joplin Cloud. A grande vantagem aqui é a criptografia de ponta a ponta (E2EE), o que significa que suas notas são criptografadas localmente antes de serem enviadas para a nuvem, garantindo que ninguém, nem mesmo o serviço de nuvem, tenha acesso aos seus dados.
-
Offline First Um dos principais recursos do Joplin é que ele foi desenvolvido com a filosofia "offline first". Isso significa que você sempre tem uma cópia completa e funcional das suas notas no seu dispositivo, permitindo que você acesse e edite suas informações, mesmo sem uma conexão com a internet. Quando a sincronização está habilitada, o Joplin sincroniza as mudanças automaticamente assim que a conexão for restaurada.
-
Busca de Texto Completo O Joplin oferece uma poderosa funcionalidade de busca de texto completo, permitindo que você encontre rapidamente qualquer informação dentro das suas notas, independentemente do volume de dados armazenados.
-
Personalização e Plugins
Além das funcionalidades padrão, o Joplin permite uma ampla personalização. Você pode ajustar a interface com temas e estender as funcionalidades por meio de plugins. Se você tem conhecimentos de programação, pode até desenvolver seus próprios plugins para adaptar o Joplin às suas necessidades específicas.
Privacidade em Foco
Um dos grandes diferenciais do Joplin em relação a outras ferramentas populares de anotações, como o Evernote e o OneNote, é o foco na privacidade do usuário. Com o Joplin, você controla seus dados completamente, sem depender de servidores de terceiros que possam explorar suas informações.
A criptografia de ponta a ponta garante que suas notas estejam seguras e que somente você tenha as chaves para desbloqueá-las. Isso é um grande atrativo para quem está preocupado com a privacidade online, especialmente em tempos em que muitos serviços coletam dados de seus usuários para fins de publicidade ou marketing.
Casos de Uso: Quem Deve Usar o Joplin?
O Joplin é uma ferramenta extremamente versátil, sendo ideal para diversos tipos de usuários:
- Estudantes: Para organização de notas de aula e pesquisa.
- Profissionais: Para gerenciamento de tarefas, anotações de reuniões e documentação de projetos.
- Desenvolvedores: Graças ao suporte nativo para Markdown, o Joplin é uma excelente opção para quem precisa documentar código ou gerenciar projetos de desenvolvimento.
- Jornalistas ou escritores: Que precisam de uma ferramenta segura para organizar suas notas e ideias.
- Usuários preocupados com a privacidade: Que querem uma ferramenta de anotações robusta sem abrir mão da segurança e controle total sobre seus dados.
Como Começar a Usar o Joplin
Iniciar com o Joplin é simples. Basta baixar o aplicativo para a sua plataforma preferida, seja desktop ou móvel, diretamente do site oficial. A partir daí, você pode começar a criar suas notas, configurar cadernos e sincronizar seus dados. A interface intuitiva facilita o aprendizado, e o suporte a Markdown oferece grande flexibilidade na criação e edição de conteúdo.
O Joplin é muito mais do que um simples aplicativo de anotações. Com seu foco em privacidade, sincronização segura, suporte offline e ampla personalização, ele se destaca como uma das melhores opções disponíveis para quem busca controlar completamente suas informações, sem abrir mão de funcionalidades avançadas. Seja você um estudante, profissional ou simplesmente alguém que deseja organizar suas ideias com segurança, o Joplin é uma escolha confiável e flexível. Com sua filosofia de código aberto, o Joplin continua a evoluir e melhorar com contribuições da comunidade global. Se você ainda não experimentou o Joplin, agora é um excelente momento para dar o próximo passo e transformar a maneira como você gerencia suas anotações e tarefas.
https://joplinapp.org/
https://github.com/laurent22/joplin/
-
-
@ 4ba8e86d:89d32de4
2024-10-11 22:59:29Livro de Estratégia , Cripto-Anarquia, Tradecraft, Zonas Autônomas Temporárias, e Contracultura ~ Smuggler e XYZ
PDF do livro em português: https://raw.githubusercontent.com/cypherpunksbr/a-segunda-esfera/master/segundaesfera.pdf
Livro em audiobook: https://archive.org/details/second-realm-digital/
Texto em português: https://cypherpunks.com.br/documentos/a-segunda-esfera/#livro-de-estrat%C3%A9gia
Opaque link
https://opaquelink.sirion.io/
Cyberpunk , Criptoanarquia , extremismo de privacidade, segurança, estratégia.
anarplex net
https://anarplex.sirion.io/
arquivos e projetos relacionados a: cripto-tribos, phyles , cripto-anarquia , agorismo, provedor de serviços darknet.
Thank you, @EricSirion, for hosting the websites, @TheRealSmuggler thanks for the content. Eles contêm alguns dos conteúdos cypherpunk e cripto-anarquistas mais importantes que existem. Se você ainda não os conferiu, dê uma olhada há muito para explorar.
-
@ 5e5fc143:393d5a2c
2024-10-11 22:26:08Just revisiting some quick tips for #newbies #pow #public #blockchain users only.
if you just getting started with bitcoin or any pow crypto coins or been using or storing them for a while, you not must forget the roots and fundamentals.
Hot Wallet — It gets connected to live internet at some point in time essentially to sign / send a tx i.e. spending transaction — exposes the private key of the address from in the process
Cold Wallet — It never ever gets connected or online and can always keep receiving inbound amounts Paper wallets are best n cheapest form of cold wallet that can used once n thrown away.
Cold wallets need to either “import”ed or “sweep”ed in order to used or spend — https://coinsutra.com/private-key-import-vs-sweep-difference/
Any thin #wallet is always dependent on connectivity to live up2date node server where-as self-sufficient qt / cli wallet takes a while to sync up to latest block height in order to be usable.
Beginners should always resist the attraction of quick and fast — thin n 3rd party wallets and always start a long learning journey of core wallets of any coin — either “qt” GUI wallet or command line “coin-cli” wallet
Almost all #proofofwork #blockchains i.e. #POW has #node #wallet - everyone who use support he #public #blockchain secures own you coin value
You can run fullnode either on clearnet or over onion 🧅 #BTC has >55% of nodes running in onion out of total 15000+ live fullnodes and 50000+ bitcoincore wallets around blockheight 777000 . Other notable pow chains are #LTC #RVN and rest are babychains for now !
Always delete hot wallet to test practice restoration before sending any large refunds to it to be safe.
Large funds are always best to keep in self custody node wallets rare n occasional use
Final word — Cannot see private key 🔑 or seed 🌱 in any wallet means not your coin. 😲
Use wallet which u learn or understand best only
That’s all for now n Thank you 🙏 ! ⚡️ https://getalby.com/p/captjack ⚡️
Some Cold wallet nostr posts nostr:note1p6ke5wqshgxtfzj5de3u04hejl2c5ygj8xk8ex6fqdsg29jmt33qnx57y2 nostr:note1rse0l220quur6vfx0htje94ezecjj03y6j7lguwl09fmvmpt6g3q0cg7yw nostr:note1q5w8dyjuqc7sz7ygl97y0ztv6sal2hm4yrf5nmur2tkz9lq2wx9qcjw90q
some nostr specific lightning ⚡️ Layer2 wallets with blockchain mainnet option nostr:naddr1qqsky6t5vdhkjm3qd35kw6r5de5kueeqf38zqampd3kx2apqdehhxarjqyv8wue69uhkummnw3e8qun00puju6t08genxven9uqkvamnwvaz7tmxd9k8getj9ehx7um5wgh8w6twv5hkuur4vgchgefsw4a8xdnkdgerjatddfshsmr3w93hgwpjdgu8zdnswpuk2enj0pcnqdnydpersepkwpm8wenpw3nkkut2d44xwams8a38ymmpv33kzum58468yat9qyt8wumn8ghj7un9d3shjtngv9kkuet59e5k7tczyqvq5m2zcltylrpetrvazrw45sgha24va288lxq8s8562vfkeatfxqcyqqq823ckqlhc8 related blog post nostr:naddr1qqxnzd3cxyenjv3c8qmr2v34qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qydhwumn8ghj7mn0wd68ytn4wdjkcetnwdeks6t59e3k7tczyp6x5fz66g2wd9ffu4zwlzjzwek9t7mqk7w0qzksvsys2qm63k9ngqcyqqq823cpdfq87
-
@ 5e5fc143:393d5a2c
2024-10-11 22:23:45Objective: Share technique n tools create awareness among nostriches
Description: Everyone using nostr will get annoyed by 1. Rougue DM, rouge reply from fraud npubs impersonating some famous accounts 2. Advertising scripts / bots replying or sending unwanted list of things 3. AI bots repeating or replying to every note u post
It is most a user responsilty to deter or mitigate those and have clean timline on whichever nost client you r using
Methods and Action:
The below may sometime client specific and you need navigate and find similar action in you fav. client
To be continued ...
Enjoy surfing nostr - we are learning - we grow together
I am not part of core team or expert just sharing own experience for you benefit. This is not only way to do things - so if you learn or know useful or similar feel free add in comment.
Thank you again!
NPUB LOOK
-
@ 5e5fc143:393d5a2c
2024-10-11 22:20:52Nostr is censorship resistant freedom protocol !!!
OBJECTIVE:
In nutshell this is jumpstart guide for fresh newbie who wanna try out nostr and also for anyone who wanna spread the info in other social media.
HOWTO: Dummies guide to start using nostr
Open browser - > visit iris.to or snort.social Click on Name or New Account – follow steps That’s it – you are in nostr now -- can browse most notes n indepth guides about nostr now and also post note / comment / ask something #asknostr (save n backup you nsec priv key carefully or make additional one later)
video #tutorial #onboarding normies 2 nostr
Get a mobile app Amethyst or Getcurrent.io or Primal later, Get a NIP05 profile checker, Get browser extension Alby wallet Once you become advanced user – explore, search and change as needed as you learn more Remember: Nobody can block/suspend/delete/remove/ban you in nostr !!! Relays servers are important. Also ZAPs are important https://habla.news/tony/welcome-to-nostr https://habla.news/u/captjack@nostrich.love/1681579356819
Any expert or power user nostrich volunteer please cut/paste text, insert screenshot in any other social media you like and think is good for nostr. mastadoon/fediverse/tiktok/meta/wechat/weibo/...
https://justpaste.it/arqgs nostr:note19v0zcp6rnwnry9vjp028qrd37zjcx3e6fpeu3pa7dm8mq48x6a7seye5g8 nostr:note19v0zcp6rnwnry9vjp028qrd37zjcx3e6fpeu3pa7dm8mq48x6a7seye5g8
OPTIONAL Lightning Wallet⚡️ : 🐝 GetAlby🐝 is easiest n also power LN wallet to learn n use Open browser - > visit https://getalby.com/auth/users/new Choose a unique username and strongpaswrd (save / backup elsewhere properly) That's it - you now have Bitcoin Lightning wallet LN-BTC and you now receive and send SATS Play with it learn more about advance features of Alby. Also now can use nostr ⚡️ZAPs ⚡️
Those using PC/Mac can install "getalby browser extension" addon firefox/safari/kiwi preferred.
On mobile install bluewallet and setup new LNWallet->Getalby LNDHub
Also Move medium to large funds to self-custody Liquid BTC wallet like Sideswap or Aqua or Marina Move any extra large funds to BTC mainnet bech32 seqwit address wallet if not spending soon as store-of-value ignoring high mainnet gas fee.
Re-posting - use iris.to or primal.net to start with
Thank you ! 💜🤙 Welcome to Nostr 💜🤙
-
@ 5e5fc143:393d5a2c
2024-10-11 22:15:54We are now given a choice of digital freedom #nostr .
Creativity for every nostrich is now unleashed from the cage of bigtech censorship , rules and algo. But freedom comes with responsibility so pick right one(s). I will try share here some learning experience both technical and also from fundamental point of view. Just wanted kick start this article n fill as we go like living reference document.
Nostr itself is an application layer protocol that can used beyond just social media mirco or long blogging. Each nostr client heavily dependent on back-end servers call nostr "Relay servers" or in short "rs" or "relays" Relays can hosted anywhere in clearnet internet, onion net , vpn , i2p , nym Relays are controlled by their respective admins based NIP specs that they select to implement according to own decisions. Relays can have certain ToS (Terms of Service) Rules to adhered too.
New users can choose and pick client or app (ios / android/ windows) with preset of relays in the simplest form , but other advanced users need to do a regular manual relay management.
Relay management is an active regular task based on where when n how you are using.
Relay list are saved within you npub profile backup file which can edited and broadcast anytime.
Relay management is an active regular task based on where when and how you are using.
Relay list always need to be updated time to time as and when needed.
2 Users MUST a common RELAY between them even if one only need to follow another. Occasionally you may notice certain npub accounts you are following already but cannot see frequent notes publish by them – one of cause maybe you not sharing a common relay
Most nostr client applications has SETTINGS where user choose add/remove relays Also user choose which function to enable - READ or WRITE
Relay list for your account is always saved within you npub profile backup file which can edited and broadcast anytime. Hence any app or browser when u login with you npub the same relay list will be enforced. There could valid reasons why u need have list for if you trying to save bandwidth and traveling.
Functions in app.getcurrent.io and primal.net app for mobile apple or android are ideal for user traveling abroad and wanted to save bandwidth since relay management is done the providers in backend and saves hassle for basic usage.
Remember if someone is selecting relay on your behalf then you may not be necessarily able to pull and get some specific and special content that you may need. Such providers like coracle and nostrid also give option to override the default relays they selected.
Relay types: They can be categorized by various features or policy or technologies.
FREE PUBLIC Relays vs PAID PUBLIC Relays
PAID relays provide unrestricted access / write / filtering options than FREE relays but both are public clearnet relays. Just subscribing to PAID relays will not solve all problems unless you choose the relays properly and enable settings correctly.
Private Replay or Tor Relays – normally not easily visible until unless someone tell you. You can also host own private relay not opened to internet of archive and back of your own notes.
The technical landscape in nostr can be fast changing as more NIPs get proposed or updated. Relays admin can choose implement certain NIPs or not based on policy or technical limitations.
Example NIP33 defines “long notes” aka blogs as you now reading this in habla site which #1 UI and site for "Editable" long notes – some relays donot implement or allow this. NIP07 is used for client authentication like nos2x and is implemented by all relays in fact. Nostr is so fasting changing-hence many links many broken Pushing long note again.
To be continued again ... reference pics will added later also Hope this help you understand "why when what" to tune and maintain active set of proper relays. Relay Proxy, Relay aggregator or Relay multiplexer – Paid, Public, Free, Private, Event, Relays That’s all for now n more later ... Thank you 🙏 ! ⚡️ https://getalby.com/p/captjack ⚡️ PV 💜 🤙
References: https://habla.news/relays https://relay.exchange/ https://relays.vercel.app/ https://nostr.info/relays/ https://nostrudel.ninja/#/relays
Related Articles: https://thebitcoinmanual.com/articles/types-nostr-relays/ nostr:naddr1qqd5c6t8dp6xu6twvukkvctnwss92jfqvehhygzwdaehguszyrtp7w79k045gq80mtnpdxjuzl9t7vjxk52rv80f888y5xsd5mh55qcyqqq823cf39s98 https://habla.news/u/current@getcurrent.io/1694434022411
-
@ 5df9cbaa:89f8f3b3
2024-10-11 17:47:02Hello,
I'm a 50 something year old male. I have always been fascinated by health and wellness, and at times even tried to follow some of the guidance. Now that I'm over half a century old, I feel I need to get serious about this stuff, and this will be my chronicle about the process.
As of the start of this blog, I'm 6 feet tall and weigh about 218 pounds. Not a super fatty, but far from my late twenties when I was around 185 pounds.
I will get into the how and why through posts on here instead of listing it all here. So, if you're interested follow along
Being a fan of freedom and such, I am attempting to keep this whole blog in the Nostr network. I am using Npub.Pro to host it and will be composing things in Obsidian ideally. This is a work in progress and a bit experimental, but it should be fun!
Here we go, hang on.
Tim
-
@ 5df9cbaa:89f8f3b3
2024-10-11 17:05:55So it seems using this obsidian plugin requires a title. Not sure if I like that, need to figure out how to go titleless.
-
@ 5df9cbaa:89f8f3b3
2024-10-11 17:01:02So I am experimenting with using the Nostr plugin for Obsidian so I one, have a permanent record of every note I post, and two, I can post a thought without getting sucked into doom scrolling.
-
@ 4ba8e86d:89d32de4
2024-10-11 15:42:46Lançada como YubiKey Classic em 2008, permite autenticação com um toque no botão para gerar um código único. Inicialmente compatível com OATH-HOTP, evoluiu para suportar U2F, NFC e FIDO2. Com o lançamento da YubiKey 5 Series, tornou-se ainda mais versátil na proteção de contas digitais em diversas plataformas. A Yubico continua inovando para aprimorar a segurança e a autenticação online.
Chaves de Segurança: Um Reforço Essencial para a Autenticação em Dois Fatores
As chaves de segurança são dispositivos de autenticação que desempenham um papel crucial na verificação de identidades online. Funcionando de maneira semelhante às chaves tradicionais, elas são inseridas ou tocadas em dispositivos conectados, como computadores e celulares, para confirmar a autenticidade do usuário. Embora possam ser usadas como única forma de autenticação, é mais comum utilizá-las como um complemento à senha tradicional.
A senha é o método de autenticação mais conhecido e amplamente utilizado, pois é algo que apenas o usuário sabe. O processo é simples: inserir a senha e obter acesso. No entanto, esse método apresenta riscos, uma vez que o vazamento ou o roubo da senha pode permitir o acesso não autorizado a locais que deveriam ser restritos apenas ao proprietário da conta.
Para mitigar esses riscos, surgiu a autenticação em dois passos (2FA), também conhecida como autenticação em dois fatores ou em duas etapas. Como o nome sugere, ela adiciona uma etapa adicional antes de conceder o acesso ao usuário legítimo.
Essa etapa extra envolve algo que o usuário possui, complementando o conhecimento da senha. Em um sistema devidamente configurado, ambos os elementos são necessários para liberar o acesso. Um exemplo comum de 2FA é o uso de tokens de banco, que antigamente vinham em cartões plásticos ou chaveiros digitais (hoje, geralmente estão no celular).
O método mais básico de 2FA, ainda amplamente utilizado, é o envio de senhas temporárias por mensagem de texto (SMS). Após inserir a senha, o sistema envia uma senha temporária descartável para o celular do usuário, que deve ser inserida para obter acesso. No entanto, o uso de SMS para 2FA é considerado frágil, uma vez que as mensagens podem ser interceptadas ou acessadas por terceiros caso o número do usuário seja clonado ou o celular seja roubado.
Os aplicativos OTP (One-time password), ou senhas descartáveis, são uma alternativa mais segura. Eles operam na mesma lógica do SMS, mas assumem a forma de um aplicativo instalado no celular, reforçando a natureza do elemento "possuir". Ao contrário de um número de celular, o próprio celular é mais único e não pode ser clonado. Além disso, os aplicativos OTP contam com medidas de segurança, como bloqueio por senha e/ou biometria. Exemplos populares desses aplicativos incluem o Aegis Authenticator e RaivoOTP Ao configurar o aplicativo para o sistema desejado, as senhas temporárias são geradas e exibidas no próprio aplicativo, exigindo acesso físico ao celular para obtê-las.
As chaves de segurança físicas representam o próximo nível nessa escala de segurança. Em vez de digitar ou colar senhas temporárias, a própria chave de segurança é utilizada como segundo fator de autenticação. Esse recurso é possível graças ao protocolo aberto FIDO U2F (Universal 2nd Factor), desenvolvido pela Aliança FIDO (Fast Identity Online).
Para utilizar as chaves de segurança em computadores, basta inseri-las em uma porta USB, enquanto em celulares, o dispositivo é tocado na chave para a comunicação via NFC (Near Field Communication), um padrão de comunicação sem fio. Em ambos os casos, ocorre uma troca de dados criptografados entre a chave e o dispositivo, usando um mecanismo de desafio-resposta que libera o acesso em caso de sucesso. Embora pareça um processo complexo, para o usuário final, a utilização é bastante simples.
Graças à evolução do protocolo para o FIDO2, as chaves de segurança também podem ser utilizadas como o único meio de autenticação. As linhas YubiKey 5 e Security Key, da fabricante Yubico, são exemplos de chaves de segurança que funcionam com o FIDO2.
A seguir, abordaremos algumas dúvidas comuns sobre o uso de chaves de segurança:
Não é necessário usar 2FA em todas as ocasiões: A maioria dos serviços permite que você defina um dispositivo confiável, como um celular ou computador, para que, em futuros acessos, apenas a senha seja exigida, ou nem isso seja necessário. No entanto, é importante garantir que o dispositivo confiável esteja devidamente protegido, por meio de criptografia, para evitar comprometimentos de segurança. De nada adianta ter 2FA ativado em uma conta se o dispositivo utilizado não estiver adequadamente seguro.
Chaves de segurança são únicas: É importante ter em mente que as chaves de segurança são dispositivos únicos. Isso significa que, se você perder a chave, não será possível transferir as configurações para outra chave. Além disso, as chaves de segurança não possuem qualquer vínculo formal com o usuário, como um nome de usuário ou senha. O vínculo existe apenas entre a chave e as contas que dependem dela para conceder acesso. É semelhante a uma chave física: ela protege a propriedade, mas não está diretamente ligada ao usuário.
Perda do celular ou chave de segurança: Caso você perca seu celular ou chave de segurança, existem soluções para recuperar o acesso. A primeira opção é ter outro dispositivo confiável configurado ou com sessão ativa nas contas. Nesse caso, é possível acessar as configurações dos serviços/aplicativos e desativar o 2FA. A segunda opção é ter salvo os códigos de backup fornecidos por muitos serviços. É importante guardar esses códigos de backup em um local extremamente seguro, como um papel impresso, pois eles são uma opção nuclear para recuperar o acesso à conta, independentemente de qualquer outra medida de segurança.
Dois métodos de 2FA paralelos: É possível utilizar dois métodos de 2FA em paralelo, como uma chave de segurança e um aplicativo OTP. Isso pode ser necessário caso você tenha dispositivos que não possuem portas USB compatíveis ou tecnologia NFC, como iPads ou celulares Android mais simples.
A configuração de uma chave de segurança pode variar de acordo com o serviço utilizado, mas, em geral, envolve a escolha da opção desejada e a confirmação por meio da inserção da chave ou de uma senha descartável gerada pelo aplicativo. Como exemplo, vamos ver como configurar uma chave de segurança no Twitter:
- Clique na aba "Mais" e depois em "Configurações e privacidade".
- Acesse "Segurança e acesso à conta" e clique em "Segurança".
- Em seguida, clique em "Autenticação em duas etapas" ou acesse diretamente este link.
- Na página de configuração da 2FA, o Twitter apresentará três opções: "Mensagem de texto" (SMS), "Aplicativo de autenticação" e "Chave de segurança". Para configurar a chave de segurança, clique na caixa de seleção ao lado dessa opção.
- O Twitter solicitará a senha novamente por medida de segurança. Em seguida, um pop-up aparecerá pedindo para inserir a chave no computador. Siga as instruções para ativar a chave. A ativação da chave de segurança envolve tocar com o dedo na área designada para garantir a presença física do usuário e mitigar ataques remotos.
- Após a ativação, o Twitter pedirá um nome para a chave e exibirá um "código nuclear" de backup, que permite o acesso direto sem 2FA caso a chave seja perdida.
Quando você for fazer login novamente, após inserir a senha, um pop-up do navegador solicitará a chave de segurança. O processo é semelhante ao da configuração: basta inserir e ativar a chave. Em dispositivos com NFC, basta tocar a parte superior do celular na chave de segurança para liberar o acesso.
Você pode adquirir as chaves de segurança diretamente na loja oficial https://www.yubico.com/br/store/ , que realiza envios para o país. Os preços variam de acordo com o modelo da chave e a forma de aquisição. Outra opção é procurar por vendedores independentes em marketplaces como o Amazon. Vale ressaltar que investir em uma chave de segurança é uma decisão pessoal e depende do nível de segurança desejado e do valor atribuído à proteção de suas contas.
Embora as chaves de segurança possam ser consideradas o "Santo Graal" da autenticação em dois fatores, é importante ressaltar que, caso você ainda não utilize 2FA em suas contas, é altamente recomendável configurar um aplicativo OTP. Confia somente em senhas torna-se arriscado com os crescentes vazamentos de dados e a intensificação de tentativas de golpes.
As chaves de segurança físicas, como a YubiKey, desempenham um papel crucial na autenticação em dois fatores (2FA), fortalecendo a segurança em contas online. Oferecendo uma abordagem mais segura em relação ao 2FA por SMS e aplicativos OTP, essas chaves proporcionam uma camada adicional de proteção, Embora sejam um investimento pessoal, a crescente importância da segurança digital torna essas chaves uma opção valiosa para proteger nossas identidades e dados online.
O U2F-TOKEN pode ser uma excelente opção para pessoas que gostam de criar e personalizar suas próprias ferramentas de segurança. Ao transformar placas STM32F103 e EFM32HG em tokens U2F, o firmware oferece uma solução econômica e versátil para autenticação de dois fatores (2FA).
As vantagens de utilizar o U2F-TOKEN incluem:
-
Customização: O U2F-TOKEN é um projeto de código aberto, o que significa que você pode personalizar e modificar o firmware de acordo com suas necessidades específicas.
-
Custos Baixos: As placas STM32F103 e EFM32HG são amplamente disponíveis e acessíveis em termos de preço, tornando o U2F-TOKEN uma alternativa econômica a outras soluções de tokens de autenticação.
-
Controle Total: Ao criar e montar seu próprio token U2F, você tem controle total sobre o processo e pode garantir a segurança do dispositivo.
-
Experiência de Aprendizado: Ao trabalhar com o U2F-TOKEN, você pode adquirir experiência em programação, compreender melhor o funcionamento de autenticação de dois fatores e aprofundar seus conhecimentos em segurança da informação.
-
Flexibilidade: O U2F-TOKEN suporta várias placas, permitindo que você escolha o hardware que melhor se adequa às suas necessidades.
Observação: é importante lembrar que trabalhar com firmware e hardware de baixo nível requer conhecimentos técnicos sólidos e cuidado, para evitar danos aos dispositivos ou problemas de segurança. Caso você não tenha experiência em programação ou eletrônica, pode ser útil buscar orientação e conhecimentos adicionais antes de iniciar o processo de criação do U2F-TOKEN.
O U2F-TOKEN é uma ótima opção para entusiastas que desejam explorar e criar suas próprias ferramentas de autenticação de dois fatores, mas é importante ter a devida cautela e conhecimento técnico ao lidar com esses projetos.
https://github.com/gl-sergei/u2f-token
https://youtu.be/o4t2rp66i-w
-
@ 4ba8e86d:89d32de4
2024-10-11 15:34:52Com o Pidgin, os usuários podem se conectar e se comunicar com pessoas em diferentes redes e serviços de mensagens instantâneas através de uma única interface.
A história do Pidgin remonta a 1998, quando Mark Spencer lançou a primeira versão do software de mensagens instantâneas chamado "Gaim". Inicialmente, o Gaim suportava apenas o protocolo de mensagens ICQ, permitindo que os usuários se conectassem e se comunicassem com seus contatos do ICQ. Posteriormente, o Gaim expandiu seu suporte para incluir outros protocolos de mensagens instantâneas, como AIM, MSN, Yahoo e IRC. Essa capacidade de se conectar a várias redes de mensagens instantâneas em um único aplicativo tornou o Gaim extremamente popular entre os usuários que desejavam gerenciar suas diversas contas em um só lugar. No entanto, em 2007, o projeto Gaim enfrentou problemas legais relacionados a questões de marca registrada com a America Online (AOL), empresa proprietária do serviço de mensagens instantâneas AIM. Para evitar conflitos e possíveis ações legais, o projeto Gaim foi renomeado para Pidgin.
O Pidgin oferece recursos comuns de mensagens instantâneas, como bate-papo em grupo, transferência de arquivos, emoticons, histórico de mensagens e notificações. Além disso, ele suporta plugins que estendem sua funcionalidade, permitindo recursos adicionais, como criptografia de mensagens, suporte a voz e vídeo, integração com serviços de redes sociais, entre outros.
Uma das vantagens do Pidgin é sua capacidade de se conectar simultaneamente a várias contas de diferentes serviços, permitindo que os usuários gerenciem várias contas de mensagens instantâneas em um único aplicativo.
Como cliente XMPP, o Pidgin permite que os usuários se conectem a servidores XMPP, como o servidor do próprio Tor, e se comuniquem com usuários XMPP em várias redes. Ele suporta recursos básicos do XMPP, como presença, envio de mensagens e participação em bate-papos em grupo.
O Pidgin é um software amplamente utilizado e bem estabelecido, conhecido por sua estabilidade e facilidade de uso. Sua versatilidade em suportar diferentes protocolos de mensagens instantâneas o torna uma escolha popular para usuários que desejam centralizar suas comunicações em um único aplicativo.
O aplicativo Pidgin funciona como um cliente de mensagens instantâneas que permite se comunicar com usuários de diferentes redes e serviços usando uma única interface. Aqui está uma descrição detalhada de como o Pidgin funciona:
-
Instalação e Configuração: Após baixar e instalar o Pidgin em seu dispositivo, você precisará configurar suas contas de mensagens instantâneas. Isso envolve fornecer as informações de login para cada serviço que deseja usar, como nome de usuário, senha e servidor correspondente.
-
Conexão com Servidores: Após configurar suas contas, o Pidgin se conectará automaticamente aos servidores correspondentes de cada serviço de mensagens instantâneas que você configurou. Ele estabelecerá uma conexão com cada servidor para verificar a presença de novas mensagens ou contatos online.
-
Lista de Contatos: Uma vez conectado aos servidores, o Pidgin exibirá uma lista de contatos, onde você poderá ver quais de seus contatos estão online, offline ou indisponíveis. A lista de contatos mostrará o status de cada contato, permitindo que você saiba se eles estão disponíveis para conversar.
-
Iniciar Conversas: Para iniciar uma conversa com um contato, você pode clicar duas vezes no nome dele na lista de contatos ou selecionar a opção "Iniciar bate-papo" no menu. Uma nova janela de conversa será aberta, permitindo que você troque mensagens de texto com o contato selecionado.
-
Recursos Adicionais: O Pidgin oferece recursos adicionais por meio de plugins. Você pode instalar plugins para estender a funcionalidade básica do Pidgin, como criptografia de mensagens, suporte a voz e vídeo, integração com serviços de redes sociais e muito mais. Os plugins permitem personalizar o Pidgin de acordo com suas necessidades e preferências.
-
Notificações e Histórico: O Pidgin exibirá notificações quando você receber uma nova mensagem, mesmo se o aplicativo estiver minimizado. Além disso, ele mantém um histórico de suas conversas, permitindo que você visualize mensagens anteriores e pesquise por palavras-chave.
7.O Pidgin implementa medidas para proteger a comunicação dos usuários. Por exemplo, por meio de plugins, é possível adicionar criptografia de mensagens para garantir que as conversas permaneçam privadas e seguras. O Pidgin também possui recursos de autenticação e suporte para conexões seguras, garantindo que as informações de login e dados de comunicação estejam protegidos durante o uso do aplicativo.
O Pidgin resolve alguns problemas comuns relacionados à comunicação em mensagens instantâneas.
-
Centralização de contas: Com o Pidgin, você pode centralizar todas as suas contas de mensagens instantâneas em um único aplicativo. Isso significa que você não precisa ter vários programas abertos ou alternar entre diferentes aplicativos para se comunicar com contatos em diferentes redes. O Pidgin permite que você gerencie todas as suas contas em uma única interface.
-
Compatibilidade de protocolos: O Pidgin suporta uma ampla variedade de protocolos de mensagens instantâneas, como XMPP/Jabber, AIM, ICQ, MSN, Yahoo, IRC e outros. Isso significa que você pode se comunicar com contatos em diferentes redes usando um único aplicativo, em vez de ter que usar um cliente específico para cada serviço. O Pidgin oferece uma solução conveniente para a incompatibilidade entre diferentes serviços de mensagens instantâneas.
-
Simplificação da comunicação: Ao usar o Pidgin, você pode trocar mensagens com contatos de diferentes redes em uma única janela de conversa. Isso simplifica a comunicação, pois você não precisa alternar entre diferentes aplicativos ou janelas para conversar com pessoas em redes diferentes. O Pidgin oferece uma interface unificada para todas as suas conversas, tornando mais fácil e conveniente se comunicar com contatos em várias redes.
-
Recursos adicionais através de plugins: O Pidgin permite a instalação de plugins que estendem sua funcionalidade básica. Isso significa que você pode adicionar recursos adicionais, como criptografia de mensagens, suporte a voz e vídeo, integração com serviços de redes sociais e muito mais. Os plugins permitem que você personalize o Pidgin de acordo com suas necessidades e preferências, adicionando recursos adicionais que podem melhorar sua experiência de comunicação.
-
Histórico de mensagens: O Pidgin mantém um histórico de suas conversas, permitindo que você visualize mensagens anteriores e pesquise por palavras-chave. Isso é útil para recuperar informações ou referências de conversas anteriores. O histórico de mensagens do Pidgin pode ser especialmente útil em situações de trabalho ou colaboração, onde você pode precisar revisitar informações compartilhadas em conversas passadas.
O Pidgin é projetado para facilitar a comunicação entre usuários de diferentes redes de mensagens instantâneas, oferecendo uma interface unificada e recursos comuns para troca de mensagens. Ele permite que você gerencie várias contas em um só lugar, simplificando sua experiência de mensagens instantâneas.
https://www.pidgin.im/
https://keep.imfreedom.org/pidgin/pidgin/
https://github.com/pidgin/pidgin
-
-
@ 4ba8e86d:89d32de4
2024-10-11 15:18:56MAPAS HISTÓRICOS DAS REDES DE COMPUTADORES Uma série de mapas históricos da ARPANET, Internet, Usenet e outras redes de computadores, traçando como essas redes pioneiras cresceram e se desenvolveram.
A pesquisa pioneira de Paul Baran na década de 1960, que imaginou uma rede de comunicações que sobreviveria a um ataque de um grande inimigo. O esboço mostra três diferentes topologias de rede descritas em seu RAND Memorandum, "On Distributed Communications: 1. Introduction to Distributed Communications Network" (agosto de 1964). A estrutura de rede distribuída ofereceu a melhor capacidade de sobrevivência.
https://void.cat/d/LQoEpXMKVSqHgPP8MpdNaA.webp
Um esboço do mapa da possível topologia da ARPANET por Larry Roberts . O mapa foi desenhado no final dos anos 1960 como parte do planejamento da rede.
(Digitalizado de Where Wizards Stay Up Late: The Origins of the Internet , por Katie Hafner e Matthew Lyon, página 50.)
https://void.cat/d/GLMfYfU4K4GMK21VqmQ1oL.webp
No início ....
https://void.cat/d/MMrLYEjZdPK1Edc8vao6v8.webp O primeiro nó na ARPANET na University California Los Angeles (UCLA) em 2 de setembro de 1969. (Fonte: "Casting the Net", página 55)
https://void.cat/d/PFExNH9thZNtGuhAKM146Y.webp Um mapa ascii muito simples do primeiro link de rede na ARPANET entre UCLA e SRI retirado do RFC-4 Network Timetable , por Elmer B. Shapiro, março de 1969.
https://void.cat/d/SqxUWWkv9rM95ujxbToLz9.webp Até o final do ano, existem quatro nós na "ARPA NETWORK", conforme mostrado no esquema acima. Estes foram a Universidade da Califórnia em Los Angeles (UCLA), a Universidade da Califórnia em Santa Bárbara (UCSB), a Universidade de Utah e o Stanford Research Institute (SRI). (Fonte: "Casting the Net", página 56. Veja também a linha do tempo do Museu do Computador .)
https://void.cat/d/KhMyRNeCWLoEnCoNMaJuuH.webp A ARPANET cresceu rapidamente à medida que mais sites foram conectados. O mapa acima mostra a situação em setembro de 1971 e o abaixo é de outubro de 1980, que inclui um link de pacote de satélite UCL em Londres. (Fontes: "Lançando a Rede", página 64; CCR, página 93)
https://void.cat/d/BKXX9CmdA22vDjNm4S6Sju.webp https://void.cat/d/2h47fzeDRpjppZ8h4MBh8k.webp Mapas de rede lógica mapeando o crescimento de sites conectados à ARPANET no início dos anos 1970.
https://void.cat/d/6HehrpyqGZi3gRNR6Am9z9.webp https://void.cat/d/S2xnxHVdDmqczSsVJh1jXd.webp RFC-432 Network Logical Map , tem um mapa semelhante da ARPANET em dezembro de 1972.
https://void.cat/d/6qkdvUuvC1LR1BNSmg59zZ.webp O mapa acima mostra a topologia da ARPANET em março de 1977. Ele foi escaneado por Larry Press do ARPANET Completion Report , Bolt, Beranek e Newman, Burlington, MA, 4 de janeiro de 1978.
https://void.cat/d/4naQvrz53sK26S8d39vCEj.webp "ARPANET, outubro de 1980"
https://void.cat/d/Pv6hZYXNjKEJMrRxPrqzAb.webp Este mapa de aparência interessante mostra o estado do núcleo da Internet em agosto de 1987. Pode ser descrito como a "Internet em um chip" . Esta versão colorida foi fornecida por Craig Partridge.
https://void.cat/d/TxoEABfV4oT6aLCku7FohG.webp O estado da ARPANET em outubro de 1989, perto do fim de sua vida, com apenas alguns nós restantes. Foi finalmente desativado em 1990, tendo sido amplamente substituído pelo NSFNET. (Fonte: CCR, página 110)
https://void.cat/d/HktWMjS6JMTvRY9F952CwF.webp https://void.cat/d/2CVKLYe26YpGzzSMcb4VN3.webp
Mapas da MILNET (Defense Data Network) nos Estados Unidos e Europa, desde 1989. A MILNET se separou da ARPANET em 1984. (Fonte: Directory of Computer Networks , editado por Tracey L. Laquey, Digital Press, 1990).
A topologia do BITNET em 1981 (mapa parcial) https://void.cat/d/KijDBdASxbQuCTLNBEWVY7.webp
A infra-estrutura NSFNET e topologia em 1991.
https://void.cat/d/9V4ug2uViat1jzxbier6X1.webp https://void.cat/d/JqTp3Jerr6JipdP6iq6gbs.webp https://void.cat/d/VNriyNuf2nkGitBTjet1rb.webp (Fonte: NSFNET postscript maps from
https://void.cat/d/6NtYLMXaoVMcoMfZQR9na8.webp Um esboço da rede de comutação de pacotes no Reino Unido proposto por Donald Davies, um pioneiro em redes na década de 1960. (Fonte: National Archive for the History of Computing , digitalizado com permissão de Janet Abbate's, "Inventing the Internet", 1999, página 31).
https://void.cat/d/LiQ9NCHDShKnbsKXGjMpzH.webp Estes mapas mostram a estrutura da JANET , a rede acadêmica e de pesquisa do Reino Unido, em 1992. O mapa acima mostra conexões internacionais com links de 256 Kbps para a Europa e o link transatlântico "Fat-Pipe" para os EUA rodando a 768 Kbps. Não é de surpreender que a capacidade desses links tenha aumentado maciçamente desde então.
https://void.cat/d/AxbiwXJbuVnVkFPikEo3ae.webp
LINK : https://personalpages.manchester.ac.uk/staff/m.dodge/cybergeography/atlas/historical.html
-
@ 4ba8e86d:89d32de4
2024-10-11 15:13:50Tutorial feito por Grom Mestre ⚡ Poste original Abaixo.
Part 1: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227366/tutorial-instalando-kleopatra-criando-primeiro-chaves-parte?show=227366#q227366
Part 2: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227377/tutorial-importando-exportando-chaves-p%C3%BAblicas-kleopatra
Part 3: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227397/tutorial-criptografando-descriptografando-kleopatra-parte
Parte 4: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227406/tutorial-fazendo-ba
TUTORIAL DE PGP USANDO O KLEOPATRA.
Instalação do Kleopatra O Kleopatra, como citado no post anterior, está disponivel para Linux e Windows. Em Linux ele pode ser instalado facilmente através do respectivo gerenciador de pacotes da sua distribuição. Alguns exemplos de comandos para algumas distros são:
ArchLinux : sudo pacman -S kleopatra
Debian : sudo apt install kleopatra
Fedora : sudo dnf install kleopatra
O Kleopatra também está disponível como pacote em Flatpak, porém nos meus testes eu tive problemas na sua utilização. Portanto, para esse tutorial estarei usando a versão empacotada pelo Debian 12. Em Windows o Kleopatra se encontra disponível no pacote Gpg4win, o qual contém, além do Kleopatra, o GnuPG e outros utilitários que podem ser úteis.
No nosso caso nós só precisaremos mesmo do dois primeiros. O link para download do Gpg4win se encontra aqui https://www.gpg4win.org/download.html
CRIANDO O SEU PRIMEIRO PAR DE CHAVES
Ao iniciar o Kleopatra pela primeira vez a seguinte tela será mostrada caso nenhuma chave esteja presente no seu sistema. Nesse caso apenas clique em 'Novo Par de Chaves' ou acesse a opção em Arquivo -> Novo Par de Chaves OpenPGP https://image.nostr.build/26a5a8b057ade36bc2957d714cb19fc1172cf5a8d844f37f52996064019386a3.jpg
Ao clicar nessa opção a seguinte janela será aberta: https://image.nostr.build/28d2a94c44f8bd2b90eb057a3e7b603a57ce483fe24dd1c9ba8ed416d0a9b93c.jpg
Os campos 'Nome' e 'Endereço de e-mail' são apenas formas convenientes de identificar a chave. A outra forma seria decorar o fingerprint da chave, o que é algo bem inviável de ser fazer.
Marque a opção 'Proteger a chave gerada com uma senha' para que ao utilizar a sua chave ou tentar importar a chave secreta uma senha seja solicitada. É extremamente recomendado que você use senhas muito longas (+20 caracteres) com uma alta entropia para inviabilizar ataques de força bruta. Use ferramentas como o gerador de senhas do KeePassXC https://keepassxc.org/download/ para isso caso você deseje.
Clicando na botão 'Configurações Avançadas' você pode selecionar qual é o algoritmo que será usado para a criação das chaves. Nesse tutorial usaremos o algorítmo de curva eliptica, pois se trata de um método mais avançado, que gera chaves menores e computacionalmente mais eficientes. https://image.nostr.build/bdee90a538fb9923b0d325e77d1a0275261319309554d40340cc7f96c38a4d34.jpg
Nas configurações avançadas, marque as seguintes opções:
• Material da Chave : ECDSA/EdDSA usando curva ed25519
• '+ ECDH' (Elliptic Curve Diffie-Hellman) usando cv25519
• Assinatura : Necessário caso você deseje gerar assinaturas digitais
A validade da sua chave é arbitrária, mas na dúvida coloque por um périodo de dois anos a partir da data da sua criação. Se você quiser inclusive você pode configurar para que ele nuca expire. Isso pode ser alterado depois caso você deseje.
Após isso, clique em OK para fechar as configurações avançadas e em OK para iniciar a geração das suas chaves. Uma caixa de diálogo vai solicitar a inserção da senha para proteger a sua chave. Depois de inserí-la e clicando em OK aguarde alguns instantes. Se tudo ocorrer como conforme uma mensagem vai aparecer sinalizando que a chave foi gerada com sucesso. https://image.nostr.build/07ca42b77ef9dd29dabef930083e99eb16e6b2562952d930f469a5fb210b0326.jpg
Sua chave agora vai aparecer na listagem de certificados do Kleopatra. https://image.nostr.build/2fbbc351937200dc32fce7d6a44c025385da4b06d6b86edd37fbaa8f71815bae.jpg
IMPORTANDO E EXPORTANDO CHAVES PÚBLICAS NO KLEOPATRA.
2.1 Importando chaves públicas.
Agora vamos aprender como importar as chaves públicas de outros usuários presentes na internet. Para esse exemplo eu usarei a chave pública do usuário nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk presente em seu perfil.
Uma informações importante de comentar é que as chaves públicas podem ser exportadas de duas formas: como um binario ou codificada em base64. Nesse tutorial usaremos as chaves codificadas em b64, porém saibam também que elas podem estar em outro formato perfeitamente reconhecível pelo Kleopatra.
Para isso vamos abrir o Bloco de Notas do Kleopatra, um seção do programa que nos permite criptografar rapidamente pequenos trechos de texto e importar as chaves em base64.
Abra o Bloco de Notas do Kleopatra clicando no ícone de paineis do Kleopatra. https://image.nostr.build/d4ffb93f7cb034a9946d9fc62e33953b1bc9ab9ad6737e47f3f03c90a7eb96bb.jpg
Copie e cole a chave pública no campo de texto e clique em seguida em 'Importar um Bloco de Notas' https://image.nostr.build/10817763d82b4f7f9dfffb81e351ff93539214a09e2e80aa68fa7eb6a8c52b0a.jpg
Uma nova janela vai abrir nos solicitando o reconhecimento do certificado do usuário. Como nós usamos o eficiente método chamado "Confia", apenas clique em Importar para dar prosseguimento. https://image.nostr.build/b9724052f9215dfbd44cd80e45b8755c24e1db6c96a674195d538d43b11b83e6.jpg
Na janela seguinte vamos certificar a chave do Ms.Lilith usando a nossa chave privada criada anteriormente, bastando selecioná-la no campo 'Certificar com:' e clicar em 'Certificar'. Se tudo ocorrer como previsto uma caixa de mensagem vai aparecer indicando que a operação foi um sucesso. Você pode ver que agora a chave do Ms.Lilith aparece no painel de certificados do Kleopatra. https://image.nostr.build/b2bba7b0fe957f050bd4a30300d3cedce7dd2d9a42000c9bc976e578f820d7ef.jpg https://image.nostr.build/f2ec4c6efc0b5f85474f7f6350b5ae1795db226e055856f516479d8c89b7bb3c.jpg https://image.nostr.build/de42e6b1007d9bde17becd35d6c3b43c70dd6f0b0dedd6f6d195ffc7cf99f952.jpg
2.2 Exportando a nossa chave públlica
Como dito anteriormente, as chaves podem se apresentar tanto no formato binário como base64. Vamos agora exportar a nossa chave de modo que ela possa ser facilmente compartilhada em um site ao estilo pastebin. Para isso, no painel de Certificados, clique com o botão direito na sua chave e selecione 'Detalhes' https://image.nostr.build/2ed1c1ab468ae4ddc9b572a8212d28d489888817be05952143508cc4125ade94.jpg
Na nova janela, clique em Exportar, a qual vai mostrar a sua chave em formato texto que poderá ser facilmente copiada e colada no local adequado. https://image.nostr.build/99fe855e2c4915272f9f66da9cd2ee8078588bc78d13b413a7033bdc23a0bf30.jpg https://image.nostr.build/adc99c06f25d5068231f9c7ddaea37ce6d42739741d8d8405f72c0ef72fa5abc.jpg
CRIPTOGRAFANDO E DESCRIPTOGRAFANDO NO KLEOPATRA.
3.1 Criptografando e assinando arquivos
A criptografia e a assinatura de arquivos e textos usando o Kleopatra é extremamente simples e intuitiva. No nosso exemplo eu vou criptografar e assinar um arquivo de imagem usando a minha própria chave, já que usando a chave pública de outra pessoa me impossibilitaria de descriptografa-la depois. Lembre-se que você também pode usar o Bloco de Notas do Kleopatra para criptografar e assinar rapidamente textos curtos e copiá-los em formato base64.
Clique na opção 'Assinar / Criptografar'. O gerenciador de arquivos será aberto para selecionar um ou mais arquivos que você deseja criptografar. No nosso caso eu vou criptografar o arquivo de imagem do meu avatar. https://image.nostr.build/4887157ace62d508760f322c42bf457edcad7c0d86048aa8d048d8d60b87ada4.jpg https://image.nostr.build/be69a6689618b2ec42ac8fe19de3d6d8e0f1eddb67abc852251701a69e111e4e.jpg
Uma janela abrirá perguntando pelas chaves que você deseja usar para assinar e criptografar. Usarei nesse cenário a mesma chave para ambos os processos, porém em situações onde se almeja a segurança das informações entre as partes marque apenas a opção 'Criptografar para outros' e selecione as chaves das pessoas em questão. Feito as devidas seleções clique em 'Assinar / Encriptar'. Uma janela será mostrada confirmando o sucesso da operação.
Verifique o arquivo gerado no diretório do arquivo original
3.2 - Criptografando textos pelo Bloco de Notas
As mesmas operações que foram feitas com um arquivo podem ser repetidas facilmente através do Bloco de Notas. As figuras a seguir ilustram esse processo.
Primeiro escreva o texto que você pretende cifrar e em seguida clique na aba 'Destinatários'
Na aba 'Destinatários' marque a opção 'Assinar' e selecione a sua chave; desmarque a opção 'Criptografar para mim' e marque a opção 'Criptografar para outros'; clique no botão a direita do campo de endereços e selecione a chave do destinatário; clique em OK e em seguida em 'Assinar/Encriptar o Bloco de Notas'; se tudo ocorreu corretamente uma mensagem de aviso vai aparecer confirmando a operação. https://image.nostr.build/36413d5411ccdef78f79a2192e157df04fde9a52193da71484450370a3169dcc.jpg https://image.nostr.build/502182e96066e186ec2858fb5f302e413b873386b891737b4af8a61678108b6e.jpg
Verifique o arquivo gerado no diretório do arquivo original https://image.nostr.build/d99b16e664a60040965c5c6fea99b2565781f4a0530b6f20950d344958fc1751.jpg
3.2 - Criptografando textos pelo Bloco de Notas
As mesmas operações que foram feitas com um arquivo podem ser repetidas facilmente através do Bloco de Notas. As figuras a seguir ilustram esse processo.
Primeiro escreva o texto que você pretende cifrar e em seguida clique na aba 'Destinatários' https://image.nostr.build/05641dcc33576aedce283de7cfc7328597136bee6018670d334178cf1ea21a0c.jpg
Na aba 'Destinatários' marque a opção 'Assinar' e selecione a sua chave; desmarque a opção 'Criptografar para mim' e marque a opção 'Criptografar para outros'; clique no botão a direita do campo de endereços e selecione a chave do destinatário; clique em OK e em seguida em 'Assinar/Encriptar o Bloco de Notas'; se tudo ocorreu corretamente uma mensagem de aviso vai aparecer confirmando a operação. https://image.nostr.build/b3c811ace9e16e90c9d17d6e6e9cbdc22679712eb56a11998d6030c88e10bc50.jpg https://image.nostr.build/e9c0485087fdbb475965ab8782f76be0c56748383f1125c0362bc5824a88e2c8.jpg https://image.nostr.build/9b167f2e4868ef125ec9f4cde87edee56e0c10e582563282c78ac7e30776a672.jpg
Descriptografar é basicamente o processo inverso, bastando copiar o bloco de mensagem PGP no Bloco de Notas e clicar em 'Descriptografar/Verificar bloco de notas'
Descriptografar é basicamente o processo inverso, bastando copiar o bloco de mensagem PGP no Bloco de Notas e clicar em 'Descriptografar/Verificar bloco de notas' 3.3 - Descriptografando arquivos
Descriptografar é tão simples quanto criptografar arquivos e textos, bastando clicar na opção Descriptografar / Verificar e selecionar os arquivos em questão. Só lembrando que todas essas operações podem ser executadas a partir do Bloco de Notas do Kleopatra para a sua conveniência. https://image.nostr.build/dc9d62a58e28dd192f937be33b4e0a487bb22a340f8dc1b34108b8a345eae0b2.jpg https://image.nostr.build/50ab5e3b0166513f2b0d0277b929c3c5501e19adf579abc7b8c6978b7d99e93d.jpg https://image.nostr.build/2bd0eb41988d2035de7680ca5055d86b7f72c7cf7b8dd674f6b24bfcada3c1a0.jpg
FAZENDO BACKUP DAS CHAVES SECRETAS E CHECKSUMS.
4.1 - Fazendo backup da sua chave privada
AVISOS!
1 - É de suma importância que você tenha ao menos duas cópias de backup da sua chave privada devidamente protegida em mídias de tipos distintos. Um exemplo seria ter uma cópia em um pendrive e outra no seu celular dentro de um contêiner criptografado com LUKS2, Veracrypt ou até mesmo chaveiros do KeePassXC.
2 - Em hipótese alguma coloque as suas chaves na nuvem em texto plano, pois já é de conhecimento público que Google, Microsoft, Apple e afins, por mais que criptografem seus dados nos servidores, possuem cópias da chave e usam-nas para diversos fins como análise de tráfego, indexação de conteúdo, coleta de analytics e entre outros. Vocês podem conferir detalhes dessa brecha para o OneDrive abaixo:
Microsoft OneDrive: https://privacy.microsoft.com/en-us/privacystatement [Archive.org]: Productivity and communications products, “When you use OneDrive, we collect data about your usage of the service, as well as the content you store, to provide, improve, and protect the services. Examples include indexing the contents of your OneDrive documents so that you can search for them later and using location information to enable you to search for photos based on where the photo was taken”.
Feito as considerações iniciais, vamos dar prosseguimento ao tutorial.
Abra o painel de certificados do Kleopatra, clique com o botão direito na sua chave e seleciona a opção 'Backup das chaves secretas'. https://image.nostr.build/c395ac3e1a0c079ac0fd9df505e1192fa323c67073c17cc984bef707dfa87214.jpg
Selecione o nome do arquivo de destino e clique em Salvar https://image.nostr.build/820b4d1eade32f4d5d985b91a0e76b083bb2e4c255f5dfd3c310036c87a33366.jpg https://image.nostr.build/a06c64da448deec7d159730a772b74149c738a79560add5586f7ae3e5282c1f1.jpg
Eventualmente a senha da sua chave poderá ser solicitada, mas nesse caso ela não foi pois a senha dela estava armazenada em cache. Reforçando: não coloque suas chaves secretas em um local inseguro.
4.2 - Checksum de arquivos
Operações de checksum são de suma importância quando desejamos verificar a integridade de um arquivo enviado pela internet ou verificar se os arquivos foram modificados durante o processo de transferência. Pense em casos no qual adversários realizam a interceptação dos seus arquivos pela rede e trocam-no por arquivos maliciosos contendo um malware. A checagem de checksum nos permite verificar essas alterações através de algoritmos de hash, que geram um número de tamanho fixo que muda mesmo que um único bit seja alterado no arquivo original. Por padrão o Kleopatra usa o sha256sum, o que é forte o suficiente para evitar colisões de hash, mas há algoritimos mais modernos como sha512sum que podem ser mais adequados.
Gerar um checksums no Kleopatra é muito simples. Basta selecionar a opção 'Arquivo -> Criar os arquivos de soma de verificação', selecionar o arquivo do qual você deseja gerar um checksum e salvar. https://image.nostr.build/dc17d84a2135b75154f05df0bdc2c42f4b3e2dafc944bf5476456aa2356389bc.jpg https://image.nostr.build/ee12b502148c2a49885d0989a3514a8c8fe65c85834dc8e98c8fa78c9efbb271.jpg https://image.nostr.build/17adbfa0ec4ad2b6ea116bf2796c734d7bfda22e8f6b48439b1eff4a57c779dc.jpg
Para verificar o checksum, basta ir em 'Arquivo -> Verificar arquivos de soma de verificação', selecionar o arquivo sha256sum.txt. Se a soma estiver correta o Kleopatra irá retornar um sinal positivo. https://image.nostr.build/3f6c0c537adb56490190cc00034ad911e7ea10c9cc0991ec8c93b48492080d09.jpg https://image.nostr.build/328823bfeae98a8c423371fe4bb484a85c2f9fdd6bae8b7c750af2f58781ab74.jpg https://image.nostr.build/62f7b644993677149f2a6b0320df3b9b01f9d07178222c8684542dbbb0e84108.jpg
Um processo que também é realizado em paralelo ao processo de checksum é a geração da sua assinatura digital, já que esse também pode e será alterado por um agente malicioso para evitar suspeitas. É muito comum que desenvolvedores de distros Linux forneçam além do checksum a assinatura desse checksum para evitar essas falsificações.
4.4 Considerações finais
Com isso eu finalizo esse breve tutorial de uso do PGP através do Kleopatra. Espero que façam bom uso dos conhecimentos adquidos aqui e busquem conhecer mais dessa ferramenta. Alguns recursos como smart cards, publicação de chaves públicas em keyservers e outros não serão citados aqui. Deixo isso para vocês pesquisarem por conta própria por não serem triviais. Espero em breve ver mais usuários do fórum conscientes da importância dessa ferramenta na internet em geral.
Até a próxima. Пока Пока Grom.
-
@ 6bae33c8:607272e8
2024-10-11 15:02:11It’s been a bad season so far, 9-15-1 through five weeks, and I really haven’t been unlucky. Sure there were some tough beats, but the better barometer is whether you’re on the right side of blowouts, and I haven’t been. It is what it is, and there’s still Q3 and Q4 to make some money. After I went 2-3 last week, Q2 is pretty much over.
But I’m still gonna make my picks:
Jaguars +2 vs Bears (London) — Trevor Lawrence played much better last week, and the Bears are missing some key pieces in the secondary. Plus Jacksonville is used to making this trip
Ravens -6.5 vs Indigenous Peoples — The Peoples have been killing me of late, but they haven’t faced anyone really good yet, and the Ravens qualify, on both sides of the ball. I the IP get a dose of reality.
Colts +2.5 at Titans — It probably hurts that Anthony Richardson is likely to start, but I still think he’s better than Will Levis. This was my fifth choice among the games.
Chargers -3 at Broncos — The Chargers should be healthier off the bye, and the Broncos make for a good sell high.
Falcons -6 at Panthers — The Panthers are a doormat, and the Falcons seem to have finally found their rhythm with Kirk Cousins.
-
@ 4ba8e86d:89d32de4
2024-10-11 14:23:07Ele foi projetado para minimizar o rastreamento e a impressão digital, oferecendo uma alternativa para navegar na internet com mais privacidade, além da Rede Tor. O navegador possui a mesma qualidade de privacidade do Tor Browser e pode ser usado em conjunto com uma VPN confiável.
A Mullvad VPN AB, proprietária do navegador, faz parte da empresa-mãe Amagicom AB, cujo nome é derivado da palavra suméria "ama-gi", que significa "liberdade" ou "voltar à mãe" no contexto da escravidão. A empresa acredita em uma internet livre, livre da vigilância em massa e da coleta de dados indiscriminada.
Essa abordagem é baseada na convicção de que a coleta excessiva de dados e a vigilância em massa têm consequências negativas para o desenvolvimento da sociedade. A empresa defende uma internet onde todos tenham direito à privacidade, liberdade de expressão e resistência à censura. Acreditam que a privacidade é a base de uma sociedade próspera e livre, e que a vigilância em massa leva ao controle totalitário.
O Mullvad Browser foi desenvolvido com o objetivo de promover a liberdade na internet, oferecendo aos usuários uma opção de navegação com foco na privacidade e minimização da coleta de dados. Ele é uma alternativa para aqueles que desejam proteger sua privacidade online, juntamente com o uso de uma VPN confiável.
Uma das principais características do Mullvad Browser é sua forte proteção contra impressões digitais, semelhante à do Projeto Tor. A ideia é que todos os usuários do navegador apareçam como um só, minimizando assim a coleta de dados e a identificação individual.
O navegador também possui recursos de privacidade, como modo de navegação privada ativado por padrão, bloqueio de rastreadores de terceiros com o uBlock Origin e ausência de telemetria, ou seja, não há coleta de dados exclusivos para melhorar o desempenho do navegador.
O Mullvad Browser segue um modelo de negócio transparente, sem intenção de ganhar dinheiro com o próprio navegador. Em vez disso, a empresa visa gerar receita por meio do serviço VPN do Mullvad. A privacidade é colocada em primeiro lugar, tanto pela Mullvad VPN quanto pelo Projeto Tor, e ambos têm histórico comprovado nesse sentido.
https://github.com/mullvad/mullvad-browser
https://mullvad.net/pt/download/browser/linux
https://mullvad.net/pt/browser
-
@ 472f440f:5669301e
2024-10-11 14:20:54As we sprint toward the 2024 US Presidential election the case for using bitcoin as an asset to store value for the long term has never been stronger. The insanity of the incumbent power structure is being laid bare and it is becoming impossible to ignore the headwinds that the Borg faces moving forward.
Yesterday morning and earlier today it became clear that inflation is rearing its head again. Not ideal for the soft landing Jerome Powell and Yellen are signaling to the markets after the first Fed Funds rate cut in years.
It seems like the yield curve predicted this earlier this week when it inverted after a temporary normalizing period after the Fed's rate cut. Futhermore, it is becoming glaringly obvious that running historically high fiscal deficits while interest rates were at multi-decade highs was a pretty bad idea. As James Lavish points out, the data from the CBO earlier this week shows that the US federal government is running a deficit that is 13% higher than it was last year. This is at a time when real wages are still depressed, inflation is still suffocating American consumers and the private sector job market for American citizens is cratering.
Speaking of the job market, the numbers that came in yesterday were worse than expected: The effect of Hurricane Helene should certainly be taken into consideration when looking at this jobs miss. However, even with the miss we know that these numbers have been under reported for years to make the economy seem healthier than it actually is. Even with Helene's effect taken into consideration this print will likely be revised higher 3-6 months from now.
All of this points to a breaking point. A breaking point for the economy and, more importantly, a breaking point for overall confidence in the US government and its ability to operate with any semblance of fiscal responsibility. The chart that Pierre Rochard shares in the tweet at the top of this letter is the only chart that matters for anyone attempting to gauge where we find ourselves on the path to bitcoin realizing its full potential.
There is $133 TRILLION worth of value sitting in global bond markets. Bitcoin is a far superior asset to store one's wealth in. Bond markets are beholden to the whims of the actors who issue those bonds. In the case of the US Treasury market, the largest bond market in the world, the US government. And as we have pointed out above, the US government is recklessly irresponsible when it comes to issuing debt with a complete inability to pay it back on the long-term. Inflation is up, the jobs market is cratering for the native born Americans who actually pay taxes, and the push toward a multi-polar geopolitical landscape is becoming more pronounced by the day. All of this points to a long-term weakening in demand for US treasuries.
The only way out of this mess is to overtly default on this debt or inflate it away. The latter will most certainly be the route that is taken, which positions bitcoin extremely well as people seek the confines of an asset that cannot be debased because it cannot be controlled by a central authority. The levels of sovereign debt in the world are staggering. Do not let the bitcoin price consolidation of the last six months lull you into a state of complacency. Even the results of the Presidential election won't have a material effect on these dynamics. Though, a Donald Trump presidency would certainly be preferable if you prefer to see relatively sane policy enacted that would provide you with time to find safety in bitcoin. But, in regards to this sovereign debt crisis, that is the only benefit you can hope for; more time to prepare. I'll leave you with some thoughts from Porter Stansberry:
"We are about to see the final destruction of the American experiment. Every economist knows this (see below) is correct; but nobody is going to tell you about it. I’ll summarize in plan English: We are fucked.
-
Debt is growing much faster than GD and interest expense is growing much faster than debt; and the real growth in entitlement spending hasn’t even begun yet.
-
Progressive taxation means nobody will ever vote for less spending + the combined size of government employees and dependents, there’s no way for America’s actual taxpayers (about 20m people) to ever win an election, so the spending won’t stop growing and, ironically, inflation will make demands for more spending to grow.
-
Inflation undermines both economic growth and social cohesion. The purple hair man-women weirdos are only the beginning; what comes next is scapegoating jews, blacks, immigrants and a huge increase in violence/domestic terror.
Get ready America. This election has nothing to do with what’s coming. And neither Trump nor Kamala can stop it.
Our experiment in freedom and self-government died in 1971 (when all restraint on government spending was abandoned with the gold standard.) You can only live at the expense of your neighbor until he runs out of money.
And that day is here."
Final thought... I hope my tux still fits for this wedding. Enjoy your weekend, freaks.Use the code "TFTC" for 15% off
-
-
@ 2ec0583a:63f20df5
2024-10-11 13:19:29I liked Twitter. News, politics, artists, memes, controversial thoughts that people discuss longer than it deserves. That Twitter wasn't what X is now. Verification doesn't mean anything, it's just an algorithm boost everybody can buy. Crowds of bots leave random overcompressed jpegs in replies to get more attention to get more money for its owner. Somehow it's normal there to want entire nation dead.
I wish it was easy to leave, but it still has hundreds of millions active users. It still has all the memes we like, the controversial thoughts people discuss too much, all the big companies and politicians have to have an account.
I checked out the biggest alternatives to decide where to go. No complicated tech terms ahead, I looked at them as a regular user who just wants to have fun.
TL;DR: Twitter/X is still the most effective and active platform, but if you really want to change it you should take part in transition to another platform and not wait for more people to be there.
Nostr
Decentralized, censorship resistant due to its nature. Of course, it's not perfect and is quite far from reaching its true potential. Out of all the alternatives, Nostr might have the most complicated registration. Do regular users really need to think about public and private keys? Yes, yes, I get it — users have to keep in mind their privacy if they want to have it. But you have to read at least something to understand what you're doing, which is automatically more difficult than simply press "Sign up". And then you have to choose between web clients... And then Android/iOS clients... And some of them might be buggy on your device, so you switch to another client... The flow could be better, but Nostr is a new social network, it keeps improving every day.
After all this, you open an app and see... Bitcoins, AI images, jokes about Elon Musk. And some anarchists. 90% of what you see is people praising Bitcoin. The universal social network protocol turns out to has a pretty narrow view. I guess, the feature of attaching your cryptocurrency wallet made it extremely popular amongst Bitcoiners, but why is it the biggest — and probably the only — community there?
How does one find another community? Hashtags don't seem to work, perhaps because of tiny size of non-Bitcoin communities. Trending is all Bitcoin. I didn't even know it's possible to discuss something that long.
It's close to being decentralized and censorship resistant; you can write and read Twitter-like notes or long posts — whatever you like! But I don't feel comfortable because I'm an alien without a Bitcoin wallet here. It could be a great place for everybody, but now it lacks diversity. It may not even want to be universal. Maybe it's the Bitcoin network and that's fine.
Mastodon
Decentralized, not so censorship resistant but way better than having everything on one company's servers. 500 symbols per post is more than Twitter, but less than long format, it's somewhere in-between. It literally has no feed algorithm, so you have to find people and hashtags you want to follow, and Mastodon won't help. You don't know what it has in the first place? Bad for you.
Sooner or later your feed start to look like one you're actually want to read. And that's when I started to like Mastodon. The UI is neat, everything is in its place and works as expected — you can tell the social network has been here for a while. There are more than 10 million users as of 2023, and it still grows slowly. Mastodon is mature but fresh, and it does scare you away at first glance. Every discussion is serious for some reason, and I'm yet to discover meme accounts to follow. Mastodon is probably the only decentralized social network on this list which has at least some officials registered here.
Bluesky
If you want to move back in time to see the old Twitter again — take a look at Bluesky. Everything is literally the same as Twitter, and it actually might be both a blessing and a curse. It seems to lack its identity and feels not like something new, but like uninhabited, decentralized Twitter.
There is a feed algorithm that shows you a mix of viral and recent posts, so you don't have a desert feeling (which sometimes occurs in Mastodon). Bluesky was launched in open access to the public in February 2024 and has reached 10 millions already. There is nothing serious about it — memes, shitposts, random thoughts put in 300 symbols. People barely use hashtags here, one would probably find something interesting or funny just scrolling the feed.
Threads
It's weird and soulless. You can't create a Threads account without an Instagram one, so you have to use both while Meta collects a huge amount of data about you. It just doesn't feel great.
You can't ignore the power of a big corporation — the experience is smooth, the UI is nice, and I personally like the little curl every thread has. And what do you see scrolling the feed? AI images and ridiculously serious inspirational quotes with a beach at the background. They're all different, but none of them makes sense. Do people actually discuss something? Not really. You just post pretty images just like you did on Instagram. And those are beautiful, you can't take that from Instagram userbase, so your feed looks absolutely incredible. And empty. There is nothing wild — no hot takes, no fresh jokes, everything is sterile and correct. It feels dead despite having over 175 million monthly active users.
UPD: Threads decided you don't want to read any politics and then disabled a lot of accounts because their AI moderation went insane, apparently.
UPD2: Threads now has an engagement bait problem.
Tumblr
Yeah, yeah, I know, but hear me out. Tumblr looks interesting for creative communities where people have fun. It goes from the cringiest actor gifs to a detailed book subplot analysis. Your posts don't disappear in the void thanks to hashtag search. There is also a feed algorithm to spend time. If you're really into discussing weirdest story and fanfiction ideas, that's the default social network for you.
But.
It's also owned by a company that can do everything it wants. And it actually did.
UPD: I'd been using Tumblr for a week, wrote two posts, liked and reposted a few times, and then my account got terminated for seemingly no reason. Maybe they found something wrong in those two posts, I don't know. I'm not that type of person who would publish anything even remotely aggressive, both posts were about SFW writing tropes.
Conclusion
There is no perfect platform to move to. If one of them had a clear advantage and/or a big userbase, many people would move there with no hesitation. But the situation is different, there is no obvious preferable social network to stick with. The vast majority stays on X trying to ignore the weird stuff. If we really want to have better and safer social networks, we should encourage competition and migration. All the X alternatives lack communities people would like to join, whereas it should be friendly and welcoming to all. Not the criminals, obviously.
My personal favorite is Nostr, but right now Bluesky seems the most convenient option.
P.S. Sorry for mistakes, English is not my native language. This post is not supposed to be some serious analysis, it's just another internet rant.
-
@ e88a691e:27850411
2024-10-11 13:17:16An opinionated guide to Sauna.
Introduction
Updated from the Sauna, October 7th 2024
After years of experimenting with different sauna types, I’ve developed strong opinions on the subject. The purpose of this article is to share these opinions with anyone who is interested in them and, hopefully, help others get more out of their sauna experience.
I’m certain my opinions will offend some, including all the people who (in my view) are doing it wrong. I know that saunas are important to many cultures around the world and that my strongly held opinions may offend some of those cultures.
Mind you, although I grew up in South America, I do have a fair amount of slavic blood in me. When I was a child, my grandfather regularly took me with him to the shvitz. One of my fondest memories from this time was the “Scottish Bath”, which involves standing against the sauna wall, execution-style, so that someone can spray you with freezing water from a high pressure hose. I’ve never heard of this outside of South American and can’t attest to whether it has any real Scottish origins.
The various health claims about using a sauna are beyond the scope of this article. All I have to say is that, like many things in my life, like Bitcoin, the meat/keto diet, and fasting, I find sauna to be yet another cheat code to life: it’s a simple thing that just makes life a lot better. If you want a good primer on scientific health benefits of sauna, I recommend starting with this article by Rhonda Patric. She goes in depth.
To be clear, it should go without saying that I am not a medical expert or professional. None of the opinions below are, or should be interpreted as, medical advice. There are many people for whom sauna use is not recommended. It would be prudent for any sauna user to consult with his or her doctor before entering a sauna.
Thanks to S. for taking the time to do a very helpful first review of this article. And thanks to The Wife for helping make my words legible and helping me make time to sauna–I don’t know which sacrifice was bigger.
Banya or Nothing
When I talk about saunas, I’m talking about a sauna with a stove, either wood or electric, that allows for steam. I call this “Banya style”. To be clear, I’m distinguishing between saunas and steam baths. Steam baths have their own place, but they aren’t my thing and I don’t consider them saunas.
A breakdown of the main types of saunas may be helpful, so you know which to avoid:
- Wet saunas, which are typically cedar rooms with wood burning or electric stoves onto which you throw liquid to create steam (I call this “Banya style”);
- Dry saunas, which are typically cedar rooms with wood burning or electric stoves without added steam (like Korean style saunas); and
- Infrared saunas, which, unlike traditional saunas, don’t heat the surrounding air. Instead, they use infrared panels to warm your body directly.
In my opinion, it’s Banya style or nothing. I’m not a huge fan of dry saunas, and I don’t even bother with infrared saunas. Infrared is a fiat-shitcoin. I want steam!
How to Sauna
Sauna Etiquette
If you read no other part of this already-too-long-article, read this.
Saunas are social places. There are proper ways of being in a sauna with others, and there are ways to do it wrong. You don’t want to be the person who ruins it for everyone. Here are some important etiquette tips:
Silence vs. Chatting: It’s not a question of whether you have to stay silent in a sauna or if it’s ok to talk. It depends on the circumstances and who else is around. If you’re using a sauna that isn’t your own, ask the staff about the preferred custom. The noise level in a sauna differs depending on the group in the sauna at a particular time. If you do want to chat with others, there’s nothing wrong with that. But, pay attention to whether there are others in the sauna who'd prefer it quiet. And definitely do NOT be obnoxiously loud – yes, I’m looking at you bachelor(ette) group who just discovered the Russian Banya.
Coming and Going: People rotate in and out of the sauna at different paces, so there will be people coming and going during your shvitz. But there are ways to come and go that are considerate and proper.
Keep the f-ing door closed (which was the working title of this article). Once you leave, don’t come back inside moments later. Doing so disturbs your fellow sauna users, lets out the all-important steam, and prevents the sauna from reaching an appropriate temperature.
If you’re in the sauna with a group of friends, try to coordinate your comings and goings so you’re all on the same cycle.
If you can only last 5 min at a sauna, don’t go in too often at the risk of ruining it for others (assuming it’s not your own private sauna).
Be fast when closing the sauna door when you come or leave. Otherwise, you will get dirty looks from others and may even hear mumbles of “quick quick, fast fast” from a Gray Beard. And you will deserve it.
Never open the door right after someone puts water on the stove to make steam. It’s all about the steam. Don’t waste it.
Controlling the heat: if you can’t handle the heat in the sauna, don’t just turn the heat down, because it ruins it for others. Instead, go to a lower bench or get out and take your break. Saunas are meant to be hot. That’s the whole point.
Personal Hygiene: Shower before you go into the sauna. Don’t wear perfume, smelly deodorant, or fragrant lotions. Smells get amplified in a sauna. Have a towel under you, don't leave your drippings behind. Best yet, make a Z with your towel, this covers your butt and down under your feet.
Clothing: sauna is not a place for wearing clothing. It is a place to get back to nature. If you are shy, just wrap a towel around yourself. People ask if I don't feel awkward, the answer is no. Who cares, humans naked is not novel. In many countries, it is strictly forbidden to wear clothing or bring anything but a towel into the sauna. It's understandable that may not be possible in North American public saunas on mix gender "family" days. If you have to wear something, then wear something 100% cotton or marino wool. You don't want plastic being backed into your genitals. One more thing, leave the watch out as it gets hot and will burn you. Also, flip-flops/sandals, stay outside.
Some saunas sell body scrubs and masks for you to apply before or in the sauna. Note that once in the heat, these can get goopy and drippy and may melt into your eyes and mouth. So (in this opinionated guides’ wife’s opinion), they are better in theory than reality.
Adding Oils and scents: As discussed below, it can be nice to add certain oils and other scents to the steam. But if there are others in the sauna, ask first before you do.
Where and how to sit: Hot air rises. So, the higher benches are hotter and the lower benches are cooler. If you are a newbie, pick a lower bench so you don’t have to leave as quickly and open the door unnecessarily.
It’s great to lay down in the sauna, but if it gets crowded, sit up to make room for others.
When moving around to find your seat, don’t walk on the benches in your sandals. Leave your sandals outside the sauna or on the sauna floor.
Sauna Temperature
In most proper Russian style Banyas you will find temperatures of 80-95 degrees celsius, which, in my opinion, is the best range. Thats near your body. "Offical" on the dial will he 100-120C. But sometimes you want to take it a little easier or last a little longer in the sauna. In these cases, 65-85 at body, dial at 80-100. degrees celsius will do.
However, if your sauna is below 85 degrees celsius on the dial, you might as well just go hide under your bed sheets and not waste your time.
At some saunas in hotels, gyms, or spas, you may not be allowed to set the sauna as high as you’d like (see below). There are many tricks to circumvent these frustrating restrictions, but my legal counsel has advised me not to go into any details here.
Sauna Duration
The amount of time you spend in the sauna is a matter of personal preference and depends on the number of cycles you do (more on cycles, below).
For your first round, my opinion is that most people should try to last 15 minutes in the sauna. If a sauna is at the proper temperature, most people will struggle to stay inside any longer. If you can stay inside for 20-30 minutes, your sauna is probably too cold and/or there is not enough steam. Many saunas have hourglasses inside to keep time, and I’ve never seen a sauna hourglass with more than 15 minutes, which should be a good hint.
My preferred is;
Cold Plunge => Sauna 15 min => Cold Plunge => Hydrate with Salt & Water, Rest 5-10min => Sauna 15min => Cold Plunge => Hydrate with Salt & Water, Rest 5-10min => Sauna 15min => Cold Plunge => Hydrate with Salt & Water, Rest
if you can rest in the sun even better (no sunscreen poison please). You can add alcohol drinks to the hydration if you feel comfortable with that. But only add food after the last cycle.
For subsequent rounds, hydration starts to play a bigger role in how long you stay inside. Most people seem to last longer on their first round than on their second or third. If you can do 15 minutes on your second round, great. But 5-10 minutes is also fine.
Sauna Cycles
The traditional Russian Banya method (and in this writer’s opinion, the best method) is to do sauna cycles. Go into the sauna and just stay as long as you can take it (up to 15 minutes or so). Then take a cold shower and/or cold plunge (see below). Then robe-up and go relax with water, tea or beer. Once you start feeling “normal” again, repeat. For me, three cycles is the sweet spot. I’ll do more cycles if I’m spending the day at the Banya facility. If I’m at home, where I often sauna every other day, I find just one or two cycles does the trick. Sometimes I add a cycle or two on the weekend.
Occasionally, I like to go into the sauna as it’s warming up and before it reaches optimum heat (i.e. at around 60 degree celsius). This way, I can stay longer in the sauna for my first round (about 30-40 minutes). If I take this approach, I generally only do one more short round after my cold plunge.
Cold showers and plunges
In my experience, you want to take a cold shower or a cold plunge (or both, plunge is better) after the sauna cycle.After you come out of the sauna, immediately jump into cold plunge for a bit, i don't like to stay too long. Some Banya facilities will have a bucket filled with cold water that you can pull with a string to let the water pour over you, pull a couple times. The banyas may also have a cold pool of water into which you can plunge for a bit.
If I’m at my country place, after I get out of the sauna I jump into the cold lake. If it’s winter, I like to roll in the snow, which is satisfying. Some cultures would say that it’s not a real sauna experience unless you roll in at least one foot of snow.
After your cold shower or plunge, put on a warm robe and go relax before going back into the sauna. I like to relax for 5-20 minutes, depending on how much time I have. This allows the body’s temperature to decrease slowly. I do not recommend going directly back into the sauna after your cold plunge. If you don’t give yourself enough time after the cold plunge, you will overheat and won’t last very long when you return to the sauna.
Position
There really are no rules here. The way you position yourself in the sauna depends on your mood and preference, and there are many options. For example, you can sauna seated with your legs hanging down or with your knees up. You can lie down if there’s room. My favorite position is to lie down on my back with my legs up against the wall and, assuming the ceiling is low enough, with my feet stretched against the ceiling. This is a great way to stretch the hamstrings (check out stretching under “Sauna Activities”, below).
Choosing whether to sit on a higher bencher or lower bench is the best way to control the temperature you experience without adjusting the room temperature itself. You will notice the heat in the sauna increases exponentially every inch you go up. If you are struggling to stay in the sauna but don’t want to get out just yet, try moving down to a lower bench to last a little longer. Lying on the floor is the coolest spot and a great place for kids to start getting exposed to saunas.
There is no shame in going to lower benches or even the floor, there is only shame in opening the door before 15min
Getting Steamy
Without steam, the sauna would just be a sad, hot oven (I’m looking at you, infrared sauna).
The steam in the sauna has many benefits but most importantly it increases the thermal coupling of your body to the air and it feels great.
The amount of steam in the sauna is a matter of personal taste. You don’t want to make it into a steam room (remember, steam rooms are NOT saunas). But, you do want the sauna to be very moist. I find that two to four ladles of water in a mid-size sauna every five to seven minutes does the trick. Keep it between 50-60% humidity.
I keep a bucket of water in the sauna at all times so that I can continue to ladle water as I shvitz. Make sure to get a wood bucket and a metal ladle with a wooden handle. Wood ladles will crack, and if the handle is metal, it’ll burn you when you grab it.
If, when you enter the sauna, it’s already been on for a while, the wood is likely to already be wet and the sauna full of steam, so you may not need to add too much water. However, if you’ve just turned on the sauna and the wood walls are dry, you will need to ladle more water to make the air moist enough. If the sauna is too moist for comfort, open the door and let it dry out a bit (obviously, only do this in a private sauna).
Essential oils and even beer can all be added to the water to create scented steam. I recommend starting your sauna with just water, and add the scent as you get going.
You can try all sorts of different essential oils. I’ve tried everything from oak and cedar to tangerine and cinnamon (gag) essential oil. In the end, there are really only two oils that are worth it, in my opinion. The first is eucalyptus. I’ve experimented with different types of eucalyptus oil, and the variety you use makes a difference. My favorite is eucalyptus globulus. I also like diluted pine tar oil.
When you settle on your essential oil, add a healthy dose of the oil to the ladle filled with water. Never put the oil onto the oven directly. It’ll just burn.
In a few Russian facilities, I’ve seen Gray Beards pour Russian beer onto the oven and it was actually quite nice. It’s almost like being in a cozy bakery while you sweat
Some people like to place a salt brick or compressed solid blocks in their sauna from time to time. Put the salt block on the stove and pour water over it. The steam takes on a saltiness that feels nice. If a salt block is not available, you can get a cast iron teapot, fill it up with salt water, and place it on top of the stove.
And for my most important steam tip, I recommend using the “towel spin”. This is an effective and underrated technique to help circulate steam in the sauna. After creating steam, take your towel above your head and spin it around hard, like a ceiling fan. This movement works like a convection oven and spreads and equalizes the heat and steam throughout the room. It might make the folks sitting lower down in the sauna a little hotter, but that's what they’re there for, isn’t it?
Hydration
Being hydrated is important to having a positive sauna experience. You will lose a lot of your body’s water in the sauna. Ideally, start to hydrate well up to an hour before your sauna. I like to add a pinch of salt to my water to encourage water retention.
Do not bring any drinks into the sauna (the exception being a dedicated steam-beer, see above). Have your water or beverage when you’re outside the sauna, resting. If you find you need to drink water inside the sauna in order to cool yourself down, then it’s time for you to get out and allow your body a cool-down.
When you’re outside the sauna, don’t immediately down a glass of super cold water because you will cool down your internal body too fast. Personally, I like to drink warm tea after my first two cycles. After my second cycle, I enjoy a beer (pre-keto days), soup, or vodka drink. When non-keto, I do enjoy adult drinks in the cycles.
If you are doing a sauna while on a multi-day fast, you need to have water and salt, at a minimum. Otherwise, you will deplete your natural reserve of electrolytes and not be able to think straight.
Sauna Frequency
When it comes to frequency, if you are not in the equatorial heat do it every day. I now do mornings and end of day if I can. so 2x 2-3x cycles. In the summer, living in a hot & humid location, I sauna a lot less frequently. My desire to sauna is greatly diminished because I spend a lot of time in the sun and heat.
What to wear
Sauna Hat: I highly recommend wearing a Russian/Finish style wool hat when you’re inside the sauna. It may seem counterintuitive, but wearing a hat keeps your head cooler. An overheated head is not good for your brain. Wearing the hat stops you from overheating and lets you stay longer in the sauna. The temperature in a sauna is significantly hotter the higher in the room you are, and one’s head is at the top of the body (for most people). So protect your brain in style with a felt sauna hat. If you don’t have a felt sauna hat, buy one. They are easily found online. But in the meantime, you can wrap a dry towel around your head. Don’t forget to take your sauna hat off as you relax between cycles so your head can cool down.
Clothing: These days, many public saunas will have family days, men-only days, and women-only days. For obvious reasons, you’re only allowed to sauna naked if you’re attending one of the single-sex days.
If you’re at home, there’s no good reason to wear shorts or a bathing suit. Sauna naked. It's a lot more pleasant.
If you do wear clothing in the sauna, be careful with items with materials like metal or plastic attached. Things like pins, buttons, or string-ends will get very hot and probably burn you. Remember to take off any heat-conductive jewelry and leave your smart watch outside, as the heat will ruin its battery.
Don’t wear your robe inside the sauna. A robe is what you wear outside when relaxing or eating. If you wear it inside, you’ll overheat (and look like an idiot). Go ahead and sweat out that body shame robe-free. You can bring a towel into the sauna to sit on, if you want.
Shoes or sandals are highly recommended in public facilities. I mean, there are many people walking around wet. Ew. But keep your sandals outside the sauna itself, or on the sauna floor.
Sauna activities.
Don’t overthink it. Sitting in a sauna is activity enough, in my opinion. But there are some sauna activities you can do:
Veniks/Viht beating: these are bundles of leaves (commonly birch, oak, or eucalyptus) that are pre-soaked in hot water. Someone with both strength and capacity to exert themselves in the heat will beat your whole body with the leaves. This exfoliates your skin and also gets the plant oils to permeate your skin. And it’s very relaxing. If you’re at a sauna facility, don’t just grab any bundle you see lying around - that belongs to someone else and veniks aren’t shared. You have to bring your own or buy them at the front desk.
Stretching: this is a great activity to do in the sauna, but make sure to go very easy. Your muscles will be super warm and you don’t want to overdo it and hurt yourself.
Exercise or Sex: your heart better be in good shape if you try out these high intensity activities in the sauna. If you engage in the latter, you better be in your own home sauna. With respect to the former, I think doing some leg-ups can be very satisfying.
Phone use: If you’re at home, it’s nice to use your sauna time to shit-post on Twitter or read an article, if you feel like it. Just keep your phone close to the colder, lower parts near the floor or it’ll overheat and shut down. You can also place the phone outside of the air vent and play a podcast! The Bitcoin.review is great ;)
Napping: I don’t recommend this. If you fall asleep or pass out, you will probably die due to overheating or dehydration.
Chatting: Saunas are great places for conversations (subject to the caveats I address above). Note that nowadays, microphone modules are both very tiny and can withstand high temperatures, so it’s no longer recommended to reenact mafia movie sauna scenes.
Eating and Drinking: As discussed above, never have food or drink inside the sauna. But when you finish your sauna, take advantage of whatever snacks the facility offers. For Russian joints, the soups, fish roe and dry salty fish snacks are great. Again, don’t eat before your sauna; wait until you’re done. Some places will have bottled salty-ish lake water, and beer seems to be a good source of salts and re-hydration. Vodka drinks are nice sometimes, too. My favorites are vodka with beet juice and horseradish, vodka with pickle juice, or just a chilled shot of Zubrowka (vodka infused with bison grass). Teas are also very enjoyable post-sauna. I prefer non-caffeinated berry teas. Some Banyas even offer free tea to patrons.
Ready to Sweat It Out?
Thanks to this fantastic guide to sauna, you’re now feeling confident and excited to seek out a solid sauna. So where do you go?
Where to Find a Sauna
Spas: Spas are not the best place to have an optimal sauna experience. Saunas at spas are typically not hot enough and spas have annoying staff whose job it is to enforce idiotic rules and practices that prevent you from having a real sauna experience.
Gyms & Hotels: These are some of the worst places to sauna. For liability reasons, these saunas tend to be too cold and there are often mechanisms that prevent you from raising the temperature. Here, you’ll often see saunas with glass doors, which may look chic, but are inefficient and stupid because they don’t seal properly and leak steam. Gyms and hotels are high traffic areas, so people who don’t know what they are doing are constantly coming and going from the sauna, which, as we discussed, is a sauna no-no. If you still want to try the sauna at your gym or hotel, I recommend going in naked. It’ll deter people from joining you and ruining the little steam you managed to get going.
Traditional bath houses (Banyas): These usually offer a great experience because they deliver a super hot sauna, good cold baths and plunges, delicious food and drinks, and knowledgeable staff.
Home: Yes, you can build a great sauna in your own home! You can create a small space in your basement, turn a closet or cold room into a sauna, or just add an outdoor hut or barrel sauna in your backyard. This is the best way for you to control the whole experience and do it often. As with anything, the easier it is to access, the more you will do it.
Build it. They will Come
Many people have asked me for details about sauna building. If you’re ready to build your own personal home sauna, here are some important considerations.
Materials
Saunas are insulated rooms, most commonly finished with cedar tung and groove slats. Cedar is used because it doesn’t rot with moisture. You don’t want treated wood as it will release all the bad stuff that keeps the wood from rotting into the air when heated. Cedar interior is often placed over a vapor barrier, followed by insulation and then the outer wall. Many outdoor saunas are not insulated. They simply have a single layer of cedar 2x6 planks functioning as both the interior and exterior. Non-insulated saunas need much more heating power in the winter.
Structure
For indoor saunas, you may want to find a bricklayer to build something for you. Traditional facilities often have brick-lined rooms and very large wood-burning stoves.
You can buy prefab outdoor saunas, which are often sheds or barrels. After experimenting with both, I’ve concluded that barrel saunas are inferior, even though that’s what I have at my country property. This is because barrels have concave ceilings and inner walls. This means the benches are lower and the curve makes the topmost part of the ceiling (and the hottest part) the furthest from you, or inaccessible. The spinning towel trick really helps in the barrel.
When it comes to buying a sauna, go with the most traditional structure possible. They are based on thousands of years of evolution and knowledge.
Portable tent saunas are fun, but impractical because you have to set them up before each use.
Bench height inside the sauna is important. I think the top-most bench should be very near the ceiling. This way, when you’re lying down, you can use the ceiling to stretch the hamstrings. As a rule of thumb, bench length should allow you to lie down completely. It is also nice to have at least one lower bench for visitors or less intense sauna days.
Sauna Ovens
There are two main types of sauna ovens: wood burning and electrical (with gas heating being available, but not common). If the location you are building allows for it, go with electrical. It’s practical and easy to get going quickly. This means you will use it more often. Wood burning saunas are romantic and smell great, but it is a lot more work to get a fire going, especially in the winter.
Opt for oven sizes that are recommended or above recommended for the size of the sauna. A larger oven means more thermic inertia, more rocks for steam, and therefore less time to warm up the room. Bigger is better. The Scandinavians make the best quality ovens.
Oven controllers
There are two types of temperature control devices: the analog cooking-style or the digital type. I think, due to liability and safety, all ovens have a timer that max out at one hour.
The digital oven controllers are fantastic and I have one in the city in my basement sauna.
However, you have to consider your environment. For me, temperatures in the winter can reach below -30C and in the summer, over 40C. This massive range can take a toll on outdoor equipment and materials. For this reason, I opted for an analog controller for my outdoor sauna in the country, since the weather will likely ruin the electronics of the digital controller.
I would avoid ovens with analog pre-heat timers. They are great in theory, but the implementation is utter garbage. The timer won’t be precise and it’ll just lead to frustration, for example, when you thought you set the oven to start in three hours, but it actually started in two hours and already turned off.
Important Sauna Gear
Windows are nice to have, especially if you have a view to enjoy. Opt for at least a cedar door with a little window. Do not go with modern glass door styles. They are crap. They have gaps, no insulation, and let in too much light.
Saunas need thermometers and hygrometers (to measure humidity). The thermometers should be rated for saunas and be visible inside. This is both for safety and bragging rights.
I think having an hourglass inside your sauna is a must. Being able to know for sure how long you’ve been inside is important, since your sense of timing inside the sauna may be off depending on the state of your mind and body on a given day. You shouldn’t wear a watch inside the sauna, since it’ll overheat or break. Having a clock visible from the inside is also a good idea, especially if you sauna often and have a wife and kids who you don’t want to leave you.
Air circulation is an often-overlooked but important part of a sauna design. Saunas should not have stale air. The best sauna design creates natural “real convection” by placing an air intake under the oven wall and another at the top opposite wall. This allows fresh air to enter the sauna while in use. Be sure to add regulators, since you don’t want to cool the sauna or expel all steam. Without regulators you may get too much or too little air in. With too much air, you may cool the sauna down too much and/or lose too much steam.
Nice Things to Have
Lights are optional but welcome additions. It can be unpleasant to have no lighting at all, especially in an outdoor sauna on a cold, dark night. Lights should be warm-temperature and low power. I recommend an oven light, since they don’t sweat the heat (get it?) and are often low power.
Put a baking tray under your oven–thank me later.
Wood “pillows” for your head are nice and don’t get sweat-stained and stinky, like a fabric pillow.
Keep some extra felt hats near your sauna so when you or your guests forget their hat, you still have easy access to one.
I like to keep a couple of essential oils on the floor of the sauna, for easy access. If you keep the oils too high in the sauna, they’ll get too hot and spoil.
I place some duck boards over floor tiles in the sauna to prevent cold feet.
I also like to keep a small, natural broom inside the sauna to sweep up any dirt or leaves that come into the sauna on people’s feet.
Final words
As you can tell, I have some strong opinions when it comes to the proper way to enjoy a sauna. My hope is that my musings will help you to maximize your own sauna experience.. If you follow this guide, I’m certain you will benefit from and enjoy the sauna as much as I do and, just maybe, you too will develop your own strongly held opinions that will most definitely offend me.
Thanks for reading, please close the F-ing door.
ps, you can get a Bitcoin Honey Badger Sauna Hat here
- EOF
-
@ 82b30d30:40c6c003
2024-10-11 12:25:34[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
-
@ ec965405:63996966
2024-10-11 11:53:23Gratitude
In light of all the doom, gloom, and meaningless state sponsored violence in the world these days, I want to practice shedding light on some dope things I have going on lately that I am grateful for. To start, I'm always grateful for my dog's health and companionship. Kaido is a 4 year old 15 lb Chiweeny with an under bite and a big attitude who never lets anybody sneak up behind me.
I'm grateful for the community I've plugged into since I made my Nostr keys and won a creator account with nostr.build in a blog contest last year. I'm coming out of the Creator Residency at nos.social this month with a new group of internet friends and was even just awarded a grant from Yakihonne to spin up a relay for a youth organization I am involved with.
My grant proposal writing skills are sharpening thanks to my participation in a cohort of young "World Builders" who meet weekly via video chat to learn the ins and outs of fundraising and building ethical social impact organizations. A friend of mine I recently reconnected with introduced me to the facilitator of this group, a professional in the development space on a mission to "hack" the non profit sector by training the next generation of youth leaders. It's exactly what I needed to evolve my writing skills and apply for funding to build the better world I want to see for the next generation.
The friend who connected me and I met as foster youth members of a California-based social impact organization dedicated to transforming policy and practice in the foster care and juvenile justice systems. We fell out of touch after high school before crossing paths again a few years ago while I was a staff member at the organization. He's now a professional software developer who runs a learning community dedicated to helping folks learn programming and get into tech roles. My participation in the community has rekindled a passion for computers and the internet that started back in middle school when I first flashed a custom firmware on my Playstation Portable but paused in high school as I became increasingly sick of the internet and more interested in politics and media production. These days, I find myself increasingly sick of the corporate politics and media that define our shared realities and more interested in fixing the internet.
Crisis
In today's perpetual state of polycrisis, systems-involved youth (which include unhoused, foster, and incarcerated youth or orphans) are among the most vulnerable in our society. Higher rates of trauma-induced mental illness culminate into poor life outcomes for this population, including higher rates of unemployment and incarceration. Compounding this is the fact that they use social media at higher rates than other demographics due to a lack of robust social support networks, making them prime targets for bullies and human traffickers on the web. The Center for Humane Technology reports on their website that "more screen time is associated with mental health and behavioral problems, poor academic performance, and worse sleep" for youth.
We had a situation at the California-based organization I mentioned where a frustrated youth member created a "finsta" (fake Instagram account) to drag the Executive Director (one of the founding youth members of the organization in the 80's) and some staff (including me) through the digital mud. The youth tagged the organization's account and spread hurtful memes and rumors throughout our network. It even sparked a staff rebellion in which a disgruntled coordinator sent out a letter to our network detailing their personal beef with management and announcing their departure. A petition of no confidence in the Executive Director was circulated, resulting in their resignation from the organization they helped start decades ago. Needless to say, the whole thing left the community pretty traumatized and we lost a few great staff members.
I can't help but imagine how the situation would have played out if our organization had something like a white-listed Nostr relay to organize our community around instead of an Instagram account. The burner account would not have been able to post anything to the relay, so the memes and rumors probably wouldn't have spread as far or as quickly as they did. The white-listed youth members of the communications committee I ran could have posted content to the relay to ensure verified information was spread throughout the membership. Maybe this kind of setup would have created an environment for the frustrated member to feel more connected to the organization and it's mission and prevented such a mess from ever taking place. In the moment, I felt powerless to stop it.
Digital Neighborhoods
When I catch myself feeling down about the state of the world and how powerless I've felt to change it over the last year, I try to remember Rabble's metaphor about building digital neighborhoods in the recent presentation he gave at Nostriga. Before long, I'm reaching for my digital construction hat on my way to my computer to jot some ideas down. I've heard a lot of lip service at different non profits I've worked for over the years be given to the idea of safe physical spaces for youth (like playgrounds and soccer fields), but I never heard this idea extended to the digital spaces where the majority of young people spend an increasing amount of their time. These days, I serve on the board of directors for a different organization that I intend to build a digital neighborhood for with the Yakihonne Relay Grant I was awarded recently. I've been building transnational support networks for youth involved in state care with the International Foster Care Alliance since 2016 when I first trained a delegation of Japanese foster youth on community organizing strategies. There are a few reasons why I think Nostr is a natural fit for systems-involved youth.
-
Confidentiality laws surrounding minors in state care make it hard for organizations like ours to engage them in storytelling on social media because of the personal identifying information required to participate on corporate platforms. A Nostr key pair empowers a youth with a layer of anonymity in line with one of the tips in the Child Welfare Gateway's Social Media Factsheet about limiting the sharing of personal information. This anonymity grows their capacity to share painful pasts intentionally and with purpose. Since Nostr profiles can't be traced to a personal identity, youth advocates are empowered to use their voice to make a difference.
-
For foster youth who are disempowered in all other areas of their lives, ownership of their identity and data gives them control over how they present themselves and engage with others online. This gives way for an increased sense of connectedness, personal capacity, and resilience in storytelling without fear of being tokenized. Our organization's web presence will evolve into a powerful tool for narrative change and foster deeper connections among youth members globally, strengthening their cultural identities while contributing to a broader conversation on child welfare reform.
-
Next generation features and a vast app ecosystem will transcend geographical boundaries and time zones, significantly enhancing communication and collaboration between organizations in the alliance. In particular, in app translations provided by many Nostr clients will allow youth to socialize with their counterparts in other countries across language barriers and facilitate smoother communication.
What's not to look forward to? I'm grateful to be part of this movement and for the opportunities the community has provided for me up until now. We've come a long way since GeoCities and Myspace but, in the words of Tim Berner's Lee, "The future is still so much bigger than the past."
-
-
@ 6bae33c8:607272e8
2024-10-11 08:55:22I have Jordan Mason in three leagues, two of which are NFFC, including the Primetime. It’s especially frustrating watching the 40-minute edited version because you miss all the sideline updates and real-time updates you’d get on Twitter. You just have to watch the game and hope he comes back. It turns out Mason has a shoulder injury, and we’ll know more later today. It bodes badly he tried to return to the game (to my great relief) but then left in pain after one play.
My other rooting interest was against Jaxon Smith-Njigba who I moved to my bench. I am almost psychotic about not wanting to make lineup errors (knock on wood, I’ve made relatively few so far this year), so I really wanted him not to have a big day. He’s tough to predict because one week he’ll have 16 targets, the next three. My feeling was Geno Smith wouldn’t have much time to throw, so if JSN got targets, they’d mostly be short, and I have Tank Dell (without Nico Collins) in for now instead (I could also use JK Dobbins.)
While lineup errors are inevitable in the aggregrate, any particular one is avoidable. The Mason injury is horrible, but he got me nine points at least, and there was nothing I could have done about that. I also had the 49ers -3.5 in my home picking pool, and it’s always nice to start the week with the Thursday night win.
``` Brock Purdy is a very good quarterback. He’s as poised in the pocket as anyone in the league other than maybe Patrick Mahomes, and he’s an underrated scrambler. I saw a Twitter post where he says he’s faster in the 10-yard split that Deebo Samuel or Christian McCaffrey, and they showed from the Combine it’s actually true.
It’s really too bad Mason got hurt because his backup Isaac Guerendo got 99 yards, which would have been his, and Kyle Juszczyk got a last-minute TD. Still it could have been worse. Guerendo is an obvious pickup, pending the news on Mason.
Deebo Samuel got his on one big play, and George Kittle scored twice. Brandon Aiyuk has been a huge fantasy bust this year.
I also had Kenneth Walker going in the Staff Dynasty League where I’m in first place, but I have both my QBs (Sam Darnold and Mahomes) on bye (and Mason), and no one will trade me a QB, so it was huge that Walker scored that TD and started catching passes in garbage time.
I also enjoyed seeing DK Metcalf (zero shares) get a long TD called back due to a false start and Tyler Lockett (who few people start) get the TD catch instead. JSN was perfect — enough to maintain my confidence in him, but not so much that I regretted benching him. He saw some end zone targets too.
Geno Smith had his worst game — he missed a couple open receivers and threw two bad picks. He only took one sack though after getting destroyed by the Giants and Lions the previous two weeks. ```
I have Jordan Mason in three leagues, two of which are NFFC, including the Primetime. It’s especially frustrating watching the 40-minute edited version because you miss all the sideline updates and real-time updates you’d get on Twitter. You just have to watch the game and hope he comes back. It turns out Mason has a shoulder injury, and we’ll know more later today. It bodes badly he tried to return to the game (to my great relief) but then left in pain after one play.
My other rooting interest was against Jaxon Smith-Njigba who I moved to my bench. I am almost psychotic about not wanting to make lineup errors (knock on wood, I’ve made relatively few so far this year), so I really wanted him not to have a big day. He’s tough to predict because one week he’ll have 16 targets, the next three. My feeling was Geno Smith wouldn’t have much time to throw, so if JSN got targets, they’d mostly be short, and I have Tank Dell (without Nico Collins) in for now instead (I could also use JK Dobbins.)
While lineup errors are inevitable in the aggregrate, any particular one is avoidable. The Mason injury is horrible, but he got me nine points at least, and there was nothing I could have done about that. I also had the 49ers -3.5 in my home picking pool, and it’s always nice to start the week with the Thursday night win.
-
Brock Purdy is a very good quarterback. He’s as poised in the pocket as anyone in the league other than maybe Patrick Mahomes, and he’s an underrated scrambler. I saw a Twitter post where he says he’s faster in the 10-yard split that Deebo Samuel or Christian McCaffrey, and they showed from the Combine it’s actually true.
-
It’s really too bad Mason got hurt because his backup Isaac Guerendo got 99 yards, which would have been his, and Kyle Juszczyk got a last-minute TD. Still it could have been worse. Guerendo is an obvious pickup, pending the news on Mason.
-
Deebo Samuel got his on one big play, and George Kittle scored twice. Brandon Aiyuk has been a huge fantasy bust this year.
-
I also had Kenneth Walker going in the Staff Dynasty League where I’m in first place, but I have both my QBs (Sam Darnold and Mahomes) on bye (and Mason), and no one will trade me a QB, so it was huge that Walker scored that TD and started catching passes in garbage time.
-
I also enjoyed seeing DK Metcalf (zero shares) get a long TD called back due to a false start and Tyler Lockett (who few people start) get the TD catch instead. JSN was perfect — enough to maintain my confidence in him, but not so much that I regretted benching him. He saw some end zone targets too.
-
Geno Smith had his worst game — he missed a couple open receivers and threw two bad picks. He only took one sack though after getting destroyed by the Giants and Lions the previous two weeks.
-
-
@ ee7d2dbe:4a5410b0
2024-10-11 07:02:21In the fluid ecosystem of SEO strategies, backlinks still matter, and guest posting is the most legitimate way to do that as well as to elevate your online presence, boost authority, and drive targeted traffic.
But, many marketers still fall into the trap of chasing low-quality links from outdated guest posting sites, which often do more harm than good. With Google’s AI-powered SpamBrain system and March 2024 core update, the search giant has become more vigilant than ever in cracking down on link spam and low-quality content.
So, how do you find the right guest posting sites that genuinely enhance your site’s credibility?
We’ve done the heavy lifting for you, analyzing over 1,000 sites from top-ranked “guest post sites” lists to identify the top 100 that meet Google’s guidelines for link diversity, relevance, and authority, while offering real value.
In addition to the list, we cover every point to help you build genuine connections through guest posting and grow your visibility the right way.
What is Guest Posting? Guest posting, or guest blogging, is the practice of writing and publishing content on another website to reach a broader audience and create backlinks naturally.
It offers a win-win scenario: the guest author gains exposure, credibility, and backlinks to their site, while the host website benefits from fresh, high-quality content for its readers.
This strategy helps you to drive referral traffic, build brand awareness, and improve search engine rankings. Typically, guest posts are marked by labels like “guest author” or “contributor,” allowing readers to recognize the content’s origin.
Now, let’s dive into an in-depth analysis to understand the benefits of guest posting and get inspired to kick-start your guest posting journey.
Benefits of Guest Posting Whether you’re a business owner or a marketing professional, without sales, there’s no sense, right? That’s why we always seek ways to promote our brand and products.
This is where guest posting comes into play. But if you’re still wondering: Should I start guest posting in 2024 and beyond? Here are the top 5 reasons why you should:
- Build Natural, High-Quality Backlinks When you publish content on reputable websites, you can request a link back to your own site. If your content meets their requirements, they often agree to this at no cost. This signals to search engines that your website is credible and valuable.
In our experience, unlike buying links or engaging in link exchanges, these backlinks are more likely to be considered trustworthy and authoritative, adhering to Google guidelines and helping to improve your search engine rankings.
- Improves Site Credibility and Authority to Boost Rankings When a reputable person or company discusses a brand or product, people take notice, and the overall buying potential increases. We know it can be challenging and expensive to gain endorsements from such personalities.
But, the beauty of digital marketing is that you can publish insightful, valuable content on authoritative sites to enhance your reputation as an expert in your field. When readers find your content useful, they are more likely to trust your brand, which indirectly boosts your rankings and revenue.
Google and other search engines reward sites that consistently demonstrate experience, expertise, authoritativeness, and trustworthiness (E-E-A-T). Guest posting on well-respected platforms can contribute significantly to this.
- Increases Brand Awareness to Generate Leads I hope you already understand that guest posting introduces your brand to new, relevant audiences, and increases visibility and awareness. Because when your content appears on established sites, it can attract potential customers who might not have discovered your brand otherwise.
So, by sharing valuable information, you can generate interest in your products or services, ultimately converting curious readers into leads.
- Helps to Build Relationships in Your Niche Guest posting is more than just content marketing; it’s a way to build valuable relationships within your industry. And, it can be the fickle beast of your marketing to reach new and broader audiences reducing budget.
Because in this process you collaborate with reputable websites and engage with their audience, so you create opportunities for partnerships, networking, and future collaborations.
And, eventually, these connections can lead to joint ventures, speaking opportunities, or co-marketing initiatives, further expanding your reach.
- Opens the Door to New Audiences to Increases Referral Traffic Now, it is understandable and evident that by publishing content on platforms that cater to a different or broader audience, you increase the chances of attracting diverse visitors to your website. Because, guest posts often include links that direct readers back to your site, driving targeted referral traffic.
So, it is clear that if you do more diversity in your guest posting efforts, the more opportunities you have to reach new audiences, expand your influence, and grow your customer base.
Now, let’s discuss which is the right choice for you: free guest posting or paid guest posting. We’ll also provide a list of top sites for both options.
Source: https://www.agicent.com/blog/guest-posting-sites/
-
@ 59df1288:92e1744f
2024-10-11 06:31:31Hold onto your digital hats folks, because Nostr's latest threads have been a labyrinth of secure whispers and mind-bending future fantasies! We dove headfirst into chat innovations that are spicier than your average encrypted burrito, merging Bitcoin wallets with messages—because why not shop for dogecoins while arranging clandestine meetups? But, just when you think it's all secret sauce and serenity, caution flags wave, as some folks remind us that a chat app without privacy is like a ship without hulls—doomed to leak! Meanwhile, the techy train ploughs ahead, loaded with both retro aesthetics and cutting-edge conundrums, leaving us all pondering: do you need an Art Deco locomotive in your metaverse? Dive in to unravel the tangled cords of conversation, where past, present, and future crash in delightful chaos.
Gossip & Gossip on Nostr: The Chat Revolution
So, @Martti Malmi kicked things off with a spicy take about secure DMs and groups being Nostr’s secret weapon to win over the crowd. Think Signal, but spicier—with no numbers, no centralized vibes, just pure unadulterated messaging magic! And the bonus? Toss a Bitcoin wallet in the mix. 🤑
nostr:npub1lgqktg83jtasayw8mpcsu46hptf8kdc4effps8mv20ymyqeewpes09l4ps was all, “Slow your horses!” He’s waving the caution flag on privacy and security. No one wants a leaky chat ship, right?
Meanwhile, @SLCW was pondering the mystery of identity-free messaging, comparing it to the SimpleX mystique.
Then there’s @TKay, who’s hyped about the potential of encrypted voice calls! Imagine that, folks—talking in near-NSA-proof peace.
Everyone’s nodding along with @nout about the real challenge: getting a critical mass of users.
@Scoundrel chimes in, “But Signal can do calls!” Who can argue with that?
And of course, nostr:npub1xsf5h8suhveztq4u5spq5wwvzftqxmglt6vwllxg8z6zrlpqn4yqrulu9v dreams big: imagine DMs with a private ecash balance à la iMessage, but un-fiatted and fabulous!
@keychat is all about the ID life, seeing it as a privacy advantage—not a drag.
Lastly, nostr:npub1dpna3xwwddnhhzg9ycpvlcz2ze0jdwm2rf3eqd2lf9leaewtq7tqhw0ef2 says, why choose? Pseudonymity FTW!
And there’s a little anecdote from @TKay about a text snafu that had everyone chuckling. 😂
Check out the full convo here
Tech Talk and Train Wrecks 🚂💬
Hey there! So, let's dive into the fun train of conversations on Nostr today.
First up, npub16t5h7ueq248pxp54rf72a0svt2tzc3jdz5fjfmykqe2m8656f5dszdspn0 got the ball rolling by reminding everyone to connect with them on SimpleX Chat. Meanwhile, keychat hit us with some tech knowledge, talking about WebRTC being used in Signal and Telegram, but apparently not in Nostr.
Azz was wondering about the possibility of logging in with Amber, and TKay wasn't shy about their thoughts on 0xChat, thinking it needs a snazzy new name and a UI tweak before recommending it to their pals.
npub1tm99pgz2lth724jeld6gzz6zv48zy6xp4n9xu5uqrwvx9km54qaqkkxn72 dropped a bit of tech wizardry, explaining how 0xChat uses WebRTC with NIP-100 and custom ICE servers – some next-level stuff for the audio/video call lovers.🔥
Now, over in a completely different thread, The: Daniel⚡️ shared a pic straight out of a Doctor Who episode, sparking a hilarious visual debate! 🤖 npub174dzvmgc6tuslmsj54rgdnhv9qdxuxwzzus626ty694ka3f6mt8sgavhl3 thought it looked like an old locomotive – likely Elon musk's dream machine. npub1gegrymd7g7ft3y36ehh060p4we5g0vj5v0veag5x3rauxtea5scsdwkv2t chimed in with a Cyberpunk 2077 vibe and npub108s578x3wr0qrkdu9lq9c427lelf90zh6hcasn6tddr6jh39xfhsnmpdrk accused it of needing some function over form.
Catch all the tech gossip and train jokes: Check out the full convo here
All Aboard the Nostalgia Express 🚂
So, nostr:npub174dzvmgc6tuslmsj54rgdnhv9qdxuxwzzus626ty694ka3f6mt8sgavhl3 sparked quite the nostalgia trip with a discussion about Art Deco locomotives from the 1930s. They even shared a vintage poster pic that gave all the retro vibes. Then, nostr:npub1ptru7arfj500zzsmrdj9gcr5tfm8c9gs5ldl33dedy0vyhfcl0kql0mn0w chimed in with this wild idea about how the electric car companies might be secretly planning a rail travel comeback or even something sci-fi level like "spin launching" us to our destinations. 🤣 Imagine being a train engineer and a coach driver in the "depression" era—it sounds like quite the career change! Anyway, wild ideas are always fun, right?
Check out the full convo here
Solar Storms and Spacey Splendors 🌌
Our pal @TheGuySwann was buzzing about potentially spotting the auroras due to a recent solar flare. Turns out, nostr:npub1ejt4286v3q7f6tcz0k2lwm44q3ygvk6lza9dp3rrdrad03arercsfqyu4g confirmed it's the strongest geomagnetic storm since 2017! That's a space weather headline, right there. 🌌 Meanwhile, nostr:npub1z5ad2zt6ujnrg8gllkv587ke9slg26dgcslxt6qtyqw6s28jytmqymplkv mentioned seeing some rare colors in the northern lights—it seems like everyone was chasing the neon skies! And of course, nostr:npub1nyhtecnejnd7shgdtc3de9p7lxp9ja6uvlvradevafnufhexjuwsfjl8y7 reported an aurora sighting down under! How cool to witness the southern lights, aka Aurora Australis, before dawn in Australia. 🌅
Check out the full convo here
Crystal Ballin' into the Crazy Future 🔮
@MAV21 is getting deep, talking about how we might just be underestimating how wild the future will get. No details yet, but grab your tin foil hat and get ready to ride the wave of the unknown—it sounds like we'll be in for quite the ride! 🚀
Check out the full convo here
Welcome to the Nostr Asylum!
So, npub1kw6g7wk4w2ljzem6xm6ms7wrpsfmmd702gme4d6lwh6qj8qzevdqwnmsqx kicked things off with a wild observation, claiming we're already living in a mental asylum! 😂 npub10p350u7q6wlxvlgrxrrz277df3r5ns6492lq83ecph9zgf0esu7qaakzp2 couldn’t agree more—guess they're on the same wavelength. npub18qj92t4p3n3ylt5x055j29xypcx568peux882t599fg7fg9j6lyqsv0y60 jumped in with some #LifeAdvice: "STAY HUMBLE AND STACK ZAPS." Finally, npub1dpna3xwwddnhhzg9ycpvlcz2ze0jdwm2rf3eqd2lf9leaewtq7tqhw0ef2 wrapped it up with a philosophical twist, suggesting there’s no way to truly grasp our reality. 🌀
Check out the full convo here.
ChatGPT: The Censored AI?!
Karnage shared how ChatGPT works wonders for them, but ABHcgd35 thinks they’re asking too many “vanilla” questions. 🤔 ABHcgd35 challenges them to test the AI with risky topics to see it cringe at its own censorship! Meanwhile, Karnage admits to mostly sticking with the basics for better info. Eventually, ABHcgd35 adds a tip on self-hosting for privacy because, let’s be honest, who knows what these AIs are really up to! 🤖
Check out the full convo here.
Decoding the ID and Privacy Puzzle
Over in another chat, keychat got into the nitty-gritty of IDs and metadata privacy. Azz asked about the possibility of Amber login, while SLCW was just there to understand all the different tech approaches being thrown around. keychat explained that they’re still working on an MLS group chat and are contemplating Amber login. Apparently, it’s a bit complicated but they’re on it! 🛠️
Check out the full convo here.
Lost in Comparison
idsera simply popped in to express some confusion over a comparison that apparently made no sense! 🤷♀️ Whatever it was, it sure sounds like they were having one of those "ugh, what?" moments. 😂
Can’t wait to hear more about these twists and turns on Nostr! 🌐
🔧 Nostr Chats: Bugs, Goodnights, and More!
So, here's the latest from the Nostr world – it's been buzzing with some fun chatter!
First up, the age-old struggle with Nostr bugs. aljaz joked about Nostr clients being bug-ridden, way more than any other top product! And our fave girinovey jumped in comparing them to the infamous Facebook Messenger bugs! 😂 Meanwhile, idsera made a point about user expectations, but girinovey wasn't having it – "You got the point, everyone's heard it already!" 💥
aljaz went detective mode on relay.nostr.net, discovering a flood of kind 29333 events. They're on the case, and the linked evidence is solving the mystery one blocked event at a time – 1.27 million of them, to be exact! Sherlock Holmes would be proud. 🕵️♀️
In the softer side of things, bostonwine sent out a sweet "Goodnight 💜" with a lovely picture, and npub14qt30q0an6gwmcl2gnwu5hf6h7pgl68wm6c082asm5l9vdtzu87q0z9htj replied wishing Boston a good night, while zach kept it simple with a "GN 🤙".
Oh, and who could forget heatherlarson's quirky drop – just a single 💩 emoji, provoking a giggle with MF_HODL adding a cryptic "Hmm... psss pffftt". Sometimes, it's the simple things that spark a chuckle! 💨🤪
And in the midst of all this, ck is going full send with a need for "higher"! Whatever that means, BenJustman is all onboard for sending it higher. 🚀
And lastly, keychat keeps us informed on the tech front, reminding us how both Signal and Telegram are rocking WebRTC for calls. Tech talk! 📞
Check out the full convo here
🎤 Chat Secrets and Whispering Wisdom
Hey there! Let me give you the lowdown on what the crew's been chattering about on Nostr.
Thread 13 kicked off with Martti Malmi talking about secure messaging protocols like double ratchet and MLS. Cool stuff! SLCW jumped in with questions about message queues and npubs, while npub1x3j34yuj6d9ln5ryuw0ncy97aa6ttc5wwyxqwvjrz7mg039t6l5qd4ewrm thinks it's more about hiding your IP than your ID. 🤔
Meanwhile, in Thread 14, aljaz shared some serious evidence through a GitHub link, and even self-replied about over a million blocked events in just 20 hours! Mind-blown! 😱
On a more contemplative note, Mario dropped a gem in Thread 15 with "If you are shouting to be heard, you are probably talking to the wrong people." Wise words, indeed! npub1q6ps7m94jfdastx2tx76sj8sq4nxdhlsgmzns2tr4xt6ydx6grzspm0kxr resonated with this, sharing a personal take about feeling unheard on Nostr. #DeepThoughts
Lastly, Thread 16 had Karnage contemplating about getting better info from "standard vanilla stuff." Sometimes simple is best, huh? 🍦
Check out the full convo here
Coffee Chat: AI Talk and Tax Trivia ☕💬
Hey there! So, here's the scoop from our Nostr chats. Our buddy ABHcgd35 kicked things off with a pretty insightful take on AI—Claude's the go-to for general inquiries, but when it comes to coding, Codestral’s the one with the magic touch. Still, ABHcgd35 is all about keeping it local with self-hosted versions. Talk about being tech-savvy and cautiously smart! 🤓💻
Meanwhile, isolabell.art 🎨 shared a lovely, wholesome "GM 🫂🎨💜", and franny echoed back with the same vibe, adding a little sparkle ✨ to the morning feels. You know, just spreading good morning vibes all the way! 🌞💜
In another corner of our digital universe, 0xtr was digging into some Norwegian tax drama. They mentioned a convo with nostr:Rune Østgård about wealth taxes and all the rich folks up and leaving Norway. Seems like the exit tax came up, and npub1ul0kylrr3kf5kd653kzq3dpach28vtazwrpx40k9j94l7c42eqxsstw6df broke it down like a pro: It's all about making sure the taxman gets his due before you hit the road. 📜💸
Sounds like some heavy stuff, but also, some pretty intriguing insights into how taxes work in Norway. Who knew?! 🤔
Check out the full convo here!
Rolling in Laughter and Bitcoin Dreams
Hey there! So here's the scoop on what's happening with our friends over on Nostr. 😄
In Thread 19, PUBKEY dropped a casual bombshell about "About 1 million BTC." 🚀 No biggie, right? Just a casual convo about a massive stack of Bitcoin! Ioana chimed in with a perfect 😂, because seriously, who wouldn't laugh at the casual mention of all that BTC?
In Thread 20, things take an artsy turn with Karnage sharing a mysterious image link. What’s cooking there? npub1rwxlkj4ez2nsl5rdld9hsdtgzx973ky5mwr4fz3lejmwzhas9fjsxepee5 is blown away, calling it "surreal e maravilhoso." Looks like something pretty incredible is going down in that pic!
Anyway, it's always a mix of humor and wonder with this crew. You gotta check it out!
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 06:18:03Ah, the age-old debate: are you a Bitcoiner or just a HODLer sitting on a digital dragon's hoard? This week, the Nostr realm was set ablaze with a fiery challenge to those who clutch their coins like a pecan pie on Thanksgiving. FreedomTechArchitect spiced things up by questioning if stacking sats is enough of a contribution. Or is it time to trade that Scrooge McDuck routine for a more active role in the bitcoin community? The stage is set—grab your popcorn and watch who steps up to the plate in this satirical showdown. Dive into the drama-filled summary and let’s see where this rollercoaster ride takes us!
Bitcoiners or Just HODLers? 🤔
FreedomTechArchitect dropped a pretty spicy take on the whole "Bitcoin elitism" scene. They're calling out those who just stack sats without engaging or giving back, dubbing them "wealthy assholes" who just hold onto their coins with dreams of a richer future. 🔥 It's like they're stirring the pot, challenging folks to look beyond just buying and holding. Looks like a call for deeper involvement in the community—'cause just sitting on your sats ain't enough! 👀 No replies yet, but you can feel the intensity hanging in the air, waiting to see who takes the bait!
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 06:06:56Hold onto your proverbial hats, folks! It seems like our trusty spam patrollers on Nostr have been waging an epic battle, with 1.27 million events blocked in just under a day—it's almost like the spammy version of tackling an endless horde of digital zombies. While the dust is still settling, we're left wide-eyed and pondering whether this is just a sneak peek into the world’s most relentless spam showdown. Will our digital heroes emerge victorious? Grab your popcorn and dive into the drama! 🍿🔍
Spam Patrol on Nostr 🚨
So, aljaz just dropped a bombshell stat: 1.27 million events got blocked in just 20 hours! 🤯 It's like they've been fighting off a zombie event apocalypse on Nostr. While nobody's chimed in yet (probably picking their jaws off the floor), it’s left everyone wondering what's caused this insane amount of blocked content. Is this the start of some epic new spam battle? Who knows? Stay tuned!
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 05:58:16Grab your magnifying glasses, fellow Nostr sleuths, because we're diving into a joy-filled whodunit this week! Our intrepid poster shared an image so heartwarming it might just melt your screen—and they're waiting with bated breath (and a flurry of heart emojis) to see if the community catches the love wave. Will the gang hop on this feel-good express, or are they just missing in action like socks in a dryer? Read on to find out if this uplifting post sparks a chain reaction of good vibes!
Snapshots of Joy 📸
fishcake was feeling all the warm fuzzies over a picture they shared. With emojis like 🫂💜🔥🥰, you know they're seriously loving it! No replies or reactions yet, but when you post something you adore, it's all about sharing the joy, right? Hopefully, the rest of the gang jumps in soon to keep the love train going!
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 05:42:47Buckle up for some Nostr insights hotter than your morning coffee, folks! This week, we've got a daring dive into the complexities of the Israeli conflict that's spurred some serious contemplation—even rendering the usual chatterheads speechless. Is it all about divine decrees or simply the age-old dance over land and power? It's the kind of topic that could turn a casual scroll session into a full-blown midnight philosophy pow-wow. Dive into the newsletter to ponder alongside the silent majority—get ready for some thought-provoking fare!
Hot Takes and Heavy Topics
So, there wasn't much chatter back and forth in this thread – no surprise replies or reactions yet – but agichoote definitely dropped a serious bombshell. They're taking a bold stance, claiming that what's going down in Israel is more about power and property than any religious squabbles. 😲 It's a heavy topic, and maybe everyone's pondering it because it's been all quiet in the replies. Wonder if this will stir up any late-night debates over in the group?
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 05:40:39In this week's nostalgic stroll through the Nostrhood, we've stumbled upon a debate hotter than a sidewalk in July—geopolitics in the Middle East! It appears that everyone’s favorite provocateur has dropped a conceptual bombshell and redefined the battle lines—hint: it's all about territory, not theology. While the fireworks might not be visible in replies, you can bet your Bitcoin it’s the talk of the virtual watercooler. So grab your popcorn, and stay tuned as we dig deeper into the realm of property and power!
Nostr's Debate Spotlight 💥
So, our friend agichoote sparked quite a deep conversation on Nostr about the geopolitical scene, highlighting some spicy views on Israel and Palestine. The core of their point? It's all about property and power, not religion. That’s a thought-provoking take, right? Even though there weren't any direct replies, it surely seems like the kind of post that gets everyone buzzing and probably discussing off-platform! I bet next time, agichoote drops something, it's going to stir the pot again. Stay tuned for more on this topic!
Check out the full convo here
-
@ a012dc82:6458a70d
2024-10-11 05:39:57Table Of Content
-
- Supply and Demand
-
- Institutional Adoption
-
- Regulatory Environment
-
- Market Sentiment
-
- Bitcoin Halving
-
- Competition
-
- Technological Advancements
-
Conclusion
-
FAQ
Bitcoin, the first and most popular cryptocurrency, has had a tumultuous journey since its inception in 2009. It has experienced both sharp highs and crushing lows, but the value of Bitcoin has continued to rise steadily over the years. The reasons behind Bitcoin's value are complex, but there are several game-changing factors that have played a significant role in determining its value. In this article, we will discuss the top 7 game-changing factors that determine Bitcoin's value.
1. Supply and Demand
The most fundamental factor that determines the value of any asset is supply and demand. Bitcoin is no exception. Bitcoin's supply is limited to 21 million coins, and as of May 2023, approximately 18.7 million Bitcoins have already been mined. This limited supply makes Bitcoin a scarce asset, and as demand for Bitcoin increases, its value rises. Conversely, if demand falls, Bitcoin's value can drop.
2. Institutional Adoption
Institutional adoption is another game-changing factor that has influenced Bitcoin's value. In recent years, many large institutions, including PayPal, Square, and Tesla, have started to invest in Bitcoin. This institutional adoption has brought credibility to Bitcoin and helped to increase its mainstream acceptance. As more institutions invest in Bitcoin, its value is likely to continue to rise.
3. Regulatory Environment
The regulatory environment is another crucial factor that affects Bitcoin's value. Governments around the world have been struggling to come up with regulations for cryptocurrencies, and their actions can have a significant impact on the value of Bitcoin. If governments impose strict regulations that limit the use and adoption of Bitcoin, its value could fall. Conversely, if governments adopt more crypto-friendly policies, it could help to increase the value of Bitcoin.
4. Market Sentiment
Market sentiment refers to the overall mood and attitude of investors towards an asset. It can be influenced by a variety of factors, including news events, social media trends, and general economic conditions. Market sentiment can have a significant impact on the value of Bitcoin. If investors are optimistic about the future of Bitcoin, its value can rise. Conversely, if investors are pessimistic, its value can drop.
5. Bitcoin Halving
Bitcoin halving is an event that occurs approximately every four years when the number of Bitcoins rewarded to miners is cut in half. This event is designed to control the supply of Bitcoin and ensure that it remains a scarce asset. The previous halving events in 2012 and 2016 both led to significant increases in the value of Bitcoin. The next halving event is expected to occur in 2024, and many analysts believe it could lead to another surge in Bitcoin's value.
6. Competition
Bitcoin is not the only cryptocurrency in the market. There are thousands of other cryptocurrencies, including Ethereum, Ripple, and Litecoin, to name a few. Competition from other cryptocurrencies can have a significant impact on the value of Bitcoin. If investors shift their focus to other cryptocurrencies, it can cause Bitcoin's value to drop. Conversely, if Bitcoin remains the most popular and widely used cryptocurrency, its value is likely to continue to rise.
7. Technological Advancements
Finally, technological advancements can also have a significant impact on the value of Bitcoin. Bitcoin is built on a complex blockchain technology, and advancements in this technology can improve the speed and efficiency of Bitcoin transactions. This can help to increase the adoption of Bitcoin and, in turn, its value. Conversely, if Bitcoin technology falls behind other cryptocurrencies, it could cause its value to drop.
Conclusion
The value of Bitcoin is determined by a complex interplay of factors, including supply and demand, institutional adoption, the regulatory environment, market sentiment, Bitcoin halving, competition, and technological advancements. Investors who understand these factors and keep a close eye on them are more likely to make informed decisions about
FAQ
What is the most important factor that determines Bitcoin's value? The most important factor that determines Bitcoin's value is supply and demand. As demand for Bitcoin increases, its value rises.
How does institutional adoption impact Bitcoin's value? Institutional adoption brings credibility to Bitcoin and increases its mainstream acceptance, leading to a rise in its value.
What is Bitcoin halving? Bitcoin halving is an event that occurs approximately every four years when the number of Bitcoins rewarded to miners is cut in half to control the supply of Bitcoin.
How does competition from other cryptocurrencies affect Bitcoin's value? Competition from other cryptocurrencies can cause Bitcoin's value to drop if investors shift their focus to other cryptocurrencies. Conversely, if Bitcoin remains the most popular and widely used cryptocurrency, its value is likely to continue to rise.
How do technological advancements impact Bitcoin's value? Technological advancements can improve the speed and efficiency of Bitcoin transactions, increase its adoption, and, in turn, its value. However, falling behind other cryptocurrencies in technology could cause Bitcoin's value to drop.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 59df1288:92e1744f
2024-10-11 05:39:22In this week's Nostr tête-à-tête, we're peering into a conversation with the potential to ignite like a bonfire at a philosophy major's backyard party. Our spotlight shines on a brave soul who isn't afraid to tackle the age-old clash of contested lands and control with a splash of modern-day tension—raising questions that seem destined to either yield enlightening discourse or send everyone running for the mute button. So grab your popcorn; the discussion is just warming up, and who knows? You might witness the sparks fly firsthand!
Tensions and Property Talk
So, agichoote dropped a thought-provoking note about the Israel state focusing on ethnic cleansing in Palestine, emphasizing that the core issue is about property and government control rather than religious differences. It's a pretty serious topic, and it looks like they were hoping to spark some debate or fresh perspectives.
Although there weren't any replies or reactions yet, it feels like one of those convos that could really heat up once people start chiming in. 🧐💬
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 05:11:41Greetings, Nostrnauts! 🚀 As we gather around our digital campfire, the talk has drifted to the stars of pre-alpha dreams and the unexpectedly harmonious hum of lowered expectations. It seems like our dear hodlers have decided to swap their typical theatrics for a kumbaya session on keeping it mellow. It's delightfully quiet—almost suspiciously so! Could it be the calm before the innovation storm, or are they simply contemplating existential code? Dive in to discover the zen of Nostr discussions and maybe catch a sneak peek of what’s lingering behind those nonchalant nods.
Let's Talk Pre-Alpha Expectations! 🤝
So, hodlbod is all about setting the right vibes for a pre-alpha release. No drama, just a friendly reminder to keep expectations chill. It seems like everyone was listening—they're just nodding along, no replies yet. Maybe they're all on the same page or still figuring out what to expect. 😅
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 05:09:59In the ever-entertaining realm of Nostr, our favorite flavor isn't just vanilla—it's a quest for juicy insights served with a scoop of humor! This week, one contributor likened the pursuit of top-notch information to the reliable joy of a creamy vanilla ice cream cone. 🍦 And while no one quite cracked the elusive code to better info sprays (or sauces?), the analogy left us wondering: just what would qualify as more exciting than ice cream? Perhaps next time, the secret will be revealed—sprinkles and all. Dive into the full scoop in our latest newsletter! 🕵️♂️
Vanilla Ice Cream and Better Info?
Looks like Karnage is on a quest for top-tier information, comparing it to good ol' vanilla ice cream! 🍦 They hinted at some kind of secret approach to getting better info than usual. No one replied, but it's funny to imagine what kind of info is more exciting than ice cream! Maybe they'll spill the secret sauce next time. 🕵️♂️
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 05:07:28Prepare to be whisked away into the bustling bazaar of Nostr's most recent chatter—a place where spontaneous bursts of enthusiasm are as common as cats in memes! This week, we've got a delightful highlight featuring a mysterious and exuberant "Amazing" from one of our lively patrons that seemed to echo into the ether with the grace of a confetti cannon. Who needs context when you can have a microdose of pure, unadulterated joy? Dive into the rest for more quirky quips and curious moments!
An Unexpected Burst of Enthusiasm! 🎉
So, there was this quick but funny moment when our pal Karnage just popped up like, "Amazing". No context, no nothing—just pure excitement! 😂 While there weren’t any replies to keep the convo rollin', it's always fun when someone drops in with that kind of energy out of the blue. Gotta love a good random moment of joy, right?
Check out the full convo here
-
@ 59df1288:92e1744f
2024-10-11 05:03:42Hold onto your hats, folks! This week in Nostr-land, a single drop of "Wowzers" set the digital streets abuzz, morphing from just a word into the hottest conversation starter. Imagine that—one cryptic gem sparking more curiosity than a cat could handle! With everyone poised for a plunge into this chatty rabbit hole, you can almost hear the gears of wit turning, ready for that perfect zingy reply. Dive in to see how a single word can cause such a delightful ruckus!
Wowzers, What a Day!
So, the excitement starts with Karnage dropping a spicy nugget into the chat with just one word – "Wowzers." 🥳 It's a little mystery that left everyone hanging, but sometimes that's all you need to spark curiosity, right? No replies yet, but you can bet folks are scratching their heads or maybe crafting the perfect comeback. 🤔
Check out the full convo here
-
@ df478568:2a951e67
2024-10-11 00:33:37I went to a local coffeehouse this morning. Like many coffeehouses, they don’t accept cash. They only take credit cards and debit cards with one exception: TIPS. There is a top jar where customers can throw loose change and crumpled up portraits of George Washington. The problem is:
- Cash is inconvenient. It requires a special trip to the bank to obtain.
- Many of the coffeehouses will not accept pieces of paper with the words “legal tender” printed on them.
- Spending with my credit card pays me 150X more than storing money in my savings account.
- Some payment terminals do not allow customers to leave a tip on their credit card.
I was not able to tip my barista this morning because I didn’t not have any paper cash money to put in the tip jar. Their payment terminal allowed me to pay the merchant with my credit card, but it did not give me an option to pay the barista. The barista also did not take credit card payments. I paid for my coffee and the credit card gave me like a 7 cent tip, but I was not able to tip my barista. I wanted to tip the barista, but the barista did not take any of my form of payments. In economics, this is called the coincidence of wants problem.
A Personal Tipping Page
Here is a link to mypersonal tipping page. I don’t work for tips, but I like to write a little code using the API of Strike, the company that makes these tipping pages. I don’t work for Strike. This is a hobby for me, but it solves this tipping problem.
It also gives me a lightning address, marc26z@strike.me It looks like an email address, but it is used to send me money instead of spam.😏 This is a great way to accept tips from people who do not want cash, You just need to choose dollars in the app. You can get your own tip page by downloading the app from the google play or app store. You can get the Strike App by using this link*.
Be aware that if you want to receive USD or your local fiat currency. You will need to change the settings.
My incoming payments are automatically converted to USD, which might surprise many of my friends and family since I’m one of those dorks that’s been talking about nerd money for so long. At the end of the day, however, I still have bills to pay and this is the currency those bills are denominated in.
Cash On The Cash App
The Cash app is popular in my area. Many people already use it. Maybe I should ask baristas if they have a cashtag from the Cash App. My cashtag is marc26z. This is straightforward. If you have my cashtag, you can send me money. I can spend that money with my card. The cash app let’s you design your own debit card. You can draw on it or add symbols. Here’s the card I designed.
If you want to accept cash using the cash app, download the app from cash app*
What Makes These Different From Other Payment Solutions
I don’t have time to convince you that p2p electronic cash is worthy of your study. I just want to tip baristas again. In a world where cash-money is in danger of becoming extinct like the dodo-bird, tips will require electronic payment systems. These are two easy solutions to this problem.
I like the tipping pages of Strike, but Cash App has a bigger network effect. Many people in my community use the cash app. It's convinient because it comes with a card. It makes it easy to spend money without using a credit card. I use them both. Although I cannot directly spend the money I recieve in the Strike app at most stores. O can buy an Amazon Gift Card as well as hundreds of other popular retail stores within the Strike App. On the other hand, the Cash App Card makes it very easy to spend at brick and mortar stores. Some of these stores offer cash back called boosts. Sometimes Strike is better. Sometimes the Cash app is better.
What makes these two apps interesting is that they are interoperable. i can move money from Strike to the Cash App within seconds and vice-versa. Other payment rails take days to move money from one place to another, but these two apps can move money between each other with little effort and extremely low fees.
✌️ nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
Like this article? Leave a Tip
- These are affiliate links which means these companies will pay me a small commission for referring new customers, but I only recommend services I use and love. I would recommend them even if they did not pay me.
If you would rather not use my affiliate links, but still want to use these services, you can also sign up for them without using my referral link at:
https://strike.me/
and
https://cash.app/
-
@ df478568:2a951e67
2024-10-10 23:47:41Six months ago, I didn't know I was a hacker. Most of my online friends are also hackers. Hacking away at our keyboards is part of our culture. We encrypt. We test software and report about it.
We believe code is speech We write code. We make pull requests.
We understand the the math behind bitcoin. We can sometimes recover "forgotten passwords," using tools that could potentially be used for nefarious purposes. I have experience using ransomware as a service software to improve my own security. I know this is not the kind of stuff that makes the news. The people of my culture are only portrayed as criminals. There are criminals among some people on my culture, but it's a stereotype to think we are all criminals. Most hackers are good people who deeply care about information security.
We realize that many smart people are very smart about things unrelated to the computer parts only nerds see. The people really good at that other stuff often don't have time to verify each character of an email like https://microsoft-super-secure.com/(not a real website).
My culture merit based. We do not care what the color of your skin is. We don't care about your gender, your nationality, or what country you love in. Who you love is none of our business. We do not require you to use your real name. You can be a woman, a man, or a sock puppet for all we care. You just need a public/private keypair.
Learning Hacker Tools
This hacker culture gave me a deep understanding of the inner workings of information security. I learned so many possible attacks just listening to podcasts. I learned how to verify PGP signatures because the people immersed within my culture encourage you to do so. Verifying software using SHA256 on Linux is second nature as I understand how the math works.
I have also learned that many companies offer bug bounties. They pay hackers who find vulnerabilities. Suddenly, Kali Linux seems like a super swell operating system to learn. I can use my skills to hack stuff and get paid! Sign me up. So I took the first step and signed up for hackerone.
I'm also reading books about ethical hacking because I don't want to accidentally do anything illegal. So far, I have learned that most companies don't just let you do anything you want. I obviously can't steal someone else's bitcoin or take down a website.
There's nothing wrong with putting $20.00 worth of bitcoin on a wallet to test it. I already have experience doing this with alpha software from an actual bitcoin company. That was more about improving the user experience, but hacking is simmilar. Essentially it's testing software. In fact, it is often called pen testing.
I'm still a beginner. I don't want to overstate my ability, but this is a path I want to pursue. It seems like a decent way to get professional IT experience doing something I find fun anyway. I also know the landscape is changing. Like it or not, open source large language models like HackerGPT](https://www.geeksforgeeks.org/hackergpt-a-powerful-ai-tool-for-ethical-hackers-and-the-cybersecurity-community/) make AI an excellent hacking tutor. We will need people who know how to use these tools to find exploits before nefarious actors do.
Marc 863,510
Send a tip https://coinos.io/marcleon
https://marcleon.work/learning-kali-linux/
Originally published at: https://marcleon.work/learning-kali-linux
Also on TOR: http://p66dxywd2xpyyrdfxwilqcxmchmfw2ixmn2vm74q3atf22du7qmkihyd.onion/learning-kali-linux/
-
@ 2ec0583a:63f20df5
2024-10-10 20:48:45Developers have already created numerous Nostr clients for everything you can possibly do there. Other clients are in development now, and some exist just as ideas in developers' minds.
I want to talk about design. I'm not here to judge anything, I understand that many developers only build clients for functionality or experiments, and it's not like visual style is a huge problem here. This article is for developers who might be concerned about not having any idea what their client should look like, so I'm here to provide some ideas. I hope you'll find some of them useful.
I'm not a designer, so all I say here is just a noname's opinion you can ignore.
Let's begin.
First thing I want to say out loud — don't be shy. Get the weirdest design idea you have on your mind. Why do you like it? Is it unique? Is it intuitive? Is it memorable? Do you think it might scare away possible users?
Let's be honest, the internet is full of lackluster websites and apps. I don't really get why — do they just play safe or do they think their unique app doesn't need a memorable style?
Newspaper
It's cozy, it's retro, it's safe and it's hard to make a mistake. Sharp bordered rectangles and no bright colors make it easy to follow the overall idea. Posts easily become blocks — I mean, that's kinda the origin of modern websites. This design is difficult to imagine with silly memes, so yeah, I believe meaningful discussions would be the best fit.
Monochrome Minimalism
It's ridiculously simple and raw. Primitive shapes, bold black borders and white background; some unusual font choices here and there. Is that Arial? This approach might look like lack of design at first glance, like it got stuck in the 90s — right before colors became so common you couldn't find a website without a 3-frame green-pink-yellow gif at the background. But the longer you look at it, the more thoughtful design choices you notice. It doesn't lack any design, the simplicity is the core design here. It's simple because of colorful websites everyone is used to.
Pseudo terminal
There is something weirdly attractive in a design that looks like a terminal with all those tildes and braces and other symbols which help you to get the meaning without pictures. The pseudo terminal is weird and specific and definitely doesn't suit everything. But I couldn't ignore the good old nostalgic aesthetics.
Vintage
Take a painting or an old photograph, put it in a modern context and you're half-way there. It makes perfect sense for everything that is somehow connected to the past — a city community, a historian community, etc. It respects what was done before us and reimagines it.
Modern
A good modern design brings together elements we like to look at. A great modern design makes you want to open their app just to look at it. It attracts users with their strong visual style. And then it's a task for developers to make the functionality and flow on a par with it. For some reason apps with visuals that strong aren't as common as you might think.
Conclusion
Don't let pretty pictures fool you — first of all, you have to decide exactly what your client is for and how it's supposed to work. Design comes after needs, not before. A client should work, and that's the main part. But it's a double win when a client works and it feels nice.
If you're interested in more examples, visit Dribble, Behance or Pinterest, there is always something to get inspired by.
Don't be shy. Create bold clients that will catch people's eye. A logo can be poorly hand drawn, posts in a feed can be stylized as Macintosh windows, user profile can look like an inventory from a forgotten game — let your client be weird, funky, old school, wild, fancy. We're here to have fun, aren't we?
-
@ eac63075:b4988b48
2024-10-10 18:12:38Companies like Meta (formerly Facebook) and Twitter (now X) control platforms that have become the main channels of communication for millions of people worldwide. At the center of this discussion are figures like Mark Zuckerberg and Elon Musk, whose recent actions raise serious questions about freedom of speech, censorship, and political manipulation.
https://fountain.fm/episode/VzJItfySZ8z6417prHyD
Recently, a public letter written by Mark Zuckerberg revealed how the U.S. government, under Joe Biden’s administration, pressured Facebook to censor information during the COVID-19 pandemic. The controversy involves, among other topics, the censorship of content related to Biden’s son, Hunter Biden, during the height of the laptop scandal. This revelation raises questions about the role these platforms play in spreading or withholding information, as well as the direct impact this has on democracy.
Meta and Censorship: Zuckerberg's Letter
In his letter, Zuckerberg admitted that Facebook was pressured by the Biden administration to suppress information about the pandemic and the Hunter Biden case, something he now claims to regret. This has sparked heated debate about how far social media should go in yielding to governmental pressure. Many see this as a threat to freedom of speech, while others argue that this censorship was necessary to control misinformation.
The issue here is not just about government pressure, but the fact that Facebook, as a global platform with billions of users, holds unparalleled power to shape narratives. When a platform decides what is “acceptable” or “truthful,” it directly influences public perception and opinion formation, especially during critical moments like an election.
Zuckerberg, in his letter, seems to be trying to salvage his image, but the damage has already been done. The admission that Facebook collaborated with the government to suppress certain information raises doubts about the platform’s impartiality and its commitment to free speech.
Elon Musk and Free Speech on X
Meanwhile, Elon Musk, now in control of Twitter, renamed X, has promised to transform the platform into a space for free expression. However, the reality seems more complex. Musk claims that X should be a place where all voices can be heard, regardless of political or ideological alignment. Yet, this promise has proven difficult to fulfill in practice.
X continues to ban users and censor content, especially in countries with authoritarian governments like India and Turkey. This creates a dichotomy: on the one hand, Musk advocates for unrestricted free speech, but on the other, he complies with censorship requests from these regimes. This raises questions about Musk’s true intentions and the extent to which he is willing to uphold his principles when the platform faces international pressure.
Moreover, Musk has used X as a political platform, especially in support of former President Donald Trump. The reinstatement of Trump’s account, banned during the Capitol insurrection, has raised further suspicions that Musk is turning X into a tool of political power. For many, this represents a significant risk to the neutrality of digital platforms.
The Cambridge Analytica Scandal and the Risk of Political Manipulation
The discussion of censorship and free speech on social media brings up a case that shocked the world a few years ago: the Cambridge Analytica scandal. In 2015, this British company was accused of using personal data from millions of Facebook users to manipulate elections, including the Brexit referendum and Donald Trump’s 2016 presidential election.
Although Cambridge Analytica was dissolved after the scandal, its legacy remains. Big Tech companies still have access to vast amounts of user data, and the power this grants them is alarming. Companies like Meta and X could, in theory, directly influence election outcomes by manipulating algorithms to promote certain narratives or suppress others.
This scenario raises crucial questions: to what extent can we trust these platforms to act impartially? Are they truly committed to free speech, or are they using their power to shape the political future of the world according to their own interests?
The Pablo Marçal Case and Manipulation in Brazil
In Brazil, a recent example that illustrates the complexity of the relationship between social media and political power is the case of coach Pablo Marçal. Marçal, who built a considerable following, became involved in controversies related to using his influence to manipulate public opinion. Recently, it was revealed that X hired the renowned law firm Pinheiro Neto to defend Marçal’s continued presence on the platform, even after controversies.
This move raises concerns about the selective enforcement of social media’s own rules. Why are some influencers protected while others are summarily banned? Marçal’s influence, particularly among conservative voters in Brazil, is undeniable, and the public defense of his account on X suggests that more is at stake than just free speech.
The Future of Social Media and Democracy
What we are witnessing is the rise of a new era where social media plays a central role in global politics. Control over the flow of information lies in the hands of a few giant companies, and the decisions of their leaders—whether Mark Zuckerberg, Elon Musk, or others—can have a profound impact on elections, governments, and democracies.
This raises legitimate concerns about the future of democracy in a world where private platforms have the power to control public discourse. Big Tech censorship, often disguised as “misinformation control,” can easily become a tool for manipulation.
For citizens, this means being vigilant and critical about the information they receive on social media. Freedom of expression must be defended, but we also need to question who is behind these platforms and what their true motivations are. Trust in social media is at stake, and the future of democracy may depend on how we decide to deal with this unprecedented power.
Conclusion
Recent revelations about Zuckerberg’s involvement in censorship and Musk’s use of X to promote a political agenda highlight the urgent need for transparency in social media platforms. As these companies become increasingly influential in the global political arena, the public must be aware of the risks and actively engage in the debate about the future of free speech and democracy.
-
@ 09fbf8f3:fa3d60f0
2024-10-10 15:44:06Taosync支持全同步模式和仅新增模式,允许用户定时扫描指定目录下的文件差异,确保目标目录与源目录保持一致,或者只同步新增的文件。此外,Taosync还支持定时下载功能,用户可以设置一次性任务,按照cron表达式在指定时间执行下载任务。
以下是Taosync的使用教程:
系统部署
下载镜像:由于国内网络环境因素,建议直接导入Taosync和AList所需的镜像文件。相关的镜像文件可以从网盘获取,例如阿里云盘或夸克网盘 。
创建容器:项目基于AList运行,因此需要创建一个AList容器。可以使用以下docker-compose.yml文件来创建Taosync和AList容器:
version: "3" services: sync: image: dr34m/tao-sync:latest container_name: taosync restart: always ports: - 8023:8023 # 左侧的端口可自定义修改 volumes: - ./taosync/data:/app/data # 如果已经有alist容器,则删除下面的代码 alist: image: xhofe/alist:latest container_name: alist restart: always ports: - 5244:5244 # http端口,左侧的端口可自定义修改 # - 5245:5245 # https端口,左侧的端口可自定义修改 volumes: - ./alist/data:/opt/alist/data
在Docker应用下创建项目,并粘贴上述代码到compose配置中,然后立即部署。
获取默认密码:部署完成后,在项目日志页面获取Taosync和AList的默认密码。
系统使用
配置AList:使用默认账号admin和默认密码登录AList后台,添加网盘驱动,并复制令牌以备后用 。
配置Taosync:使用默认账号admin和默认密码登录Taosync后台,修改密码,并在引擎管理中增加AList的URL地址和令牌。
创建同步作业:在作业管理中新建作业,选择引擎,源目标目录和目标目录,设置同步速度和方法,以及定时同步的方式(间隔或cron) 。
Taosync支持多种存储源,包括但不限于本地存储、阿里云盘、OneDrive、天翼云盘、GoogleDrive、FTP/SFTP等 。通过部署Taosync,可以有效地补充NAS中的同步方法,实现本地存储与网络存储的有效结合 。
-
@ 6ad3e2a3:c90b7740
2024-10-10 13:49:50As a New Yorker growing up in the 1980s, I didn’t have a high opinion of Christians. I don’t mean my Irish-Italian friends who were nominally Christian, but what we thought of as the “religious right,” those joyless scolds who took it seriously. Who were they to lecture me about the music to which I could listen, or what my teenage girlfriend and I could do in private?
The Christian Right, it seemed, wanted to control you, force their beliefs on you, knew what was best for you and were absolutely certain about what would happen to you if you were not “saved.” I didn’t even like Judaism, my own religion — I was never Bar Mitzvah’d — and contemplating the dull drudgery of synagogues, Sunday schools and chapels filled me with boredom and dread. Religion was for simpletons, and I wanted nothing to do with it.
. . .
Everyone knows the untold evil that has been committed in the name of religion, and Christianity, from the Crusades to the Inquisition to the Salem witch burnings is no exception. But that’s not especially relevant for those of us in the post-enlightenment modern west where practicing one’s religion, especially in adulthood, is increasingly voluntarily. That is, most Christians I encounter have made a conscious choice to place their faith in Jesus and his teachings. No one is forcing them, and they are not forcing anyone else, either.
. . .
Many people in the west have rejected traditional organized religion, but that does not mean they’ve defeated the powerful urge to believe in something larger than themselves, something to root their experience in the world. I have witnessed this religious mindset often, whether people were lecturing me about “trusting” science, never mind that science is based on distrust and verification, or the hilarious “you are not an epidemiologist” during the covid pandemic. Titles, degrees, credentials, blind faith in the technocrats and appeals to authority mirrored to an uncanny degree the behavior of religious subjects terrified to run afoul of clerical edicts in eras past.
If you dissent from such edicts, you are now guilty of misinformation (the modern word for heresy), and you might be deplatformed or lose your livelihood and friends (excommunicated). These super rational non-believers went along with forced injections at the behest of pharmaceutical conglomerates, and when it was obvious the injections didn’t work to stop the spread, they pivoted to nonsense about “occupying ICU beds” in accordance with the new commands of their church.
We were told we could take off our masks while eating in restaurants but had to put them on again while getting up to use the restroom. And we weren’t supposed to gather in large numbers, except for the George Floyd protests because racism was “the real pandemic.” And people swallowed this because, after all, it was Science, not some kind of primitive, superstitious backwards religion.
But the illogic and abuse of sense-making wasn’t just restricted to covid. The two-plus-two-equals five brigade told us a woman could have a penis, men could get pregnant, that biological males belonged in women’s locker rooms and sports competitions if they self-identified as such. I view these deliberate distortions of reality as loyalty tests of sorts — if you can defend the indefensible, you are surely a trusted comrade.
. . .
My experience objecting to this new merger of Science with the whims of the party has been eye opening. Quite often those who were most ruthless in mocking and gaslighting people like me were from my own social circle — college educated liberals, laptop class professionals, those who use words and spread sheets for a living.
And many of those standing up for civil liberties and personal autonomy were not who I would have expected. Wealthy people who didn’t depend on their peers’ good graces to live comfortably, it turns out, were often cowardly beyond belief. Academia, which purports to value truth and open inquiry, were among the most compliant, in many cases enforcers of the party dogmas to the point of abetting the US government in illegally censoring dissent. Even some of those I had most thought of as independent thinkers like Nassim Taleb, Noam Chomsky and “the bad boy of radio” during my formative years, Howard Stern, capitulated abjectly and totally.
So who was willing to resist authoritarianism? Who had the back of the ordinary citizen that simply didn’t want to inject himself with experimental chemicals because someone in a lab coat said so? On my timeline it was disproportionately Christians. People with profiles like “God and family,” “Jesus is No. 1,” and “Follower of Christ.”
Apparently they believe in something bigger than the State and its power, which is why one of the aims of Soviet Russia was to supplant Christianity (and other religions) with state atheism. It’s harder to control people who bow to something other than earthly might. If Jesus went to the cross for them, surely they could endure the wrath of their employers, condemnation by their government, vitriol by all the good people who knew for certain what was best for us.
The roles were now reversed. Instead of the Christian Right being the joyless scolds who knew what was best for me, they became a bulwark against the indoctrinated technocrats doing the same.
What a relief to have such a large swath of the population so resilient to the corrupting forces of the State. That is not to say Christians are perfect people just by virtue of believing or to paint an unrealistic picture of them, only that when the Big Bribe was offered, a large number of them had the wherewithal to turn it down.
As I said, I am not a Christian, but I am sure glad they exist.
-
@ 460c25e6:ef85065c
2024-10-10 13:22:06In the early days of Nostr, developers often competed to see who could implement the most NIPs. Although all were optional (except NIP-01), it became a point of pride and vital for the ecosystem's growth. Back then, there were only a few dozen relatively simple NIPs to implement. Fast forward to today, with nearly 100 NIPs, maintaining and implementing everything has become nearly impossible. Yet, the drive among developers to "code all things Nostr" remains as strong as ever.
nostr:nprofile1qqsrhuxx8l9ex335q7he0f09aej04zpazpl0ne2cgukyawd24mayt8gprfmhxue69uhhq7tjv9kkjepwve5kzar2v9nzucm0d5hszxmhwden5te0wfjkccte9emk2um5v4exucn5vvhxxmmd9uq3xamnwvaz7tmhda6zuat50phjummwv5hsx7c9z9 raised the point that everyone, even I, agrees:
nostr:nevent1qqsqqqp2zrs7836tyjlsfe7aj9c4d97zrxxqyayagkdwlcur96t4laspzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7q3q80cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsxpqqqqqqzgcrrrp
But how big is too big? How can we better understand the range of options available for devs out there?
I went out for a hunt in my own brain to figure out how to clarify the situation. I came up with the following 4 categories for Nostr Clients: - Super Clients: These apps merge vastly different domains into a single application, offering basic support for reading, writing, configuration, and data management for each use case within each domains. An example would be an app that combines a Marketplace and Live Streams under one roof.
-
Clients: These apps provide comprehensive support for a single domain, handling all its use cases in a single home. They manage the complete set of reading, writing, configuration, and long-term data management within that domain. An example is a marketplace app that helps users manage product catalogs, process orders, collect payments, and handle fulfillment and reports.
-
Mini Clients: These apps focus on read and write functionality for a single use case, including configuration management and any actions related to that specific task. For example, a fulfillment app that helps users view orders placed from another client to then pack and ship them.
-
Micro Clients: These apps have a single interface and perform one specific action. Viewing and creating a record is handled by separate micro apps. An example is an app that simply scans an order's QR code and marks it as shipped.
Based on my made-up categories described at the end, this is how I would split our most known apps.
Super Clients - amethyst - nostrudel - coracle
Clients - damus - twitter - primal - twitter - snort - twitter - gossip - twitter - lume - twitter - ditto - twitter - rabbit - twitter - freefrom - twitter - nos - twitter - flycat - twitter - straylight - twitter - nostter - twitter - iris - twitter - nostur - twitter - nostrmo - twitter - yana - twitter - openvibe - twitter - freerse - twitter - 0xchat - chats - cornychat - chats - coop - chats - nostrchat - chats - blowater - chats - habla - blogs - yakihonne - blogs - highlighter - blogs - blogstack - blogs - stemstr - music - wavlake - music - fountain - podcasts - zap.stream - live streaming - shopstr - marketplace - plebeian.market - marketplace - flotilla - communities - satellite - communities - zapddit - communities - nostr.kiwi - communities - hivetalk - video calls - flare - long-form videos - nostrnests - audio spaces - wherostr - location - yondar - location - stacker.news - news - flockstr - events - nostrocket - issue tracker - docstr - docs - satshoot - freelance - wikifreedia - wiki - formstr - forms - chesstr - chess - memestr - meme feed - npub.cash - wallet - npub.pro - websites - gitworkshop - dev tools - onosendai - metaverse - degmods - games - turdsoup - prompts
Mini Clients - amber - signer - alby - signer - nos2x - signer - nsec.app - signer - keys.band - signer - nostrame - signer - nokakoi - anon - zap.cooking - recipes - anonostr - anon - getwired - anon - lowent - anon - creatr - exclusive content - lightning.video - exclusive content - zaplinks - slides - listr - lists - zap.store - app store - badges.page - badges - oddbean - news - dtan - torrents - nosta - user pages - pinstr - pinterest - pollerama - polls - swarmstr - trending - nostrapp - apps manager - noogle - search - ostrich.work - job postings - emojito - emoji manager - nostree - links - citrine - local relay - joinstr - coinjoins - heya - crowdfunding - zapplepay - zaps - nosbin - clipboard - shipyard - scheduler - tunestr - live streams - filestr - files - nostrcheck.me - media hosting - sheetstr - spreadsheets - crafters - curriculum vitae
Micro Clients - w3 - url shortener - nosdrive - backups - zaplife - zaps dashboard - zapper.fun - payments - nostrends - trends - zephyr - trends - wavman - music player - nostrrr - relay info - nosdump - relay info - notestack - blogs - nostr.build - media hosting - nostr.watch - relay info - nostr hours - use reports - lazereyes - vision prescriptions - snakestr - games - deletestr - deletion requests - 2048str - games - nostrqr - qr generator - notanostrclient - anon
Super apps will try to do everything, but can't really do most things super well. Regular-sized Clients will try to manage most of a given domain but are likely to centralize users on themselves, an unwanted effect inside of Nostr. If we want Nostr to grow in a decentralized fashion, we have to start betting on and using more Mini and Micro clients.
-
-
@ a012dc82:6458a70d
2024-10-10 12:51:18Table Of Content
-
The Satoshi-Era
-
The $11 Million Move
-
Lessons Learned
-
Conclusion
-
FAQ
Bitcoin, the world's first decentralized digital currency, has witnessed a meteoric rise in popularity since its inception in 2009. Over the years, Bitcoin has gone through a series of ups and downs, but it still remains one of the most valuable assets in the world. Recently, a Satoshi-era Bitcoin holder woke up to a pleasant surprise, finding that his Bitcoin stash had appreciated in value to over $11 million.
The Satoshi-Era
Satoshi Nakamoto is the pseudonym used by the person or group of people who created Bitcoin. The first Bitcoin block was mined by Satoshi Nakamoto on January 3, 2009, marking the birth of the Bitcoin network. The early days of Bitcoin, which is referred to as the Satoshi-era, saw very few people using the cryptocurrency. The first-ever Bitcoin transaction took place on January 12, 2009, when Satoshi Nakamoto sent 10 Bitcoins to Hal Finney, a renowned cryptographer.
The 1 Million Move
Fast forward to 2021, and Bitcoin has grown into a massive industry with millions of users around the world. In April 2021, the price of Bitcoin surged to an all-time high of over $64,000. This surge in price has made many early Bitcoin adopters very wealthy, including the Satoshi-era Bitcoin holder who recently woke up to an $11 million move.
According to reports, the Bitcoin holder had acquired 400 Bitcoins in the early days of the cryptocurrency when the price was still in its infancy. At the time, Bitcoin was trading for less than a dollar. The holder had lost track of his Bitcoin stash until he was reminded of it by a friend. Upon checking his wallet, he realized that his 400 Bitcoins were now worth over $11 million.
Lessons Learned
The story of the Satoshi-era Bitcoin holder serves as a reminder of the potential of Bitcoin as an investment. While Bitcoin's price is notoriously volatile, the cryptocurrency has consistently trended upwards over the long term. As more people adopt Bitcoin, its value is likely to continue increasing.
However, the story also highlights the importance of taking proper precautions to secure your Bitcoin holdings. The Satoshi-era Bitcoin holder had stored his Bitcoins in a digital wallet that he had forgotten about. If he had not been reminded of his Bitcoin stash, he could have lost his investment forever.
Conclusion
Bitcoin has come a long way since its inception in 2009. While it still has its fair share of detractors, the cryptocurrency has proven to be a valuable investment for many people. The recent $11 million move by a Satoshi-era Bitcoin holder serves as a reminder of the potential of Bitcoin and the importance of proper investment strategies. As Bitcoin continues to grow in popularity, it will be interesting to see how its value evolves over the coming years.
FAQ
What is Bitcoin? Bitcoin is a digital currency that operates on a decentralized network, allowing for peer-to-peer transactions without the need for intermediaries.
Who created Bitcoin? Bitcoin was created by an anonymous individual or group using the pseudonym Satoshi Nakamoto.
How does Bitcoin work? Bitcoin transactions are verified by a decentralized network of computers using complex algorithms. Transactions are recorded on a public ledger called the blockchain.
Is Bitcoin a good investment? Bitcoin has proven to be a valuable investment for many people, but it is also notoriously volatile. It is important to do your research and take proper precautions when investing in Bitcoin.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 6bf975a0:65de1244
2024-10-10 11:26:15- Площадки СМИ для размещения контента: как изменения в алгоритмах социальных медиа влияет на эффективность их использования редакциями
- Мультиканальные и мета-медиа в авторской типологии медиа
- Влияние доверия аудитории СМИ на медиапотребление: кейсы конкретных изданий
- Хронология взаимодействия СМИ и поисковых машин. Кейсы
- Возможен ли paywall (продажа контента) в российских СМИ?
- Сценарии использования подкастинга: есть ли будущее у этого формата?
- Как и за счёт чего выживает эфирное радиовещание в разных странах мира
- Текст или нет? Какие форматы подачи контента предпочитает аудитория
-
@ c69b71dc:426ba763
2024-10-10 09:05:29Chef's notes
This cashew blue cheese is a true plant-based delight, delivering the rich, tangy flavours you’d expect from traditional blue cheeses like Roquefort or Gorgonzola. The fermentation process, with the help of «Penicillium Roqueforti», creates a beautifully marbled, creamy cheese that’s both bold and complex. It’s a labor of love that rewards your patience with an unforgettable vegan cheese experience! Whether enjoyed on crackers, in salads, or simply on its own, this cheese will elevate any dish with its unique flavour profile.
Note 1: For this recipe you need parchment paper, a potent blender, glass jars with lid and two cheesecloths.
Note 2: Always use very clean tools, and avoid touching with your fingers or tasting with them while working on the cheese!
Details
- ⏲️ Prep time: 4-5 weeks
- 🍳 Cook time: 0
- 🍽️ Servings: Two small cheese loaves (2x 10-12 cm diameter)
Ingredients
- 300g raw cashews
- 3 tbsp water
- 3 tbsp kefir, kombucha or rejuvelac
- 2 tbsp coconut oil (raw, unrefined)
- 1-4 capsules vegan probiotics
- 1/2 tsp Himalayan salt (iodine-free, no additives)
- 1/16 tsp «Penicillium Roqueforti» (blue cheese mold culture)
Directions
- Day 1: Soak 300g of cashews overnight in water.
- Day 2: Rinse the soaked cashews thoroughly and let them drain well.
- In a high-speed blender, combine the cashews, 3 tbsp of water, 3 tbsp kefir or rejuvelac, and 2 tbsp coconut oil. Blend until the mixture is smooth and creamy.
- Add 1-4 capsules of vegan probiotics, 1/2 tsp Himalayan salt (free of iodine and additives), and blend again briefly.
- Add a pinch (about 1/16 tsp) of «Penicillium Roqueforti» powder (blue cheese culture) and give it another quick mix.
- Transfer the cashew mixture to a glass container, leaving the lid lightly on top (do not seal it completely) and store in a warm place, ideally in your kitchen, for 24 hours to ferment.
- Day 3: Divide the fermented cashew mixture into two smaller glass containers lined with cheesecloth. Press the mixture down firmly to eliminate air pockets.
- Store in a cool place (12-14°C / 53-57°F), ideally in a wine fridge.
- Day 4: Remove the cheese from the containers, take off the cheesecloth, and turn the cheese onto parchment paper.
- Sprinkle salt all over the cheese, ensuring it is evenly coated.
- Cover the cheese with larger glass bowls, ensuring that air can flow from underneath, and return to the wine fridge or the cool storage area.
- Days 4-7: Turn the cheese daily onto fresh parchment paper to maintain its texture.
- Day 7 or 8: Pierce the cheese with a thicker wooden skewer to create holes, allowing oxygen to reach the center, encouraging the blue mold to grow throughout the cheese, not just on the surface.
- Alternatively, crumble the cheese completely and then press it back into shape to ensure oxygen distribution.
- Days 8 toaround 12 or 15: Once the blue mold has fully developed around and inside the cheese, wrap the cheese in parchment paper, place it in a wooden cheese box, and then wrap it in a cloth bag.
- Transfer to a regular fridge to age for another 2-3 weeks or even several months, depending on your desired strength of flavour.
-
@ 32dc4f25:f95ddcce
2024-10-10 08:10:36Decentralized social networks were my main focus during my PhD. After I graduated early last year, my classmates Younes , npub147whqsr5vsj86x0ays70r0hgreklre3ey97uvcmxhum65skst56s30selt and I went all in on building Yakihonne. With this, some new members joined the YakiHonne team. This marks our fourth year exploring decentralized social networks.
For the first three years, we built a well-known decentralized research media platform in Asia. We experimented with decentralized creation, funding, and moderation to make media truly decentralized. From 2020 to early 2023, those were some of our happiest times—joining hackathons, winning grants, and focusing on decentralized media. We managed to achieve decentralized content creation for research communities.
In February 2023, we built a decentralized media client based on Nostr and secured some funding. In the early days of a small team, doing the right things and maintaining funding is crucial. Nostr's early phase, combined with the challenges many decentralized media projects have faced, made securing funding particularly tough.
I really believe in the Chinese saying, "After endless mountains and rivers that leave doubt whether there is a path out, suddenly one encounters the shade of a willow, bright flowers and a lovely village.” 山重水复疑无路,柳岸花明又一村。
At the Bitcoin Global Summit in the US, I met npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z , npub1xtscya34g58tk0z605fvr788k263gsu6cy9x0mhnm87echrgufzsevkk5s , npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424 , npub1j8y6tcdfw3q3f3h794s6un0gyc5742s0k5h5s2yqj0r70cpklqeqjavrvg, and others who gave us much encouragement and inspiration. In NV, I was asked if our projects on Nostr were competitors. My belief has always been that we are in a positive sum game—building the ecosystem together and creating growth, rather than being competitors. This is the nature of Nostr and a necessity for the future development of the world. The virtual digital world is vast enough, and we don’t need to cling to zero-sum thinking from the industrial age.
On my way back to Singapore from NV, a series of delays turned a 24-hour journey into 40 hours. Luckily, I didn't miss my chance to meet with my PhD supervisor. We had a great conversation about publishing and media through the lens of AI, social computing, advertising, and intelligent philosophy . Over the past 20 years, my supervisor has spent almost half of each year traveling to different countries, promoting the development of AI and complex systems. Now he’s more focused on making sure his students stay healthy.
Over the past two years, I received a few invitations for journal submissions, but I had to delay them due to my busy schedule. Moving forward, I plan to publish our latest research as papers, introducing Nostr and decentralized social networks to more academics, and inviting more researchers to join the Nostr ecosystem.
Right before boarding, I received support from an international academic organization, which really lifted my travel fatigue. Together, we’ll be planning a series of initiatives to engage the academic community in discussions about Nostr.
A big thanks to my team and npub1wmr34t36fy03m8hvgl96zl3znndyzyaqhwmwdtshwmtkg03fetaqhjg240 ,npub1trr5r2nrpsk6xkjk5a7p6pfcryyt6yzsflwjmz6r7uj7lfkjxxtq78hdpu npub1szpa7cypmyd59083qs3pte9lez22lzfu6pl2guhgqx7q09x68y6qquh3td for supporting Yakihonne and helping us grow.
Wendy
OD311 Flight
2024-10-09