-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ fa0165a0:03397073
2024-10-23 17:19:41Chef's notes
This recipe is for 48 buns. Total cooking time takes at least 90 minutes, but 60 minutes of that is letting the dough rest in between processing.
The baking is a simple three-step process. 1. Making the Wheat dough 2. Making and applying the filling 3. Garnishing and baking in the oven
When done: Enjoy during Fika!
PS;
-
Can be frozen and thawed in microwave for later enjoyment as well.
-
If you need unit conversion, this site may be of help: https://www.unitconverters.net/
-
Traditionally we use something we call "Pearl sugar" which is optimal, but normal sugar or sprinkles is okay too. Pearl sugar (Pärlsocker) looks like this: https://search.brave.com/images?q=p%C3%A4rlsocker
Ingredients
- 150 g butter
- 5 dl milk
- 50 g baking yeast (normal or for sweet dough)
- 1/2 teaspoon salt
- 1-1 1/2 dl sugar
- (Optional) 2 teaspoons of crushed or grounded cardamom seeds.
- 1.4 liters of wheat flour
- Filling: 50-75 g butter, room temperature
- Filling: 1/2 - 1 dl sugar
- Filling: 1 teaspoons crushed or ground cardamom and 1 teaspoons ground cinnamon (or 2 teaspoons of cinnamon)
- Garnish: 1 egg, sugar or Almond Shavings
Directions
- Melt the butter/margarine in a saucepan.
- Pour in the milk and allow the mixture to warm reach body temperature (approx. + 37 ° C).
- Dissolve the yeast in a dough bowl with the help of the salt.
- Add the 37 ° C milk/butter mixture, sugar and if you choose to the optional cardamom. (I like this option!) and just over 2/3 of the flour.
- Work the dough shiny and smooth, about 4 minutes with a machine or 8 minutes by hand.
- Add if necessary. additional flour but save at least 1 dl for baking.
- Let the dough rise covered (by a kitchen towel), about 30 minutes.
- Work the dough into the bowl and then pick it up on a floured workbench. Knead the dough smoothly. Divide the dough into 2 parts. Roll out each piece into a rectangular cake.
- Stir together the ingredients for the filling and spread it.
- Roll up and cut each roll into 24 pieces.
- Place them in paper molds or directly on baking paper with the cut surface facing up. Let them rise covered with a baking sheet, about 30 minutes.
- Brush the buns with beaten egg and sprinkle your chosen topping.
- Bake in the middle of the oven at 250 ° C, 5-8 minutes.
- Allow to cool on a wire rack under a baking sheet.
-
-
@ ff18165a:dd7ca7f0
2024-10-19 18:23:51Chef's notes
- DO NOT add too much Peppermint Extract! It’s extremely strong and it will make your milkshake way too strong if you add more than a few drops.
- Feel free to be creative with your toppings. We used Caramel Flavored Whipped Topping and it turned out great!
Details
- ⏲️ Prep time: 5 min
- 🍳 Cook time: 2 min
- 🍽️ Servings: 1
Ingredients
- 1 1/2 cup Milk
- 2 drops Peppermint Extract
- 2 packets Stevia
- 1 cup Ice
- 2 drops Green Food Coloring
- Green Sprinkles
- 1 Crushed Peppermint Candy
- 2 Mint Leaves
Directions
-
- Blend together until smooth and frothy
-
- Pour into a tall glass
-
- Top with listed toppings
-
- Add straw and enjoy
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 57d1a264:69f1fee1
2024-10-23 16:11:26Welcome back to our weekly
JABBB
, Just Another Bitcoin Bubble Boom, a comics and meme contest crafted for you, creative stackers!If you'd like to learn more, check our welcome post here.
This week sticker:
Bitcoin Students Network
You can download the source file directly from the HereComesBitcoin website in SVG and PNG.
The task
Starting from this sticker, design a comic frame or a meme, add a message that perfectly captures the sentiment of the current most hilarious take on the Bitcoin space. You can contextualize it or not, it's up to you, you chose the message, the context and anything else that will help you submit your comic art masterpiece.
Are you a meme creator? There's space for you too: select the most similar shot from the gifts hosted on the Gif Station section and craft your best meme... Let's Jabbb!
If you enjoy designing and memeing, feel free to check our JABBB archive and create more to spread Bitcoin awareness to the moon.
Submit each proposal on the relative thread, bounties will be distributed next week together with the release of next JABBB contest.
₿ creative and have fun!
originally posted at https://stacker.news/items/736536
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ cbaa0c82:e9313245
2024-10-01 11:04:45TheWholeGrain - #September2024
To start the second year of Bread and Toast off strong the September of 2024 includes five Sunday Singles, and the newest piece of cover art for a comic from Toast's Comic Collection includes a touch of color. Some bonus pieces of content were included this September. This includes one of the Political posts we all take so seriously, and a promotional piece for the upcoming npub10hj9rg5gds5x2gk0z0s2jlqnq04jg7g30aj2t5pqzdaaztfactgsnze5ny event coming up in October. The Concept Art released this month is an early design of a possible website logo. This month's Bitcoin Art stars End-Piece who is well informed on what money really is and asks the question, "Do you?"
September Sunday Singles
2024-09-01 | Sunday Single 055 Jump Rope https://i.nostr.build/ESlb23xVmTQLw7sw.png
2024-09-08 | Sunday Single 056 Trampoline https://i.nostr.build/1HNutqYQUjsA1JaG.png
2024-09-15 | Sunday Single 057 Hippity Hop https://i.nostr.build/5dTyLA0FJdK2rNol.png
2024-09-22 | Sunday Single 058 Jumping on the Bed https://i.nostr.build/PWaHDMroMjjfPmWS.png
2024-09-29 | Sunday Single 059 Shades https://i.nostr.build/pWeIZrttOjpcXAtz.png
Other Content Released in September 2024
2024-09-04 | Toast's Comic Collection Teenage Mutant Ninja Bread #5 Four brothers trained in ninjutsu live underneath the city and come up to the surface in order to save it! https://i.nostr.build/WPSB1qn2lMRlbdwJ.png
2024-09-10 | Politics Debate Night The first official debate between the candidates for Selection2024. https://i.nostr.build/wppFU8U3NJCww6U0.png
2024-09-11 | Concept Art Early Website Logo Design This is an early concept for a logo. It was never used. https://i.nostr.build/hxhzvtS4fCe0imNh.png
2024-09-18 | Bitcoin Art On Top of It End-Piece knows what money is. Do you? https://i.nostr.build/6TCWK5d1ynPhrteA.png
2024-09-27 | Nostr Valley Nostr Valley 001 Bread is getting prepared for NostrValley! Hope to see you there! https://i.nostr.build/nQqsPGmJ8hjvxROK.png
September Additions to The Bakery in 2024
2024-09-05 | npub1895dg7n47ldxxq8hyqj9h4xa3xwwxzpnn8lm7hydag4tck6cfj3qcmc4f0 https://m.primal.net/KgDW.jpg
2024-09-26 | npub1hcusg0xp9maamlh9vnv4mf635uwldsfeut00ghzrrjk7kjjh8j3sf9049l https://image.nostr.build/a0a64d709376b3650ebde0f3de5076748d69a999aef9e5fbd882574d5e64cf88.jpg
We hope you enjoyed this first issue of The Whole Grain. The Whole Grain will be released on the first of every month and will cover all of the content released by npub1ew4qeq576v3vz4gukeseknqghx3x4jtlld8ftys9amrca6f3xfzsrm8jpd in the previous month.
Thanks for checking it out, Bread, Toast, and End-Piece
BreadandToast #SundaySingle #ToastsComicCollection #ConceptArt #BitcoinArt #TheBakery #Bread #Toast #EndPiece #Art #Artstr #DigitalArt #Comic #Manga #NostrValley #NostrOnly #🖼️
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 96417ed9:66b02a55
2024-09-29 20:01:36Image this.
You are scrolling through your favorite social media. It’s probably been 10 minutes Scroll. Like. Repeat. Scroll. Like. Repeat. And so on and on and on.
Does it sound familiar to you? How many times did you find yourself in this situations? Most importantly, how much attention did you pay to the hundreds of posts that you liked? What can you actually remember?
Attention and likes
Recently, I took a communication class. I was very surprised when the teacher told me that the average attention span is around 7 seconds! This means that when you are looking at something or talking to someone, you are actually paying attention for the first 7 seconds. After that, something else has already captured your mind. And it's actually getting worse and worse. Why is that, you might wonder? Yeah, you got it right, social media.
The infinite amount of content that you can consume on social media continuously steals your attention. Thus, when you are looking to a post, your focus is already on the next piece of information, and on the one after and so on indefinetly. Finally, when you decide to leave a like to the first post, you are not actually remembering what you were looking at.
In this context, likes moved from being an appreciation for someone else's work to a simple mechanism that feeds the social media algorithm. From a measure of the value provided by a creator, they became an empty number. Liking a post is no more action, but a mere unconscious reflex. A like is something free, something that you can leave without any conscious effort, to anyone, to anything. Even to something that you actually do not like.
In the last years, likes stopped being a measure of value provided.
And then, zaps came.
Zaps and the value 4 value revolution
Since I am publishing this article on Nostr, I expect most of the reader to know what a zap is. However, for the nebies whom may come across my random thought, here is a brief explaination.
Zaps are a simple way to communicate appreciation. Whenever you like a photo, a thought, a video, you can zap the creator. Exactly as a like, you might say. But here is the deal. When you zap someone, you are actually sending them some amount of money! And not a simple type of money, but the scarcest type of money on earth: Bitcoin! Basically, if a creator provides value to a user the user can award the creator with some monetary value. Nowadays, this concept is quite common and known as value4value (v4v for short).
This is a revolution. Anyone can provide value. Thus, everybody should be able to earn value if something of value is provided , not only some super influencer with sponsors and affiliate programs
Zaps from the user perspective
I started this article by talking about attention, and how there is such a huge competition for it that no one is actually able to focus on something anymore. How does it connect to zaps?
Zaps allow users to regain their lost attention. Since zaps provide real monetary value to a creator, a user has to be 100% on focus on what he is reading or watching: "Is this picture/video/post providing me value?". You do not want to separate from you hard-earned sats for something useless. Unlike likes, zaps are not free. When you zap someone, it means that you have actually paid attention to the post and you are actually acting to signal your appreciation.
Zaps from the creator perspective
I am an amateur photographer. I love going around places and took hundreds of photos at everyhting that catches my curiosity. I posted more than a hundred pictures on Instagram and received even a decent amount of likes. However, I eventually started to wonder if likes came from a genuine appreciation of my work, or only from the aforementioned mechanical reflex.
This does not happen on Nostr. Whenever I am zapped, I instantly know that the appreciation is real. My God, someone really spent some time looking at my photos and decided to give me some real monetary value for that! I really provided value to someone! This is truly exciting.
The realization of this fact has been one of those "ah-ah" moments. Why should I spent my time posting pictures on a social media just to get likes, when someone can send me a chunk of the best money ever created?
And why should you?
-
@ c3f12a9a:06c21301
2024-10-23 17:59:45Destination: Medieval Venice, 1100 AD
How did Venice build its trade empire through collaboration, innovation, and trust in decentralized networks?
Venice: A City of Merchants and Innovators
In medieval times, Venice was a symbol of freedom and prosperity. Unlike the monarchies that dominated Europe, Venice was a republic – a city-state where important decisions were made by the Council of Nobles, and (the Doge, the elected chief magistrate of Venice who served as a ceremonial head of state with limited power), not an absolute ruler. Venice became synonymous with innovative approaches to governance, banking, and trade networks, which led to its rise as one of the most powerful trading centers of its time.
Decentralized Trade Networks
The success of Venice lay in its trust in decentralized trade networks. Every merchant, known as a patrician, could freely develop their trade activities and connect with others. While elsewhere trade was often controlled by kings and local lords, Venetians believed that prosperity would come from a free market and collaboration between people.
Unlike feudal models based on hierarchy and absolute power, Venetian trade networks were open and based on mutual trust. Every merchant could own ships and trade with the Middle East, and this decentralized ownership of trade routes led to unprecedented prosperity.
Story: The Secret Venetian Alliance
A young merchant named Marco, who inherited a shipyard from his father, was trying to make a name for himself in the bustling Venetian spice market. In Venice, there were many competitors, and competition was fierce. Marco, however, learned that an opportunity lay outside the traditional trade networks – among small merchants who were trying to maintain their independence from the larger Venetian patricians.
Marco decided to form an alliance with several other small merchants. Together, they began to share ships, crew costs, and information about trade routes. By creating this informal network, they were able to compete with the larger patricians who controlled the major trade routes. Through collaboration and shared resources, they began to achieve profits they would never have achieved alone.
In the end, Marco and his fellow merchants succeeded, not because they had the most wealth or influence, but because they trusted each other and worked together. They proved that small players could thrive, even in a market dominated by powerful patricians.
Satoshi ends his journey here, enlightened by the lesson that even in a world where big players exist, trust and collaboration can ensure that the market remains free and open for everyone.
Venice and Trust in Decentralized Systems
Venice was a symbol of how decentralization could lead to prosperity. There was no need for kings or powerful rulers, but instead, trust and collaboration among merchants led to the creation of a wealthy city-state.
Venice demonstrated that when people collaborate and share resources, they can achieve greater success than in a hierarchical system with a single central ruler.
A Lesson from Venice for Today's World
Today, as we think about the world of Bitcoin and decentralized finance (DeFi), Venice reminds us that trust among individuals and collaboration are key to maintaining independence and freedom. Just as in Venice, where smaller merchants found strength in collaboration, we can also find ways to keep the crypto world decentralized, open, and fair.
Key
| Term | Explanation | |------|-------------| | Doge | The elected chief magistrate of Venice who served as a ceremonial head of state with limited power. | | Patrician | A member of the noble class in Venice, typically involved in trade and governance. | | Decentralized Finance (DeFi) | A financial system that does not rely on central financial intermediaries, instead using blockchain technology and smart contracts. |
originally posted at https://stacker.news/items/737232
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ a012dc82:6458a70d
2024-10-23 15:23:26Table Of Content
-
The Origins of the Debate
-
The Rise of Bitcoin
-
HODLing: A Strategy to Weather the Storm
-
The Skepticism of Peter Schiff
-
The Bitcoin Community's Response
-
Conclusion
-
FAQ
In the world of finance, few debates have garnered as much attention as the showdown between Peter Schiff and Bitcoin. As an outspoken critic of the cryptocurrency, Peter Schiff, a well-known economist, has long been skeptical of its value and viability. However, as the Bitcoin market experienced unprecedented growth and adoption, the concept of "HODLing" emerged victorious. This article delves into the clash between Schiff and Bitcoin, exploring the reasons behind their differing views and ultimately highlighting how the strategy of HODLing prevailed.
The Origins of the Debate
It all began when Bitcoin, the first decentralized cryptocurrency, was introduced to the world in 2009. While many were intrigued by the concept of digital currency, Schiff expressed skepticism and voiced his concerns regarding its lack of intrinsic value. Schiff, a proponent of traditional investments like gold, believed that Bitcoin's meteoric rise was nothing more than a speculative bubble waiting to burst. This clash of ideologies set the stage for an ongoing battle between Schiff and Bitcoin enthusiasts.
The Rise of Bitcoin
Despite Schiff's reservations, Bitcoin steadily gained traction and captured the imagination of investors worldwide. Its decentralized nature, limited supply, and potential as a store of value attracted a growing number of individuals looking to diversify their portfolios. Bitcoin's disruptive technology and its ability to facilitate fast and secure transactions also played a significant role in its ascent.
HODLing: A Strategy to Weather the Storm
As Bitcoin's price exhibited volatility, a strategy emerged among its proponents: HODLing. This term, originating from a misspelling of "hold" in a Bitcoin forum post, refers to the practice of holding onto Bitcoin for the long term, irrespective of short-term market fluctuations. HODLers believed that Bitcoin's underlying technology and its potential to revolutionize the financial industry made it a worthwhile investment, regardless of temporary setbacks.
The Skepticism of Peter Schiff
While Bitcoin continued to surge in popularity, Peter Schiff remained steadfast in his skepticism. He argued that Bitcoin's lack of intrinsic value made it a speculative asset rather than a legitimate currency or store of wealth. Schiff often compared Bitcoin to gold, highlighting the tangible and historical significance of the precious metal. He warned investors of the potential risks associated with Bitcoin, emphasizing the possibility of a catastrophic collapse.
The Bitcoin Community's Response
Bitcoin enthusiasts fervently defended their chosen asset against Schiff's criticism. They pointed out that while Bitcoin may not possess intrinsic value like gold, its value is derived from its decentralized network, scarcity, and the trust placed in its underlying technology. They highlighted the benefits of Bitcoin's borderless transactions, low fees, and the potential for financial inclusion. The community also stressed that Bitcoin's volatility was merely a temporary characteristic during its early stages of adoption.
Conclusion
In the ultimate showdown between Peter Schiff and Bitcoin, the concept of HODLing emerged victorious. Despite Schiff's skepticism, Bitcoin's decentralized nature, technological innovation, and growing adoption propelled it forward. The strategy of HODLing, fueled by the belief in Bitcoin's long-term potential, allowed investors to weather the storm of market volatility. As the world continues to embrace digital currencies and explore the possibilities they offer, the clash between traditionalists and innovators will persist. The story of Peter Schiff vs Bitcoin serves as a testament to the ever-evolving landscape of finance.
FAQ
Is Bitcoin a reliable investment in the long term? Bitcoin's reliability as an investment depends on one's risk tolerance and long-term perspective. While it has exhibited significant growth, its volatility and regulatory uncertainties make it a speculative asset that carries inherent risks.
Can Bitcoin replace traditional forms of currency? Bitcoin's potential to replace traditional forms of currency is still highly debated. While it offers certain advantages, such as faster and cheaper cross-border transactions, widespread adoption and regulatory clarity would be necessary for it to become a mainstream currency.
How does HODLing differ from traditional investing? HODLing differs from traditional investing as it involves holding onto an asset for the long term, regardless of short-term market fluctuations. Traditional investing often involves active management, buying and selling based on market trends and analysis.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ bbb5dda0:f09e2747
2024-09-27 19:45:31Moving into Norway the nice, almost-alpine landscapes greeted me. Slowly however the mountains numbed down and fjords started appearing. I was nearing Trondheim, the most northern city in Norway that has something that resembles a high-way. Anything further north and you’re bound to 80km/h roads. Which isn’t a bad thing at all, given the views.
| | | | | --- | --- | --- | |
|
|
|
| | | --- | |
| | On the road to Trondheim |
I went pretty much straight to Trondheim because I got in touch with Lucas through an ex-colleague of mine (Thanks Niek ;)). I texted Lucas about a week before we met to see if he’d be up to go hiking somewhere in the Trondheim area. He said he was thinking about going North, waaaay North, in order to see the midnight sun and he wanted to do this the next weekend. This was around June 21st, the longest day of the year. I said it’d be cool to experience that and so that is just what we did. For those of you who don’t know, on June 21st the sun is right at the ‘Tropic of Cancer’ (‘Kreeftskeerkring’ in Dutch), the most northern position of the sun after which the summer slowly turns into winter again. In the period around this moment, the sun will NOT go below the horizon at all when you are above the arctic circle.
| | | | | --- | --- | --- | |
|
|
|
I’m glad Lucas has an electric car, because the round-trip would’ve cost me (whith my thirsty van) €333,-. Instead we spent less than €60,- for this 1200km round-trip. What a difference! So we left for the 9 hr drive on Friday-evening and camped out besides a lake next to the E6 highway, which runs all the way from the south to the north, which is over 3000(!) kilometers long.
| | | | | --- | --- | --- | |
We found this seemingly abandoned bus, what a beauty! |
|
Woke up to this view! | |
|
Time for a charging break in Mosjøen |
|
Because of a tunnel-closure we had to take this mountain-pass, not complaining here…
We moved on the next morning and had perfect weather, too perfect for Norway because it was just below 30 degrees Celsius. This hot weather reached well into the arctic circle, where we’d be hiking up a mountain to find a camp-spot with a view to the north. We parked the car and started to hike up the steep hill, we found a route online, but soon found out we missed the path shown on the map. We figured we would not backtrack but instead walk around the same height on the mountain to get back at that path. Long story short, that path didn’t exist (anymore). So we tried to get back at it but just couldn’t find it. Eventually we just followed the trail that was actually set out using red ‘T’-s that were painted on the rocks every 50-100 meters. It was quite a walk and the heat didn’t make it any easier.
A beginner mountaineer realizing he climbed the wrong mountain
| | | | | --- | --- | --- | |
After a near-death experience with mosquito’s, the Deet really saved us |
|
| |
|
|
Finally we reached our intended camp-spot |
After draining most of our energy we finally arrived at the place we wanted to camp for the night day, which was in front of a small lake and a bigger one which lied a bit lower. I don’t think I need to say much more about the beauty of the place when you can just look at the pictures below:
| | | | --- | --- | |
|
|
The ‘next’ day we hiked back, and tried to return using the ‘official’ path we wanted to hike in the first place, all in vain. It led us to hike some strange, steep and almost treacherous paths after which we decided it would be wise to just backtrack a little bit and get back to the (red) marked trail. We got back to the car safely after which we drove to the river that was just below the car park to take a refreshing dive before heading back south. We found a (safe) spot to take the dive in the river that was now raging because of the heavy snow-melt due to the extremely high temperatures. Lucas later told me that in some regions electricity was even free due to the surplus of hydro-electricity.
| | | | --- | --- | |
We had to walk over this |
|
We made a car-recharge stop at Mosjøen where we had a quick pizza-dinner. Just after leaving the parking-lot we saw a couple hitch-hikers who wanted to go to Trondheim just like us. We pulled over and took them with us, they were a couple from different south-eastern European countries and were touring around Europe and soon also the world. They shared some cool stories and told about their plans. When we got to Trondheim we dropped them off near their camping-spot and drove back to Lucas’s house. Quite tired I jumped back in my own bed in my own home. How nice is it to have your house with you (almost) everywhere… 🙂
I camped in front of his house for a couple days. To be honest I didn’t do much those days as I was pretty much drained from experiencing all kinds of different things back-to-back for over a month now. I used this time to work a bit on the official stuff for my own freelance IT company which I started, I finally got a bank-account approved after 3 weeks of waiting, which allowed me to manage some of the essential setup-things and book-keeping. After these formalities I took a bit of time to head into the city-center, of course using my folding bike like a real Dutchie. And since Trondheim is a hilly city, biking downhill from Lucas’s house was a blast but going back up was quite the struggle with these tiny wheels, but it all worked out… That same night a thunderstorm was rolling in and sitting on top of a hill in a campervan, with lightning striking the ground at less than 100 meters away from the van was a new thing for me. I guess this too is part of the ‘living closer to nature’ thing…
I’m very thankful for the experiences and the hospitality of the people I meet along the way. It was very much fun to make this trip together! It’s the people that make the journey…
| | | | | --- | --- | --- | |
|
|
|
| | | | --- | --- | |
|
|
-
@ 8d34bd24:414be32b
2024-10-23 15:30:53Check out earlier posts in God Makes Himself Known series:
-
God Demonstrates His Power: Part 1 (Egypt)
-
God Defends His Honor: Part 2 (Phillistines)
-
The One True God: Part 3 (Who deserves worship)
-
Jesus is God: Part 4 (Jews & Gentiles)
Throughout history, God has shown His power and glory at different times and different places and to different people, but never shown it to everyone at once. The time is coming when God will show His power, glory, and judgement to all mankind.
But we do not want you to be uninformed, brethren, about those who are asleep, so that you will not grieve as do the rest who have no hope. For if we believe that Jesus died and rose again, even so God will bring with Him those who have fallen asleep in Jesus. For this we say to you by the word of the Lord, that we who are alive and remain until the coming of the Lord, will not precede those who have fallen asleep. For the Lord Himself will descend from heaven with a shout, with the voice of the archangel and with the trumpet of God, and the dead in Christ will rise first. Then we who are alive and remain will be caught up together with them in the clouds to meet the Lord in the air, and so we shall always be with the Lord. (1 Thessalonians 4:13-17) {emphasis mine}
God’s first end times miracle will be the rapture of the church. All true believers (dead & alive) will be taken out of this world, given new, perfect, eternal bodies, and join Jesus in paradise. The world will see these Christians disappear. They will be there one moment and gone the next.
I always thought it strange, that after the Bible’s prophecies of the church being raptured, that most people would not believe God had removed His followers. I think something (maybe fallen angels pretending to be aliens who have rescued mankind) will make people not get panicked about millions of Christians all disappearing in an instant. Maybe it will be solely based on people’s hard hearts and their unwillingness to consider an unpleasant thought (that they were left behind), but life will go on.
The Bible makes it sound like there will be a short time of disarray, but then a man will come who make peace for a time (the Anti-Christ). After 3.5 years, things will get worse than they have ever been in the history of mankind.
The 7 Seals
In the end times, the world will experience unfathomably hard times. At first everything that happens will be things that have happened before, just worse. In Revelation 6, we see each of the 7 seals opened:
-
White Horse = Conquering
-
Red Horse = Takes away peace so men slay one another
-
Black Horse = Famine
-
Pale (Ashen) Horse = A quarter of the earth killed by war, famine, pestilence, and animals.
-
Those who trust in Jesus are martyred.
-
Awesome, terrifying natural disasters:\ — A great earthquake,\ — the sun becomes black,
— the moon becomes like blood,\ — the stars fall to earth,\ — the sky is split like a scroll,\ — every mountain & island moved out of its place,\ — everyone from kings to slaves hide in fear due to the wrath of the Lord.
The 7 Trumpets
The opening of the 7th Seal leads to the 7 trumpets which are more terrifying than the first 6 seals and in faster succession. These miraculous signs of God’s wrath are beyond anything mankind has ever experienced and to a degree never experienced. First there is a half hour of silence and reprieve before the sounding of the trumpets in Revelation 8 & 9:
-
Hail & fire, mixed with blood, fall to earth and “a third of the earth was burned up, and a third of the trees were burned up, and all the green grass was burned up.” This burning will likely destroy crops and kill livestock causing famine.
-
“something like a great mountain burning with fire [asteroid?] was thrown into the sea; and a third of the sea became blood, and a third of the creatures which were in the sea and had life, died; and a third of the ships were destroyed.” A mountain sized asteroid would cause terrible tsunamis. The death of a third of the sea creatures will cause worse famine. The destruction of a third of the ships will cause a disruption in international trade leading to shortages and prices skyrocketing.
-
“a great star [comet?] fell from heaven, burning like a torch, and it fell on a third of the rivers and on the springs of waters.” A third of the waters of earth are poisoned. If you don’t have clean water, you die. People will be dying of thirst and of drinking the poisoned waters out of desperation.
-
“a third of the sun and a third of the moon and a third of the stars were struck, so that a third of them would be darkened.” The world will experience fearful darkness. Sinful man hid their evil deeds under the cover of darkness and will now experience darkness that they don’t want.
-
A “star from heaven” (most likely a fallen angel) falls to earth with the key to the bottomless pit and “smoke went up out of the pit, like the smoke of a great furnace; and the sun and the air were darkened by the smoke of the pit. Then out of the smoke came locusts [fallen angels that procreated with women: see Genesis 6] upon the earth.” These “locusts” will torment those who reject God and are forbidden from harming the remaining plants. The torment will last 5 months and will be so bad that people will desperately want to die.
-
Four angels will “kill a third of mankind.” Death comes through an army of 200 million that kills with “fire and smoke and brimstone” that comes out of their mouths. The fourth seal resulted in the death of a quarter of mankind. The sixth trumpet will then lead to an additional third of mankind dying.
The 2 Witnesses
God’s wrath will be unimaginably bad, but God still cares and he sends two witnesses to witness to the world to make sure that every person on earth has the opportunity to repent and turn to God. Many will, but many more will reject God despite His miraculous judgements upon them.
And I will grant authority to my two witnesses, and they will prophesy for twelve hundred and sixty days, clothed in sackcloth.” These are the two olive trees and the two lampstands that stand before the Lord of the earth. And if anyone wants to harm them, fire flows out of their mouth and devours their enemies; so if anyone wants to harm them, he must be killed in this way. These have the power to shut up the sky, so that rain will not fall during the days of their prophesying; and they have power over the waters to turn them into blood, and to strike the earth with every plague, as often as they desire. (Revelation 11:3-6) {emphasis mine}
God’s two witnesses will:
-
Prophecy
-
Shoot flames out of their mouths to devour those who want to harm them
-
Stop the rain as judgement
-
Turn water into blood
-
Strike the earth with every plague
After 1260 days, God will allow:
-
The beast to kill them
-
Their bodies lie in the streets watched by the world as the world celebrates
But after 3.5 days, the witnesses will be raised from the dead in the view of every person on earth and be raised in the air up to heaven. God’s unmistakable power will be demonstrated in a way that there will not be any excuse for any person to reject Him as God and Creator.
And in that hour there was a great earthquake, and a tenth of the city fell; seven thousand people were killed in the earthquake, and the rest were terrified and gave glory to the God of heaven. (Revelation 11:13)
At this point the unholy trinity (Satan always copies God because he can’t create anything himself) will rule the world and will begin to seriously persecute all those who have believed in Jesus and trusted Him as savior.
Amazingly, after all that God has demonstrated, the majority of people will worship the Anti-Christ rather than their creator who is the one, true God.
Additional Witnesses
As if the two witnesses that are seen by every person on earth is not enough, God sends other witnesses. He makes sure that every person truly knows who He is, what everyone is expected to do, and the consequences of refusing.
First God marks 144,000 Jews, 12,000 from every tribe, to be witnesses throughout the world. Then God sends an angel up in the sky to witness:
And I saw another angel flying in midheaven, having an eternal gospel to preach to those who live on the earth, and to every nation and tribe and tongue and people; and he said with a loud voice, “Fear God, and give Him glory, because the hour of His judgment has come; worship Him who made the heaven and the earth and sea and springs of waters.” (Revelation 14:6-7)
He sends a second angel to warn that Babylon the Great has fallen. He then sends a third angel to give warning to people against following the Beast (Anti-Christ) or receiving his mark.
“If anyone worships the beast and his image, and receives a mark on his forehead or on his hand, he also will drink of the wine of the wrath of God, which is mixed in full strength in the cup of His anger; and he will be tormented with fire and brimstone in the presence of the holy angels and in the presence of the Lamb. And the smoke of their torment goes up forever and ever; they have no rest day and night, those who worship the beast and his image, and whoever receives the mark of his name.” (Revelation 14:9b-11) {emphasis mine}
Most of those who believe and are saved during the seven year tribulation will be martyred, but they are promised “rest from their labors” and that “their deeds follow with them”:
… “Blessed are the dead who die in the Lord from now on!’ ” “Yes,” says the Spirit, “so that they may rest from their labors, for their deeds follow with them.” (Revelation 14:13b)
The 7 Bowls
The final miracles that show the wrath of God against those who refuse to trust in Him come in the 7 bowls (or vials). These are poured out in very rapid succession, probably hours or a few days.
-
“… a loathsome and malignant sore on the people who had the mark of the beast and who worshiped his image.” (Revelation 16:2b)
-
“the sea … became blood like that of a dead man; and every living thing in the sea died.” (Revelation 16:3b) Notice that this blood isn’t like the other instances where it is like fresh blood. This blood is “like that of a dead man.” Every creature in the sea died, and I’m sure caused a rotting, putrid mess that smelled of death.
-
“… rivers and the springs of waters … became blood.” (Revelation 16:4b) God gave those who had murdered the prophets blood as the only thing they could drink, as a just punishment.
-
“… the sun … was given to it to scorch men with fire.” (Revelation 16:8b)
-
“… his *[the beast’s*] kingdom became darkened; and they gnawed their tongues because of pain.” (Revelation 16:10b) [clarification mine]
-
“… the Euphrates … water was dried up, so that the way would be prepared for the kings from the east.” (Revelation 16:12b)
-
“… a loud voice came out of the temple from the throne, saying, “It is done.” (Revelation 16:17b) and “… there was a great earthquake, such as there had not been since man came to be upon the earth …” (Revelation 16:18b) “And every island fled away, and the mountains were not found. And huge hailstones, about one hundred pounds each, came down from heaven upon men. …” (Revelation 16:20-21a)
More than half of the population of earth will be killed during the tribulation. Some will repent and turn to God, but then pay with their lives. Others will willfully disobey and reject God and refuse to submit to Him despite knowing who He is and why He should be worshipped. God will have shared His mercy and then His wrath in order to turn people back to Him, but too many will be hard hearted and reject Him. They will be guilty and every punishment they receive will be well deserved. Justice will ultimately be served.
The 4 Hallelujahs
Right before the end the whole earth will hear the voice of a great multitude in heaven saying:
“Hallelujah! Salvation and glory and power belong to our God; because His judgments are true and righteous; for He has judged the great harlot who was corrupting the earth with her immorality, and He has avenged the blood of His bond-servants on her.” And a second time they said, “Hallelujah! Her smoke rises up forever and ever.” And the twenty-four elders and the four living creatures fell down and worshiped God who sits on the throne saying, “Amen. Hallelujah!” And a voice came from the throne, saying, “Give praise to our God, all you His bond-servants, you who fear Him, the small and the great.” Then I heard something like the voice of a great multitude and like the sound of many waters and like the sound of mighty peals of thunder, saying, “Hallelujah! For the Lord our God, the Almighty, reigns. (Revelation 19:4-6) {emphasis mine}
The 2nd Coming of Jesus
Last of all is the greatest moment in all of history when Jesus returns to earth as Lord and King to claim His own and to judge those who rejected Him and lived evil lives.
And I saw heaven opened, and behold, a white horse, and He who sat on it is called Faithful and True, and in righteousness He judges and wages war. His eyes are a flame of fire, and on His head are many diadems; and He has a name written on Him which no one knows except Himself. He is clothed with a robe dipped in blood, and His name is called The Word of God. (Revelation19:11-13)
The most magnificent man who ever lived, the eternal, creator God comes down from heaven in the sight of all with all of His followers behind Him dressed in white, but all those, both man and angel, who refused to worship Him and submit to Him decide to line up for battle against Him. They somehow think they have a chance against the very one who upholds their life with the power of His mind. All of the men who took the mark of the beast will line up for battle against their creator.
The Millennium
Of course these rebels have no chance. The beast and false prophet are thrown into the lake of fire. The rest are destroyed by the sword in the mouth of Jesus while His followers watch, never having to lift a hand or dirty their white attire. Satan is bound for a thousand years and Jesus reigns over all of the earth for a thousand years on earth fulfilling the promises to Abraham, Isaac, Jacob, Moses, Joshua, David, and everyone else in the Bible. There will be a thousand years without the evil influences of Satan and his fallen angels. What a wonderful time that will be, but sadly, not all will fully submit to the perfect, sinless, creator God and one more moment of glory will be shown before the earth is burned with fire.
Judgement Throne of God
At the end of 1,000 years, there will be one more rebellion when Satan is released.
I used to think it strange that God would allow Satan to be released again to mislead, but I think it is a test to expose those who are not really trusting in Jesus. During the millennial reign, there will not be much outright sin, but not all will follow with all their heart, mind, soul, and strength. Many will be going through the motions. They will be going along to stay out of trouble, but not because their hearts are following Jesus. When temptation comes along, many will turn away from God again into judgment. Satan will gather people from all the nations to surround the saints, but God will send fire down from heaven to devour all of the rebels
And the devil who deceived them was thrown into the lake of fire and brimstone, where the beast and the false prophet are also; and they will be tormented day and night forever and ever. (Revelation 20:10)
Great White Throne Judgement
In the end, everyone that rejected Jesus will have their lives judged at the Great White Throne.
And I saw the dead, the great and the small, standing before the throne, and books were opened; and another book was opened, which is the book of life; and the dead were judged from the things which were written in the books, according to their deeds. (Revelation 20:12)
We are all sinners and do not want to be given what we deserve. We want God’s grace. Those who had trusted Jesus before the tribulation were judged by Jesus to determine their rewards. Those who rejected Jesus will be judged at the Great White Throne Judgement and will experience the just wrath of our holy, creator God. I hope you will be one of those who trust Jesus, otherwise you will receive your just punishment:
And if anyone’s name was not found written in the book of life, he was thrown into the lake of fire. (Revelation 20:15)
By the end every person who has ever lived on earth will know who God is and will understand how much they have failed Him. Every knee will bow — whether in awe or in terror.
God made Himself known through His creation. God made Himself known through His blessings. God made Himself known by coming to earth to die for mankind to take away our sins. God made Himself known through His written word. God made Himself known through His wrath. Nobody can reject Him and claim they did not know.
Trust Jesus.\ \ your sister in Christ,
Christy
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
-
@ 4ba8e86d:89d32de4
2024-10-23 13:28:09Ele possibilita o compartilhamento seguro de arquivos e mensagens entre dispositivos próximos em uma rede Wi-Fi local, sem a necessidade de uma conexão com a Internet.
O LocalSend é um aplicativo de plataforma cruzada que utiliza uma API REST e criptografia HTTPS para garantir a segurança da comunicação. Diferentemente de outros aplicativos de mensagens que dependem de servidores externos, o LocalSend não requer acesso à Internet ou servidores de terceiros.
Para assegurar a máxima segurança, o LocalSend utiliza um protocolo de comunicação seguro em que todos os dados são enviados por HTTPS, e um certificado TLS/SSL é gerado instantaneamente em cada dispositivo durante a comunicação.
https://f-droid.org/pt_BR/packages/org.localsend.localsend_app/
https://github.com/localsend/localsend
-
@ 4ba8e86d:89d32de4
2024-10-23 12:46:23Desenvolvido pelo Tor Project, o OnionShare é um projeto de código aberto que visa proteger a privacidade dos usuários durante o compartilhamento de arquivos.
Criado em 2014 por Micah Lee, um desenvolvedor de software e ativista de privacidade, o OnionShare surgiu como uma solução para compartilhamento seguro e anônimo de arquivos pela rede Tor. O OnionShare faz parte do desenvolvimento contínuo do Tor Project, a mesma equipe responsável pelo navegador Tor. Micah Lee reconheceu a necessidade de uma solução que respeitasse os princípios e valores da rede Tor, fornecendo privacidade aos usuários. O OnionShare utiliza serviços ocultos do Tor para criar servidores web temporários com endereços .onion exclusivos, permitindo que os arquivos compartilhados sejam acessados apenas pela rede Tor. Desde o seu lançamento, o OnionShare tem sido aprimorado e atualizado pela comunidade de desenvolvedores do Tor Project, garantindo a compatibilidade contínua com os princípios e protocolos da rede Tor. A ferramenta tornou-se amplamente reconhecida como uma opção confiável para compartilhamento de arquivos com privacidade e segurança, sendo usada por jornalistas, ativistas e pessoas preocupadas com a privacidade em todo o mundo.
Como funciona o OnionShare:
-
Geração do endereço .onion: Ao iniciar o OnionShare, a ferramenta gera um endereço .onion exclusivo para o compartilhamento dos arquivos. Esse endereço é composto por uma sequência de caracteres aleatórios que serve como identificador único para os arquivos compartilhados.
-
Configuração do servidor web temporário: O OnionShare cria um servidor web temporário no dispositivo do usuário, permitindo que os arquivos sejam acessados por meio desse servidor. O servidor web temporário está vinculado ao endereço .onion gerado.
-
Compartilhamento do endereço .onion: O usuário pode compartilhar o endereço .onion gerado com as pessoas que desejam acessar os arquivos compartilhados. Isso pode ser feito por meio de mensagens, e-mails ou qualquer outro canal de comunicação.
-
Acesso aos arquivos compartilhados: As pessoas que receberem o endereço .onion podem usar o navegador Tor para se conectar à rede Tor. Ao inserir o endereço .onion em seu navegador Tor, elas serão direcionadas ao servidor web temporário do OnionShare.
-
Download dos arquivos: Uma vez que a pessoa tenha acesso ao servidor web temporário por meio do endereço .onion, ela poderá visualizar e baixar os arquivos compartilhados. O OnionShare permite que os arquivos sejam transferidos diretamente do dispositivo do remetente para o dispositivo do destinatário, garantindo a privacidade e a segurança dos dados durante a transferência.
-
Encerramento do compartilhamento: O OnionShare permite definir uma duração específica para o compartilhamento dos arquivos. Após o período especificado, o servidor web temporário é desativado e os arquivos não estarão mais disponíveis para download.
É importante destacar que o OnionShare utiliza a rede Tor para criptografar as comunicações e garantir a privacidade dos usuários. Ele fornece uma camada adicional de segurança, permitindo que os arquivos sejam compartilhados diretamente entre os dispositivos dos usuários, sem a necessidade de intermediários ou serviços de armazenamento em nuvem.
O OnionShare resolve diversos problemas relacionados ao compartilhamento de arquivos, fornecendo uma solução segura e anônima.
-
Privacidade: Ao utilizar o OnionShare, os usuários podem compartilhar arquivos de forma privada e segura. A criptografia e a tecnologia da rede Tor garantem que apenas as pessoas com o endereço .onion específico possam acessar os arquivos compartilhados, mantendo a privacidade dos dados.
-
Anonimato: O OnionShare utiliza a rede Tor, que ajuda a ocultar a identidade dos usuários e a proteger sua localização. Isso permite que os usuários compartilhem arquivos anonimamente, sem revelar sua identidade ou localização geográfica aos destinatários.
-
Segurança dos dados: O OnionShare oferece uma forma segura de compartilhar arquivos, evitando a interceptação e a violação dos dados durante a transferência. A criptografia ponto a ponto e a natureza temporária do servidor web garantem que apenas os destinatários pretendidos tenham acesso aos arquivos compartilhados.
-
Contornar a censura e a vigilância: Através do uso da rede Tor, o OnionShare permite contornar a censura e a vigilância online. A criptografia e a rota de tráfego do Tor ajudam a evitar que terceiros, como governos ou provedores de serviços de internet, monitorem ou restrinjam o acesso aos arquivos compartilhados.
-
Eliminação de intermediários: Com o OnionShare, os arquivos são transferidos diretamente entre os dispositivos do remetente e do destinatário, sem a necessidade de intermediários ou serviços de armazenamento em nuvem. Isso reduz o risco de violações de privacidade ou acessos não autorizados aos arquivos compartilhados.
-
Facilidade de uso: O OnionShare foi projetado para ser uma ferramenta fácil de usar, mesmo para usuários não técnicos. Com uma interface simples, os usuários podem gerar endereços .onion e compartilhar os arquivos de forma conveniente, sem a necessidade de conhecimentos avançados de tecnologia.
O OnionShare resolve problemas relacionados à privacidade, anonimato, segurança dos dados e censura, oferecendo uma maneira confiável e acessível de compartilhar arquivos de forma segura e anônima pela rede Tor. É uma solução simples e eficaz para proteger a privacidade dos usuários durante as transferências de arquivos.
https://onionshare.org/
https://github.com/onionshare/onionshare
-
-
@ 4ba8e86d:89d32de4
2024-10-23 15:19:11Para ajudar a contornar a censura da Internet em locais onde o acesso ao Tor é bloqueado. Ele é uma espécie de ponte do Tor que permite que os usuários se conectem à rede Tor por meio de um sistema distribuído de voluntários.
A história do Snowflake começou em 2019, quando o Tor Project percebeu que muitas pessoas em locais com restrições de acesso à Internet estavam recorrendo a soluções de VPN e proxies para contornar a censura. No entanto, muitas dessas soluções eram bloqueadas pelas autoridades governamentais, o que criou a necessidade de encontrar novas maneiras de contornar a censura. Foi aí que surgiu a ideia do Snowflake, que foi lançado como uma solução para ajudar a aumentar a capacidade do Tor de contornar a censura da Internet em todo o mundo.
O Snowflake funciona por meio de um sistema distribuído de voluntários que oferecem seus proxies para ajudar a contornar a censura. Quando um usuário se conecta ao Snowflake, seu tráfego é roteado por meio de um conjunto de proxies voluntários que se oferecem para ajudar a contornar a censura. Esses proxies são distribuídos em todo o mundo, o que ajuda a garantir que haja sempre uma opção disponível para os usuários que desejam acessar a Internet livremente.
O Snowflake resolve o problema de acesso à Internet em locais onde o acesso ao Tor é bloqueado. Ele permite que os usuários contornem a censura e a vigilância da Internet, acessando sites e aplicativos que seriam bloqueados em suas regiões. Com o Snowflake, os usuários podem navegar na Internet com mais privacidade e segurança, evitando serem detectados pelos censores da Internet.
"A privacidade é necessária para uma sociedade aberta na era eletrônica. Privacidade não é sigilo. Uma sociedade livre requer privacidade na comunicação, bem como privacidade na busca e na associação." - Eric Hughes
https://snowflake.torproject.org/
https://youtu.be/ZC6GXRJOWmo
-
@ 23acd1fa:0484c9e0
2024-10-23 09:21:33Chef's notes
Cocoa powder: You can use 100% natural unsweetened cocoa powder or Dutch-processed cocoa powder – both work well.
Gluten free flour: There are many different gluten free flours on the market. I tested this recipe using White Wings All Purpose Gluten Free flour. I recommend choosing a gluten free flour that says it can be subbed 1:1 for regular plain or all purpose flour.
*Chocolate chips: Double check your chocolate chips are gluten free if you are making this brownie for someone who is celiac.
Cook times: Cook times will vary depending on your oven, but you’ll know these brownies are done when they firm up around the edges and no longer wobble in the middle. Keep in mind they will continue to cook slightly as they cool. You can also check they’re done by inserting a skewer into the middle of the brownie. If the skewer emerges with only a few crumbs on it, they’re ready. If it is covered in wet, gooey batter, keep baking the brownies and check them in another 5 minutes.
Storage: Brownies will keep well in an airtight container at room temperature or in the fridge for up to 5 days. To serve warm, microwave each brownie for 20 seconds. You can also freeze these brownies to enjoy at a later date. Simply thaw at room temperature and then microwave if you prefer them warm.
Serving Size: 1 brownie Calories: 278 Sugar: 26.4 g Sodium: 22.9 mg Fat: 15.5 g Carbohydrates: 34.1 g Protein: 3 g Cholesterol: 77.3 mg Nutrition information is a guide only.
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 35 min
- 🍽️ Servings: 12
Ingredients
- 170 grams (3/4 cup) unsalted butter, melted
- 200 grams (1 cup) caster sugar or granulated sugar
- 90 grams (1/2 cup) brown sugar
- 1 teaspoon vanilla extract
- 3 large eggs
- 40 grams (1/2 cup) cocoa powder
- 70 grams (1/2 cup) gluten free plain or all purpose flour
- 75 grams milk or dark chocolate chips*
Directions
- Preheat the oven to 180 C (350 F) standard / 160 C (320 F) fan-forced. Grease and line an 8-inch square pan with baking or parchment paper, ensuring two sides overhang.
- In a large mixing bowl, add melted butter and sugars and gently whisk together. Add vanilla extract and stir.
- Add the eggs, one at a time, stirring in-between, then sift in the cocoa powder and flour. Stir until just combined. Add chocolate chips.
- Pour the brownie batter in the prepared pan and place in the oven. Bake brownies for approximately 30-35 minutes or until they no longer wobble in the middle.
- Leave brownie in pan and transfer to a wire rack to cool completely. These brownies are quite fragile so if you can, transfer to the fridge for an hour before cutting into squares to serve.
-
@ 9349d012:d3e98946
2024-10-23 04:10:25Chef's notes
Ingredients
4 tablespoons (1/2 stick) butter 2 ounces thinly sliced prosciutto, cut into thin strips 1 1/4 cups orzo (about 8 ounces) 3 cups low-salt chicken broth 1/2 teaspoon (loosely packed) saffron threads, crushed 1 pound slender asparagus, trimmed, cut into 1/2-inch pieces 1/4 cup grated Parmesan cheese Parmesan cheese shavings
Preparation
Melt 2 tablespoons butter in large nonstick skillet over medium-high heat. Add prosciutto and sauté until almost crisp, about 3 minutes. Using slotted spoon, transfer to paper towels to drain. Melt 2 tablespoons butter in same skillet over high heat. Add orzo; stir 1 minute. Add broth and saffron; bring to boil. Reduce heat to medium-low, cover, and simmer until orzo begins to soften, stirring occasionally, about 8 minutes. Add asparagus; cover and simmer until tender, about 5 minutes. Uncover; simmer until almost all liquid is absorbed, about 1 minute. Remove from heat. Mix in prosciutto and 1/2 cup grated cheese. Season to taste with salt and pepper. Transfer to large bowl. Garnish with Parmesan shavings. Makes 6 servings.
Details
- ⏲️ Prep time: 30
- 🍳 Cook time: 30
Ingredients
- See Chef’s Notes
Directions
- See Chef’s Notes
-
@ 4ba8e86d:89d32de4
2024-10-23 00:52:22é um software de código aberto gratuito que permite aos usuários reproduzir diversos tipos de mídia, incluindo vídeos, música e podcasts, em vários sistemas operacionais, incluindo Windows, MacOS e Linux. Além disso, o VLC também está disponível para dispositivos móveis, incluindo smartphones e tablets com Android e iOS. O programa foi desenvolvido pela organização sem fins lucrativos VideoLAN e é utilizado por milhões de usuários em todo o mundo.
O desenvolvimento do VLC começou em 1996, como um projeto acadêmico liderado por estudantes da École Centrale Paris, na França. O objetivo era criar um software de streaming de vídeo que pudesse ser usado em uma rede de campus. O projeto evoluiu ao longo dos anos e se tornou um software de código aberto que permite a reprodução de diversos tipos de mídia. O VLC foi criado por Jean-Baptiste Kempf e é desenvolvido por uma equipe de voluntários em todo o mundo. Desde sua criação, o programa passou por várias versões e continua a ser atualizado regularmente para garantir sua compatibilidade com as últimas tecnologias e sistemas operacionais.
O VLC é um reprodutor de mídia que suporta uma ampla variedade de formatos de arquivo, incluindo MPEG-1, MPEG-2, MPEG-4, DivX, MP3, Ogg e muito mais. O programa é capaz de ler arquivos locais de mídia armazenados no seu computador ou no seu dispositivo móvel, bem como reproduzir mídia a partir de uma rede local ou da internet.
O VLC funciona como um software autônomo e não requer a instalação de codecs adicionais para a reprodução de arquivos de mídia. Ele vem com uma ampla variedade de codecs integrados, que permitem a reprodução de diversos formatos de arquivo sem a necessidade de instalar codecs adicionais.
O VLC resolve vários problemas relacionados à reprodução de mídia. Um dos principais problemas que o VLC resolve é a incompatibilidade de formatos de arquivo. Com o VLC, você pode reproduzir quase todos os tipos de arquivos de mídia, sem precisar se preocupar em instalar codecs adicionais ou software de conversão de arquivo.
O VLC também resolve problemas de segurança. O programa é capaz de reproduzir arquivos de mídia criptografados e suporta vários protocolos de segurança de rede, incluindo HTTPS e RTSP sobre TLS.
O VLC é uma opção confiável e eficiente para a reprodução de mídia em diversos sistemas operacionais. Ele é gratuito e de código aberto, o que significa que você pode personalizá-lo para atender às suas necessidades específicas e verificar seu código-fonte para garantir sua transparência e segurança.
O VLC é um programa leve e fácil de usar que oferece vários recursos avançados, incluindo a capacidade de reproduzir mídia em rede com segurança, equalizador de áudio, suporte a legendas e muito mais. Além disso, o VLC é uma ótima opção para quem quer reproduzir mídia em um dispositivo mais antigo, pois é capaz de rodar em sistemas operacionais mais antigos e em computadores com recursos limitados.
O VLC também é conhecido por sua estabilidade e capacidade de lidar com arquivos de mídia danificados ou incompletos. Ele é capaz de reparar arquivos de mídia corrompidos e reproduzir arquivos incompletos, permitindo que os usuários assistam a vídeos ou ouçam músicas que não funcionariam em outros reprodutores de mídia.
O VLC é um programa altamente personalizável, com uma variedade de opções de configuração disponíveis para os usuários. É possível personalizar a interface do usuário, configurar teclas de atalho personalizadas e muito mais. Isso torna o VLC uma opção ideal para usuários avançados que desejam ajustar o programa às suas necessidades específicas.
O VLC é um reprodutor de mídia altamente eficiente e confiável que permite aos usuários reproduzir diversos tipos de mídia em vários sistemas operacionais. Ele é gratuito, de código aberto e altamente personalizável, tornando-o uma opção popular entre usuários avançados e iniciantes.
Com sua ampla compatibilidade de arquivo, recursos avançados e estabilidade, o VLC é uma excelente escolha para quem procura um reprodutor de mídia simples e eficiente.
https://www.videolan.org/vlc/
https://github.com/videolan
-
@ 75d12141:3458d1e2
2024-10-23 00:20:14Chef's notes
A childhood favorite of mine! Just don't go too crazy with the scallions as you don't want to overpower the pork flavor.
Details
- ⏲️ Prep time: 15
- 🍳 Cook time: 15-20 mins
- 🍽️ Servings: 3-5
Ingredients
- 1 pound of lean ground pork
- 1 tablespoon of diced scallions
- Ground black pepper (optional)
Directions
- Lightly coat your palms with olive oil to prevent the meat from sticking to you and to assist in keeping its ball form
- Mix the ground pork and diced scallions in a large bowl
- Roll the pork into the preferred portion size until it feels like it won't fall apart
- Cook in a skillet for 15-20 mins
-
@ 4ba8e86d:89d32de4
2024-10-23 00:11:19Ele permite que os usuários descubram, baixem e instalem aplicativos em seus dispositivos Android sem depender da Google Play Store, que é a loja de aplicativos padrão do Android.
História do F-Droid
O F-Droid foi lançado em 2010 por um grupo de desenvolvedores liderados por Ciaran Gultnieks. A ideia por trás do projeto era criar uma alternativa de código aberto para a Google Play Store, que é uma plataforma centralizada controlada por uma única empresa. O F-Droid foi desenvolvido como um catálogo de aplicativos que só inclui aplicativos de código aberto que podem ser baixados e instalados gratuitamente.
Desde o lançamento, o F-Droid cresceu significativamente e agora oferece mais de 3.500 aplicativos de código aberto para Android, com uma ampla gama de categorias, incluindo jogos, educação, produtividade, privacidade e segurança. O projeto é mantido por uma comunidade de desenvolvedores voluntários e é executado sem fins lucrativos.
Os problemas que o F-Droid resolve
O F-Droid resolve vários problemas associados à Google Play Store e outras lojas de aplicativos. O primeiro é o controle centralizado de uma única empresa. A Google Play Store pode remover aplicativos que violem suas políticas, e os desenvolvedores podem ser impedidos de distribuir aplicativos por meio da loja por motivos arbitrários. O F-Droid, por outro lado, é administrado por uma comunidade sem fins lucrativos e não há restrições sobre quais aplicativos podem ser incluídos no catálogo.
Além disso, o F-Droid oferece uma alternativa para os usuários preocupados com a privacidade que não querem depender dos serviços da Google. O F-Droid é independente do Google Play Services e não rastreia os usuários ou coleta informações pessoais, tornando-se uma escolha atraente para aqueles que buscam maior privacidade.
Por que usar o F-Droid?
Há várias razões pelas quais você pode querer usar o F-Droid em vez da Google Play Store ou outras lojas de aplicativos. Aqui estão algumas delas:
-
Privacidade: Como mencionado anteriormente, o F-Droid é independente do Google Play Services e não rastreia os usuários. Isso significa que você pode baixar e instalar aplicativos sem se preocupar com a coleta de dados pessoais.
-
Segurança: O F-Droid oferece apenas aplicativos de código aberto e de software livre, o que significa que a comunidade pode examinar o código-fonte para garantir que não haja vulnerabilidades ou backdoors mal-intencionados.
-
Controle: O F-Droid permite que os usuários controlem seus próprios dispositivos Android e decidam quais aplicativos são instalados e atualizados.
-
Escolha: O F-Droid oferece uma ampla gama de aplicativos de código aberto e de software
Também é importante observar que nem todos os aplicativos disponíveis no F-Droid são completamente livres de riscos. Portanto, é sempre recomendável ler cuidadosamente as informações sobre o aplicativo e avaliar os riscos antes de baixá-lo e instalá-lo.
Aqui está o passo a passo para instalar o F-Droid em seu dispositivo Android:
-
Acesse o site oficial do F-Droid em https://f-droid.org/ usando um navegador da web no seu dispositivo Android.
-
Verifique a assinatura PGP do arquivo APK que você irá baixar. Para isso, clique no link "PGP Signature" abaixo do botão "Download F-Droid" na página inicial do site. Na página seguinte, baixe o arquivo "F-Droid.apk.asc" clicando no botão "Download". Baixe também a chave pública do desenvolvedor do F-Droid, clicando no link "PGP key of F-Droid release signing key" na mesma página. É importante verificar a assinatura antes de prosseguir com a instalação.
-
Clique no botão "Download F-Droid" para baixar o arquivo APK.
-
Abra o arquivo APK baixado em seu dispositivo Android. Se você não sabe como abrir o arquivo, vá até o gerenciador de arquivos do seu dispositivo e encontre o arquivo APK que acabou de baixar. Toque no arquivo e siga as instruções na tela para instalar o aplicativo.
-
Se aparecer uma mensagem de alerta informando que a instalação de aplicativos de fontes desconhecidas está desativada, vá até as configurações de segurança do seu dispositivo e habilite a opção "Fontes desconhecidas". Isso permitirá que você instale aplicativos de fora da Google Play Store.
-
Clique em "Instalar" e aguarde a instalação ser concluída.
-
Após a instalação, abra o aplicativo F-Droid e aguarde a inicialização do repositório de aplicativos.
-
Pronto! Agora você pode navegar e baixar aplicativos do F-Droid em seu dispositivo Android. O F-Droid oferece uma ampla variedade de aplicativos de código aberto e de software livre, e todos são gratuitos para baixar e usar. Você pode usar o F-Droid como uma alternativa à Google Play Store se estiver preocupado com privacidade, segurança ou controle de seus próprios dispositivos Android.
https://github.com/f-droid
-
-
@ 4ba8e86d:89d32de4
2024-10-22 23:20:59Usar um gerenciador de senhas pode resolver vários problemas, incluindo a dificuldade de criar senhas fortes e únicas, o risco de reutilização de senhas e a possibilidade de comprometimento de contas devido a senhas fracas ou roubadas. Com o uso de um gerenciador de senhas, o usuário pode criar senhas fortes e únicas para cada conta, sem precisar se preocupar em lembrar de todas elas. Além disso,um gerenciador de senhas pode ajudar a simplificar o processo de login, economizando tempo e reduzindo a frustração.
O KeepassDX é uma versão do software de gerenciamento de senhas Keepass, desenvolvido originalmente por Dominik Reichl em 2003. O Keepass é um software gratuito e de código aberto para desktops, que permite que os usuários armazenem suas senhas em um banco de dados seguro, criptografado com algoritmos avançados. Em 2017, o desenvolvedor alemão Brian Pellmann criou o KeepassDX como uma versão para dispositivos móveis, com o objetivo de tornar mais fácil para os usuários gerenciarem suas senhas em smartphones e tablets. O KeepassDX foi criado a partir do código-fonte do Keepass e foi projetado para ser fácil de usar, seguro e personalizável. Pellmann adicionou várias funcionalidades novas ao KeepassDX, incluindo a capacidade de importar senhas de outros gerenciadores de senhas, a organização de senhas em categorias e a compatibilidade com serviços de armazenamento em nuvem para sincronização entre dispositivos.
Algumas das funcionalidades do KeepassDX incluem a criação de senhas fortes e únicas, preenchimento automático de senhas, autenticação de dois fatores e organização de senhas por categorias. O KeepassDX também oferece uma ferramenta para importação de senhas de outros gerenciadores de senhas, o que torna a transição para o uso do KeepassDX mais fácil.
Passo a passo instalação do aplicativo KeepassDX:
-
Baixe e instale o KeepassDX em seu dispositivo móvel https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
-
Clique em [CRIAR NOVO BANCO DE DADOS]
3. Selecione o local do arquivo no meu caso é " transferência " Semelhante ao KeePassXC, o KeePassDX suporta o formato de banco de dados .kbdx (por exemplo, Passwords.kdbx) para armazenar senhas de contas importantes. Você deve salvar este arquivo em um local de fácil acesso para você, mas difícil de encontrar para outras pessoas que você não deseja visualizar as informações. Em particular, evite salvar seu arquivo de banco de dados em um serviço de armazenamento online, conectado às suas contas, pois pode ser acessado por outras pessoas.
- Digite um nome para seu banco de dados Neste exemplo, " urso " nosso banco de dados como "urso.kdbx"; você pode escolher um nome de sua preferência. Você pode usar um nome que disfarce o arquivo e o torne menos óbvio para invasores que podem tentar acessar seu telefone e exigir que você desbloqueie o banco de dados. Também é possível alterar a "extensão" no final do nome do arquivo. Por exemplo, você pode nomear o banco de dados de senhas "Revoltadeatlas.pdf" "primainterior.jpg " e o sistema operacional geralmente dará ao arquivo um ícone de "aparência normal". Lembre-se de que, se você der ao seu banco de dados de senhas um nome que não termine em ".kdbx", não poderá abrir o arquivo diretamente. Em vez disso, você terá que iniciar o KeePassDX primeiro e, em seguida, abrir seu banco de dados clicando no botão "Abrir banco de dados existente". Felizmente, o KeePassDX lembra o último banco de dados que você abriu, então você não terá que fazer isso com frequência.
https://github.com/Kunzisoft/KeePassDX
-
-
@ 4ba8e86d:89d32de4
2024-10-22 23:04:43O objetivo principal do Tutanota é oferecer um serviço de e-mail protegido, onde as mensagens são criptografadas de ponta a ponta. Isso significa que as mensagens são codificadas no dispositivo do remetente e permanecem criptografadas até chegarem ao dispositivo do destinatário. Somente o remetente e o destinatário têm as chaves necessárias para descriptografar as mensagens, garantindo a confidencialidade das comunicações.
Além da criptografia de ponta a ponta, o Tutanota oferece outras medidas de segurança. Os e-mails são armazenados de forma criptografada nos servidores da empresa, o que significa que mesmo se alguém obtiver acesso aos servidores, os e-mails permanecerão ilegíveis sem a chave de descriptografia do usuário. O Tutanota também permite que os usuários protejam suas contas com senhas fortes.
O Tutanota foi fundado em 2011 na Alemanha por Arne Möhle e Matthias Pfau, com o objetivo de oferecer um serviço de e-mail seguro e privado. Eles buscavam fornecer uma alternativa aos serviços tradicionais, enfatizando a proteção da privacidade e a criptografia de ponta a ponta. Desde então, o Tutanota expandiu suas funcionalidades, adicionando recursos como armazenamento criptografado, calendário e agenda. A empresa está comprometida com a proteção dos dados dos usuários e está sediada na Alemanha, seguindo o Regulamento Geral de Proteção de Dados (GDPR). O Tutanota continua a ser reconhecido como uma referência em privacidade digital e mantém seu compromisso com a segurança e a privacidade dos usuários.
Recursos de Segurança: 1. Criptografia de ponta a ponta: Uma das principais características do Tutanota é a criptografia de ponta a ponta. Isso significa que suas mensagens são codificadas no dispositivo do remetente e permanecem criptografadas durante o trânsito até o dispositivo do destinatário. Somente o remetente e o destinatário têm as chaves para descriptografar as mensagens, tornando praticamente impossível para terceiros interceptá-las e acessar seu conteúdo.
-
Armazenamento criptografado: Além da criptografia de ponta a ponta para as mensagens em trânsito, o Tutanota também armazena seus e-mails de forma criptografada em seus servidores. Isso significa que, mesmo se alguém obtiver acesso aos servidores do Tutanota, os e-mails armazenados permanecerão ilegíveis sem a chave de descriptografia do usuário.
-
Proteção por senha: O Tutanota permite que você defina uma senha segura para proteger sua conta de e-mail. Essa senha é usada para criptografar seus dados armazenados e deve ser mantida em sigilo para garantir a segurança de sua conta.
Outros Recursos e Funcionalidades: 1. Interface amigável: O Tutanota oferece uma interface de usuário intuitiva e fácil de usar, semelhante aos serviços de e-mail convencionais. Isso torna a transição para o Tutanota suave para os usuários acostumados a outras plataformas de e-mail.
-
Aplicativos móveis: O Tutanota oferece aplicativos móveis para dispositivos iOS e Android, permitindo que você acesse sua conta de e-mail de forma segura em seu smartphone ou tablet.
-
Armazenamento e anexos: O Tutanota oferece 1 GB de armazenamento gratuito para sua conta de e-mail, permitindo que você mantenha um histórico de mensagens seguro. Além disso, você pode enviar e receber anexos com segurança, pois eles também são criptografados.
-
Proteção contra spam: O Tutanota possui um filtro de spam eficiente que verifica e filtra mensagens indesejadas, garantindo que sua caixa de entrada seja livre de spam e ameaças.
-
Calendário e Contatos: Além do serviço de e-mail, o Tutanota também oferece recursos de calendário e agenda, permitindo que você organize seus compromissos de forma segura e mantenha uma lista de contatos criptografados.
-
Personalização: O Tutanota permite que você personalize sua conta de e-mail, como escolher seu próprio domínio personalizado (para usuários pagos) e criar aliases de e-mail para maior flexibilidade na comunicação.
-
Compromisso com a privacidade: O Tutanota é conhecido por sua postura pró-privacidade e compromisso com a proteção dos dados de seus usuários. A empresa está sediada na Alemanha, onde estão sujeitos a rigorosas leis de proteção de dados, e segue o Regulamento Geral de Proteção de Dados (GDPR) da União Europeia.
O Tutanota é uma opção excelente para aqueles que valorizam a privacidade e desejam proteger suas comunicações online. Com sua criptografia de ponta a ponta, armazenamento criptografado e outros recursos de segurança, o Tutanota garante que suas mensagens e dados pessoais permaneçam privados e seguros.
https://tutanota.com/pt_br/
https://github.com/tutao/tutanota
-
-
@ 4ba8e86d:89d32de4
2024-10-22 22:58:12Isto visa aumentar a privacidade dos utilizadores envolvidos, proteger contra a vigilância financeira e aumentar a fungibilidade da rede Bitcoin como um todo.
O coinjoin é uma técnica poderosa de privacidade para aqueles com um conhecimento intermediário do Bitcoin. Aprender o que é o coinjoin e como ele funciona pode ser uma ferramenta valiosa para sua caixa de ferramentas no mundo do Bitcoin. Antes de entrarmos em detalhes, é fundamental compreender o funcionamento dos endereços e das UTXOs (Unspent Transaction Outputs) do Bitcoin, bem como os princípios básicos da privacidade no Bitcoin.
Para começar, todas as transações padrão do Bitcoin são registradas publicamente na blockchain. Isso significa que se alguém identificar um endereço como pertencente a você, poderá rastrear o saldo desse endereço e acompanhar como seus Bitcoins são movimentados. No entanto, ao enviar Bitcoin para um coinjoin, você torna extremamente difícil para qualquer pessoa continuar associando UTXOs ou partes específicas de Bitcoin à sua identidade. Em essência, os coinjoins permitem que você recupere a privacidade perdida e, em certa medida, corrija erros de privacidade cometidos no passado.
Agora, vamos explorar como os coinjoins funcionam. O conceito é relativamente simples. Um coinjoin é uma colaboração sem confiança entre várias pessoas para criar uma transação. Na forma mais básica, cada pessoa envolvida contribui com uma quantia igual de Bitcoin como entrada para a transação e, em seguida, recebe essa mesma quantia de Bitcoin de volta como saída. Para ilustrar, considere este exemplo:
Imagine um coinjoin envolvendo você e mais quatro participantes. Cada pessoa retira 0,05 Bitcoin de um endereço vinculado à sua identidade e paga uma taxa para contribuir para a transação global. Após a transmissão e confirmação da transação, cada pessoa recebe 0,05 Bitcoin de volta como um novo UTXO em um novo endereço de carteira que controlam. As cinco novas addresses que recebem os UTXOs devem ser anônimas, o que significa que qualquer observador da blockchain não terá ideia de qual delas pertence a você. Mas Claro Você pode participar de múltiplos coinjoins com um número muito maior de participantes.
Aumento no número de maneiras pelas quais as coinjoins da Whirlpool podem ser interpretadas na cadeia
5 entradas/5 saídas = 1.496 interpretações (existentes)
6 entradas/6 saídas = 22.482 interpretações
7 entradas/7 saídas = 426.833 interpretações
8 entradas/8 saídas = 9.934.563 interpretações
Lembre-se de que, após submeter Bitcoins a um coinjoin, eles podem novamente ser associados à sua identidade por meio de ações subsequentes, como enviar Bitcoin para um serviço financeiro que conhece a sua identidade, o Bitcoin será naturalmente vinculado a você aos olhos desse provedor de serviços. #Bitcoin #privacidade
https://medium.com/oxt-research/understanding-bitcoin-privacy-with-oxt-part-1-4-8177a40a5923
https://medium.com/oxt-research/understanding-bitcoin-privacy-with-oxt-part-2-4-20010e0dab97
https://medium.com/oxt-research/understanding-bitcoin-privacy-with-oxt-part-3-4-9a1b2b572a8
https://medium.com/oxt-research/understanding-bitcoin-privacy-with-oxt-part-4-4-16cc0a8759d5
https://medium.com/samourai-wallet/introducing-whirlpool-surge-cycles-b5b484a1670f
https://medium.com/samourai-wallet/diving-head-first-into-whirlpool-anonymity-sets-4156a54b0bc7
https://blog.samourai.is/why-we-coinjoin/
https://docs.samourai.io/whirlpool
https://youtu.be/0YwiL978p1c?si=DRZNEH_aHKHjb2-m
-
@ 9e69e420:d12360c2
2024-10-23 13:05:29Former Democratic Representative Tulsi Gabbard has officially joined the Republican Party, announcing her decision at a Donald Trump rally in North Carolina. As one of the few voices of reason within the Democratic Party, Gabbard's departure marks the end of her journey from Democratic presidential candidate to Republican Party member[1]. Her transition began with her exit from the Democratic Party in 2022, when she accurately called it an "elitist cabal of warmongers"[3].
Throughout her congressional career, Gabbard demonstrated a consistent anti-interventionist stance and a strong defense of civil liberties. She was an original member of the bi-partisan 4th Amendment Caucus, fighting against warrantless searches and championing privacy rights in the digital age[4]. Her principled opposition to the surveillance state and bulk data collection set her apart from the establishment of both major parties.
While some may view her political evolution as opportunistic, Gabbard's core positions on foreign policy have remained remarkably consistent. She has maintained her opposition to unnecessary foreign interventions and has been vocal about the risks of nuclear war[2]. Her criticism of the military-industrial complex and her calls for the Democratic party to renounce the influence of military contractors and corporate lobbyists demonstrate a commitment to principles over party loyalty[4]. Though her recent alignment with Trump may raise eyebrows, her consistent advocacy for peace and opposition to the warfare state make her a unique figure in American politics[1].
Sauce: [1] Tulsi Gabbard's Political Evolution | TIME https://time.com/7096376/tulsi-gabbard-democrat-republican-political-evolution-history-trump/ [2] Tulsi Gabbard wants to serve under Trump, but do their policies align? https://www.usatoday.com/story/news/politics/elections/2024/06/19/tulsi-gabbard-trump-vp-secretary-policy/73968445007/ [3] Tulsi Gabbard announces she is leaving Democratic Party https://abcnews.go.com/Politics/tulsi-gabbard-announces-leaving-democratic-party/story?id=91326164%2F [4] Political positions of Tulsi Gabbard - Wikipedia https://en.wikipedia.org/wiki/Political_positions_of_Tulsi_Gabbard [5] Tulsi Gabbard Turning Republican Is 'Surprise' to Donald Trump https://www.newsweek.com/tulsi-gabbard-donald-trump-republican-party-1973340
-
@ 599f67f7:21fb3ea9
2024-09-19 08:27:12¿Qué es una dirección Lightning o Lightning address?
Una dirección Lightning es una dirección que visualmente se asemeja a una dirección de correo electrónico legible para los humanos, por ejemplo usuario@dominio.com pero que en realidad te permite recibir pagos en bitcoin instantáneos y económicos, sin la necesidad de tener un nodo en linea en tu dispositivo ni tener que generar facturas de forma manual cada vez que alguien te quiere hacer un pago.
¿Suena bien no?
¿Y cómo funciona?
Funciona utilizando el protocolo de pago LNURL.
Aquí se muestra un sencillo esquema de lo que ocurre en segundo plano.
En resumen, cuando otro usuario quiere pagarte usando tu dirección Lightning, tu billetera convierte la dirección Lightning en una solicitud de pago LNURL. Luego se utiliza esa solicitud de pago LNURL exitosa para obtener una factura BOLT11.
💡 Dirección Lightning > LNURLp > Factura BOLT 11.
Suena bien, pero ¿cuál es el problema?
Por el momento, muchas de las implementaciones de Lightning Address son de custodia, porque se necesita un dominio para que Lightning Address funcione y un nodo que esté siempre en línea para recibir los pagos. Debido a que es de custodia, el custodio puede atacarte en cualquier momento y monitorear tus transacciones.
Tienes que confiar en el propietario del dominio para no cambiar el registro de tu dirección Lightning. Y no funciona si el servidor LNURL no está en línea.
Bitcoin Txoko ofrece una sencilla solución de Lightning Address respaldada por LNbits. Esto también es de custodia, así que por favor mantén solo una pequeña cantidad en tu billetera Bitcoin Txoko y ve retirando a tu billetera de autocustodia a medida que recibas más sats.
Estoy listo, ¿qué necesito para empezar?
¡Todo lo que necesitas es un teléfono móvil o un ordenador y una conexión a Internet!
1. Creando tu billetera
Si aún no lo has hecho, navega a https://bitcointxoko.com y crea una nueva billetera. Puedes elegir el nombre que quieras.
2. Activar extensiones
Hace falta la extensión
Pay Links
para que las direcciones Lightning funcionen.Abre
Extensiones
en la barra de herramientas y activaPay Links
.3. Creando tu enlace de pago
-
En a la extensión
Pay Links
, haz clic enNew Pay Link
. -
Elige la billetera que has creado.
-
Para la descripción del artículo, puedes escribir lo que quieras.
-
Elige un nombre de usuario de tu dirección Lightning. Tu dirección Lightning se verá como
username@bitcointxoko.com
. -
Desmarque
Fixed amount
y cambia el valor mínimo a 1 y el valor máximo a 500000.
⚠️ También puedes cambiar el valor máximo a algo más alto, pero es más probable que los pagos más grandes fallen debido a la limitada capacidad de entrada del nodo Lightning de Bitcoin Txoko. Así que recomendamos mantenerlo en 500000 sats.
-
Ahora abre
Advanced options
y cambiaComment maximum characters
a 799. Este paso no es necesario pero permite más funcionalidades más adelante. -
Marca
Enable nostr zaps
en la parte inferior, para que puedas utilizar tu dirección Lightning para recibir zaps. -
Las demás opciones avanzadas son opcionales, puedes configurarlas si quieres o dejarlas en blanco.
Al final debería verse algo así.
- Cuando hayas comprobado que todo es correcto, sigue adelante y haz clic en
Create Pay Link
.
Probando
Puedes probar si tu nueva dirección Lightning funciona yendo a otra cartera, pulsando en
Enviar
y escribiendo tu dirección Lightning como destino, y luego enviándote una pequeña cantidad de sats.Vuelve a tu billetera Bitcoin Txoko y comprueba si has recibido tu propio pago. Es posible que tengas que actualizar la página.
Si todo funcionó correctamente, ¡enhorabuena! 🥳
Si no es así, háznoslo saber. Siempre estamos aquí para ayudar.
Próximos pasos
Nostr zaps
Puedes añadir tu dirección Bitcoin Txoko Lightning a tu perfil de nostr y usarla para recibir zaps. Normalmente, esto se hace yendo a
Perfil
>Editar
>Dirección Lightning
y cambiando la dirección Lightning.LNDhub
Puedes importar tu billetera LNbits como un LNDhub en tu teléfono utilizando una aplicación como Zeus o BlueWallet, en lugar de visitar la billetera en el navegador cada vez que desees comprobar tu saldo o realizar un pago. Echa un vistazo a nostr:naddr1qvzqqqr4gupzqkvlvlma7a55ccp6d5rrdc27h3ssmdmael286mjaq5uxmqslk04fqqxnzd3exuerqdfkxccnyv3cs0uvul sobre cómo hacer esto.
Código QR
También puedes compartir o imprimir tu código QR LNURLp para que la gente pueda escanearlo fácilmente con sus teléfonos. ¡Muy útil si estás introduciendo bitcoin a tu comerciante local favorito para que pueda recibir propinas Lightning!
Simplemente comparte el enlace a tu página compartida, o imprime el código QR como PDF yendo a
View Link
>Print
. -
-
@ 4ba8e86d:89d32de4
2024-10-22 22:48:44O uBlock Origin é uma extensão para navegadores que bloqueia anúncios e outros conteúdos indesejados em páginas da web. Ele utiliza filtros para identificar e bloquear elementos da página, como banners, pop-ups, rastreadores, scripts maliciosos e outras formas de conteúdo que possam comprometer a segurança ou a privacidade do usuário. O uBlock Origin é uma ferramenta útil para melhorar a segurança e a privacidade do usuário na internet, oferecendo controle sobre o tipo de conteúdo que é exibido nas páginas visitadas. Ele consome menos recursos do que outros bloqueadores de anúncios, o que significa que o navegador terá um desempenho melhor. Além disso, o uBlock Origin impede que empresas coletem informações sobre o comportamento online do usuário, bloqueia sites com malware e phishing.
Além disso, o uBlock Origin utiliza técnicas de otimização para minimizar o impacto no desempenho do navegador, como o carregamento de listas de filtros em segundo plano e o uso de cache para evitar a reavaliação de elementos já bloqueados.
A história do uBlock Origin remonta a 2014, quando Raymond Hill, fundador, autor original e desenvolvedor principal, criou a extensão original do uBlock. Ele iniciou o desenvolvimento da extensão a partir da bifurcação da base de código do HTTP Switchboard com uma extensão de bloqueio separada, uMatrix, que havia sido projetada anteriormente para usuários avançados. O uBlock foi criado para habilitar listas de bloqueio mantidas pela comunidade, adicionando recursos adicionais e atualizando a qualidade do código para os padrões de lançamento adequados. Inicialmente, a extensão foi lançada em junho de 2014 como uma extensão exclusiva do Chrome e Opera. A partir de 2015, a extensão do uBlock foi expandida para outros navegadores sob o nome atual de uBlock Origin. A demanda por bloqueadores “puros” com a capacidade de operar fora do programa de “publicidade aceitável” usado pelo AdBlock e outras extensões do setor levou a um rápido crescimento da popularidade do uBlock Origin. um período de 10 meses, o crescimento mais rápido entre qualquer software da indústria listado publicamente na época. A partir de 2023, o uBlock Origin continua a ser mantido e desenvolvido ativamente pelo fundador e desenvolvedor líder Raymond Hill.
Desde sua criação, o uBlock Origin tem sido mantido e desenvolvido ativamente por seu criador, Raymond Hill. A extensão foi adicionada aos repositórios para Debian 9 e Ubuntu e foi premiada com a honra de "Pick of the Month" pela Mozilla.
O uBlock Origin resolve vários problemas relacionados à navegação na internet, como:
-
Anúncios: Ele bloqueia anúncios, pop-ups e banners que muitas vezes são intrusivos e atrapalham a experiência de navegação.
-
Rastreamento: Ele impede que empresas coletem informações sobre o seu comportamento online, o que aumenta a sua privacidade e segurança.
-
Malware: Ele bloqueia sites que possuem malware, impedindo que você acabe infectando o seu dispositivo.
Experimente o uBlock Origin e tenha mais controle sobre a sua navegação na internet, com maior segurança e privacidade. O download está disponível para diversos navegadores, incluindo Google Chrome, Mozilla Firefox, Microsoft Edge e Opera.
https://ublockorigin.com/
https://github.com/gorhill/uBlock
-
-
@ a012dc82:6458a70d
2024-10-22 14:05:23Table Of Content
-
The Background of Tesla's Bitcoin Investment
-
Tesla Believes in the Long-Term Potential of Bitcoin
-
Bitcoin Fits with Tesla's Clean Energy Vision
-
Tesla's Investment in Bitcoin is a Hedge Against Inflation
-
Bitcoin Offers Diversification for Tesla's Balance Sheet
-
Conclusion
-
FAQ
Tesla, the American electric vehicle and clean energy company, has been making headlines for its Bitcoin investment strategy. The company made headlines earlier this year when it announced that it had invested $1.5 billion in the cryptocurrency, causing the price of Bitcoin to surge. However, in the first quarter of 2021, Tesla's Bitcoin strategy remained unchanged.
The Background of Tesla's Bitcoin Investment
Before we dive into why Tesla's Bitcoin strategy hasn't changed in the first quarter of 2021, let's take a brief look at the background of the company's investment. In February 2021, Tesla announced that it had invested $1.5 billion in Bitcoin and that it would begin accepting the cryptocurrency as a form of payment for its products. The announcement caused the price of Bitcoin to surge, with the cryptocurrency reaching an all-time high of over $60,000.
Tesla Believes in the Long-Term Potential of Bitcoin
One reason why Tesla's Bitcoin strategy has remained unchanged is that the company believes in the long-term potential of the cryptocurrency. In a tweet in March 2021, CEO Elon Musk said, "I am a supporter of Bitcoin, and I believe it has a promising future." Musk has also said that he thinks Bitcoin is a good thing and that it has a lot of potential.
Bitcoin Fits with Tesla's Clean Energy Vision
Another reason why Tesla's Bitcoin strategy hasn't changed is that the cryptocurrency fits with the company's clean energy vision. Tesla is committed to reducing its carbon footprint, and Bitcoin's decentralized nature makes it an attractive option for clean energy advocates. By using Bitcoin as a form of payment, Tesla can reduce its reliance on traditional payment methods, which often involve high energy consumption.
Tesla's Investment in Bitcoin is a Hedge Against Inflation
Tesla's Bitcoin investment is also a hedge against inflation. The company's decision to invest in Bitcoin was partly motivated by concerns about the value of the US dollar. In a filing with the US Securities and Exchange Commission, Tesla said that it had made the investment to "maximize returns on our cash." By investing in Bitcoin, Tesla is protecting its cash reserves against inflation.
Bitcoin Offers Diversification for Tesla's Balance Sheet
Finally, Bitcoin offers diversification for Tesla's balance sheet. The company's investment in the cryptocurrency is a way to diversify its assets and reduce its reliance on traditional forms of investment. Bitcoin is not correlated with other asset classes, which means that it can provide a hedge against market volatility.
Conclusion
Tesla's Bitcoin strategy remained unchanged in the first quarter of 2021. The company's investment in the cryptocurrency is driven by a belief in its long-term potential, a commitment to reducing its carbon footprint, and a need to diversify its assets. While Bitcoin, like any investment, carries some level of risk, Tesla's decision to invest in the cryptocurrency is a calculated risk that has so far been profitable. As Bitcoin continues to gain acceptance as a mainstream investment, it's likely that more companies will follow in Tesla's footsteps.
FAQ
Has Tesla sold any of its Bitcoin holdings? No, Tesla has not sold any of its Bitcoin holdings in the first quarter of 2021.
Will Tesla continue to accept Bitcoin as a form of payment? Yes, Tesla will continue to accept Bitcoin as a form of payment for its products.
Does Tesla plan to invest more in Bitcoin? There is no official word from Tesla on whether the company plans to invest more in Bitcoin.
What impact does Tesla's Bitcoin strategy have on the wider cryptocurrency market? Tesla's investment in Bitcoin and its decision to accept the cryptocurrency as a form of payment has brought increased attention to the cryptocurrency market. The company's endorsement of Bitcoin has helped to legitimize the cryptocurrency and has contributed to its growing acceptance as a mainstream investment.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 1b5ee74d:bb1aae6e
2024-09-10 08:51:03- Who Is Responsible for the Content Published on Social Networks?
- What should the role of platforms be in content moderation?
- Who should be consulted in cases of disputes involving illegal content?
- Should there be a limit to freedom of speech online? Where should the line be drawn?
These are just a few of the numerous questions that have characterized the debate for years, not only regarding social networks but, more broadly, the entire landscape of online interactions.
In recent weeks, tensions have reignited due to three cases that have stirred the pot—depending on the perspective—with slogans of either combating illegal activity or fighting censorship: Telegram, Meta, and X.
These cases are distinct, with the platforms and their executives behaving differently in each instance: Meta cooperated with authorities, while Telegram and X were more reluctant. However, all three stories share a key issue—perhaps the key issue: the ability to intervene in the content they host.
To understand the reason, let’s briefly recap what happened.
Telegram, Meta, and X: Three Different Cases, One Common Origin
Pavel Durov, founder of Telegram, was arrested in Paris on August 24th as part of an investigation that French authorities have been conducting for months against the messaging platform.
The accusations are numerous: money laundering, drug trafficking, child pornography, and refusal to cooperate with law enforcement. In the press release issued by the Prosecutor’s Office, there is even mention of violations related to the import and export of cryptographic tools—an approach reminiscent of the United States in the 1990s, when the government classified cryptography on par with weaponry. This interpretation only changed due to the outcome of the Crypto Wars.
In fact, reports tell us that Pavel Durov was released after a few days upon paying a €5 million bail, with the condition that he not leave France. Initially, Telegram issued a statement via Twitter, asserting its compliance with European laws. But on September 6th, the founder of Telegram decided to fight back, leaving little room for interpretation.
"Sometimes we can’t reach an agreement with regulators in certain countries on the right balance between privacy and security," Durov said, adding that, if necessary, Telegram will leave markets that are incompatible with these principles.
It is worth noting that this is not the first time Durov has clashed with authorities. In the past, he refused to cooperate with Russia by denying access to Telegram users’ personal data. This refusal led to the platform being temporarily blocked in Russia in 2018.
Meta: Pressure from the White House and Zuckerberg’s Revelations
Mark Zuckerberg, CEO of Meta, recently disclosed pressures he received from the White House during the pandemic. In a letter to the U.S. House Judiciary Committee, Zuckerberg revealed that the Biden administration pushed Meta to remove content related to the virus, including satirical and critical posts.
Zuckerberg explained that in 2021, Meta deleted more than 20 million posts related to COVID-19 but expressed regret over some of the decisions made, admitting that the company had succumbed to excessive political pressure.
Zuckerberg emphasized that these requests were perceived by the company as an obligation rather than a choice, and in hindsight, some of these actions might have been mistakes. Meta’s future commitment, according to Zuckerberg, will be to better resist such pressures, even in emergency situations.
I believe the government’s pressure was wrong, and I regret not being more transparent about it.
X and the Clash with the Brazilian Government
Elon Musk and X (formerly Twitter) are at the center of a legal dispute in Brazil, where the platform was blocked after Musk refused to appoint a local legal representative, as required by the country’s Supreme Court. The issue arose when Judge Alexandre de Moraes ordered X to suspend certain accounts accused of spreading political disinformation, particularly those associated with former president Jair Bolsonaro and his supporters.
Musk’s reaction was harsh. He accused the Supreme Court of corruption and of violating free speech, criticizing de Moraes and calling him a “criminal.” However, the judge continued his legal actions against Musk and his company, even freezing the bank accounts of Starlink, Musk’s satellite division, to pressure X into complying with Brazilian laws.
Brazilian authorities are even pursuing those who attempt to access the platform using VPNs, sparking further controversy over freedom in Brazil.
Currently, the platform remains suspended, with about 21 million Brazilian users cut off from the service. The legal dispute is ongoing and could have long-term repercussions for X’s presence in Brazil, one of the platform’s largest markets.
The Ownership of Content
Telegram and X have found themselves in hot water for refusing to comply with content moderation mandates imposed by various jurisdictions. Meta, on the other hand, has avoided such issues by adhering to directives from the White House, including the removal of content flagged by Washington, such as “satirical and ironic” posts, as noted in the letter.
The decisive factor in all three cases is the same: the ability to intervene in what is published on the platform. The terms and conditions of Meta and X do not formally claim ownership of the content users post, but they clarify that users grant the companies a non-exclusive, royalty-free, worldwide license to use, distribute, modify, and display the content in relation to the services offered. Telegram’s terms are slightly stricter: while users also retain formal ownership of their content, Telegram requires a license to distribute and display content only within its ecosystem.
However, the result remains the same. Anything published by users can be modified by the platform, according to the implicit contract every single user agrees to when they begin using the service.
Nostr is the Way
It’s no coincidence that, in recent weeks, many who care about issues such as privacy and censorship resistance have reignited interest in Nostr. The protocol, whose acronym stands for Notes and Other Stuff Transmitted by Relays, can be used via various clients, not a single platform—similar to how the Web is accessible from different browsers.
But most importantly, users who create an account do not do so through a username and password saved on the company’s servers—because, in this case, the company doesn’t exist—but rather through a public key and a private key.
This key pair allows users to interact with Nostr across multiple clients and send their “notes”—as posts are called on Nostr—to as many relays (servers) as they wish. In other words, the data is not stored on a single server but on multiple servers chosen by the user—and the user can even set up their own server without much difficulty.
Most importantly, the data is portable. Posts sent are cryptographically signed: in Nostr, content ownership is not just formally with the user, it is mathematically so.
In such a context, blaming the operator of a client or relay for the content signed and published by users' private keys would be bordering on absurdity, besides revealing a clear technical ignorance. Of course, after the accusations from the U.S. Department of Justice against the developers of Samourai Wallet, it’s fair to be ready for anything.
But giving a chance to solutions like Nostr also means considering the possibility of reclaiming one's online identity and no longer being an unconscious victim of manipulative algorithms and invasive governments.
-
@ 9e69e420:d12360c2
2024-10-22 11:49:49Nostr Tips for Beginners
Setting Up Your Account
- Choose a Nostr client (e.g., Damus for iOS, Amethyst for Android, nostrudel for web)
- Generate your public/private key pair
- Store your private key securely (password manager, browser extension or my personal recommendation amber)
- Set up a Lightning wallet for tipping and payments (minibits recommended)
Customizing Your Profile
- Add a profile picture (use nostr.build or postimages.org)
- Complete your profile information
- Verify your account (use nostrplebs.com or nostrcheck.me for the easy route.) there are also many guides for setting up a nip-5 on a custom domain.
Finding and Interacting with Others
- Search for friends using public keys or usernames
- Explore hashtags like #grownostr or #foodstr
- Follow interesting users and check their follower lists
- Interact through comments, likes, and reposts
Understanding Relays
- Connect to reliable relays for better user experience
- Subscribe to specific relays for targeted content
- Consider using paid relays for improved performance
Hashtags "#"
- don't just "explore hashtags"
- use them.
- follow them.
- people will find you through them and you will find people to follow with them.
Best Practices
- Use text replacement shortcuts for your public key
- Experiment with different Nostr clients
- Be patient and engage with the community
- Remember Nostr's censorship-resistant nature
- Keep your software and apps updated
Remember, Nostr is evolving, so stay curious and don't hesitate to ask for help from the community when needed.
-
@ 42342239:1d80db24
2024-10-23 12:28:41TL;DR: The mathematics of trust says that news reporting will fall flat when the population becomes suspicious of the media. Which is now the case for growing subgroups in the U.S. as well as in Sweden.
A recent wedding celebration for Sweden Democrats leader Jimmie Åkesson resulted in controversy, as one of the guests in attendance was reportedly linked to organized crime. Following this “wedding scandal”, a columnist noted that the party’s voters had not been significantly affected. Instead of a decrease in trust - which one might have expected - 10% of them stated that their confidence in the party had actually increased. “Over the years, the Sweden Democrats have surprisingly emerged unscathed from their numerous scandals,” she wrote. But is this really so surprising?
In mathematics, a probability is expressed as the likelihood of something occurring given one or more conditions. For example, one can express a probability as “the likelihood that a certain stock will rise in price, given that the company has presented a positive quarterly report.” In this case, the company’s quarterly report is the basis for the assessment. If we add more information, such as the company’s strong market position and a large order from an important customer, the probability increases further. The more information we have to go on, the more precise we can be in our assessment.
From this perspective, the Sweden Democrats’ “numerous scandals” should lead to a more negative assessment of the party. But this perspective omits something important.
A couple of years ago, the term “gaslighting” was chosen as the word of the year in the US. The term comes from a 1944 film of the same name and refers to a type of psychological manipulation, as applied to the lovely Ingrid Bergman. Today, the term is used in politics, for example, when a large group of people is misled to achieve political goals. The techniques used can be very effective but have a limitation. When the target becomes aware of what is happening, everything changes. Then the target becomes vigilant and views all new information with great suspicion.
The Sweden Democrats’ “numerous scandals” should lead to a more negative assessment of the party. But if SD voters to a greater extent than others believe that the source of the information is unreliable, for example, by omitting information or adding unnecessary information, the conclusion is different. The Swedish SOM survey shows that these voters have lower trust in journalists and also lower confidence in the objectivity of the news. Like a victim of gaslighting, they view negative reporting with suspicion. The arguments can no longer get through. A kind of immunity has developed.
In the US, trust in the media is at an all-time low. So when American media writes that “Trump speaks like Hitler, Stalin, and Mussolini,” that his idea of deporting illegal immigrants would cost hundreds of billions of dollars, or gets worked up over his soda consumption, the consequence is likely to be similar to here at home.
The mathematics of trust says that reporting will fall flat when the population becomes suspicious of the media. Or as the Swedish columnist put it: like water off a duck’s back.
Cover image: Ingrid Bergman 1946. RKO Radio Pictures - eBay, Public Domain, Wikimedia Commons
-
@ 41ed0635:762415fc
2024-10-23 12:17:11O Que é um RAM Disk?
Um RAM Disk é uma área de armazenamento criada na memória RAM do sistema, tratada pelo sistema operacional como um dispositivo de armazenamento físico, similar a um disco rígido ou SSD. Sua característica principal é ser baseado em memória volátil, o que significa que os dados armazenados são perdidos quando o sistema é desligado ou reiniciado. Essa tecnologia oferece uma alternativa de armazenamento temporário extremamente rápida, ideal para situações que exigem acesso veloz a dados, mas sem a necessidade de persistência a longo prazo.
Vantagens e Desvantagens do RAM Disk
Vantagens - Velocidade Superior: Acesso muito mais rápido comparado a dispositivos de armazenamento baseados em NAND flash ou SSDs tradicionais. - Latência Mínima: Redução significativa na latência de leitura/escrita. - Isolamento de Dados Temporários: Ideal para armazenar dados temporários que não precisam de persistência após o desligamento.
Desvantagens - Volatilidade: Perda de dados em caso de desligamento ou falha de energia. - Consumo de Memória: Utiliza a RAM do sistema, que é um recurso limitado.
Consumo de Memória e Soluções Alternativas
Uma abordagem inovadora para lidar com o consumo de memória do sistema é a implementação de um SSD SATA em FPGA utilizando LiteSATA e LiteDRAM como backend de memória. Este método requer a seleção de uma placa FPGA apropriada com recursos necessários, incluindo transceptores capazes de operar na velocidade SATA desejada e memória DRAM compatível. O processo envolve a configuração do LiteDRAM e LiteSATA, implementação de lógica de controle, integração dos componentes, compilação e síntese do design, e programação do FPGA. Esta solução oferece uma alternativa flexível e personalizável para o armazenamento de alta velocidade.
1. Seleção da Placa FPGA
Escolha uma placa com transceptores adequados e memória DRAM compatível.
2. Configuração do LiteDRAM e LiteSATA
Instancie e configure os núcleos LiteDRAM e LiteSATA no design FPGA.
3. Implementação da Lógica de Controle
Desenvolva um controlador para interfacear LiteSATA com LiteDRAM.
4. Programação e Teste
Compile, sintetize e programe o FPGA, seguido por testes e otimizações.
Configuração do LiteDRAM
1. Instanciação
No seu design, instancie o núcleo LiteDRAM.
2. Configuração
Configure o LiteDRAM para corresponder ao tipo e à configuração da memória DRAM na sua placa (por exemplo, DDR3, DDR4).
3. Parâmetros
Defina parâmetros como frequência de operação, largura de banda e latências.
Configuração do LiteSATA
Instanciação
Comece por instanciar o núcleo LiteSATA no seu design FPGA.
PHY SATA
Em seguida, configure o PHY SATA de acordo com o hardware da sua placa FPGA, incluindo a taxa de transferência desejada. Por exemplo, para uma conexão SATA 3.0, a taxa de transferência será de 6 Gbps.
Mapeamento de Pinos
Por fim, certifique-se de que os pinos do FPGA estão corretamente mapeados para os conectores SATA.
Desenvolvimento do Controlador com Máquina de Estados Finitos
O desenvolvimento de um controlador que interfaceia o LiteSATA com o LiteDRAM utilizando uma Máquina de Estados Finitos (FSM) é crucial para gerenciar a comunicação entre o protocolo SATA e a memória DRAM. Este controlador é responsável por receber e interpretar comandos SATA, gerenciar operações de leitura/escrita na DRAM, e sincronizar dados entre os sistemas. A FSM é composta por vários estados, cada um representando uma etapa específica do processamento. A transição entre estados é baseada em eventos ou condições, como a recepção de um novo comando ou a conclusão de uma operação de leitura/escrita.
Objetivo do Controlador
Gerenciar comunicação entre SATA e DRAM, traduzindo comandos e garantindo integridade dos dados.
Estrutura da FSM
Estados representam etapas do processamento, com transições baseadas em eventos ou condições.
Implementação
Desenvolvimento de lógica para cada estado, garantindo fluxo correto de operações e tratamento de erros.
Estados da Máquina de Estados Finitos
A Máquina de Estados Finitos (FSM) do controlador é composta por vários estados essenciais. O estado IDLE é o ponto inicial, aguardando comandos. O COMMAND_DECODE decodifica os comandos recebidos. READ_SETUP e WRITE_SETUP preparam as operações de leitura e escrita, respectivamente. READ_EXECUTE e WRITE_EXECUTE realizam as operações de leitura e escrita na DRAM. O STATUS_UPDATE atualiza o status da operação e informa o host. O ERROR_HANDLE lida com erros ocorridos durante as operações. Cada estado tem ações específicas e critérios de transição para outros estados, garantindo um fluxo de operação eficiente e confiável.
- IDLE: Aguarda comandos, transição para COMMAND_DECODE ao receber novo comando.
- COMMAND_DECODE: Decodifica o comando recebido e prepara parâmetros.
- READ/WRITE_SETUP: Configura operações de leitura ou escrita na DRAM.
- READ/WRITE_EXECUTE: Executa operações de leitura ou escrita na DRAM.
- STATUS_UPDATE: Atualiza o status da operação e informa o host.
Comparação entre RAM Disk e SSD SATA em FPGA
RAM Disk e SSD SATA em FPGA com LiteSATA e LiteDRAM compartilham semelhanças em termos de velocidade superior e uso de memória volátil. Ambos oferecem velocidades de leitura/escrita superiores aos dispositivos de armazenamento convencionais. No entanto, diferem significativamente em sua implementação de hardware e flexibilidade. O RAM Disk é uma solução puramente de software que utiliza a RAM interna do sistema, enquanto o SSD em FPGA envolve hardware personalizado conectado a DRAM externa. A escalabilidade e flexibilidade também diferem, com o SSD em FPGA oferecendo maior potencial de expansão.
Característica | RAM Disk | SSD SATA em FPGA --- | --- | --- Implementação | Software | Hardware personalizado Escalabilidade | Limitada pela RAM do sistema | Expansível com módulos DRAM Flexibilidade | Baixa | Alta (ajustável via FPGA) Persistência | Volátil | Volátil (com opções de backup)
Integração com a Partição de Swap no Linux
A integração de um SSD SATA em FPGA com a partição de swap no Linux pode acelerar significativamente o desempenho do sistema. O Linux utiliza o swap como uma extensão da memória RAM, e um swap mais rápido permite que o sistema mova páginas de memória para o swap e as recupere mais rapidamente, aumentando efetivamente o desempenho percebido da RAM. Essa integração resulta em redução do tempo de espera para processos que requerem acesso a dados no swap, melhorando a eficiência geral do sistema. Em aplicações de alto desempenho, como bancos de dados, máquinas virtuais ou processamento de big data, um swap rápido pode evitar gargalos quando a memória física está esgotada.
1. Melhor Gestão de Memória
Movimento mais rápido de páginas entre RAM e swap, aumentando o desempenho percebido da memória.
2. Redução de Tempo de Espera
Processos acessam dados no swap mais rapidamente, melhorando a responsividade do sistema.
3. Melhoria em Aplicações de Alto Desempenho
Evita gargalos em workloads que exigem muita memória, como bancos de dados e processamento de big data.
Benefícios e Desvantagens da Integração
A integração de um SSD SATA em FPGA com LiteSATA e LiteDRAM como partição de swap no Linux oferece diversos benefícios. A latência reduzida e as altas taxas de transferência aceleram operações de leitura e escrita no swap. A ausência de desgaste por escrita na DRAM aumenta a longevidade do dispositivo. A capacidade pode ser expandida adicionando mais módulos DRAM, e atualizações são facilitadas via firmware. Contudo, existem desvantagens a considerar. A implementação requer hardware adicional (FPGA e DRAM externa), o que pode resultar em um custo mais elevado comparado a soluções de RAM Disk convencionais. A complexidade da implementação também pode ser um fator limitante para alguns usuários.
Benefícios - Latência reduzida - Altas taxas de transferência - Ausência de desgaste por escrita - Capacidade expansível - Atualizações facilitadas
Desvantagens - Necessidade de hardware adicional - Potencial custo mais elevado - Complexidade de implementação
Considerações Finais e Recursos
Compatibilidade de Protocolos
Garanta que o seu design esteja em conformidade com as especificações SATA para evitar problemas de compatibilidade.
Limitações de Hardware
Esteja ciente das limitações do seu FPGA, como recursos lógicos disponíveis e capacidades dos transceptores.
Segurança dos Dados
Considere implementar recursos de correção de erros ou proteção de dados se necessário.
Recursos Úteis: - Repositório do LiteSATA: https://github.com/enjoy-digital/litesata - Repositório do LiteDRAM: https://github.com/enjoy-digital/litedram - Documentação do LiteX: https://github.com/enjoy-digital/litex/wiki
-
@ 4ba8e86d:89d32de4
2024-10-23 12:16:57Ao contrário dos aplicativos de mensagens tradicionais, o Briar não depende de um servidor central - as mensagens são sincronizadas diretamente entre os dispositivos dos usuários. Se a internet cair, o Briar pode sincronizar via Bluetooth ou Wi-Fi, mantendo o fluxo de informações em uma crise. Se a internet estiver ativa, o Briar pode sincronizar via rede Tor, protegendo os usuários e seus relacionamentos da vigilância.
O Briar foi criado em 2014 por um grupo de desenvolvedores alemães liderado por Michael Rogers. O objetivo era desenvolver um aplicativo que fosse seguro e privado o suficiente para ser usado em situações de repressão governamental e em outras regiões com censura e vigilância online. A equipe recebeu financiamento do Open Technology Fund e outros patrocinadores para desenvolver o aplicativo.
Briar usa conexões diretas e criptografadas entre usuários para evitar vigilância e censura. https://nostr.build/i/nostr.build_5fd2ffa577e4d9978199ba8e957cf9334efd40b3a648e504f24728e94c2a961a.jpg
Briar pode compartilhar dados via Wi-Fi, Bluetooth e Internet. https://nostr.build/i/nostr.build_1a2762f68f623f5598174801f01d89967197c5333dc52a0ff81a850d9afbefa9.png
A Briar fornece mensagens privadas, fóruns públicos e blogs protegidos contra as seguintes ameaças de vigilância e censura:
• Vigilância de metadados. Briar usa a rede Tor para impedir que os bisbilhoteiros descubram quais usuários estão conversando entre si. A lista de contatos de cada usuário é criptografada e armazenada em seu próprio dispositivo.
• Vigilância de conteúdo. Toda a comunicação entre os dispositivos é criptografada de ponta a ponta, protegendo o conteúdo contra espionagem ou adulteração.
• Filtragem de conteúdo. A criptografia de ponta a ponta do Briar impede a filtragem de palavras-chave e, devido ao seu design descentralizado, não há servidores para bloquear.
• Ordens de retirada. Todo usuário que se inscreve em um fórum mantém uma cópia de seu conteúdo, portanto, não há um único ponto em que uma postagem possa ser excluída.
• Ataques de negação de serviço. Os fóruns de Briar não têm um servidor central para atacar, e todo assinante tem acesso ao conteúdo, mesmo que esteja offline.
• Apagões da Internet. O Briar pode operar por Bluetooth e Wi-Fi para manter o fluxo de informações durante os apagões.
Acesse a F-droid ou Google play story em seu dispositivo Android.
Crie uma conta Quando abrir o app Briar pela primeira vez, você será convidado a criar uma conta. Sua conta será armazenada seguramente em seu dispositivo, criptografada com sua senha.
Escolha um apelido com cuidado pois não poderá alterá-lo depois. Você pode escolher o mesmo apelido que outra pessoa, assim como na vida real.
Escolha uma senha que seja difícil de adivinhar mas fácil de lembrar. Se você esquecer sua senha, não haverá como recuperar o acesso à sua conta.
Se você precisar deletar sua conta rapidamente, apenas desinstale o app Briar.
Adicione um contato Após criar a sua conta você verá uma lista vazia de contatos. Para adicionar um contato, pressione no botão de mais (+). Há duas opções, dependendo se a pessoa que você quer adicionar está próxima.
Se a pessoa que você quer adicionar está próxima, escolha “Adicionar contato que está próximo”. Se a pessoa que você quer adicionar não está próxima e você tem acesso à Internet, escolha “Adicionar contato à distância”.
Adicione um contato próximo Quando você escolhe “Adicionar contato que está próximo”, o Briar pedirá permissão para usar sua câmera para escanear o código QR do seu contato. O Briar tambem pedirá permissão para acessar sua localização, para que possa se conectar ao seu contato por Bluetooth. O Briar não armazena, compartilha ou faz upload da sua localização, mas essa permissão é necessária para descobrir dispositivos Bluetooth próximos.
Finalmente, o Briar pedirá permissão para ligar o Bluetooth e tornar seu dispositivo visível para dispositivos Bluetooth próximos por um curto perído de tempo.
Após conceder todas essas permissões, o Briar mostrará um código QR e uma visualização de câmera. Escaneie o código QR de seu contato e deixe ele escanear o seu. Após uns 30 segundos seus dispositivos devem estar conectados e seu contato adicionado à sua lista de contatos.
Se seus dispositivos não se conectarem, vocês devem voltar à lista de contatos e iniciar o processo de novo.
Adicione um contato à distância Quando você escolhe “Adicionar contato à distância”, o Briar mostrará um link que você deve enviar para a pessoa que deseja adicionar. Você pode enviar o link por outro app como o Element , Simplesxchat . Seu contato tambem precisa te enviar o link dele. Cole o link de seu contato e escolha um apelido para ele. Se você e seu contato estão conectados ao Briar e têm acesso à Internet, então seu contato deve ser adicionado à sua lista de contatos dentro de alguns minutos.
Envie uma mensagem Após adicionar seu primeiro contato, toque em seu nome na lista de contatos para enviar-lhe sua primeira mensagem. O círculo próximo ao nome de seu contato ficará verde quando o Briar estiver conectado ao seu contato via Internet, Wi-Fi ou Bluetooth.
Apresente os seus contatos Você pode usar o recurso de apresentação para apresentar dois contatos seus entre si, para que eles não precisem se encontrar pessoalmente para se adicionarem.
Comunique-se sem Internet O alcance do Bluetooth e do Wi-Fi está em torno de 10 metros, a depender dos obstáculos. Claramente isso não é suficiente para se comunicar através de uma cidade ou mesmo de um prédio grande. Então, quando o Briar recebe uma mensagem de um contato que está próximo, ele armazena a mensagem e pode depois repassá-la para outros contatos, quando eles estiverem em alcance (por exemplo, quando você for de um local para outro).
Por favor, note que o Briar só vai sincronizar mensagens com os seus contatos, não com estranhos próximos que tenham o Briar. E só vai sincronizar as mensagens que você escolheu compartilhar com cada contato. Por exemplo, se você convida seus contatos X e Y para entrar em um fórum e eles aceitam, as mensagens nesse forum serão sincronizadas com X ou Y sempre que estiverem em alcance. Logo, você pode receber mensagens de fórum de X em um local, ir até outro local e entregar essas mensagens para Y.
Mas isso não funciona para mensagens privadas: elas apenas são sincronizadas diretamente entre o remetente e o destinatário.
Conecte-se com seus contatos sem Internet Quando você se encontrar com um de seus contatos do Briar, você pode usar o recurso “Conectar via Bluetooth” na tela da conversa para fazer uma conexão Bluetooth entre seus dispositivos. Após fazer isso uma vez, seus dispositivos devem se conectar automaticamente no futuro, mas isso pode levar um minuto ou dois após seu contato entrar em alcance. Se você não quiser esperar, pode usar o recurso “Conectar via Bluetooth” de novo para fazer a conexão imeditamente.
Se um grupo de pessoas dentro do alcance de Wi-Fi quiser se comunicar, pode ser útil criar um hotspot Wi-Fi no celular de uma pessoa. Mesmo que o hotspot não tenha acesso à Internet, o Briar pode usá-lo para se comunicar com contatos conectados ao mesmo hotspot.
Se é muito arriscado carregar seu celular de um lugar para outro (por conta de pontos de revista policial, por exemplo), você pode sincronizar mensagens criptografadas usando um pendrive USB ou cartão SD para carregá-las mais discretamente.
https://youtu.be/sKuljekMzTc
https://github.com/briar/briar
-
@ 13e63e99:25525c6a
2024-09-03 09:29:54Preview
Last week, President Nayib Bukele of El Salvador emphasized Bitcoin’s role in enhancing the country's global image that boosted foreign investment and tourism. At the NostrWorld Unconference in Riga, the synergy between Bitcoin and decentralized social networks was a key focus, showcasing the potential for integrating Bitcoin with the growing Nostr protocol. Meanwhile, Lightspark launched its Extend platform, facilitating instant Bitcoin payments for U.S. businesses, thereby expanding the accessibility of Bitcoin transactions. Publicly traded companies have increased their Bitcoin holdings by nearly 200%, bringing their total to $20 billion, reflecting strong institutional confidence in Bitcoin as a reserve asset. Additionally, Bitcoin in exchange experienced its third-largest daily net outflow of 2024, indicating a shift toward long-term holding among investors. Despite some withdrawals, including a $13.5 million outflow from BlackRock’s iShares Bitcoin Trust, the fund remains a dominant force in the Bitcoin investment landscape. Lastly, Nigeria's SEC granted its first provisional exchange license, a milestone in the regulation of the country’s rapidly growing digital asset industry, positioning Nigeria as a leading player in global digital asset adoption. For more details, continue reading below.
A. Bitcoin Data Dashboard
1. Bitcoin Transactions\ 2. Supply\ 3. Mining\ 4. Transaction Fees\ 5. Difficulty Retarget\ 6. Lightning Network (Public)
B. Bitcoin Ecosystem
1. Bukele: Bitcoin was a powerful rebranding tool for El Salvador\ 2. NostrWorld Unconference in Riga: Exploring Bitcoin and Decentralized Social Networks\ 3. Lightspark launches Extend for instant Bitcoin Lightning payments in the U.S.\ 4. Public companies boost Bitcoin holdings by nearly 200%, reaching $20 billion\ 5. Bitcoin exchanges see 3rd-largest daily net outflow of 2024\ 6. BlackRock's iShares Bitcoin Trust faces $13.5m outflow amid broader ETF withdrawals
C. Regulation
1. Nigeria's first provisional exchange license from SEC, marking milestone in digital asset regulation
D. Macroeconomy
1. Vice President Harris proposes wealth tax targeting unrealized gains for ultra rich\ 2. Jobless claims drop as labor market slows, US economy remains on steady growth path
A. Bitcoin Data Dashboard
As of Sep 2, 2024
B. Bitcoin Ecosystem
1. Bukele: Bitcoin was a powerful rebranding tool for El Salvador
President Nayib Bukele recently provided a candid assessment of El Salvador's groundbreaking decision to adopt Bitcoin as legal tender, a move that has drawn both praise and criticism on the global stage. In an interview with Time magazine, Bukele emphasized that the initiative has had substantial benefits particularly in enhancing El Salvador's international image despite the country's bitcoin adoption has not expanded as rapidly as he has hoped, Bukele described the Bitcoin adoption as a powerful rebranding tool for the nation, one that has attracted foreign investment and boosted tourism. The president’s marketing advisor, Damian Merlo, echoed this sentiment, calling the decision "genius" and likening it to a major public relations campaign that El Salvador didn’t have to pay for. "We could have spent millions on a PR firm to rebrand the country," Merlo noted, "but instead, we adopted Bitcoin." While the move initially strained relations with institutions like the International Monetary Fund (IMF), which urged Bukele to abandon the policy due to perceived risks, there are signs that the tension is easing. El Salvador has recently reported progress in negotiations with the IMF, with a focus on enhancing transparency and addressing potential fiscal and financial stability risks related to the Bitcoin project.
Reference: Bitcoin.com, Time
2. NostrWorld Unconference in Riga: Exploring Bitcoin and Decentralized Social Networks
Last week, NostrWorld’s third unconference, held in Riga, Latvia, gathered advocates and developers of the Nostr protocol. Organized by Jack Dorsey, NostrWorld provides a platform for open-source enthusiasts to collaborate on building a decentralized internet. The event, called Nostriga, underscored the emerging synergy between Nostr’s decentralized social network and Bitcoin. Nostr is an open-source protocol for a decentralized, censorship-resistant social network. Unlike traditional platforms, Nostr operates on a network of relays, supporting features like micropayments and digital identity management. It promises greater privacy and independence from centralized platforms. A highlight of the conference was Strike CEO Jack Mallers discussing how Nostr’s micropayments—Zaps—helped a skeptic understand Bitcoin’s value. This feature shows Bitcoin’s utility in social contexts, advancing the concept of internet tipping. Jack Dorsey enphasizing the importance of open source. Nostr faces the challenge of broadening its user base beyond Bitcoin enthusiasts. New initiatives like Ditto aim to integrate Nostr with larger internet communities, potentially increasing Bitcoin’s visibility and accessibility. Nostr’s role as a social and identity system could pave the way for decentralized digital economies. By leveraging social graphs and cryptographic trust, Nostr and Bitcoin together could enable secure, decentralized commerce.
Reference: Bitcoin magazine
3. Lightspark launches Extend for instant Bitcoin Lightning payments in the U.S.
Lightspark has unveiled Lightspark Extend, a new solution designed to facilitate instant Bitcoin Lightning payments for U.S. businesses. This platform integrates with Universal Money Addresses (UMA) and Lightning-enabled wallets, exchanges, or bank accounts, offering a compliant and cost-effective way to handle transactions around the clock. Lightspark Extend is compatible with over 99% of U.S. banks that support real-time payments, enabling businesses to provide their customers with fast, low-cost transactions. UMA simplifies the payment process by using easy-to-remember addresses similar to email, removing the need for complex codes or passwords. With this launch, Lightspark Extend makes real-time payments via the Bitcoin Lightning Network accessible to eligible recipients across the U.S. Businesses interested in adopting this solution can sign up for a UMA address, link their accounts, and start receiving payments through an onboarding process facilitated by Zero Hash, a regulated U.S. financial institution. The introduction of Lightspark Extend marks a significant advancement in expanding the accessibility and utility of Bitcoin payments. This follows Lightspark’s recent announcement of a partnership with Coinbase, enabling customers to send up to $10,000 instantly through the Lightning Network.
Reference: Bitcoin magazine
4. Public companies boost Bitcoin holdings by nearly 200%, reaching $20 billion
Publicly listed companies have seen their Bitcoin holdings soar by nearly 200% in a year, rising from $7.2 billion to $20 billion. According to Bitbo data, 42 such companies now hold 335,249 BTC, valued at roughly $20 billion. This marks a 177.7% increase from a year ago, when their BTC holdings were worth $7.2 billion. The trend began with MicroStrategy's August 2020 purchase of over 21,000 BTC, making Bitcoin its primary treasury reserve asset, and the company has since grown its holdings to 226,500 BTC. A survey commissioned by Nickel Digital Asset Management revealed strong institutional support for Bitcoin as a reserve asset, with 75% of 200 surveyed institutional investors and wealth managers endorsing public companies holding BTC. The survey, involving firms managing $1.7 trillion in assets, also found that 58% believe 10% or more of public companies will hold BTC within five years. Nickel Digital's CEO, Anatoly Crachilov, noted that institutional investors see Bitcoin as a hedge against currency debasement and a valuable addition to reserve allocations. Despite this growth, the 335,249 BTC held by public companies represent just 1.6% of Bitcoin's total capped supply of 21 million.
Reference: Cointelegraph
5. Bitcoin exchanges see 3rd-largest daily net outflow of 2024
Bitcoin is seeing a significant uptick in exchange withdrawals as its price nears the $60,000 mark, with approximately 45,000 BTC removed from exchanges on August 27 alone. This movement represents the third-largest net outflow of Bitcoin from exchanges in 2024, following similar spikes in July. According to data from CryptoQuant, this trend could signal a growing bullish sentiment among investors, who appear to be transferring their Bitcoin off exchanges to hold for the long term, thereby reducing potential selling pressure in the market. As of August 27, major exchanges hold around 2.63 million BTC, reflecting a 12.5% decrease from the 3.01 million BTC held at the beginning of the year. This reduction in exchange reserves underscores a broader trend of investors preferring to hold their Bitcoin privately, possibly in anticipation of future price increases.
Reference: Cointelegraph
6. BlackRock's iShares Bitcoin Trust faces $13.5m outflow amid broader ETF withdrawals
BlackRock's iShares Bitcoin Trust (IBIT) experienced a $13.5 million outflow on Thursday, marking its first outflow since May 1st and only the second in the fund's history since its launch in January. This rare withdrawal contrasts with the ETF’s usual pattern of consistent inflows, underscoring its dominance in the Bitcoin investment space. The outflow came as part of a broader trend affecting spot Bitcoin ETFs, which saw a collective $71.8 million in withdrawals on Thursday. Competing Bitcoin ETFs from Grayscale, Fidelity, Valkyrie, and Bitwise also reported significant outflows, ranging from $8 million to $31 million. Despite these withdrawals, ARK's Bitcoin ETF saw an inflow of $5.3 million, highlighting a mixed investor sentiment as Bitcoin remains below the $60,000 mark. This divergence suggests varied outlooks among investors regarding Bitcoin's future. Despite the recent dip, BlackRock's Bitcoin ETF continues to lead the market, having attracted over $20 billion in net inflows since inception. With more than 350,000 BTC under management, it remains one of the largest institutional Bitcoin holders, reflecting its enduring appeal and influence in the Bitcoin investment landscape.
Reference: Bitcoin magazine
C. Regulation
1. Nigeria's first provisional exchange license from SEC, marking milestone in digital asset regulation
The Nigerian Securities and Exchange Commission (SEC) has granted Quidax, an Africa-based crypto exchange, its first provisional operating license. This marks a significant step toward formal recognition and regulation of Nigeria's digital asset industry. The SEC's license allows Quidax to operate as a registered crypto exchange in Nigeria, a move the company describes as a "shot of adrenaline" for the local crypto community, spurring innovation and growth. Quidax CEO Buchi Okoro praised the SEC, particularly under the leadership of Emomotimi Agama, for its efforts to bring order and investor protection to the Nigerian crypto market. The approval also paves the way for Quidax to collaborate with banks and financial institutions, pending approval from the Central Bank of Nigeria. This licensing follows the SEC's recent amendment to its rules on June 21, covering digital asset issuance, exchange, and custody. Despite concerns that stringent requirements could limit local crypto exchanges, the new regulatory framework, including the Accelerated Regulatory Incubation Programme, aims to align virtual asset service providers with the latest standards. Nigeria, Africa's largest economy, is a global leader in cryptocurrency adoption, ranking second in Chainalysis’ 2023 Cryptocurrency Geography Report. While foreign investment in Nigeria's crypto sector has been slower than expected, the new regulatory environment and Quidax's licensing could attract more investors by offering a stable and secure market.
Reference: Cointelegraph
D. Macroeconomy
1. Vice President Harris proposes wealth tax targeting unrealized gains for ultra rich
As a presidential candidate, Vice President Harris has aligned with President Biden’s tax policies, including the pledge not to raise taxes on anyone earning under $400,000 annually. However, she also has her own ambitious tax proposals. These include raising the top marginal tax rate on high earners from 37% to 39.6%. Although she previously suggested a 4% “income-based premium” on households earning over $100,000 to fund Medicare for All, this idea has not resurfaced in 2024. Among the more controversial proposals Harris supports is a tax on unrealized capital gains for individuals with over $100 million in wealth. Often dubbed the “billionaire tax,” this would require these households to pay an annual minimum tax of 25% on their combined income and unrealized gains. This approach would be groundbreaking in U.S. tax history, as it taxes assets that have not yet been sold. For example, if you buy stock at $10 and it increases to $20, you would owe taxes on the $10 gain, even if you haven’t sold the stock. The same principle would apply to real estate, where yearly value increases would be taxed. This proposal raises significant concerns, particularly about the administrative challenges of valuing assets annually and the potential for future expansion of the tax to lower wealth thresholds. The wealth tax faces hurdles in Congress and potential court challenges, but it signals Harris's intent to push for new forms of taxation on the ultra-wealthy.
Reference: Forbes
2. Jobless claims drop as labor market slows, US economy remains on steady growth path
Last week, new applications for jobless benefits in the U.S. dropped slightly, but re-employment opportunities for laid-off workers are becoming scarcer, indicating the unemployment rate likely remained high in August. Despite this, the labor market's orderly slowdown is keeping economic growth on track, with the economy growing faster than initially reported in the second quarter, driven by consumer spending and rebounding corporate profits. The labor market's cooling supports the expectation that the Federal Reserve may start cutting interest rates next month, though a 50-basis-point reduction seems unlikely. Initial jobless claims fell by 2,000 to 231,000 for the week ending August 24, while continuing claims, which indicate ongoing unemployment, rose slightly, suggesting prolonged joblessness. In the second quarter, the economy grew at an annualized rate of 3.0%, with consumer spending revised upward to a 2.9% growth rate, offsetting lower business investment and exports. Corporate profits also reached a record high, helping businesses manage input costs amid supply-chain challenges. The goods trade deficit widened in July due to a surge in imports, likely driven by expectations of higher tariffs if former President Trump wins the November election. Despite these factors, economists predict growth will slow but avoid a recession.
-
@ 469fa704:2b6cb760
2024-09-02 06:11:43I joined Nostr a week ago and wanted to recap it for myself and also give other newbies a simple introduction. Maybe this will help you get started too.
Step 1: Create your identity and get your private key for a browser extension
I started with the Snort client on my local home server. It created my private/public key pair and I was good to go. Then I transferred the private key to Amethyst, a pretty good Android-based client. Before looking at various clients and other nostr-based websites, I tried transferring my private key into a browser extension. I looked at Alby and nos2x. I chose the latter because I wanted to keep my Lightning wallet separate from my identity management. You don't have to, I just found it easier.
Step 2: If you're confused, always check your feed settings
I tried many different clients and was very confused at first. Due to its decentralized nature, Nostr relies on relays, which are just small servers, and to each one you can connect to, all your data is stored. When you post a message, write a note, an article like this or simply who you follow. The main reason and benefit for this is that there is no single point of failure or server-like entity that could be censored. The side effect of this, combined with using different clients, was that not only did it look different everywhere, but the content was also very different. This was simply because I wasn't connected to all my different clients with the same relays. But the main reason why each feed looks different on each client is usually because you can choose different variations of feeds and some clients even offer filters for the feeds.
Scroll down to get a small overview of the clients I've tried.
Step 3: Set up your lightning wallet with something like Wallet of Satoshi
I made my Bitcoin Lightning wallet independent of my identity. That's why I just went with the number one Lightning wallet on the market: Satoshi's Wallet. It's very simple and provides you with a Lightning address that resembles and has the format of an email address. You can add this address to your Nostr profile description and you're ready to receive Sats. Anyone can send them to you, e.g. for a good message or something else they find valuable on Nostr (like a podcast, a video, an article, ...). Just be aware that Satoshi's wallet contains your key and the sats you have there are not really your sats. So only leave a small amount there or no more than you need for your nostr experience.
Step 4: Set up your Nostr address
I set up a unique NIP-05 identifier that is human readable and also looks like an email address. For me, that's tobiya@nostrplebs.com, also called a nostr address. It's much easier to read, share and remember than your public key, which is just a long, unwieldy string of characters.
Some popular services are: * NostrVerified * Alby * Iris * Primal * Snort * nostrplebs.com
Most offer free services or at least a free tier. I chose nostrplebs.com because it links my Nostr address (tobiya@nostrplebs.com) to my Lightning wallet. ⚡
Brief overview of the clients (I have tested)
Web/Browser:
- Primal: Fast, user-friendly, nice looking, easy to use
- Coracle: Focuses on decentralized reputation, privacy and trust metrics. Also well organized and structured
- noStrudel: The most comprehensive I've found, has everything
- Rabbit: Designed like X (Twitter) Pro, focuses on everything at once
- Nostter: Clearly structured, easy to find what you're looking for
- Snort: Fast web client for those who prefer simplicity and speed.
iOS
I'm not an iPhone user, but everything I've discovered says that Damus is the best app for iOS.
Android:
- Amethyst: Feature rich for Android, I only tried this program because it gives me everything I currently need on my phone.
- Primal: Works seamlessly with Primal on the web, which is a pretty convenient starting point if you only want to use one client.
As for the web clients, I'm still figuring out which one will be my favorite. But I think they're all good in their own way. In the time of writing, I am mainly using Primal on Android and Web, Amethyst and noStrudel.
Let's have fun!!
-
@ 45bda953:bc1e518e
2024-10-23 10:15:14Morning light shone beautifully through the arched rose stained glass of the modest cathedral. From the east Ceb rays permeated inside of the stony structure with splendour. A priest standing elevated over the crowd by a forward leaning pulpit, like a comical figurehead on the bow of a ship. Almost precariously, as if it should not be able to suspend him, though no one doubts that it would. Ecknard has never seen the church so full. The devotion of the colony has been growing but he did not expect a turnout of this scope. He swelled with pride and blinked away the moist warning sign of tears. People were even gathering around the outside of the building for a lack of benches to accommodate all the derriere's. Everyone was silent in pious reverence of the holy day. This day would initiate the MD epoch. Domitius, Cleolia and Albin were sitting in the front pew. Albin, dressed in respectable although a slightly uncomfortable suit could not help but shift in his seat, awkwardly feeling as if he were disturbing everyone around him. Ecknard motioned with outstretched arms to alert all that he is about to address the congregation. The silence was so disciplined that you could hear the flap of his sleeves and a small bird chirping away on the stone windowsill outside, merrily indifferent to the solemnity of air the building exuded. “Kaspian brethren, esteemed Magar, today is a most holy and greatly anticipated occurrence! Before we initiate festivities I wish to expound, primarily to the benefit of the younger people in our company, the history of our colony and to express thanks. Ahem... It has been III cycles now since our colony had been established! Our endeavours have been blessed with great bounty, we have expanded independently in isolation! We, who are old enough to remember, were discharged, from the Primary Omega Expansion Vessel with only the implements of labour, livestock, seed, steely resolve and courage in our hearts. We asserted ourselves and rose to a daunting challenge, A party of MCCC slaves and free men to tame a wild land, adapt to a star with a volatile proclivity and a planet with different rotational patterns from what we were accustomed!” A slight excitement erupted from the crowd but Ecknard muted it quickly with outstretched arm. "Our esteemed visionary and great leader prepared a way for us, long before any of you even considered the freedom and opportunity, a chance to build something and own it!” The priest’s voice ascended powerfully out over the people. “He had a dream, an idea, a grand scheme to expand the Empire!” Ecknard motioned down to Domitius. The crowd erupted in cheer chanting, the older Kaspian men softly beating their chests with their fists. “Domitius! Domitius!” The lord’s composure remained unchanged, as if he were alone in private devotion. Cleolia blushed slightly and tilted her head using her hat to protect her from the incessant adoration. Albin could not contain his own excitement and stood up on his seat in the pew to get a better view of the standing ovation, absorbing the glory directed towards his father.” The priest waited for the people to exhaust themselves until there was only an isolated call before continuing his monologue. “A student of the void, a sage of stars, a scientist of renown! Scoffed and ridiculed by his peers! They laughed and jested when he proposed his innovations. They published warnings and mockery of his ambition proclaiming to all that they would be proved fools if they are seduced by his unrealistic promise. Their jealousy moved them to lobby the high council to convince them, and convince them, they did. By ratio of VIII to II refused to grant him licence!” Ecknard leaned forward over the pulpit with a fierce look of disgust in his jowl. “A council on which he holds a seat to this day... He was denied the opportunity to improve the lives of future generations and untold millions by his own house! His desire to see his dream realised pushed him to do what no Magar noble ever has or would ever dare much less someone born of sacred blood!” Ecknard gripped at his robe as if to curtsy or show fear, no one understood the gesture. “He ventured outside the confines and protection of Magar Prime void. He brought his technological treasure to us! We Kaspa were undeserving of the honour! The Kaspian elders endorsed him granting freedom to continue his research and install his technology. A true Magar with holy blood in his veins travelling betwixt our stars!" He looked up and pointed at the arches as if he could see the stars through the stone and daylight. "Brethren, allow me to express the distinction of this achievement. Habitable planets are as rare as sat. Inhabitable planets are so rare, wars were fought at the mere rumour or hope of their discovery. With his star shields he was able to block the solar winds in systems that were inhospitable to travel through and not a single inhabitable planet to be found. With time and stimulus unnatural landscapes of horror and perdition were transformed into paradise. Our esteemed Lord Domitius with his lovely wife spent III cycles inhibiting stars and seeding planets with life. The Kaspian Academy of Sciences had a revival and all the concerted efforts of our people were united in spirit when we witnessed the first sun shields confine their chosen stars..." His tone became soft and morose. "We are truly blessed to have tamed XIV stars within our own void region. Kaspa is quickly becoming the most dense concentration of occupied habitats in the known universe. The family Chevalier conquered Ceb the most volatile star in the Kaspian void. And to inspire confidence in the stability of the star shield he settled under it’s umbrella to live through it’s success or die by it’s failure.” He paused for sincere dramatic effect. “The Seat of the Empire has since changed it’s opinion, humiliated and shamed are they who doubted... All glory to the Core.” “All glory to the core.” The mass repeated in unison. “Today we approach block CCCXV million since Genesis. The Epoch MD. One thousand five hundred epochs in the scientific metric tongue. The known universe is united in celebration, a ceasefire has been negotiated by Empire and the Juela Federation. Both are bound by the accords. No war may be fought. CCLXII million blocks have transpired since Exodus, when the almighty Core made Mother Terra desolate with the fires of it’s Judgement. Punishing mankind for it’s greed and vice. We thank the Core that it extends it’s reach to the outer void by way of the drift gates, unites mankind across the great divide by way of the XII anchor gates and that it continues to be merciful, guide and bless us. All glory to the Core. Amen.”
...
scifi
-
@ 5fe0d982:250048e1
2024-10-22 08:37:44Fireflies, also known as lightning bugs, are one of nature’s most captivating insects, enchanting people worldwide with their bioluminescent glow. Found in warm and temperate regions across the globe, these small beetles, belonging to the family Lampyridae, have a unique ability to produce light, which plays a vital role in their survival, mating rituals, and communication. The beauty and mystery of fireflies have fascinated scientists, poets, and nature lovers for centuries.
The Science Behind the Glow
Fireflies produce light through a chemical reaction called bioluminescence, which occurs in specialized cells in their abdomen. This glow is created by the enzyme luciferase, which acts on a substrate called luciferin in the presence of oxygen, magnesium, and adenosine triphosphate (ATP). What makes this process extraordinary is its efficiency — nearly 100% of the energy in the reaction is emitted as light, making it one of the most efficient biological processes known. Unlike incandescent bulbs, which emit a lot of heat, fireflies generate “cold light,” which means almost no energy is wasted as heat.
The color of the light can range from yellow to green to pale red, depending on the species. Interestingly, the glow is not continuous but happens in pulses or flashes, which vary in frequency and pattern from one species to another.
The Role of Light in Mating
One of the most critical functions of the firefly’s glow is in courtship and mating. Male fireflies use light to signal their presence to females, and each species has its own distinctive flashing pattern. Females of the same species respond with a specific flash pattern of their own, allowing males to identify potential mates. This fascinating behavior is a form of communication, ensuring that individuals of the same species find each other in the dark.
Some species of fireflies engage in more complex light displays, with groups of males synchronizing their flashes in an almost choreographed manner. In certain regions, particularly in Southeast Asia and parts of the United States, tourists flock to see these mass synchronization events, where thousands of fireflies light up in unison, creating a mesmerizing, rhythmic glow.
A World of Diversity
There are over 2,000 species of fireflies spread across different continents, and they can be found in a variety of habitats, including forests, marshes, fields, and gardens. Fireflies thrive in warm, humid environments, making them common in tropical and subtropical regions.
While their ability to glow is perhaps their most famous trait, fireflies are also notable for their other life stages. Firefly larvae, sometimes called glow worms, also produce light and live in moist environments, such as under the soil or in leaf litter. These larvae are predatory, feeding on snails, slugs, and other small invertebrates. Some species remain in their larval form for up to two years, and only live for a few weeks as adults.
The Threats They Face
Despite their enchanting glow, fireflies are facing significant threats to their populations. Habitat loss due to urbanization, deforestation, and the use of pesticides in agriculture has drastically reduced their natural habitats. Light pollution is another growing concern, as artificial lighting interferes with the fireflies’ ability to communicate and find mates. This disruption in their mating patterns can lead to declining populations over time.
Conservation efforts are gaining momentum as people become more aware of the importance of preserving firefly habitats. Creating “firefly-friendly” environments by reducing pesticide use, limiting outdoor lighting, and conserving wetlands and forests can help maintain the delicate ecosystems these insects rely on.
-
@ ee7d2dbe:4a5410b0
2024-10-23 07:14:35React native App Development Services from Agicent ?
We used to use various flavors of Javascript long before react native came into being and once it came, we went all big on it. There were times when React-native and other cross platform technologies (like Flutter, Ionic, QT) were only good for creating App MVPs and had a lot of issues such as integration with third party libraries, with Device’s own hardware capabilities and so on. But today as of mid-2022 we can safely say that React Native can help building as good or superior apps as a native tech would do and that do with single coding effort. Its like Java of old days, “Write once, run anywhere”.
Theoretically, an App that you can make in React-native can be created in Flutter or ionic or in native technologies too. However, if we have to rate the cross-platform technologies, react native rules the roost hands down because of its larger community support, flexible frameworks, and capability to generate the native code over other platforms.
Rates for react native App Developers on Demand
Following is the standard rate card for different Exp and skill levels of On Demand Reac Native App Developers. Besides this, we can also create a custom on Demand App Team and optimized the monthly rate based on our specific needs.
Junior React Native Developer
Exp. Level: 1-2 Years
Hands on react native Development.
3 Projects experience minimum.
Agicent’s inhouse trained.
Familiar with PM Tools
Perfect for rapid MVPs and maintenance react native works
Starting at $ 2200 /mo.
Mid-level React Native Developer
Exp. Level: 2-5 Years
All of Jr. Dev +
10 Projects experience minimum.
Has Backend Experience.
Hands on CI/CD pipeline.
Manages Jr. Developers.
Perfect for complex react-natived projects and fast Development
Starting at $ 2900 /mo.
Senior React Native Developer
Exp. Level: 5+ Years
All of Mid-level Exp +
15 Projects experience minimum.
Full Stack Developer.
Participate in Architecture.
Ability to play Tech. Lead Role.
Perfect for bigger size projects with multi teams
Starting at $ 3800 /mo
BEST Practices followed by Agicent React Native App Development Company
First and foremost, we critically analyze if the App project is a good candidate for cross platform or react native development or not. In some pretty niche Apps, native can still be a technology of choice so ruling out this possibility is most important first step. Once it is identified that react native is the tech of choice, we then figure out the backend stack (like node.js or graphql, or traditional LAMP stack), or web front-end third-party libraries, like vue.js, typescript, redux etc. If it’s a regular kind of app that we do time and again (like a dating app or ecommerce app, or healthcare app) then we decide on tech stack in few hours only; if it is a niche one- of-a-kind project (like an AI based app suggesting you medicine dosage or an App that heavily uses some third- party APIs for its core function – like creating digital avatars or facilitates Holoportation) then we take more than few hours to check on libraries, their scalability with react native and then decide.
Performance optimization, Build optimization
Native applications are top performers because they use stock APIs, patters, and enjoy best support from the OEM’s OS and hardware and you achieve great performance by the virtue of the platform. However, in case of creating a react native app, which is cross platform by the way you have to use a variety of testing tools (like Appium, jest, detox etc), be more meticulous for performance parameters, and optimize your code for best performance across different devices. It can be a time-consuming exercise at times, but totally worth it and warranted.
For react native app development, you have to take care of multi-threading, third party library integration in optimized way, image compression, APK or iPA file size optimization and lot more what you don’t really do when doing native app development.
Limitations of React Native App Development
Lack of native libraries:
If the app has a lot of features, React Native can slow down the development process due to a lack of native libraries and reliance on external, third-party libraries.
Takes more time to initialize:
The issue with React Native is that it takes more time to initialize the runtime for gadgets and devices, mostly because of the JavaScript thread which takes time to initialize.
Excessive Device Support required
Due to the variety of OEM Devices size, Type, Version, and OS Versions, it is challenging for a developer to provide full support to all the app uses in one go, so it becomes sort of a continuous exercise to extend support to more and more devices.
Still in pre-mature face
React native latest version is 0.68 as of June 2022, which shows that it is still in face of evolving which is why it still have lack functionality. Good thing is that it is continuously maturing and have community support with big tech giants like Facebook & tesla also it easy to learn and understand even for the beginner.
React Native Doesn’t Fully Support NFC
NFC enables the communication between nearby devices. But React Native Devices still don’t support or provide full access for NFC communication.
Future of React Native Development
Start-up first choice
Many big names like Facebook, Instagram, tesla and all have an app on react native also react native becomes one of the most discussed libraries on StackOverflow. Most startup and even enterprise start adopting it because it only needs a single manager to manage for both android and IOS app development which save it time, resources and money.
Better integration with Device’s and external Hardware
We are already working on some react native projects where we are interacting with external hardware (using Silabs or infi semiconductors) and have found that react native doesn’t always get priority support, however this is going to be changed in the future. React native will be more scalable and easier to integrate with device’s own hardware as well as external Hardware (Bluetooth, NFC devices).
Open the gate for new open-source frameworks
The domain-specific engineers are meet-up and do conferences in which each platform bring their own player who are working on a similar problem. Like web where react (which power react-native) which commonly draw inspiration from other open-source web frameworks like: Vue, Preact & Svelte. On mobile, React Native was inspired by other open-source mobile frameworks, and we learned from other mobile frameworks built within Facebook.
Source: https://www.agicent.com/react-native-development-company
-
@ 0edc2f47:730cff1b
2024-09-02 01:54:55Chef's notes
In this case, sweet-and-sour doesn’t mean Americanized Chinese food but rather the sauce that dominated the Shabbos and Pesach dinner table among American Jewish immigrants in the early 20th century.
Details
- ⏲️ Prep time: 30 minutes
- 🍳 Cook time: 6 hours
- 🍽️ Servings: 12
Ingredients
- 1 medium onion, peeled and quartered
- 2 tsp ground ginger
- 8-10 large cloves garlic
- 1 cup ketchup
- ¼ cup dry sherry
- ¼ cup sake
- ¼ cup cider vinegar
- ¼ cup soy sauce
- ¼ cup honey
- ¼ cup Dijon mustard
- 1 tablespoon coarsely ground black pepper
- ¼ teaspoon ground cloves
- 1½ cups Coca-Cola, ginger ale, or Dr. Pepper
- 1 first-cut brisket, 6 to 7 pounds (2.7-3.2kg), rinsed and patted thoroughly dry
Directions
- Preheat oven to 325F / 160C.
- Combine all ingredients except brisket in a blender and blend until smooth.
- Place brisket in a Dutch oven or other large pot with a tight-fitting lid.
- Pour sauce over brisket, place lid on pot, roast in oven for 3 hours. Flip roast and return to oven for 3 hours or until fork tender.
- Remove roast to rest. Skim fat from sauce and reduce if desired. Serve immediately with sauce or cool, cover brisket and refrigerate overnight in cooking pan. The next day, defat sauce, reduce if desired, and reheat meat in sauce before serving.
-
@ 3b7fc823:e194354f
2024-09-01 23:52:38I dOn'T cAre ABouT pRivAcY. IT dOEsN'T maTtER. i'M nOT dOiNg AnyThiNg wRonG.
GHOSTn
Your phone is spying on you. Your apps are spying on you. Your websites, search engine, fitness tracker, smart watch, IoT device, EVERYTHING is collecting anything it can and sending it off to be stored, cross referenced, and sold.
Data is the new oil.
So what? I don't care if Google knows I like motorcycles. By itself one data point isn't a big deal but once you start bringing everything together...
Who are you talking to? When and how long did you talk to them? Where did you go? How often do you go there? On and on the profile starts to become overwhelmingly invasive.
Right now it is extremely cheap and easy to collect and store the data but it's hard and expensive to cross reference and tabulate the data down to the individual. But in the extremely near future using AI and faster processers, data profiles for sale go from white men between 25 - 30, with this education level, and background like XYZ to -> John loves motorcycls and steak.
Suddenly your insurance premiums are way higher than your friends because you partake in dangerous activities and eat too much red meat. You get denied that loan because you invest in risky assets and it raises your risk factors to pay it back. That job that you applied to never responded because they already ran you through the algorithm and you don't fit the culture.
Protect your data and privacy now before its too late.
privacy
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:44:52Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10.5 ounce) each condensed beef noodle, bean with bacon, and cream of celery soup
- 2 Soup cans water
- 2 TBSP chopped parsley
- 1 TBSP Worcestershire
Directions
- Combine soups and water.
- Add parsley and Worcestershire
- Heat to simmer.
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:41:04Chef's notes
Add cooked rice to stretch. Serve with celery for crunch. Top with Parmesan cheese for a nice change. You can also use red or yellow sweet peppers instead of or along with the green peppers.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 TBSP Chopped green pepper
- 2 TBSP Chopped onion
- Dash oregano
- 2 TBSP butter
- 1 Can (10.5 ounce) condensed tomato soup
- 1 Soup can Water
Directions
- Cook green pepper, onion, oregano in butter until tender.
- Add soup, and water.
- Heat till simmer, stirring often.
-
@ 6c2d68ba:846525ec
2024-09-01 13:02:53Dear friend,
it seems like you have decided to turn your back on those walled gardens and set sails to enter uncharted territory. A world without walls, an open world, a world of beautiful chaos. At least for today, I don't intend guiding you out of the safe harbour onto the open, endless sea. Today, my only intent is sharing a few thoughts, before you depart.
As a wise man on Madeira once said, it's not so much about having the right answers, it's about asking the right questions. While I'm not certain whether I have found the right questions myself by now, let me share the current set with you:
-
What causes the discomfort that drives you out of the walled garden onto the open sea?
-
Are you trying to transfer from one walled garden to the next one, where the difference being a slightly friendlier colour on the wall?
-
What are you hoping to find on the open sea that walled gardens cannot provide?
-
What are you willing to sacrifice for freedom (of speech)?
-
What will you need to keep the ship afloat?
-
How will you react when you find yourself in the middle of a storm?
I sincerely believe that it's worthwile taking a step back before departing to reflect on the big picture and the underlying paradigm shift between walled gardens and nostr. This is not about building competitors to broken systems, this is not about mimicking centralised services, this is not about repeating the same mistakes over and over.
This is about building a new world, an open world without walled gardens and data silos.
Onwards!
-
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:35:35Chef's notes
Serve with crackers
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- ¼ Cup Spam
- 1 TBSP butter
- 1 Can (10.5 ounce) gumbo soup
- 1 Soup can water
- Dash Tabasco
Directions
- Brown Spam in butter.
- Mix gumbo, water, and heat to simmer.
- Add Spam.
- Tabasco to taste
-
@ 42342239:1d80db24
2024-08-30 06:26:21Quis custodiet ipsos custodes?
-- Juvenal (Who will watch the watchmen?)
In mid-July, numerous media outlets reported on the assassination attempt on Donald Trump. FBI Director Christopher Wray stated later that same month that what hit the former president Trump was a bullet. A few days later, it was reported from various sources that search engines no longer acknowledged that an assassination attempt on ex-President Trump had taken place. When users used automatic completion in Google and Bing (91% respectively 4% market share), these search engines only suggested earlier presidents such as Harry Truman and Theodore Roosevelt, along with Russian President Vladimir Putin as people who could have been subjected to assassination attempts.
The reports were comprehensive enough for the Republican district attorney of Missouri to say that he would investigate matter. The senator from Kansas - also a Republican - planned to make an official request to Google. Google has responded through a spokesman to the New York Post that the company had not "manually changed" search results, but its system includes "protection" against search results "connected to political violence."
A similar phenomenon occurred during the 2016 presidential election. At the time, reports emerged of Google, unlike other less widely used search engines, rarely or never suggesting negative search results for Hillary Clinton. The company however provided negative search results for then-candidate Trump. Then, as today, the company denied deliberately favouring any specific political candidate.
These occurrences led to research on how such search suggestions can influence public opinion and voting preferences. For example, the impact of simply removing negative search suggestions has been investigated. A study published in June 2024 reports that such search results can dramatically affect undecided voters. Reducing negative search suggestions can turn a 50/50 split into a 90/10 split in favour of the candidate for whom negative search suggestions were suppressed. The researchers concluded that search suggestions can have "a dramatic impact," that this can "shift a large number of votes" and do so without leaving "any trace for authorities to follow." How search engines operate should therefore be considered of great importance by anyone who claims to take democracy seriously. And this regardless of one's political sympathies.
A well-known thought experiment in philosophy asks: "If a tree falls in the forest and no one hears it, does it make a sound?" Translated to today's media landscape: If an assassination attempt took place on a former president, but search engines don't want to acknowledge it, did it really happen?
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:30:47Chef's notes
Trim down bread to fit serving bowl, if necessary, prior to broiling. Try using a biscuit cutter for perfect bread rounds. A cookie cutter could be used to treat children.
The addition of the vegetable juice creates a fuller flavor than the previous onion soup recipe.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10.5 ounce) condensed onion soup
- 1 Soup can water
- ½ Soup can V8 juice
- 2-3 slices French, or Italian bread, or Texas Toast
- Butter
- Parmesan cheese
Directions
- Combine soup and water.
- Heat to simmer.
- Place bread on baking sheet, butter, and top with cheese.
- Broil bread until browned.
- Ladle soup in bowl
- Top soup with bread
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:25:20Chef's notes
Try using a biscuit cutter for perfect bread rounds. A cookie cutter could be used to treat children.
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10.5 ounce) condensed onion soup
- 1 Soup can water
- 2-3 slices French, or Italian bread, or Texas Toast
- Butter
- Parmesan cheese
Directions
- Combine soup and water.
- Heat to simmer.
- Place bread on baking sheet, butter, and top with cheese.
- Broil bread until browned.
- Ladle soup in bowl
- Top soup with bread
- Trim down bread to fit serving bowl, if necessary, prior to broiling.
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:19:57Chef's notes
Serve with coleslaw, and chips on the side. Pictured here using English muffin, with a side of mung bean sprouts.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- ¼ Cup Chopped onion
- 2 TBSP Chopped green pepper
- 1 TBSP butter
- 1 LB Ground beef
- 1 can (10.5 ounce) bean with bacon soup
- ½ Cup water
- ⅓ Cup ketchup
- Hamburger buns, toasted
Directions
- Cook onion and green pepper in butter until tender.
- Add crumbled ground beef, brown
- Add soup, water, and ketchup
- Heat to simmer, stir often for five minutes.
- Spoon on buns, serve.
-
@ 472f440f:5669301e
2024-08-27 22:36:32I'm sure you are all well aware of the news out of France. The French government has made the bold move of arresting the founder of Telegram, Pavel Durov, after charging him with 12 criminal counts ranging from "complicity in web-mastering an online platform in order to enable an illegal transaction in organized group" to "importing a cryptology tool ensuring authentication or integrity monitoring without prior declaration".
Telegram is an extremely popular messaging app that is used by almost 1 billion people from around the world. I have personally been a user for seven years and it is very dismaying to see the French government attack an entrepreneur who has built a widely used and loved app. We've said it many times over the years in this rag, governments need to stop throwing the baby out with the bath water by attacking successful businesses for the crimes their users commit and begin doing better law enforcement. It makes no sense to demonize a technology for the crimes that are committed by a small minority of users of that tool. Is the French government going to go after the CEO of Bic, the largest producer of pens in the world, because there are pen pals out there who use their pens to write letters in which they coordinate criminal activity? If we apply the same logic behind the decision to arrest Pavel it would seem that the Bic CEO should be a bit worried.
Who knows what evidence the French government has against Pavel. Maybe he is directly involved in the coordination of crimes that were committed on his app. I highly doubt it, but who knows. We'll have to wait and see what evidence the French courts put forth once a trial gets under way. As of yesterday, we know that this seems like a classic case of "You refuse to cooperate with deep state actors who want access to your users' data, so we're going to accuse you of all of the crimes."
The fact of the matter is, we shouldn't have to worry about the actions of a founder dictating the accessibility of a novel technology that they bring to market. Especially technologies that enable people to connect in the digital world to exercise their God given right to free speech.
It's a bit poetic that this happened on Saturday night in Europe. Just one day after the Nostriga conference in Riga, Latvia wrapped up. Nostriga was a two-day event which attracted people from all over the world so that they could meet to discuss how to push the Nostr protocol forward. For those who are unaware of what Nostr is, it is an open source communications protocol with no leaders that enables individuals to publish their thoughts to the world is a distributed, censorship resistant fashion. User profiles are created via a private-public key pair. The public key makes it easy for others to follow and the private key enables a user to sign notes with certain data that get broadcasted to relays. App developers can then pull the user generated data from those relays and present the data in unique ways using front-end interfaces known as clients. Users can port their private keys (commonly known as nsecs) into any client they like and have all of the data they've published to the protocol automatically show up. Said another way, since Nostr is a protocol and not a platform, users have way more optionality when it comes to the applications that present the data they publish. If one client decides to censor or simply has a bad UX, they can plop their magic string (private key) into another client and see everything they've ever posted while still being connected to everyone they added to their social graph historically. This is extremely powerful on many fronts.
Gone are the days of having to worry about building an audience on a platform, making that a critical part of your brand and livelihood, and having to self-censor because of the fear of being deplatformed. You own your private key and that gives you access to your data. Not the platform.
For app developers, the network effect of Nostr produces an incredible and truly unique bootstrapping mechanism. Instead of having to start from scratch and hope that users find your app, fill it with data, and begin spreading the word to more users you adopt the social graph of Nostr from day one. Every user of the protocol is already feeding your application data. If you can build an appealing product that provides users of the protocol with value, they will find it and immediately be able to leverage it. There will be no need for them to build up a reputation or find their social connections on the app. They will be ported into the client.
Nostr can be additive to seemingly unrelated applications that aren't built directly on Nostr. We've already seen this with bitcoin wallets that have enabled users to port their Nostr social graphs directly into their wallet. Making it easy for individuals to find their friend's Nostr account and send bitcoin directly to the lightning address they've associated with it. No need for an invoice. Just find your friend and send them money like you would on an app like Venmo.
The number of added benefits users and app developers get from Nostr beyond those I just explained are too long to list. Long story short, this protocol is a massive deal.
It is still very early for Nostr, but the progress that has been made in the last couple of years has been nothing short of awe inspiring. If you squint into the future, it isn't hard to see how Nostr becomes mainstream by the end of the decade. The compounding network effects are stronger than anything I've seen since bitcoin.
All of this is to say that this will be one of the only ways to build truly robust communications-based applications moving forward. As we've seen with TikTok and now Telegram, if the state doesn't like the owner of a particular platform they will either kick the platform out of their country or arrest the founder and do their best to corrupt the platform itself once he is in custody. This hasn't happened yet with Telegram, but you can bet your ass that the deep state will try to corrupt Telegram if they successfully remove him from the picture.
To be clear, this doesn't make the founders of particular Nostr clients immune to this type of overt overreach by governments. However, the design of Nostr is such that governments would have an exponentially harder time achieving their end goal, suppressing and controlling speech that's expressed on these platforms, because the protocol has hundreds of competing clients serving customers the data stored in relays. They could even attempt to go after the relays, but that task may prove to be impossible as well.
Make no mistake, we live in very trying times. The world's governments are losing control and they are doing the best they can to suppress freedom of speech in anyway they can to prevent people from spreading information that makes the Regime to look like the evil fools that they are. The best we can do is to build robust systems that make their attempts at suppressing speech as close to impossible as is possible. The efforts to build out robust systems like bitcoin and Nostr should be complemented with pushing back against the Regime via the courts. But as we all know, we can't always depend on the courts to actually deliver justice. There are times where freedom must be taken and defended. We are certainly living through one of those times right now.
Despite the insanity of the world and the governments who would like to rule it, the momentum of the light is building. People are taking action and solutions are being built slowly but surely. It is our job to keep the momentum up and make sure the lifeboats of bitcoin, Nostr and similar protocols are ready to go once the Deep State begins attacking others. They came for TikTok and Telegram. Don't think that platforms like X, Rumble and Gab aren't in their crosshairs as well.
Here are four videos from Nostriga that I think you all should watch.
https://youtu.be/XUsk7cqZyKU?si=2vUl01azeFJQjczZ
https://youtu.be/qUwXRDrfJU0?si=np3vyTDddoQKuPJK
https://youtu.be/OHqxp-Hrx9k?si=K7vhVBWtFQwB68Tr
https://youtu.be/iZyqVGHjDGo?si=CjJCbAlNBa06qcwV
And a panel I hosted about funding Nostr if you're interested in that.
https://youtu.be/qD-Y0fq5KiA?si=L81sFCPGw2ayXXzw
We're going to win.
Final thought... Jet lag sucks.
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:04:53Chef's notes
Use slotted spoon to place green beans on toast.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- ¼ cup Chopped onion
- 2 TBSP butter
- 1 Can (10 ½ ounces) condensed cream of chicken soup.
- ⅓ cup milk
- 1 can (5 ounce) chicken, or 1 cup diced cooked chicken
- 2 boiled eggs, sliced
- 4 Slices of toast
- French style green beans, cooke
Directions
- Cook onion in butter until soft, not brown
- Mix soup, milk, chicken, and most eggs, add to onion. (Reserve some egg for garnish)
- Heat through stirring often.
- Heat beans, divide equally and spoon on toast.
- Top beans with chicken.
- Garnish with remaining egg.
-
@ 3c7dc2c5:805642a8
2024-10-23 06:09:57🧠Quote(s) of the week:
"At some point, people will realize that they have more to fear by not embracing this technology than by embracing it." - Michael Saylor
'The tail (Bitcoin) seems to be wagging the dog (ECB)... until the world realizes Bitcoin is the dog and central banks the tail.' -Tuur Demeester
🧡Bitcoin news🧡
Of course, I will start this week's Weekly Recap with a short recap on the new ECB paper: 'The distributional consequences of Bitcoin.' by Jürgen Schaaf & Ulrich Bindseid aka the ECB BTC-gaslighters.
Why do I say gaslighters? Those two gentlemen already wrote a paper in 2022 "Bitcoin is basically dead". Just for your information, Bitcoin is worth 64% more today than when Jürgen & Uli made that statement. Ergo, ECB economists during the bear market: it's a worthless scam; ECB economists during the bull market: it's not fair.
Anyway, the new paper is a true declaration of war: the ECB claims that early Bitcoin adopters steal economic value from latecomers. “If the price of Bitcoin rises for good, the existence of Bitcoin impoverishes both non-holders and latecomers"
I quote Tuur Demeester: 'I strongly believe authorities will use this luddite argument to enact harsh taxes or bans' A bit below in the Bitcoin segment you will already see some first steps from governments to imply some harsh taxes on their (Bitcoin) citizens. Now back to the paper and my view on it. Let me start with the following: It’s not our fault (ECB, no coiners) you didn’t take the time to study Bitcoin, the signs were everywhere.
How freaking cool is it and I know we are winning when the ECB is quoting people like Marty Bent, and Molly White, quoting from Bitcoin Magazine, excerpting Trump and RFK from Nashville, and matching price movements with electoral polls in its research papers. Madness!
This is one of the first times in history that those who weren’t supposed to get wealthy did. Bitcoin is leveling the playfield for everyone. Lovely to see that the ECB, and in time the EU, will actively attack the only thing that can save this continent in decline.
Just to hit you with some logic. We, the public need a PhD - some ECB economist, to tell us that investing early in stocks, a house, art, or whatever makes it any different than investing early in Bitcoin. All they say is whoever enters an asset class earlier accrues more value than those who enter later, right? Again, like in every other asset class. For example, and I quote Ben Kaufmann: “If the price of Apple /Nvidia (you name it) stock rises for good, the existence of Apple/Nvidia (you name it) impoverishes both non-holders and latecomers.” See how stupid that sounds? Can someone find any logic in this?
Bitcoin protects you from the fiat clowns at the ECB who inflate the currency into oblivion and then blame Bitcoin for people being poor. “protect yourself from currency debasement with Bitcoin.”
I truly hope the ECB is at its final stage of denial and is only one 'logical' leap away from realizing that they need Bitcoin on their balance sheet. To finish this bit, the ECB is doing a great job. Cumulative change has been just -40,57 % in about 20 years.
The real thieves are the people who can create fiat money out of thin air and dilute entire populations behind their backs. Something the ECB and big banks perform as a primary function. Bitcoin simply allows anyone to protect themselves from fiat debasement and reliably improve their standard of living.
Sam Callahan: 'Holders of worse money will lose out to holders of better money. Welcome to Reverse Thiers’ Law. It’s not Bitcoin’s fault that these institutions destroyed their currencies. Fortunately, anyone can opt into BTC. The choice has been yours since 2009. Choose your money wisely.'
On the 14th of October:
➡️Publicly-listed German company Samara Asset Group to buy Bitcoin using a $33M bond.
➡️MicroStrategy stock has done over $3.2 billion in trading volume so far today.
➡️$1.45 trillion Deutsche Bank partnered with Keyrock for Crypto and FX services. Great thing that these huge, although DB is insolvent, legacy banks will dump billions into the space, and allow people with complex financial situations to own and utilize Bitcoin.
On the 15th of October:
➡️Fed’s Kashkari: Bitcoin remains worthless after twelve years. Almost the 6th largest monetary asset in the world...Blackrock and Fidelity beg to differ. Blackrock now holds 1.87% of the mined supply for its clients. Fidelity holds 0.93%. At a 1.35 trillion market cap 1.2 billion wallet addresses would say otherwise.
➡️Metaplanet purchases an additional 106.97 $BTC. They have purchased an additional 106.976 Bitcoin for ¥1 billion at an average price of ¥9,347,891 per Bitcoin. As of October 15, Metaplanet holds ~855.478 Bitcoin acquired for ¥7.965 billion at an average price of ¥9,310,061 per Bitcoin.
➡️Adam Back's company Blockstream raises $210 MILLION to buy more Bitcoin for its treasury and fund its other initiatives.
On the 16th of October:
➡️93% of the Bitcoin supply is in profit. We can HODL longer than the market can remain irrational.
➡️You know the day will come. Governments will use Bitcoin to get more taxes or do 'capital control' / 'exit control' / 'control of money'.
Italy's Deputy Finance Minister Maurizio Leo announced their plan to increase capital gains on Bitcoin from 26% to 42% because "the phenomenon is spreading." Immoral tax on regular people. Rich people will have a workaround.
The main question on this matter is how many other states follow this path before other nations realize the benefits of embracing Bitcoin. Work > Pay Income Tax > Invest your money > Take risk > Pay half your profits to them.
➡️Bitcoin miner Marathon Digital Holdings has obtained a $200M credit line from an unnamed lender.
The loan is secured by a portion of the company's Bitcoin holdings and will be used for strategic investments and general corporate purposes.
➡️ETFs have taken in $1.64 BILLION in just 4 days.
On the 17th of October:
➡️BlackRock's spot Bitcoin ETF bought $391.8 MILLION worth of Bitcoin today. Since launching in January, Bitcoin ETFs officially broke $20 BILLION in net inflows. This milestone took gold ETFs about 5 years to achieve. Total assets now stand at $65B, another all-time high.
Bitcoin ETFs have taken in $1.7 BILLION in October so far. • IBIT: $1.27b • FBTC: $278m • BITB: $126m • ARKB: $29m
On the 18th of October:
Samson Mow, JAN3 Founder, speaks at the German Bundestag telling MPs about Bitcoin adoption for nation-states.
➡️Whales have been buying Bitcoin aggressively at an unprecedented pace.
➡️'When Bitcoin was $68k in 2021 the hash rate was 160M TH/s. Now it’s 661M TH/s. The network is 4x more secure. Large players are suppressing the price to stack at low prices, but they can’t fake the electricity numbers. Something will happen soon to the price!' -Bitcoin for Freedom
➡️Morgan Stanley reveals $272.1M Bitcoin ETF holdings in SEC filing.
➡️Although I don't like the guy, Anthony Pompliano, because of his BlockFi 'rocketship' endorsement, last week he was spot on as he destroyed a Fox Host who says Bitcoin is "way too volatile" to be used for savings. Pomp: "Since 2016, the average cost of an American house has increased by over 50% in dollars but has dropped 99% when measured in Bitcoin."
➡️SEC approves NSYE options trading on spot Bitcoin ETFs.
On the 19th of October:
➡️Bitcoin balance on exchanges hits a 5-year low.
On the 21st of October.
➡️Now at the beginning of the Weekly Recap I already showed how central banks are losing their mind(ECB in that case), as they lose their grip and control of money.
I don't wanna be doom and gloom, I rather want to write positive news... but sometimes I really think it is important to show you what on earth is going on.
Multiple different government entities suggested making Bitcoin illegal because people would rather buy Bitcoin and have the price go up than buy bonds and lose purchasing power to inflation. All I know is if the government doesn't want you to have something that's often a good reason to get some. Especially when it's something that simply stores value! I 100% get why governments are against it. It's a threat to their unchecked money printing!
On this day the following paper came out. A paper from the Minneapolis Federal Reserve states that "a legal prohibition against Bitcoin can restore unique implementation of permanent primary deficits." Without Bitcoin to contend with, they believe the debt can go up forever.
You can find the paper here: https://www.minneapolisfed.org/research/working-papers/unique-implementation-of-permanent-primary-deficits
Technically a much better paper than the ECB one. Unfortunately, I am not surprised about that.
This is a real piece of research that identifies the key issue: consumers are too smart to fund forever deficits.
All these papers coming out are too timely. They are coordinating something against Bitcoin...central banks are freaking out… can you smell the panic in the air?
ECB - Bitcoin is so much better than fiat it could go to $10 million and make fiat holders worse off (I don't make that up)
FED - It's useless but we have to ban or tax the shit out of it so we can run deficits indefinitely
➡️Japan’s Democratic Party of the People leader pledges to cut Bitcoin and crypto taxes if elected. They will cut the taxes from 55% to 20% if the Democratic Party of the People wins the election.
➡️BlackRock’s Bitcoin ETF is now the 3rd biggest ETF for 2024 inflows and the fastest-growing ETF ever!
➡️'October's Bitcoin mining revenue has plummeted by 70% from its March peak, with miners generating less than 9,000 BTC so far this month.' -Bitcoin News
💸Traditional Finance / Macro:
On the 18th of October:
👉🏽 Investor's allocation to stocks hit 61%, the highest level in at least 40 years. 'This share has ALMOST DOUBLED since 2009 and is in line with the 2000 Dot-Com Bubble levels.
The median value of US consumers’ stock holdings spiked to $250,000 in October, the most on record. Over the last 12 months, this amount has DOUBLED, according to the University of Michigan consumer survey. In 2010, Americans' investments in single stocks, mutual funds, and retirement accounts were worth just ~$50,000, or 5 times less.
Now, equities account for 48% of US households' net worth, the highest since the 2000 Dot-Com bubble peak.' -TKL
And this all is mostly with retirement money.
🏦Banks:
👉🏽no news
🌎Macro/Geopolitics:
On the 14th of October:
Google agrees to buy nuclear power from Small Modular Reactors to be built by Kairos Power.
ZeroHedge: "First it was Amazon, then Microsoft, now Google telegraphs why the "next AI trade" will generate obnoxious amounts of alpha in the coming years by sending the same message: i) it's all about how all those data centers will be powered, and ii) in the future a growing number of data centers will be powered by small modular nuclear reactors."
Senior director for energy and climate at Google, Michael Terrell, said on a call with reporters that "we believe that nuclear energy has a critical role to play in supporting our clean growth and helping to deliver on the progress of AI." Full article: https://www.zerohedge.com/markets/google-inks-deal-nuclear-small-modular-reactor-company-power-data-centers
As of 2024, there are three operational small modular reactors (SMRs) in the world, located in different countries:
-
Russia - Akademik Lomonosov, a floating nuclear power plant operated by Rosatom. It is located in the Arctic town of Pevek, Chukotka. This is the world’s first floating nuclear plant.
-
China - Linglong One (ACP100), developed by the China National Nuclear Corporation (CNNC). This SMR is operational at the Changjiang Nuclear Power Plant in Hainan province, China.
-
Argentina - CAREM-25, developed by the Argentine state-owned company CNEA (Comisión Nacional de Energía Atómica). This reactor is located in the Lima district, Buenos Aires province, near the Atucha Nuclear Power Plant. These SMRs are being used to demonstrate the feasibility of small-scale nuclear power generation for diverse applications.
On the 13h of October:
👉🏽The US money supply hit $21.17 trillion in August, the highest level since January 2023.
This also marks a fifth consecutive monthly increase in the US money supply. Over the last 10 months, the amount of US Dollars in circulation has jumped by a MASSIVE $484 billion.
In effect, the money supply is now just $548 billion below a new all-time high. After a brief decline, the quantity of money in the financial system is surging again raising concerns about another inflation wave. - TKL
I won't worry about a recession or something like that, but more on the inflation and debasement part.
On the 16th of October:
👉🏽'Let‘s take a look at Europe‘s largest economies: Germany - commits deindustrialization suicide France - 6% fiscal deficit during good times despite highest tax burden in Europe Italy & Spain - collapsing demographics, pensions and healthcare systems to follow.' - Michael A. Arouet
👉🏽In the last couple of months I have shared how the U.S. government did its revision on job reports and other data points.
Now the FBI "revised" violent crime data, reporting that instead of a 2.1% drop in violent crime in 2022, it was actually a 4.5% increase. They missed 1.699 murders in 2022. What are a few murders among friends, innit? '6.6 points of net swing. So basically took them 18 months to realize they had missed 1 in 15 violent crimes in the country.
Conveniently released after all debates complete + no future ones agreed. Don't want to be this cynical, I really don't, but they aren't leaving me any room' - Pi Prime Pi
All government data is fudged it seems. From jobs to the economy, and inflation... It's all just made up.
"Oopsie whoopsie we made a fucky wucky! And people (politicians) wonder why trust in institutions is cratering...
Just to give you another example...
'The US Treasury is supposed to release its Monthly Treasury Statement at 2 pm on the 8th business day of each month. We are now on the 13th business day of October and have still not received last month's report. No explanation or estimation, complete radio silence.' - James Lavish
On the 17th of October:
👉🏽ECB cuts interest rates again by 0.25 percentage points.
'The ECB cut rates and signals it is getting hastier to bring rates back to more 'neutral' levels. It's funny how many investors argue that this time is different and that the ECB would take it easy or even refrain from rate cuts. Eurozone GDP growth is going nowhere, not in the near term and definitely not in the long term. Official inflation numbers in all major Eurozone economies are below 2%, and France is making headlines every day concerning debt sustainability. In the long term, interest rates will be low or negative when corrected for inflation, while bond volatility will increase.' - Jeroen Blokland
👉🏽Gold is back in record territory:
Even as markets price in a chance of a NO rate cut in November, gold just broke above $2700/oz.
The US Dollar has strengthened by 3% since September 30th and gold prices are STILL positive this month. Bank of America warns that gold may be the last safe haven as US Treasuries face risks from surging national debt. We all know that it is not the last and best safe haven, got Bitcoin?
'The higher gold goes in EUR, the greater the % of Eurozone gold reserves as a % of total EZ reserves goes (the EZ marks its gold to mkt quarterly, like China & Russia, but unlike the US.) In extremis, this gives the ECB option of “QE Heavy” (print EUR, bid for gold)' - Luke Gromen
Gold is up 31% YTD, the best year since 1979. Bitcoin is up 60% YTD, a casual year so far.
Gold for the central banks. Bitcoin for the citizens. Bitcoin wins and power returns to the people!
👉🏽 Half a trillion increase in US debt in a few days before the election. The fiscal year ends in September. So in October, the US treasury injects liquidity. Still, crazy work to increase the debt by half a trillion.
https://fiscaldata.treasury.gov/datasets/debt-to-the-penny/debt-to-the-penny
James Lavish: 'Pure unadulterated reckless government spending and so an exponential rise in debt, requiring more units of debt to drive each unit of GDP. Madness.'
On the 18th of October:
👉🏽Last week I mentioned that China's CB launched a $70 billion funding program to stimulate the economy and the capital market.
But China is in a debt bubble: 'China’s debt-to-GDP ratio hit a jaw-dropping 366% in Q1 2024, a new all-time high. Since the 2008 Financial Crisis, the ratio has DOUBLED. To put this differently, for 1 unit of GDP, the Chinese economy has produced 3.66 units of debt burden. Non-financial corporates have the highest ratio, at 171%, followed by the government sector, at 86%. Households and financial entities' debt-to-GDP is 64% and 45%, respectively. Stimulus won't solve China's debt crisis.' - TKL.
On the 21st of October:
👉🏽The US just recorded the 3rd largest budget deficit in its entire history. The federal deficit hit a WHOPPING $1.83 trillion in Fiscal Year 2024 ended Sept. 30. In other words, the government borrowed a staggering $5 billion A DAY. This was only below the 2020 and 2021 pandemic years.
🎁If you have made it this far I would like to give you a little gift:
Technology Powered Freedom - Bitcoin, eCash & Nostr | Alex Gladstein x Peter McCormack:
https://www.youtube.com/watch?v=L5BVxfdYgNo
Credit: I have used multiple sources!
My savings account: Bitcoin
The tool I recommend for setting up a Bitcoin savings plan: @Relai 🇨🇭 especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly. (Please only use it till the 31st of October - after that full KYC)
Hence a DCA, Dollar cost Average Strategy. Check out my tutorial post (Instagram) & video (YouTube) for more info.⠀⠀⠀⠀
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple.
Do you think this post is helpful to you? If so, please share it and support my work with sats.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
-
@ 91687725:a0de48ea
2024-08-24 05:40:14こんにちは。Kateです。
最近ちょっとお休みしていますが、日本でビットコインを専門に扱うDiamond Hands Magazineに寄稿したりしてます。
私がビットコインと出会ったのは2011年、まだビットコイン利用者はとても少なかった時代です。たまたま身内にビットコイン界隈の人がいました。もしかしたら今でいうビト妻だったかも?
まだビットコインが1ドル以下でおもちゃみたいな存在だった頃に知ったわけですが、その後勢いづいて、100ドル、1000ドルと価値が上がっていきました。
それを見て、ビットコインを少しずつ買って貯めておけば、将来リタイヤの蓄えになるかもと思ってお小遣い程度のビットコインを積立してました。でも、アクシデントで失くしちゃったんですよね。
その後、身内のごたごたで自分の生活が天地がひっくり返るように一変し、気がつけばカナダでただお金がないアジア系移民シングルマザー、しかも周りに家族が誰もいないという、非常にマイノリティな立場になりました。
人生、何事も経験。一度ビットコインを失くし、傷心もあり、数年はビットコインから離れました。でも気がつけばビットコインは冬の時代を終えて、また元気になっていたんですね。自分は海外でひとり子育てに追われ、なんとか生きてた感じですが!
ビットコインが500ドルくらいになっていた時に困窮していた私は、ふとペーパーウォレットと呼ばれた当時の携帯可能ウォレット?に0.5btc 残っていたのを発見して速攻換金しましたね。悔やまれます。
その後、2017年頃、カナダで当時大手の割と使い勝手のいい取引所があることを知って、再度ビットコイン貯蓄にチャレンジしました。2年ほどで、ほぼ1ビットコインと10ETHくらいあったんですけどね、今度は取引所の代表者が行方不明になり、またもやビットコインを失くしました。
ふつうだったら、もうやめますよね。2回もなくしたら。
けれど、自分はかつてインターネットが始まったころのワクワクを経験していました。90年代半ば、新宿にできたばかりのインターネットカフェで、GIFがかろうじて表示できるグレーのブラウザ画面と対面しました。世界を変える技術を体験した時の感動は今でも忘れられません。
(こう書くと立派なオバサンなのがバレちゃいますね。ビットコインネイティブ世代の中では年長者)
それから15年以上たって、初めてサトシナカモトのホワイトペーパーを読んだ時に、同じ衝撃を受けたのです。初めて実用化されたインターネット上で世界の誰とでも送り合えるマネー。その可能性は無限∞。
そのビットコインの進化を、実際に買ってみたり、使ってみたり、なくしたりしつつ、より深く知ろうと付き合ってきた自分は、いつの間にかビットコインを通して世の中のいろいろを見て考えるようになりました。
ビットコインが生まれ、実験段階を経て、すでに15年が経ちます。けれども、ビットコインは今でも多くの人から最も誤解されている技術・発明のように見えます。ここまで来たら、自分が生きている間に、ビットコインが世界とどう関わっていくのか見届けたいと思います!
そして、私自身がビットコインを知ることで発見した世界や新しい価値観を、誰かに伝えられたらいいなと願って、このブログをスタートすることにしました。
今回は自己紹介という形になりましたが、私がビットコインを通して学んだことや気づいたことをこれから少しづつアップしてみます!
週1くらいのペースで投稿が目標です。よろしくお願いします。
-
@ e97aaffa:2ebd765d
2024-10-21 15:46:17Eu regularmente, sou questionado ou pedem para eu fazer uma previsão de preço para o Bitcoin a longo prazo. Eu sempre evito responder, não quero criar falsas expectativas.
Em primeiro lugar, quem quer entrar no Bitcoin não deve entrar na expectativa que vai enriquecer rapidamente. Quem entra com este pensamento vai perder muito dinheiro, não vai resistir à pressão e vai vender tudo na primeira queda de 20%. Bitcoin é uma moeda ética, uma filosofia, muito estudo e por fim, é uma poupança a longo prazo. Para tirar frutos a longo prazo, tem que estar mentalmente preparado para suportar e ultrapassar, centenas de quedas de 20% e algumas dezenas de quedas superiores a 50%.
As previsões que são dadas, normalmente de valores muito elevados, dão uma falsa expectativa, levando as pessoas a entrar no Bitcoin com o único objectivo de enriquecer, sem estudá-lo minimamente. Geralmente as previsões de altos valores, implicam um enorme aumento da base monetária, só que as pessoas têm uma enorme dificuldade em compreender a inflação. Por esse motivo eu evito dar previsão e quando tento explicar, gosto de dar exemplos de inflação.
Eu acredito que o bitcoin vai ultrapassar 1 milhões de dólares, mas isto é sinónimo de ficar rico, porque 1 milhão é muito dinheiro hoje, mas daqui a 10 ou 20 anos, já não é assim tanto. A moeda perde muito poder de compra, isto é essencial para compreendermos as previsão de preços. Eu sempre que faço previsões, gosto sempre de dar o exemplo: hoje com 1 milhão compramos 4 casas novas, daqui a 20 anos, apenas compramos 1, com tamanhos e localização semelhante. Assim, aquela previsão de um milhão parece muito dinheiro, mas como são previsão a muito longo prazo, não é assim tanto dinheiro. O factor da inflação é essencial sempre que falamos ou analisamos previsões de preço do Bitcoin.
Não podemos esquecer que o preço do bitcoin é similar ao conceito de física da velocidade relativa.
Velocidade Relativa: Quando dois objetos se movem em direções opostas, a velocidade relativa entre eles é a soma das suas velocidades individuais.
Ou seja, o preço do Bitcoin é o resultado da soma da sua adoção, com a perda de poder de compra do dólar. São duas variáveis em sentido opostos, por isso o bitcoin está a ganhar bastante poder de compra.
Distribuição da riqueza Global
Hoje em dia a riqueza global (valor global dos ativos) é estimada em 900 Triliões, dividida pelas seguintes classes:
- Imobiliário: 330 Triliões
- Obrigações: 300 Triliões
- Dinheiro: 120 Triliões
- Ações: 115 Triliões
- Arte: 18 Triliões
- Ouro: 16 Triliões
- Car e colecionáveis: 6 Triliões
- Bitcoin: 1 Triliões
Previsão do Michael Saylor
Este fim-de-semana, Michael Saylor divulgou uma nova previsão:
Eu gosto destes modelos que apresentam 3 cenários possíveis, um conservador(Bear), um base(Base) e um optimista(Bull). Mas faltou incluir o valor global dos ativos, é verdade que é fácil de calcular, através do valor do market cap indicado a dividir pela percentagem do ativo.
Assim o valor global total dos ativos em 2045, segundo a precisão são:
- 2024: 900 Triliões
- Bear: 3400 Triliões
- Base: 4000 Triliões
- Bull: 4600 Triliões
Isto significa um aumento aproximado 270% (bear), 340% (base) e 410% (bull). É verdade que nestes 21 anos a riqueza real de todos ativos vão aumentar, mas essa valorização será sobretudo devido à expansão da base monetária do dólar.
Desvalorização
Saylor está a apostar que vai existir uma forte desvalorização do dólar. Será plausível essa desvalorização da moeda?
Nos últimos 15 anos o Balance Sheet da Reserva Federal (EUA), 3 grandes expansão monetária, próximo dos 100%, algo similar também aconteceu na Europa.
- 2008/01 a 2008/12:
- 0.9 Triliões -> 2.2Triliões
- aumento de 144%
- 2010/09 a 2014/11:
- 2.3 Triliões -> 4.5 Triliões
- aumento de 95%
- 2019/08 a 2022/03:
- 3.7 Triliões -> 8.9 Triliões
- aumento de 140%
Nos últimos 16 anos (2008-2024) a Balance Sheet aumentou 7 vezes.
O M2 global (EU + EUA + Japão + China + Reino Unido), no mesmo período, quase triplicou, de 34.4 para 91.7 Triliões.
Se nos últimos 16 anos houve várias desvalorização da moeda, é provável que volte a repetir-se, no próximo 21 anos e talvez seja ainda mais severa.
Conclusão
Voltando à previsão do Saylor.
Assim, os 3 milhões de dólares por Bitcoin para 2045, da precisão no cenário Bear, correspondem a 860 mil dólares com o poder de compra de hoje. E 3 milhões dólares (Base) e 9.4 milhões dólares (Bear).
860 mil dólares é um valor muito interesante para o custo de vida da Europa ou EUA, mas está muito longe de ser rico. Quem não tem a noção da inflação, ao ler esta previsão fica com uma falsa expectativa que com 1 bitcoin será milionário (3 mihões de dólares) em 2045, mas não é verdade.
Eu acredito que pode alcançar o cenário Bear, mas o Bull é demasiado, para atingir os 49 milhões, a desvalorização teria que ser muito superior, é um cenário pouco provável, neste espaço de tempo.
-
@ b0510a0c:12716ced
2024-08-21 06:03:43On April 24, 2012, Erik Voorhees changed everything about Bitcoin with the launch of Satoshi Dice:
a game that captivated users and intensified debates about Bitcoin's evolution and the network's ability to handle an increasing volume of transactions.
At that time, Satoshi Dice allowed thousands of players to bet on digital dice rolls, leading to a MASSIVE influx of transactions that filled the blocks of the blockchain.
📈 Success of Satoshi Dice:
Satoshi Dice achieved phenomenal success, attracting millions of users with its simplicity. Players flocked in, bets piled up, and blocks filled up.
Erik Voorhees effectively leveraged Bitcoin's microtransactions, quickly saturating the blocks with these. This was a testament to the game's popularity, but also a source of tension within the community.
Within months, Satoshi Dice became the most popular service on the Bitcoin network, boosting its usage and virality.
Players appreciated the "provable fairness" aspect of the game, where they could verify the transparency and fairness of each bet.
🚫 Criticism and Controversy:
However, this success was not without criticism.
Many Bitcoin enthusiasts viewed the massive influx of transactions generated by the game unfavorably. For them, these sometimes trivial transactions "spammed" the blockchain, clogging the blocks and increasing transaction fees for all users. Does this sound familiar?
The network, designed to handle about seven transactions per second, quickly reached its maximum capacity, causing validation delays and "high" fees.
⚔️ BlockSize Wars:
The BlockSize wars, which took place mainly between 2016 and 2017, were a technical and ideological conflict centered on block size and scalability solutions.
While Satoshi Dice was not the sole cause, the game significantly contributed to the emergence of this event by helping to popularize Bitcoin among new users and generating substantial transaction volume.
As Bitcoin adoption grew, the network faced intense pressure, leading to block saturation and rising transaction fees. On one side, some advocated for increasing block size to allow more transactions, leading to the creation of Bitcoin Cash in August 2017. On the other, proponents of solutions like SegWit pushed for improvements without compromising decentralization.
🔧 Adoption of SegWit:
Erik Voorhees expressed his support for the SegWit2x proposal, which aimed to improve network scalability by combining the implementation of SegWit with an increase in block size.
Segregated Witness (SegWit) was adopted in August 2017, allowing transaction data to be separated from signatures. This reorganization not only increased transaction processing capacity but also paved the way for the development of the Lightning Network, a layer 2 solution enabling instant and low-cost transactions.
SegWit was a crucial response to the challenges posed by network congestion, which had been exacerbated by Bitcoin's growing adoption and the emergence of popular applications like Satoshi Dice.
⚡ SegWit and Lightning:
The adoption of SegWit helped resolve blockchain congestion issues, while the Lightning Network, a layer 2 solution, facilitated fast and low-cost transactions.
Together, these innovations not only addressed technical challenges but also renewed enthusiasm for games and other applications on Bitcoin, paving the way for a new wave of development.
🎲 Nostr Dice:
Today, as we reflect on the impact of Satoshi Dice, a new project emerges: nostr:npub1nstrdc6z4y9xadyj4z2zfecu6zt05uvlmd08ea0vchcvfrjvv7yq8lns84
This modern clone of the original game is built on Nostr, a decentralized communication protocol, and Lightning, paying homage to the past while offering an enhanced gaming experience that does not impact layer 1 congestion!
From a game that caused Bitcoin congestion to its rebirth on Lightning, which it helped to bring about, the circle is complete!
-
@ 9aa75e0d:40534393
2024-10-23 05:36:30Finnish Customs, working together with Swedish police, has successfully shut down the Sipulitie marketplace, a dark web platform used for illegal activities, including the anonymous sale of drugs. The site, active since February 2023, operated on the encrypted Tor network and was available in both Finnish and English.
Sipulitie, which provided a platform for illegal drug transactions under the protection of anonymity, generated a reported revenue of €1.3 million, according to the site’s administrator who posted the figure on public forums.
Sipulitie had a predecessor, Sipulimarket, which launched in April 2019. This Finnish-language platform also facilitated illegal drug and doping sales in an anonymous environment. Finnish Customs, with help from Polish authorities, shut down Sipulimarket in December 2020. It is believed that Sipulimarket had a turnover exceeding €2 million.
Read further on SmuggleWire
-
@ 59df1288:92e1744f
2024-10-23 05:00:39null
-
@ 59df1288:92e1744f
2024-10-23 04:59:30null
-
@ 9aa75e0d:40534393
2024-10-21 15:22:19A large-scale cocaine-smuggling network has been dismantled by authorities in Italy, Albania, Poland, and Switzerland in a joint operation coordinated by Eurojust. The criminal organization, which had been operating for at least four years, primarily focused on selling cocaine in northern Italy, particularly around the city of Brescia.
Coordinated Action Across Europe The international operation, led by an Albanian-organized crime group (OCG), culminated in the arrest of 66 suspects. On the main action day, 45 individuals were apprehended, most of them in Italy. Prior to this, 21 additional suspects had already been arrested in connection with cocaine distribution in the Brescia area.
Eurojust, based in The Hague, played a key role in facilitating and coordinating the efforts of law enforcement agencies across the involved countries. Over 400 officers were deployed in Italy alone to execute the operation. Eurojust set up a coordination center to support the implementation of European Arrest Warrants and Mutual Legal Assistance requests, particularly towards Albania and Switzerland. Europol also provided critical support by managing the exchange of information and offering on-the-ground analytical assistance, including deploying a mobile office to Italy.
Read the full article on SmuggleWire
-
@ 59df1288:92e1744f
2024-10-23 04:56:00null
-
@ 6bf975a0:65de1244
2024-10-21 11:56:28Мы создаем небольшие редакции (4 человека на каждую) новостей декабря 2040 года небольшого российского города (реальный город, откуда вы родом, на выбор).
В первый день начала работы редакция рассказывает о том, каким стал её населенный пункт в 2040 году.
Медиа работает на протяжении двух недель и ежедневно выпускает новости на мультимедийной основе — от текстов до видео.
Ежедневно каждая редакция выпускает 2 информационно-новостных текста с иллюстрациями, один видеосюжет. Еженедельно — один короткий аудиоподкаст.
Техническая основа проекта
- Площадка для публикации контента редакции — специально созданный профиль в Nostr;
- Инструменты создания легенды про населённый пункт: генеративные текстовые нейросети;
- Инструменты создания медиаконтента: нейросети для генерации изображений, видео, создания музыки и звука.
Рабочая среда проекта
- Docs.iris.to — будут созданы таблицы для контент-планов по проектам для отслеживания и корректировки хода их выполнения;
- Комментарии и обсуждения проектов включены в docs.iris.to.
Критерии успешного выполненного проекта
- Разнообразие мультимедийного контента: использованы все доступные форматы. Звук, текст, изображения, видео;
- Качество созданного контента: тексты — вычитанные, отредактированные, изображения — отобранные с точки зрения соответствия действительности (люди с нормативным количеством конечностей, не зомби) etc;
- Регулярность публикации контента: редакции масс-медиа публикуют новости ежедневно.
Правила создания контента
- Сгенерированный контент не должен нарушать местное законодательство. Контент размещён в созданных авторами профилях, поэтому ответственность за его содержание несут авторы.
- Сгенерированный контент не должен призывать к насильственным или агрессивным действиям в отношении кого бы то ни было, а также не должен содержать унижающих, оскорбительных оценок любых социальных групп по любым характеристикам.
- 2040-ой — это наши надежды на будущее, возможности, которые, мы верим, будут реализованы. В будущем мы преодолеваем экологические и экономические проблемы.
Ссылки на проекты оставляйте в таблицах с контент-планами
-
@ bcbb3e40:a494e501
2024-08-16 18:00:07El hombre y el contexto
El pensamiento tradicionalista español cuenta con una amplia trayectoria en la que concurren personajes, situaciones e ideas gestadas en el transcurso de dos siglos, en los que debemos distinguir el conflicto dinástico y el papel del legitimismo de la propia doctrina, que es algo que se construirá en el tiempo, con la contribución de figuras como el protagonista de este escrito, Don Juan Vázquez de Mella, así como por la confluencia de fuerzas de diferente signo que tiene lugar a lo largo del siglo XIX y la consolidación del Estado liberal, que lo hará siempre en lucha abierta contra las peculiaridades y el carácter genuino del pueblo español. Vázquez de Mella, nuestro autor, quizás represente la consolidación y madurez doctrinal del movimiento tradicionalista español, uno de sus primeros y más brillantes sistematizadores. No se destacó por una obra extensa ni especialmente difundida más allá de sus discursos, de sus artículos en periódicos y sus escritos dispersos, los cuales fue capaz de dotar de una especial significación y dignidad fruto de su enorme carisma y especial clarividencia para dar una forma definida y meridianamente clara a las ideas y doctrinas que nutrieron el tradicionalismo español madurado al calor de las armas, de las tres guerras que el carlismo libró contra el liberalismo español.
|
| |:-:| |Juan Vázquez de Mella|
Nuestro autor, de origen asturiano, y nacido en Cangas de Onís un 8 de junio de 1861, ha mantenido vivo su prestigio y el valor de sus aportaciones teórico-doctrinales, ampliamente reconocidos por sus sucesores, por Rafael Gambra Ciudad (1920-2004) y Francisco Elías de Tejada y Espinola (1918-1978), así como de otros autores como Álvaro D'Ors (1915-2004) y otros muchos, que han reivindicado su figura en el tiempo y se han nutrido de sus fecundas enseñanzas. Se ha destacado la rectitud de su pensamiento, su inquebrantable voluntad y su impagable contribución en la creación de un marco teórico y conceptual para dar un sentido y una forma a las ideas del tradicionalismo español. Hijo de un militar de origen gallego, muerto prematuramente, quedó huérfano de padre durante su niñez, por lo cual pasó al cuidado de unos parientes de origen modesto. Estudió en la Universidad de Santiago de Compostela, donde mostró tempranamente su temperamento y habilidades oratorias, que explotó convenientemente a través de diarios como La Restauración o El pensamiento galaico, donde también mostró sus filiaciones militantes con el catolicismo tradicional. Sus habilidades y la brillantez de sus escritos pronto llegaron a Madrid, a las más altas instancias del Carlismo, lo que le permitió dar continuidad a sus actividades desde un medio más amplio, a través de El correo español.
En su militancia política llegó a las más altas cotas de su trayectoria con la elección en 1893 como representante de las Cortes por el distrito de Estella, Navarra, que ya con sus primeros discursos obtuvo un notable éxito, incluso entre los propios liberales, hasta 1900, fecha en la que se vio obligado a marcharse a Portugal, acusado de participar en una conspiración para derrocar el régimen de la Restauración. No regresó a España hasta 1905, manteniendo su estatus como diputado hasta 1919. De todos modos, no queremos dar más protagonismo a la biografía en detrimento de la doctrina, que es lo que nos interesa en este artículo, de ahí que obviemos otros datos biográficos trascendentes, polémicas con otras facciones del carlismo o sus posturas respecto a la dictadura del general Miguel Primo de Rivera, que nos harían desviar la atención del propósito principal que acabamos de enunciar.
La gran paradoja del Carlismo fue que a pesar de su derrota en la Tercera Guerra Carlista (1872-1876), y pese a la posterior escisión integrista en 1888, el partido carlista continuó manteniendo una fuerza y preponderancia significativa en la sociedad española del régimen de la Restauración durante el último cuarto de siglo. El Carlismo se vio inmerso en un buen número de paradojas, de situaciones encontradas, especialmente en relación al Desastre del 98 y la pérdida de los últimos territorios ultramarinos. Mientras que la gran esperanza del tradicionalismo español estaba depositada en el desmoronamiento y caída final de la restauración alfonsina, por otro lado este mismo régimen trataba de defender, al menos en teoría, los últimos restos del imperio español y, de algún modo, a la España católica frente a una nación protestante, como era la anglosajona estadounidense. Al mismo tiempo, durante esta época el tradicionalismo español se enfrentó a los grandes retos que presentaba una sociedad en cambio, con transformaciones políticas y sociales de gran calado como la emergencia del sufragio universal o el nacimiento de los separatismos periféricos (propiciados por la burguesía liberal), las cuales requerían de nuevas estrategias y reestructuraciones internas capaces de enfrentar la envergadura de todos estos cambios. Fue en este contexto donde se significó la figura de Juan Vázquez de Mella, quien merced a la obra de sistematización a la que ya hemos hecho alusión, y de sus concurridas conferencias, dio lugar a la denominada Acta Loredán, redactada por el tradicionalista asturiano y publicado en El correo español. Este escrito tenía como ejes fundamentales la defensa de la nación política española fundamentada en la monarquía, el catolicismo y el régimen foral. Al mismo tiempo, también recogía la reivindicación de un programa corporativista y gremial al abrigo de la doctrina social de la Iglesia defendido en la encíclica Rerum Novarum (1891), y es lo que se conoce como el «sociedalismo», cuyos antecedentes encontramos ya en autores como Donoso Cortés o Antonio Aparisi Guijarro. Son precisamente los atributos de esta doctrina, que contribuyó a la revitalización del pensamiento carlista, los que nos disponemos a desarrollar a continuación.
La figura del tradicionalista asturiano, de Don Juan Vázquez de Mella, aparece como necesaria ante una serie sucesiva de destrucciones que el régimen liberal ha producido sobre los fundamentos tradicionales de España, pero su papel no fue, como ya venimos apuntando, el de un gran intelectual erudito, y de hecho, como apunta Rafael Gambra, las mayores debilidades de su pensamiento se encuentran en los principios filosóficos, y destacando, en cambio, su papel de «revulsivo espiritual» podemos ubicarlo mejor en el ámbito de lo político y lo espiritual. Para ello debió tomar en cuenta las fuentes de sus predecesores, entre los cuales podemos ubicar perfectamente al ya mencionado Donoso Cortés y Jaime Balmes, así como también a otro contemporáneo suyo, Menéndez Pelayo. De los dos primeros tomó su capacidad de síntesis y la sencillez expositiva, mientras que de Menéndez Pelayo tomó, al menos en parte, el sentido de la crítica histórica en aras de la restauración de una Tradición nacional. Pero más allá de los sistemas de pensamiento y elementos retóricos, vemos a Vázquez de Mella profundamente interesado por la vida política de los pueblos medievales de Las Españas, lo cual fue, en definitiva, el marco de referencia para una síntesis política de conjunto más allá de los posicionamientos teóricos, como algo que puede ser llevado a la práctica en sus aspectos concretos y que es perfectamente viable. Todo un sistema edificado sobre el pensamiento tomista y una una profunda religiosidad, En este contexto, y más allá de las ideas formuladas por realistas y carlistas en la primera mitad del siglo XIX, Mella teoriza junto a la concepción del espíritu medieval, la idea de la coexistencia de dos soberanías, una política y otra social, una teoría de la soberanía tradicional inspirada por un principio dinámico y que se cimenta en las propias experiencias humanas en el devenir de la historia.
|
| |:-:| |NITOGLIA, Curzio; En el mar de la nada: Metafísica y nihilismo a prueba en la posmodernidad, Hipérbola Janus, 2023|
El concepto de lo social
Lo social para Mella no tiene absolutamente nada que ver con las denominadas «políticas sociales», tan comunes en el lenguaje político de las democracias liberales, en las que se contempla lo social como un elemento externo a la propia estructura política, donde prevalece el individualismo a todos los niveles, y la sociedad aparece como un mero agregado de individuos. Muy al contrario, lo social, en el tradicionalismo de nuestro autor, implica la afirmación de un principio intrínseco tanto al modelo social como al tipo humano, así como a la naturaleza de las cosas en las que la persona desarrolla su existencia en común con los demás. Nos referimos a las instituciones, a los elementos jurídicos y otros órganos gestados en el tiempo por la experiencia histórica, que regulan la vida común.
En el ámbito de la sociedad cristiana medieval, en plena Reconquista, cuando todavía no existía un Estado unitario como tal, cada municipio tenía sus propias leyes y sus normas, adaptadas a su modelo de vida y costumbres, Las comunidades se concebían como agrupaciones de familias con un sistema de propiedad comunal y privado en las que el patrimonio y el estatus de cada uno de sus miembros venía garantizado por el ejercicio activo de una serie de derechos en defensa de las libertades concretas, cuya fuente última era el derecho natural. Los señores feudales y los reyes se limitaban a reclamar tributos para la guerra, pero sin interferir en la defensa de estas libertades concretas ni vulnerar el sistema que las sustentaba.
Eran gobiernos autárquicos, muy estables e inspirados por un principio democrático, el cual nada tenía que ver con las democracias liberales plutocráticas de la actualidad, cuya idea del derecho y la justicia está pervertida por el formalismo jurídico vacío e inane de sus constituciones, abstractas y plenamente funcionales a las oligarquías, al servicio de intereses espurios. En este caso, el hombre alcanzaba una plena dignidad y desarrollo en el contexto de una comunidad donde prevalecía el vínculo comunitario, al amparo de un modelo tradicional, de normas consuetudinarias y concretas que permitían la defensa efectiva del propio derecho. Ni siquiera con el advenimiento de los Estados modernos, y la centralización de algunos elementos de poder, como la Hacienda o el Ejército, se vieron alterados significativamente estos elementos, que representaban a los denominados «cuerpos intermedios» de la sociedad, y que adquirieron su propia expresión particular bajo el nombre de «Fueros», los que los propios reyes juraron respetar a lo largo de toda la Edad Moderna y hasta el advenimiento del régimen borbónico.
La antropología tradicional vincula al hombre a un medio social, a una familia, a una estirpe o a un pueblo, que reproducen esa misma estructura familiar, aunque a mayor escala. En nuestro caso particular lo vemos a través de la convivencia de pequeños grupos humanos, de ahí la importancia de los municipios o de los concejos en un marco de vida comunitaria fuertemente institucionalizada. Al mismo tiempo este modelo y estructura también se replicaba en otros ámbitos, como en la vida económica y profesional, impregnando todas las esferas de la vida del hombre. Instituciones naturales, amparadas en el derecho natural, y orientadas a la protección y garantía de prosperidad de los hombres, y esto por encima de cualquier interés particular y mercantil de negocio. Para Mella, la ruptura con este mundo, y en general con las experiencias del pasado, es la que nos lleva, merced a la acción del liberalismo, a los tiempos actuales, y lo hace recorriendo un itinerario que todos conocemos, y que tienen su punto de partida en la Ilustración y la posterior Revolución Francesa, la irrupción del elemento racional y abstracto y la destrucción de la religión, considerada como fruto de la superstición. La destrucción del orden feudal, que todavía pervivía como marco de convivencia en el mundo rural, como una suerte de prolongación de ese espíritu medieval, hizo desaparecer de un plumazo ese entorno de relaciones concretas y personales para sustituirlas por lo «público» entendido como la centralización estatal uniforme, ignorando las realidades particulares subyacentes en el cuerpo social, los denominados «cuerpos intermedios», que fueron despojados de su autonomía, corporaciones y patrimonios. De modo que la destrucción de estas «sociedades intermedias» que mediaban entre el Estado y la sociedad desenraizó y destruyó la propia sociedad, al mismo tiempo que los fundamentos cristianos del derecho natural sobre la cual se hallaba asentada, para hacer prevalecer esos principios racionales y abstractos traídos por la revolución.
Al mismo tiempo, y anejo a este desarraigo, del individuo se encuentra sometido a poderes arbitrarios del propio Estado liberal, sin un conglomerado institucional propio que lo proteja de estos atropellos, sumido en el individualismo ajeno a toda institución y destino colectivo, se limita al voto cada cuatro años de los partidos al servicio de oligarquías e intereses espurios, contrarios al Bien común. En este sentido, y advirtiendo las posibles acusaciones de «absolutismo» que en ocasiones se han lanzado contra el tradicionalismo, hay que señalar que Mella las rechaza por completo, dado que viola la idea de contrapoderes frente a la autoridad del rey que éste formula, ya que el absolutismo creía en la existencia de un poder ilimitado y tiránico del rey, transmitido por Dios y ajeno a la participación de la sociedad y sus estamentos. Como bien señaló Julius Evola, el absolutismo es un fenómeno antitradicional, vinculado a la descomposición y desacralización de las estructuras tradicionales. De hecho, el absolutismo, como los regímenes liberales de hoy, dejan al individuo totalmente desprotegido, sin un asidero sobre el que apoyarse en la defensa de sus libertades concretas. El propio Mella, como bien saben todos los que se adentren en su obra, fue partidario de contrarrestar el creciente poder del aparato estatal, tal y como hemos visto y seguiremos viendo en lo sucesivo, a lo largo del presente artículo.
|
| |:-:| |EVOLA, Julis; Metapolítica, Tradición y Modernidad: Antología de artículos evolianos, Hipérbola Janus, 2020|
En nuestro caso particular, la desaparición de la organización gremial y corporativa tuvo unas consecuencias especialmente nefastas, y en especial después de las dos desamortizaciones liberales (Mendizabal y Madoz) al despojar a los grupos sociales populares de su natural organización sociohistórica. Asimismo, desvincularon la propiedad en las relaciones comunitarias y su uso patrimonial para vincularla al uso privado y anónimo, para fines puramente especulativos, los que caracterizan al liberal-capitalismo. De ahí nace la figura del asalariado, del contratado como mera mercancía, en un proceso de alienación del trabajo característico en el desarrollo del capitalismo burgués. De aquí parte lo que algunos tradicionalistas, como Gambra, denominan el «problema social», frente al cual, y al margen de las recetas ideológicas de la modernidad, Mella reivindica la restauración de los antiguos vínculos corporativos y orgánicos de inspiración medieval.
La idea de soberanía social
Todos los procesos disolutivos que conducen a la Modernidad liberal tienen su punto de inicio con el Renacimiento, con la afirmación del individualismo y la ruptura definitiva del ecumene cristiano medieval, algo que aparece indefectiblemente unido a la Reforma luterana, así como la «valorización» del mundo clásico, con la reemergencia de teorías de tipo hedonista, como las de Epicuro, por ejemplo, generando una disolución de los vínculos con el medio concreto. Esto supone la aparición de un nuevo tipo, que es el hombre abstracto que escapa cada vez más al entorno inmediato y vital, esto al tiempo que el poder del Estado se robustece y se vuelve omnipotente. Es por ese motivo que en lo sucesivo se ha impuesto en nuestras sociedades la falta de concreción, tanto en lo teórico como en lo político, lo cual ha propiciado el triunfo del contrato social roussoniano y la justificación del orden social en virtud de componendas voluntarias y totalmente artificiales. Estas construcciones político-ideológicas son las que contribuyen a la construcción de la sociedad liberal, asentada sobre patrones puramente racionales, individualistas y mercantilistas.
De hecho, la mayor preocupación de Mella es la destrucción de las instituciones locales y ese vínculo afectivo del hombre con su realidad inmediata, algo que impregnaba su relación con el trabajo, con su obra, con su impronta vocacional y devota, imprimiéndole, como en el caso del artesano, un sello propio y particular a su trabajo.
Y en este sentido, Mella afirma que la sociedad moderna ha perdido su sentido institucional como base estable de la sociabilidad. A través del elemento jurídico y la participación en las instituciones es el medio a partir del cual la comunidad se cohesiona y construye sus vínculos y su particular autonomía, que le hace tener una vida propia e interna, y con la institución nos podemos referir desde una asociación profesional, a la universidad o una cofradía etc. El individualismo ha representado el factor disolutivo y corrosivo que ha destruido este vínculo social fundado en múltiples solidaridades que han enfrentado y polarizado al cuerpo social, con el enfrentamiento entre «clases sociales» y la negación de las jerarquías naturales.
Ante todo lo relatado, y como consecuencia de las destrucciones provocadas por la revolución, Mella plantea su teoría de la soberanía social. Esta teoría consiste básicamente en encuadrar de nuevo a la sociedad en sus raíces naturales, concebida en todos sus órdenes como portadora de un dinamismo propio en una suerte de organización geométrica en la que conviven objetivos y finalidades variadas y concretas con su propia legitimidad y autonomía. Estas finalidades, amparadas en el derecho natural, son junto al poder del propio Estado las únicas formas de limitación del poder. La particularidad de esta idea de soberanía social está en el hecho de que la formación de la jerarquía social tiene una dirección ascendente, que tiene como punto de partida a las personas colectivas y concretas, pasando por una serie de instituciones, hasta llegar al Estado central, de forma escalonada y plenamente conscientes de sus funciones. Así lo expresa Mella en su propio lenguaje: «la jerarquía de personas colectivas, de poderes organizados, de clases, que suben desde la familia hasta la soberanía que llamo política concretada en el Estado, que deben auxiliar, pero también contener». Es lo que Mella concibe como el sociedalismo, que supone la reintegración de la sociedad en la vida concreta de los hombres, con el desarrollo de una vida política común y estable en el marco de instituciones naturales que potencien las relaciones humanas y sociales, estimulando la sociabilidad. Y hablamos, desde la perspectiva de la integración de distintas sociedades, fuertemente institucionalizadas con funciones y finalidades concretas, más allá del sentido democrático y pactista que pueda entenderse en términos modernos o de cualquier asociación u organización relacionada con el «problema social».
¿Qué es la Tradición?
De este modo quedan formuladas las dos soberanías, la política y la social, que coexisten en un mismo espacio limitándose y apoyándose recíprocamente en lo que es uno de los fundamentos del sociedalismo de Mella. No obstante, esta doble soberanía no explica todavía la concreción política de cada pueblo y el vínculo superior que lo lleva a federarse con las diferentes sociedades y a mantenerse unido en una historia y espíritu comunes. Los vínculos que las mantienen unidas en el tiempo tienen que ver con un orden histórico concreto, con un vínculo espiritual que las entrelaza interiormente de una generación a otra, y en última instancia de ese orden tradicional que lo engloba todo, y que al mismo tiempo se asienta en la monarquía y la religión católica. La lealtad a Dios y a un solo rey en torno a los cuales se aglutina la fe, viene a coronar todas estas estructuras y lazos forjados en el fermento de la historia.
No se trata de la Tradición en términos de un «ultraconservadurismo», que ya sabemos que el prefijo «ultra» (lo que sea) es muy recurrente en nuestros días, con la idea de un medio social y político petrificado e invariable, sino que es el producto de un proceso de maduración y evolución histórica, de carácter dinámico y nutrido de experiencias humanas. Nada que ver con las monstruosas ideologías progresistas y modernas, nacidas de lo abstracto e impulsadas por un desbocado «ir hacia delante», desarraigado y que tiende siempre hacia la deshumanización y la destrucción de toda creación humana natural forjada en el devenir de los siglos. Este mismo dinamismo, planteado por Mella, en torno al concepto e idea de Tradición tiene continuidad y adquiere fuerza en sus sucesores y depositarios. Y al fin y al cabo, Mella no hace más que partir de la propia etimología del término, que viene del latín tradere, entregar, de la generación que entrega los frutos de su experiencia a la siguiente, perfeccionándola, haciéndola más estable y segura.
Podríamos seguir extrayendo más conclusiones del pensamiento tradicional de Vázquez de Mella, pero probablemente excedería, y por mucho, el modesto propósito de este escrito, de modo que nos quedaremos aquí, no sin advertir a nuestros lectores de la posibilidad de que en un futuro volvamos a retomar nuevamente el tema.
Antes de acabar queremos llamar la atención sobre una polémica acontecida hace unos años en torno a una Plaza en Madrid que llevaba el nombre de nuestro autor y que se cambio para dedicársela a un sujeto cuyos méritos eran, por decirlo suavemente, más que discutibles, concretamente a Pedro Zerolo, miembro del PSOE y activista al servicio del lobby homosexualista. Durante aquella época, en 2019, muchos miembros de la izquierda globalista trataron de identificar a Vázquez de Mella como un «pensador franquista», cuando en realidad ni cronológica ni ideológicamente tuvo nunca nada que ver con el franquismo. Recordemos que murió en 1928, y la impronta de su pensamiento ha tenido como continuadores a sus propios correligionarios dentro del ámbito tradicional, aunque en su tiempo llegó a ser muy respetado también por sus adversarios, los liberales. Aunque la retirada del nombre de una calle pueda resultar algo banal, o carente de una importancia excesiva, también contribuye, a su modo, a una forma de damnatio memoriae que condena al olvido y al ostracismo a grandes autores de la Tradición, portadores de un Patriotismo sano y capaz de entender las peculiaridades y el Dasein profundo de España, que si bien no nació invertebrada, como pretendían los Orteguianos, su esencia y naturaleza es mucho más compleja que cualquiera de las grandes naciones de Europa.
Artículo original: Hipérbola Janus, Juan Vázquez de Mella y el tradicionalismo español, 16/Ago/2024
-
@ 6bf975a0:65de1244
2024-10-21 10:06:18- Какие этические проблемы могут возникнуть в связи с широким распространением VR/AR-технологий? (Например, приватность, зависимость, манипуляция, влияние на социальные взаимодействия.) В своё время именно этические проблемы не позволили Google Glass стать мэйнстримом.
- Насколько реалистично ожидать, что VR/AR заменят традиционные способы потребления медиа? Какие факторы могут этому способствовать или препятствовать? (Например, цена, доступность, удобство использования, социальное принятие.)
- Насколько вероятно, что метавселенная станет «еще одним слоем интернета», а не его полной заменой? (Рассмотреть текущие тенденции развития интернета и технологические ограничения.)
- Какие этические дилеммы связаны с использованием ИИ для таргетированной рекламы и персонализации контента? (Например, манипуляция потребительским выбором, дискриминация, распространение дезинформации.)
- Может ли гиперперсонализация привести к «информационному изоляционизму» и снижению социальной когезии? Как этого избежать? (Рассмотреть важность «слабых связей» по Марку Грановеттеру.)
- Как унификация платформ и облачные технологии повлияют на медиаиндустрию?
- Как можно противостоять «несоциальности» современных социальных медиа и создать более инклюзивную и полезную цифровую среду?
- Децентрализация и современные социальные медиа: смогут ли новые платформы веб 3.0 потеснить в популярности существующие крупные соцсети? Либо последние позаимствуют новые технологии и задавят в зародыше новые проекты
-
@ 59df1288:92e1744f
2024-10-23 04:54:40null
-
@ 6bcc27d2:b67d296e
2024-10-21 03:54:32yugoです。 この記事は「Nostrasia2024 逆アドベントカレンダー」10/19の分です。Nostrasiaの当日はリアルタイムで配信を視聴していました。Nostrを使ってアプリケーションの再発明をすべきという発表を聴き、自分だったらどんなものを作ってみたいかを考えて少し調べたり試みたりしたのでその記録を書きます。また、超簡単なものですがおそらく世界初となるvisionOS対応のNostrクライアントをつくってみたので最後の方に紹介します。
アプリケーションを再発明する話があったのは、「What is Nostr Other Stuff?」と題したkaijiさんの発表でした。
Nostrプロトコルを使って既存のアプリケーションを再発明することで、ユーザ体験を損なわずにゆるやかな分散を促すことができ、プロトコルとしてのNostrも成長していくというような内容でした。
自分はまだNostrで何かをつくった経験はなかったので、実装に必要な仕様の知識がほとんどない状態からどのようなアプリケーションをつくってみたいかを考えました。
最初に思いついたのは、Scrapboxのようなネットワーク型のナレッジベースです。自分は最近visionOS勉強会をやっており、勉強会でナレッジを共有する手段としてScrapboxの導入を検討していました。
Nostrコミュニティにも有志によるScrapboxがありますが、Nostrクライアントがあればそれを使うだろうから同じくらいの実用性を備えたクライアントはまだ存在しないのではないかという見立てでした。
長文投稿やpublic chatなどの機能を組み合わせることで実現できるだろうか。そう思っていた矢先、NIP-54のWikiという規格があることを知りました。
https://github.com/nostr-protocol/nips/blob/master/54.md
まだちゃんとは読めていないですが、Scrapboxもwikiソフトウェアだし参考になりそうと思っています。正式な仕様に組み込まれていないようで、採用しているクライアントはfiatjafによるリファレンス実装(?)のwikistrくらいしか見つかりませんでした。
Scrapboxのようなナレッジベースを志向するNostrクライアントがあれば、後述するvisionOS対応クライアントの存在もありアカウントを使いまわせて嬉しいので試してみたいです。もし他にも似たようなサービスをどなたか知っていたら教えてください。
また現在は、勉強会やワークショップ、ハッカソンなどのコラボレーションワークを支援するためのツールを自分たちでも開発しています。Apple Vision Proに搭載されているvisionOSというプラットフォームで動作します。
https://image.nostr.build/14f0c1b8fbe5ce7754825c01b09280a4c22f87bbf3c2fa6d60dd724f98919c34.png
この画面で自分が入りたいスペースを選んで共有体験を開始します。
スライドなどのコンテンツや自らのアバターを同期させることで、遠隔地にいてもまるでオフラインかのように同じ空間を共有することが可能になります。
https://image.nostr.build/cfb75d3db2a9b9cd39f502d6426d5ef4f264b3d5d693b6fc9762735d2922b85c.jpg
ということなので、急遽visionOS対応のクライアントを作ってみました。検索しても1つも事例が出てこなかったので多分まだ世界で実装しているアプリはないのではないでしょうか。
とはいえ、クライアントを名乗っているもののまだ大した機能はなく、リレーからデータを取得するだけの読み取り専用です。
https://image.nostr.build/96e088cc6a082528682989ccc12b4312f9cb6277656e491578e32a0851ce50fe.png
画像では自分のプロフィールデータをリレーから取得しています。
まだどのライブラリもvisionOSに対応していなかったりで手こずったものの仕様の勉強になりました。
ただvisionOSアプリはiOSアプリ同様NIP-7が使えないので秘密鍵を自分で保管しなくてはならず、今後どう対処すべきかわかりかねています。これから時間ある時に少しずつ調べていこうと思っていますが、ネイティブアプリの秘密鍵周りはあまりリソースが多くないようにも感じました。もしどなたかその辺の実装に詳しい方いたら教えていただけると嬉しいです。
準備ができたらそのうちコードも公開したいと思っています。
これから少しずつ色んな機能を実装しながらNostrで遊んでいきたいです!
-
@ 5afdec5b:2d631be1
2024-08-14 09:42:29Introducing Our New Whitepaper on Escrow-Less Bitcoin-Collateralized Lending
We are thrilled to release our latest whitepaper, elaborating on our innovative Escrow-Less Bitcoin-Collateralized Lending protocol. This pioneering system leverages the power of Discreet Log Contracts (DLCs) and Hash Time Lock Contracts (HTLCs) to create a trustless, peer-to-peer lending environment that aligns with the ethos of decentralization and user empowerment.
Empowering Users with Our Architecture
Our protocol is meticulously designed to empower users by allowing them to borrow against their Bitcoin while retaining full control over it. We believe that this is not just a technological advancement, but a crucial step towards crafting a more decentralized, trust-minimized, and secure financial ecosystem. By eliminating the need for intermediaries, we aim to give users greater autonomy and flexibility, freeing them from traditional constraints.
Addressing Market Needs for Peer-to-Peer, Trustless Lending
Extensive market research highlights a significant, growing demand for peer-to-peer, trustless lending solutions. Users consistently expressed a desire for more control over their assets and greater flexibility in their lending options. Our Escrow-Less Lending protocol directly addresses these needs, providing a robust framework that enhances user control while maintaining the integrity and security of the lending process.
Exploring the Potential of Ark for Microloan Liquidity Management
Initially, our focus was predominantly on micro-loans. However, user interviews revealed a relatively limited demand for such products at this time. Nonetheless, we identified Ark as good solution in the context of Bitcoin microloans. Ark's capabilities could unlock new possibilities and efficiencies, making microloans more viable and attractive.
Remaining Flexible and Adaptable
Even as our primary focus shifts, the potential of Ark continues to intrigue us. Our protocol's design is inherently flexible and adaptable, allowing for continuous refinement and adjustments based on user interest and feedback. Should there be sufficient interest in the future, we are open and ready to explore Ark's integration once again to better serve our users’ needs.
Revolutionizing Bitcoin Borrowing and Lending
We firmly believe that our Escrow-Less Bitcoin-Collateralized Lending protocol has the potential to revolutionize the borrowing and lending landscape within the Bitcoin ecosystem. Our commitment is steadfast; we aim to make this innovative protocol a reality and will diligently work to iterate and improve based on user feedback. Together, let’s shape the future of decentralized lending.
Your Feedback Matters
We invite you to delve into our whitepaper and share your thoughts and feedback on this groundbreaking approach. Your insights are invaluable as we strive to create a more user-centric, flexible, and secure lending protocol. Read the full whitepaper here
Feel free to reach out with your thoughts, questions, or suggestions. We’re eager to engage with you and iterate based on your valuable input.
-
@ a012dc82:6458a70d
2024-10-21 02:09:34Table Of Content
-
The Ordinals Revolution
-
Celebrating Ordinals: A Red Carpet Welcome
-
The Critics and the Supporters
-
The Impact on Bitcoin Mining
-
The Changing Landscape of Revenue in Mining
-
The Road Ahead: Adapting to Change
-
The Ripple Effect: More Applications on the Horizon
-
Conclusion
-
FAQ
In the dynamic world of cryptocurrencies, innovation is the name of the game. The latest entrant to this ever-evolving landscape is Ordinals, a protocol that has taken the crypto community by storm. Ordinals enables users to mint NFT-like assets, known as inscriptions, directly onto the Bitcoin blockchain. This groundbreaking development has led to a surge in demand for computing power, significantly raising transaction fees as miners compete for available resources. The advent of Ordinals marks a new era for Bitcoin, opening up a world of possibilities for users and miners alike.
The Ordinals Revolution
The introduction of Ordinals has been met with a wave of enthusiasm from the crypto community. With nearly 12 million inscriptions now created on top of the Bitcoin blockchain, the hype around this new technology is palpable. The ability to launch NFT-like assets on the Bitcoin network, which boasts one of the most powerful brands in the crypto industry, is a significant milestone. This development has not only expanded the functionality of the Bitcoin network but also added a new dimension to the world of cryptocurrencies.
Celebrating Ordinals: A Red Carpet Welcome
The arrival of Ordinals deserves a red carpet welcome. It represents a significant step forward in the evolution of Bitcoin and the broader crypto industry. As we look to the future, it is clear that Ordinals will play a crucial role in shaping the trajectory of Bitcoin mining and the broader crypto landscape. So, let's roll out the red carpet and celebrate the arrival of Ordinals in style. The future of Bitcoin and the crypto industry is bright, and Ordinals is leading the way. This is not just a celebration of a new technology, but a celebration of the limitless potential of the crypto industry.
The Critics and the Supporters
However, the advent of Ordinals has not been without its critics. Some experts have voiced concerns about the protocol's vulnerability to scams and slower transaction speeds. They argue that the rush to embrace this new technology could lead to unforeseen consequences. But these criticisms overlook the potential of Ordinals to revolutionize Bitcoin mining and the broader crypto industry. On the other hand, supporters of Ordinals see it as a game-changer, a technology that will have a net positive effect on the profitability of Bitcoin mining in the long run. They argue that the benefits of Ordinals far outweigh the potential risks.
The Impact on Bitcoin Mining
The rising popularity of Ordinals has been a boon for Bitcoin miners. Bitcoin's scalability is limited to around seven transactions per second (TPS), so a sudden increase in demand for computing power often translates to higher fees. This shift in profitability away from rewards, which are reduced by 50% every four years due to halving, is something that many miners welcome. The introduction of Ordinals has essentially created a new revenue stream for miners, making the mining process more lucrative and sustainable in the long run.
The Changing Landscape of Revenue in Mining
For the second time in history, miners are not fully dependent on block rewards. The current period of high transaction fees has changed the perception of the sustainability of Bitcoin mining. In the future, transaction fees will likely become the main source of revenue in the mining industry. As Bitcoin's adoption and usability increase, miners are expected to earn more from commissions than via block rewards. This shift in the revenue model could potentially lead to a more stable and sustainable mining industry.
The Road Ahead: Adapting to Change
The introduction of Ordinals has brought about significant changes, and Bitcoin miners will need to adapt to remain profitable. This includes upgrading mining infrastructure and software and optimizing energy efficiency to address the challenge of reduced block rewards. The advent of Ordinals has essentially raised the bar for miners, requiring them to be more innovative and efficient in their operations. This could lead to the development of more advanced mining technologies and practices.
The Ripple Effect: More Applications on the Horizon
The arrival of Ordinals has also opened the door for more applications to be written on top of the Bitcoin protocol. This development is expected to lead to more use cases and a greater boost in Bitcoin adoption in the next couple of years. The introduction of Ordinals could potentially spur a wave of innovation in the crypto industry, leading to the development of new applications and services that leverage the power of the Bitcoin network.
Conclusion
Despite the concerns raised about Ordinals, it is essential to view this technology as an opportunity rather than a threat. Experimenting with the Bitcoin network's capabilities can only help support the overall ecosystem, both now and in the future. The introduction of Ordinals represents a significant step forward in the evolution of Bitcoin and the broader crypto industry. It is a testament to the endless possibilities that the world of cryptocurrencies offers.
FAQ
What is Ordinals? Ordinals is a new protocol that allows users to mint NFT-like assets, known as inscriptions, directly onto the Bitcoin blockchain.
How does Ordinals impact Bitcoin mining? The introduction of Ordinals has led to a surge in demand for computing power, significantly raising transaction fees as miners compete for available resources. This shift in profitability away from rewards is welcomed by many miners.
How does Ordinals affect the sustainability of Bitcoin mining? The high transaction fees brought about by Ordinals have changed the perception of the sustainability of Bitcoin mining. It has shown that miners are not fully dependent on block rewards, suggesting a more sustainable future for the mining industry.
How does Ordinals contribute to the evolution of Bitcoin? Ordinals has added a new dimension to Bitcoin by enabling the creation of NFT-like assets on its network. This has opened the door for more applications to be written on top of the Bitcoin protocol, leading to more use cases and a greater boost in Bitcoin adoption.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ fd208ee8:0fd927c1
2024-10-20 18:19:48(Please note that this is not official financial or business advice, but rather a description of something we have done, on an informal basis.)
A long, long time ago
It's been nearly a year, since nostr:nprofile1qydhwumn8ghj7argv4nx7un9wd6zumn0wd68yvfwvdhk6tcpypmhxue69uhkummnw3ezuetfde6kuer6wasku7nfvuh8xurpvdjj7qpqs3ht77dq4zqnya8vjun5jp3p44pr794ru36d0ltxu65chljw8xjqv5atj2 came into being, mostly as a lark, involving a couple of members of our private chat group. Our initial plan was to work toward bounties, but Nostr bounties are a bit of a biased, uncertain thing, and our enthusiasm for that quickly waned.
So, what to do? Here we are, we three (nostr:npub1ecdlntvjzexlyfale2egzvvncc8tgqsaxkl5hw7xlgjv2cxs705s9qs735, nostr:npub1wqfzz2p880wq0tumuae9lfwyhs8uz35xd0kr34zrvrwyh3kvrzuskcqsyn, and I): IT professionals with little time, but plenty of intellectual energy, a Slack chat, a GitHub repo, and lots of frustration with the Nostr status quo.
We were, you see, Nostr end-users. We loved the idea of the protocol, but we were being regularly stymied by the poor quality of many implementations.
- Why can I not login? Oh, they fixed the login! Nope, still can't login.
- If I press this button, it says it sent, but it didn't send. Where note?
- They announced a new feature, but I tried it and it didn't work. Oh well.
- I noticed a bug in the client, reported it, and the issue is just rotting away in the project repo. Ignored.
- The website/relay/repo was here... yesterday. Today it has disappeared, and taken my zaps with it.
It was enough to make us want to tear our hair out. We decided that what Nostr needed... what it really needed... was a Nostr Stable Version. Nothing glamorous. Nothing exotic. Nothing busy or excitable. Just something that stayed where you initially found it, ran, and actually worked. Something where you could report a bug and receive a prompt response. Maybe even something, where you could pay a reasonable fee and be allowed to have expectations of some particular service being returned. And who better to build such a version, than people who want to use it, themselves?
Things working is an underrated concept
I know that the very idea of software running as expected and websites not appearing and disappearing suddenly, based upon what some particular developer had for lunch, tends to be met with little but scorn, from hardened, seasoned Nostriches (who are convinced that bugs are all features), but I think the majority of potential users would see it differently.
I'm with the majority, on this one.
I like to click "save" buttons and have them save. If I publish something, I want it to appear under my list of published somethings. I like to type in the website address I always type in, and have it magically appear on my screen, as if there were a little man sitting at controls in my laptop, just waiting for me to write H-T-T-P-S... and then jump to attention.
My unreasonable expectations have no bounds, it is true. But unreasonable people are also people, so we would also like to have our own unreasonable things to play with. Scorn away. My save button will save, and my published something will publish, and my website will load every damn time, just to spite you.
In the larger scheme of things, you see, we win even if we fail, if we at least increase the competition enough, that things working becomes the new standard. We can simply prove, definitively, that it is possible for Nostr things to work, if they are built by people who care if they work. If we also have fun together, learn something new, and come up with some cool, novel use cases, then that's pure profit.
We can only win, at this endeavor.
Where to start?
Name that brand
So, we had a team, we had a business idea, and we had a heck of a lot of motivation. What we didn't have, is a name. (Never underestimate the importance of naming things.)
We decided to name ourselves "GitCitadel" because "git" sounds techy, hints at our GitRepublic project, and is reminiscent of open-source development, and "citadel" reminds us of Bitcoin. The republic is at home in the citadel, naturally. All other products also live in the same citadel, hence the naming-convention of prefacing everything with "GC" (i.e. "GC Alexandria", "GC Sybil", "GC Aedile", etc.).
Brand yourself
The next thing we did, was rent a domain and run a webserver on it. This is an important step because it gives you an Internet presence, allows you to have company NIP-05 and email addresses (a form of promotion), and it's simply exciting to have one. Feels so much more "official" and it helps increase the name-recognition of your company.
Define yourself
We then sat down, together, over the Internet, and figured out who we are. Not who we individually are, but who we are, as a company. A company, after all, (according to the Cambridge Dictionary) is "an organization that produces or sells goods or services in order to make a profit". Now, a company's profits don't have to be monetary, but they should be something tangible. A company, in other words, is a team of people working toward some defined goal.
What is our goal? Well, we decided to think it over, sat down with the newer additions to the company (you can see who they are, on our project wiki page, and came up with a Vision and a Mission:
The vision is what the overall goals of the company are, whereas the mission describes how those goals shall be achieved. Now, this is a sort of lofty, abstract statement, so it was important that we posted it someplace publicly (to keep ourselves accountable) and look at it regularly, so that we can ponder it and realign whatever we are currently working on, with this statement. We know the statement is well-designed, if considering it helps us make decisions about what to do next.
Pay yourselves
(I'm going to switch from "we" to "you", here, as it's easier to write this part, but let's just pretend I didn't.)
The next thing on the list, is to arrange the finances, usually by setting up a Geyserfund, with an associated wallet, and then deciding how the funds from the wallet will be dispersed or stored. (I won't tell you how we are handling that, as that's internal company business, but I'm sure you'll think of something clever, yourselves. Or just google it.)
I would encourage you to arrange to pay yourselves profits. Not merely because your idea is going to make you all fabulously wealthy and internationally famous (although, that is obviously true), but because profits are the most pure form of communication that consumers in the market have with its producers, and one of the best ways to make decisions and measure increases in efficiency (increasing profits and/or output, while keeping prices steady or falling).
Cutting off this signal, in order to look pious to outsiders, is to shoot yourself in your free-market foot. Nobody says that you have to spend your profits on the proverbial lambo and a bimbo. You could donate them to charity, reinvest them, or store them for your nephews to inherit, but pay them out, you should. You don't have to love money, to value it as a tool and use it shrewdly. Money is a measure, and companies should regularly measure themselves: against their previous state, against their potential state, and against their competition.
(Also, you can use money to buy a lambo and a bimbo, but you didn't hear that from me.)
Organize yourselves
Once you've been working together, for a while, you'll find that you need to figure out how to organize yourselves. The first step is to...
Form a board of directors.
Stop laughing. I'm serious.
Any company has at least two roles (President and Secretary), ideally held by two different people, so any single-proprietor company is a man down. Find a different person, to be your Second, even if they're just your confident, who lets you cry on your shoulder on The Bad Days, when your code refuses to compile, and can tell people that you've become a Bitcoin millionaire and have gone on a sabbatical to hike the Himalayas and will be back in 3 months on The Very Good Days. Because business man was not meant to be alone.
If, like us, you're a small herd of people and have already been working together for a while, then this step is actually really, really fun. Just think about what people are already doing, and put a label on it. That role is now defined and it is clear who is in charge of what.
Scientists become "Chief Science Officer" or "Scientific Advisor". The person who always writes the okay, so this is what we've decided comment in the thread becomes the Secretary, the one managing the Lightning wallet and worrying over paying for the servers is the CFO, the person running the remote server becomes the CTO, and so on and etc.
And everyone knows who the CEO is. Everyone always knows. They do. Just write it down.
Agree how to disagree
Now, have the secretary write up a Member's Agreement. It's a contract between the members, about whatever the group thinks is important concerning the way the company will operate. According to Investopedia, common topics are:
Is this legally binding? Probably not. Maybe. I don't know and wouldn't tell you, even if I did. But it's emotionally binding, which is arguably more important.
Writing things down is an advanced form of naming things and it provides clarity, helps to manage expectations, and allows you to define a working agreement before Real Money shows up and taints your interaction. You're just accepting tips, at the moment. Everyone is calm and cheerful, so now is your best time to negotiate.
Keep it very simple and only address the most basic things. If you wish to incorporate, at a later date, then you just take this to a registered agent, or other experienced person, and have them tidy up any loose ends and add the fine print.
Go forth, together
This has probably taken you weeks, or even months, but you're now a company. Get a logo and a company npub, start dropping the company name into your notes, and get on with the business of being in business.
-
@ 59df1288:92e1744f
2024-10-23 04:51:48null
-
@ 59df1288:92e1744f
2024-10-23 04:50:20null
-
@ 06830f6c:34da40c5
2024-08-11 20:13:46On August 10, 2024, the vibrant Sarit Expo was alive with energy as Bitcoin Dada celebrated the graduation of its seventh cohort. This momentous event, dedicated to advancing the understanding and application of cryptocurrency, showcased the dynamism and innovation of the Bitcoin Dada community.
The evening began with the MC engaging the audience in a series of lively questions. “What is Bitcoin? Explain it to me like I’m five,” was one such question that underscored the diverse range of understanding in the room. While some answers were complex, others offered simpler explanations, highlighting the challenge of conveying intricate concepts.
As the MC continued, participants were asked for their impressions of the event space and suggestions for improvement. Comments ranged from critiques of overly bright lighting to discussions about the relevance of Bitcoin. One participant proposed an intriguing app idea that combined Eventbrite and WhatsApp, reflecting the innovative spirit of the audience.
The highlight of the evening was the inspiring opening speech by the CEO of Bitcoin Dada.
She addressed the marginalization of women in tech, celebrating Bitcoin Dada’s commitment to inclusivity and support. She introduced her team
each member contributing uniquely: Edith, the community lead from Uganda; Sabina, the recruiter who found a sense of belonging; and Memelord, the project manager with a flair for comedy.
The ideathon segment was particularly thrilling. Debra’s third-place pitch proposed a Bitcoin-powered marketplace aimed at reducing youth unemployment by showcasing skills. Shantelle’s second-place idea focused on using Bitcoin to address global issues, such as helping refugees find safe zones with GPS technology. The top prize went to Meg, with her solution promising a significant impact—though the specifics were left as a tantalizing cliffhanger. 🌟🏆
PS : Sabina also gave a preview of the #tando app tha you can check out here on my youtube channel Link HERE
Meeting Inspiring Figures and Making Connections 📸
Throughout the event, I had the pleasure of meeting some remarkable individuals who are deeply involved in the Bitcoin community.
First, I met Felix from TheCore, a key panelist in the discussion on the financial revolution amidst economic unrest. We took a photo together, capturing a moment of shared enthusiasm for the potential of Bitcoin.
Later, I connected with a Bitcoin Dada and gamer who is actively involved with Thndr Games, Mary Imasuen. We took a photo showcasing our shared passion for Bitcoin and gaming.
I also had the chance to meet a Bitcoin enthusiast named Hope and she was adorned in Bitcoin-themed merchandise. We snapped a photo together, celebrating our mutual enthusiasm for Bitcoin and its future.
Panel Discussions: Insightful Exchanges and Thoughtful Dialogues
The panel discussion titled “Financial Revolution Amidst Economic Unrest” featured Felix from TheCore, Jason, a Bitcoin Dada supporter, and Bill, a lawyer with expertise in Bitcoin. They delved into the major challenges Kenyans face in adopting Bitcoin, emphasizing the importance of education and community support. They discussed the solid foundation of Bitcoin’s base layer and the need for further development in subsequent layers to enhance its functionality.
The discussion also touched on Kenya’s future in the Bitcoin space. Bill suggested integrating Bitcoin with fiat transactions and stock exchanges, while Jason highlighted the government's welcoming stance and the need for energy to support Bitcoin. Felix proposed making Bitcoin legal tender and finding sustainable energy sources to bolster its use. ⚖️🌍
Audience questions added further depth to the conversation. One attendee asked about using Bitcoin to offset government debt, while another inquired about measures for improving public education on Bitcoin. The responses stressed the need for comprehensive educational initiatives. When asked about alternative cryptocurrencies, the panel firmly rejected the idea of “shitcoins,” focusing instead on the value of Bitcoin. 🚫💸
The second panel discussion, moderated by Sharon from ₿-Trust, explored personal experiences with Bitcoin Dada. Panelists Anon, Vera, and Caroline shared how the program impacted their perspectives.
- Anon discovered a niche and a supportive community, emphasizing Bitcoin’s role as “lightning-fast internet money,” especially with Layer 2 advancements. 🌐⚡
- Vera found Bitcoin to be a valuable medium of exchange, advocated against other cryptocurrencies as “shitcoins,” and highlighted opportunities for women. 💪💰
- Caroline expanded her knowledge and aimed to educate others, describing Bitcoin as a store of value and emphasizing the importance of combating inflation through education. 📚🔍
The panelists also discussed opportunities for Bitcoin in their communities: - Anon saw potential for learning and growth through knowledge-sharing. - Vera mentioned BitSacco, a solution for saving in Bitcoin, and other upcoming projects like Sabina’s Tando app. - Caroline stressed the importance of education to counteract misconceptions about Bitcoin and its benefits. 🏡📈
In their closing remarks, the panelists shared their future aspirations: - Anon aimed to become a developer impacted by Bitcoin. - Vera planned to engage with the community and learn from others. - Caroline focused on educating the community to dispel myths about Bitcoin. 🌟👩💻
The event concluded with a warm dinner where attendees mingled, exchanged ideas, and enjoyed a meal together. WATCH https://video.nostr.build/4d0fbc2dd6ae0c20e0d45aa071a9e88000a9544f4289414900c91134d13960da.mp4
The Bitcoin Dada Cohort 7 graduation was more than just a celebration of individual achievements; it was a testament to the collective potential of the Bitcoin community.
As the event wrapped up, the atmosphere was charged with optimism and a shared commitment to advancing bitcoin technology. The graduating cohort left with new skills, fresh ideas, and a network of like-minded individuals, ready to make a significant impact on the future of Bitcoin. 🌍💡 #kenya #bitbiashara #kenya
-
@ bcea2b98:7ccef3c9
2024-10-20 17:33:12originally posted at https://stacker.news/items/732719
-
@ 9e69e420:d12360c2
2024-10-23 01:58:14Amber why, what, how?
Why?
Downstairs different then other social media apps. Instead of passwords managed by a central entity that can be recovered your identity is secured cryptographically with a public and private key pair. This grants you a lot of freedom. It also burdens you with a lot of responsibility. If your private key gets lost you lose access to your account forever. No one can help you. If your private key gets compromised the attacker will have access to your account in perpetuity. Able to impersonate you to all your contacts forever.
We need a way to keep our nsec's safe. We want to be able to try out all the latest nostr apps without compromising our keys. We need a way to back up our keys offline.
What?
Enter Amber. By Greenart7c3. Amber allows you to leverage any noster app that utilizes nip-46. Which is rapidly growing in popularity. And it's relatively simple to implement for developers so I expect it will become standard at some point. It's based on nsec bunker. The main difference being instead of your keys being on a remote server they are on your phone. Basically, a app that supports this and send request to Amber which will sign the event with your key and then be published via whichever app you are using. communications through a NOSTR relay.
Having your keys on your phone does post some security risks in and of itself. But I always recommend a strong pin instead of face or fingerprint ID anyways. As well as being very selective with the apps you put on your phone and the permissions you give them. I personally use graphene OS because it gives me complete control over app permissions including the otherwise mandatory Google Play and Android system apps. If your phone is wide open first considered changing that. If you're unable to then maybe look for another key management solution
Amber also enables nip-06 which allows for key generation with a mnemonic backup. For anyone who's ever had a Bitcoin wallet it's the exact same thing. In fact you can even use them as a different wallet. This way you can store your key's backup safely offline as a hard copy. Write them on paper, stamp on on stainless steel, or for ultimate resilience chisel them in a granite tablet.
How?
If it's not displaying in your client here's the link: Video All zaps from this note are %100 split with greenart7c3 so show some love
greenart7c3:
npub1w4uswmv6lu9yel005l3qgheysmr7tk9uvwluddznju3nuxalevvs2d0jr5
-
@ bcea2b98:7ccef3c9
2024-10-20 15:50:27The Bitcoin space is constantly evolving with new ideas, technologies, and innovations. From Lightning Network advancements to privacy improvements, there’s always something happening that could change the future of Bitcoin.
What do you think is the most exciting or innovative development in Bitcoin right now? I've been following a lot of privacy related advancement in Bitcoin and LN and look forward to learning about more solutions.
originally posted at https://stacker.news/items/732534
-
@ dd664d5e:5633d319
2024-07-10 14:45:43The Law Giver
In my previous article, I briefly went into the topic of how contract law is holy law.
The Father of the Christians, you see, is a God of Covenants, and He sent His Son to Earth to fulfill the Law and pay a Price for our salvation. The Father also created the Natural Order to confirm His Laws through our observation of that Law in action.
That is why Christians have a deep respect for honest contracts, true prices, fair measures, natural systems, and good laws. Not merely for their own sake, but also because understanding them helps us to understand and emulate the Law Giver.
The tired What would Jesus do? meme is actually an attempt to capture this emulation of the Highest Judge. Jesus knows the Law, since His Father defined it and He is One with the Father, so how would He apply the Law best, in this situation?
The Last Things
Working together with him, then, we entreat you not to accept the grace of God in vain. For he says, “At the acceptable time I have listened to you, and helped you on the day of salvation.”
Behold, now is the acceptable time; behold, now is the day of salvation.
-- 2 Corinthians 6:1-2 New Testament, RSV Bible
One of the things most devout Christians frequently ruminate over, is when Christ will return.
Every day, we ponder. We go for a walk, and ponder. We cook dinner, and ponder.
At the same time, we are called upon to live each day in a productive manner, and to not simply lie around, vegetating, and staring at the heavens. Not only for our own sake, but also because to do so would be to limit our ability to inform others about the Good News, so that they can take to pondering with us. We are called to ponder with as many people as we can produce, adopt, convert, or simply collect through our daily interactions.
This means that we are not of the world (as our eyes are watching God and baptism has made us Immortals), but we are definitely in the world (involved in, and effected by, the everyday dealings around us.) It is a very difficult balancing act to know when we are paying too much attention to the one or the other, or to know where to store up our treasures, if we can't put them all immediately into the Final Treasury.
So, we worked today and earned a bit of fiat cash and we have no immediate usage for it. What to do with it?
Well, some of it should go to charity or be invested in a business that provides important goods, services, and employment. Some of it will be needed to simply cover the day-to-day costs of our own life, or that of those dependent upon us. But it might be prudent to store up some of it, for the mysterious length of time between receipt of the monies and our own ascent into Heaven.
Typically, that store was the local currency, but that's being inflated away at an alarming rate. Then we all began to move to precious metals, and many of us still do, but they are so difficult to spend and can't be broken into small bits or transported over wide distances at low cost.
Enter Bitcoin.
The Great Ledger
In our frustration, more and more Christians are turning to a new technology, to save up some treasure in a liquid asset, for the mid-term. And, once we begin using it, and begin to understand how it works, we quickly grow fond of it.
Bitcoin is a beautiful money because it is a money based upon keeping precise accounts, using a fair measure, and obeying the Laws of Nature.
In essence, Bitcoin is a debt note emitted by a universal debtor (the network) in exchange for some good or service. This frees the individual people using it from ever needing to carry debt, as the debt stays in the network, the value and enforceability of that debt note is protected by the effort used to create and maintain the network, and the eagerness with which other people wish to store their efforts up in that same network. The debt still exists, but it can be so thinly and widely spread that it no longer rests as a burden upon one particular person.
The debt, in other words, has been disassociated from humans and the management has been distributed to machines. This is the precise opposite process of a "fiat" (by decree) currency, which only has value so long as it is associated with some particularly solvent group of humans (who personally vouch for repayment of any debts denominated in the currency), and where management is centralized to some other group of humans.
Have you accepted Bitcoin as your personal money and store of value?
You have invested $10 to buy the electricity to mine Bitcoin? Then you receive $10 of Bitcoin in return. The Bitcoin network now owes you the $10 purchasing power equivalent of that electricity.
If someone then gives you $5 worth of pizza, then you can then give them a $5 portion of your $10 worth of Bitcoin. You have taken a part of your Bitcoin debt note and shared it with them.
They now hold $5 worth of Bitcoin invested in the network and can spend it on some other good or service. Or they can simply hold it and wait for it to rise in value, as more people "mine" more of it (and produce more notes, paradoxically making the existing notes more useful and therefore valuable) and more people try to gain the notes in order to manage their own finances by storing their energy in the network or transporting their energy using the network.
Bitcoin, in other words, is an accounting book that needs no accountant because it stores, tracks, and controls the ledger on its own. It is a Natural Ledger that runs according to the the Laws.
It is the only human-made ledger that allows for true and immediate Final Settlement. This Final Settlement is what allows people to trade using the convenience of digital debt notes, with neither person occurring or even risking any personal debt. We Christians know that all debt is a burden, including monetary debts, which is why we are called to forgive each other's debt and to hope that our own debts are forgiven. Better still, is to avoid the accumulation of debts, altogether.
So, Final Settlement? Final Settlement is what Jesus would do.
-
@ df478568:2a951e67
2024-10-20 14:49:52Portfolio
I run 72 services on three servers - Umbrel - Start9 - -PopOS! with a Cloudflare Tunnel This has given me experience in running my own cloud, ticketing system, full bitcoin node, decentralized blog, a meal management system, and Docker experience in both Linux and Portainer.
Umbrel Server.
I run an Umbrel Server and host many services on the clear-net using the Cloudflare tunnel.
Start9 Server
I also run a start9 Server with services also exposed to the clearnet and TOR
Bitcoin Node
I began running a full bitcoin node in 2019. I also run two pruned nodes. You can see the Genesis Block on my instance of mempool
.
Peppermint Ticketing System
You can submit a ticket on my ticketing system here
I wrote about it in my blog here. This service runs on a AMD computer with the PopOS! Operating system and cloudflare.
Mealie
This is my favorite service on Umbrel. It’s a meal management system that allows me to plan my meals and automate my grocery lists. It saves so much time. You can find [my instance of mealie here(https://mealie.marcleon.work/).
Self Hosted and Decentralized Blog
I host a ghost blog on Start9 here.
This blog is also published on nostr at:
npub.pro
https://marc26z.npub.pro/
habla.news/
https://habla.news/u/marc26z@nostrplebs.com/
Highlighter.com
https://highlighter.com/marc26z@nostrplebs.com
Portainer
I am currently working on a website using WordPress using Portainer on Umbrel.
It’s not done, but the idea is to create a website that allows me to help people learn how to take self custody of bitcoin, run nodes, and mine.
It is not finished, but the idea is to offer bitcoin IT services.
Tails On An Air Gapped Computer
I removed the Wi-Fi card and hard drive from an old laptop to create an air gapped computer using TAILS Click here to watch the video hosted on nostr.build.
Bitcoin Mining Heater
I converted an old S9 into a space heater. The 3D printed case was made by CryptoCloaks. The S9 miner was a gift from the first person I met after starting my meetup.
PeerViewer
This is free and open source software that can be found at https://github.com/PeerViewer/. - It’s like a free and open source version of RDP on Windows or TeamViewer on Linux.
Certifications
Google Technical Support Certificiate
Automate The Boring Stuff With Python
-
@ 3c7d12a6:9532013e
2024-06-20 14:47:12NUD: Pubkey to colors
This NUD defines how to convert pubkey to colors.
Why?
npub
is nonsense to display.- too long.
npub1bla...bla
is nonsense to display.npub1
takes too much space....
means nothing.
Specs
- Uses hex pubkey.
- Converts 64 characters to 8 colors.
- Splits 64 with 8 length chunks.
- Converts each 2 in 8 into
- Alpha (0-255 -> 0.0-1.0)
- Hue (0-255 -> 0.0-360.0)
- Saturation (0-255 -> 0.0-1.0)
- Light (0-255 -> 0.0-1.0)
- Supports dark and light theme.
- When Light is 1.0, flip the Light for light theme (0.0).
-
@ de75eb1d:710c3014
2024-10-20 12:15:24What is Nostr?
- Decentralised/multihosted data publishing protocol; that’s it.
Notes (‘tweets’, blogs, web pages, DMs etc) and
Other (calendar events, map data, payments, computer game moves)
Stuff
Transmitted (hosted/stored) by
Relays (servers)
Other data sharing protocols: TCP, FTP, SMTP, HTTP
NB. Nostr relays transmit only text based data - not FILES. Images/video/audio etc are linked to via http
Protocol: a standardised set of rules for formatting and processing data. Protocols enable computers to communicate with one another.
🥱 Why’s it so great then?
-
Easy for nerds to build on (vs activity pub for example) and is growing very quickly (was only launched in 2020)
-
Cryptographic key pairs replace user accounts
-
Cross platform - use your keys to post and read notes in any client
-
Much harder to censor multiple copies of information; impossible if using selfhosted relay
-
Can be completely anonymous - no KYC, keys can even be generated offline
-
Bitcoin lightning integration through ‘zaps’
-
Anyone with a key pair can post notes, anyone can run a relay, ‘anyone’ can build a client
How to Nostr;
- Generate a fresh set of keys by clicking 'Sign Up' / 'Create Account' in any nostr client
- Get zappable - input your lightning address
- Write an #introductions post, get zapped
ok, ok I'm joking; here are the stepz
Getting started on Coracle.Social, my favourite microblogging web client
First up visit https://coracle.social/login and click 'Sign up' to generate a set of fresh keys.
The account creation process will walk you through inputting basic profile information, all of which is ENTIRELY optional. The only thing you need to interact with the nostr network are key pairs (you can make an unlimited amount of these). Coracle helps you out with finding a few accounts to follow based on interest, so you don't need to start with an empty feed.
Next & very important if you wish to keep this account is to backup your keys. Just like with Bitcoin you will lose access forever if you do not store the private key (nsec) somewhere safe, like a password manager or nostr login extension (nos2x, Alby, flamingo).
Click on the circle bottom left (profile pic if you uploaded one) and select 'Keys'. Clicking the little copy icon will bring up a box with the option to encode your private key with a password, you can then save the nsec string.
With your nsec in your pocket you can now go and play with any app in the Nostrverse and all of your data will follow you! *in theory 🤪
wanna get paid for posting pictures of your dog?
'Lightning Address' is the field to look out for, in Coracle this can be found under Profile and clicking edit from the three dot menu
Many wallets such as WoS, Breez, Minibits (Ecash), Zeus, Phoenix & Alby will provide you with a static lightning address, paste this into the box to receive sats from the get go.
Finding stuff to read
At the top of the 'Feed' page on Coracle is a Filters(|) button which brings up a yugge range of options
Anatomy of a Nostr "post"
{ "id": "4376c65d2f232afbe9b882a35baa4f6fe8667c4e684749af565f981833ed6a65",
"pubkey": "6e468422dfb74a5738702a8823b9b28168abab8655faacb6853cd0ee15deee93",
"created_at": 1673347337,
"kind": 1,
"content": "Walled gardens became prisons, and nostr is the first step towards tearing down the prison walls.", "tags": [ ["e", "3da979448d9ba263864c4d6f14984c423a3838364ec255f03c7904b1ae77f206"], ["p", "bf2376e17ba4ec269d10fcc996a4746b451152be9031fa48e74553dde5526bce"]
], "sig": "908a15e46fb4d8675bab026fc230a0e3542bfade63da02d542fb78b2a8513fcd0092619a2c8c1221e581946e0191f2af505dfdf8657a414dbca329186f009262" }Let's break that down - id: a unique number for each event allowing for referencing - pubkey: the author's unique public key (npub in hex format) - created_at: time stamp - kind: the type of content (known as an event), in this case a simple text note - content: the note - tags: this note references another event (it is a reply), and the op's npub - sig: verification code proving this note has been signed by the author's private key
The note displayed in Primal:
Get zapping - Primal inbuilt (email kyc, not available in certain location - choose El Salvador?), https://www.zapplepay.com/ or Alby Hub (self hosted)
Options for generating own keys: https://nip06.jaonoctus.dev/ - BIP39 https://gist.github.com/kdmukai/ae9911ed6fb92f8e7d2c553555b0cb86 - via seedsigner (we can dream) https://github.com/guilhermegps/secret-border https://www.nostr.rest/- vanity key mining
Nostr client examples:
-
Damus, Amethyst, Primal, Snort, Iris - Twitter like
-
Corale.social snort.social iris.to satellite.earth Nostrudel- web clients for computer browsers
-
Habla News https://yakihonne.com/- Long-form content (like this doc)
-
Flockstr, inmytown - Calendars
-
Fountain - Podcasts
-
Wavlake - Music
-
Tunestr - music live streaming for zaps
-
footstr.com - feet
-
cornychat.com nostrnests.com/ live audio rooms
-
Zap.stream - more live stuff
-
Shopstr, Plebeian.Market cypher.space - p2p buying/selling
-
Stacker.news, Oddbean - Forums
-
Yondar - Maps
-
Jester - Play chess jesterui.github.io/
-
lazereyes - Save your lens prescription on nostr:
-
Zap.cooking - recipes
-
Shipyard.pub - note scheduler
-
npub.pro - your notes as a website
-
Njump.me - profile preview tool with client chooser, makes easily shareable webpage using lightning address
-
mostro - p2p bitcoin exchange
- Pinstr - Create customized public boards of pins
- Listr - edit your lists (mute/bookmarks/follows etc
NIPs:
-
NIP-05: Mapping Nostr keys to DNS-based internet identifiers
-
NIP-08: Handling Mentions --- unrecommended: deprecated in favor of NIP-27
-
NIP-10: Conventions for clients' use of e and p tags in text events
Nostr Vs Mastodon/Twitter/Threads/Bluesky
Discoverability/finding people to follow/algos
Privacy/self-custody
It’s Shit and doesn’t work but I will die on this hill
Other rabbit holes:
-
DVM, data vending machines
-
Web of Trust
-
Outbox model
--------> https://zapper.nostrapps.org/ <----------
Some popular Nostriches to follow (import into Listr):
Handy nostr tools:
https://advancednostrsearch.vercel.app https://nostr.build/upload.php meme uploader https://zaplife.lol/ who zapped who https://zap.store/download - permissionless app store validated by the web of trust https://decenchat.com/ - embeddable nostr live chat widget for website https://highlighter.com/ - Tool to quote articles
-
@ 6f0ba1ef:58eb4351
2024-10-22 23:31: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
-
@ d830ee7b:4e61cd62
2024-06-02 05:44:01This article is a translation of my original Thai-language article, which will be published as a long-form piece in the coming days.
.........................
After listening to these two masters go back and forth, circling each other like intellectual gladiators, I gotta say… the lines between the "real world" and the "virtual world" are getting seriously blurry.
Watch more > Alt+Tab Season 2 EP4 : "พี่ชิต" ดร.วิชิต ซ้ายเกล้า
The battle for power is changing, man.
Forget tanks and explosions, the most powerful weapon now is invisible, hiding in plain sight. It's woven into the fabric of society. We call it "Soft Power", the unseen influence that slowly consumes us, manipulates us... without us even realizing it.
"The wars we see today..." Wichit says with a voice that sends shivers down your spine, "It's just throwing percentages at each other in the air."
Piriya nods in agreement. "Like you said, humans are getting smarter, more cunning. Those old-school, head-on confrontations? They just lead to destruction. Waste of resources, waste of life..."
They're right, you know... Back in the day, if you wanted something, you just sent an army to take it. Conquered land, plundered resources. It was all about "Hard Power."
Direct, brutal, effective... but the scars ran deep.
The world today is way more complex. Humans have learned to use "influence" to infiltrate every aspect of life.. individuals, societies, even international relations. No bloodshed, but the results are even more potent...
That's why "Soft Power" has become the most powerful weapon in this new age.
Imagine...
A world where information is the new crude oil... Where attention is the currency... And beliefs are weapons... Used cunningly in this invisible battlefield...
"Influence" is the real victory. Not about conquering land anymore. It's about controlling minds, hearts, and actions...
Here are some prime examples of "Soft Power" playing out in our everyday lives.
Online Warfare - Fake news, twisted facts, everyone's sharing it like crazy on social media. A few taps on a screen can destroy reputations, incite hatred, and control people's thoughts without breaking a sweat. (Wichit calls it "promiscuous bits" in his lectures.)
Have you ever... almost made a bad decision because you believed a rumor or fake news? Have you ever... fallen prey to manipulation, been tricked into hating or opposing someone without even knowing why?
That, my friend, is Soft Power working its magic... behind the scenes...
Economic Control - Think about those skyrocketing interest rates, inflation… everything's getting more expensive by the day while our wallets get thinner.
That's the consequence of Soft Power wielded by a handful of people who control the global economy.
Ever wonder... why your money seems to be worth less and less each day? Why you work harder, but life doesn't get any better?
The "money" system, controlled by the few… that's the culprit...
Cultural Domination - Movies, TV shows, music, fashion… We consume it all every day, and it slowly seeps in, shaping our thoughts, values, and behavior without us even realizing it. It's a tool used by certain groups to manipulate and steer society...
Have you ever… wanted to be, have, or act like what you see in the media? Ever gone along with trends or fads, even if they didn't really reflect who you are?
That's the power of "Cultural Domination"...
"The scary part is… most people don't even realize they're being manipulated." Piriya shakes his head.
"It's like a frog being boiled alive. By the time they realize it, it's too late..."
Wichit sighs...
"The system is broken, slowly eroding us from the inside... God knows where it'll all end, but it's not gonna be pretty."
...
Wait, what about "Money"? Isn't that Soft Power too?
Money used to be a mirror, reflecting the "value" of work, of resources. It was a tool for exchanging, saving, building wealth...
But today... the "money" system is designed to be conjured up out of thin air. No real cost, no sweat. Just print more bills, and suddenly its value is distorted. Leading to "bubbles of inequality" and a crisis of faith in money itself...
It's like sand… the tighter you grip it, the more it slips away…
"Like when America ditched the Bretton Woods system and embraced Fiat currency, which they can print endlessly… It's how they became the world's financial superpower." Wichit explains.
"Countries that used to hoard gold, like Europe, China, Russia… they lost power because the money they held wasn't worth as much anymore."
"So what about Thailand? We're just a small country. How can we survive?" Piriya asks, worried.
"We can't just print our own money. We have no control over the global economy..."
"That's the million-dollar question…" Wichit says with a serious tone.
"If we don't wake up, if we're not prepared, Thailand could become a victim in this power struggle."
"We need to build up our "immunity," man..."
...
Bitcoin.. Hope or Menace?
In the midst of this Soft Power battleground, filled with deception and distorted truths, Bitcoin emerges… like a beacon of light piercing through the darkness. A glimmer of hope for a fairer world, a chance to reshape the global economy...
"Weapons should be used for self-defense, not to attack others." Wichit says, implying that Bitcoin is no different.
"It's a tool that can be used for good or for evil. It all depends on who's wielding it."
Bitcoin is presented as a symbol of "Truth" in the digital realm.
No one can counterfeit it or control it. It's finite, requiring energy to "mine." It's like applying the laws of physics to the financial system, creating honesty and transparency that traditional money can't achieve.
Imagine… a public ledger that everyone can see, transparent, unchangeable... That's Bitcoin.
"It's like a monetary revolution, creating a new system that's fair, transparent, and accessible to everyone." Piriya says excitedly.
"No one can print more Bitcoin on a whim. No one controls it."
"Exactly." Wichit adds.
"If people understand and accept it, Bitcoin can change the world. Bring balance, reduce inequality, and return power to the people."
"Imagine… a world where money belongs to the people, not the government or banks..."
But Bitcoin is a double-edged sword... In the hands of the righteous, it's a beacon of hope. A chance to create a fairer world.
*But in the wrong hands? *
It could become a menace, a tool for money laundering, crime, even a "weapon" for cyber warfare…
...
Where Does Thailand Stand?
"The question is… with Bitcoin challenging the old powers, how should Thailand respond?" Piriya asks seriously.
"Do we embrace it? Resist it? Or just ignore it?"
"Doing nothing is not an option, just like when we missed the boat on the gold standard." Wichit emphasizes.
"Back then, England pushed for the gold standard, but Thailand clung to the old way. We ended up losing out, trade deficits, economic downturn... We can't let history repeat itself."
"I agree." Piriya nods.
"We need to learn from the past and prepare for the future."
"The government and the people need to wake up, study, and truly understand Bitcoin." Wichit continues.
"Not just knowing what it is… but understanding its mechanisms, its potential, its risks."
"You mean… we should push for Bitcoin to be the main currency of Thailand?" Piriya asks.
"Whoa, hold your horses, Professor." Wichit smiles.
"No need to rush things. I think we should start by creating a space for people to learn and experiment with Bitcoin. Promote innovation and businesses related to blockchain. Maybe the government could set up a "regulatory sandbox" to control and mitigate risks along the way."
"But will the government be willing to relinquish control over money and embrace Bitcoin?" Piriya asks skeptically.
"It won't be easy." Wichit sighs…
"Power is seductive. Everyone wants to hold on to it. But if we see Bitcoin as an opportunity for Thailand to develop, to create stability and prosperity for the people, I believe the government will see the benefits and eventually embrace it."
"So what can we, the people, do?" Piriya asks.
"We need to be aware of Soft Power." Wichit answers.
"Question the information we receive, be savvy about media tactics, don't fall prey to anyone's agenda. And most importantly, use Soft Power constructively, for the betterment of society."
"Absolutely." Piriya agrees wholeheartedly.
"We need to be informed citizens, not manipulated victims."
"And remember… Bitcoin is not some far-off concept anymore. We need to learn, stay informed, and be prepared because the future is in our hands." Wichit concludes. "The future of money, the future of our country, the future of the world…"
The conversation ends… but the crucial question lingers.
Will Thailand keep up and be ready for the world's seismic shift?
The answer… lies with each and every one of us...
...
This conversation between Wichit and Piriya is like a doorway to another dimension.
A dimension we're familiar with, but never truly see clearly. A world teeming with games, power struggles, and manipulations happening all around us… often without us even realizing it.
They're trying to show us the "Soft Power," the formless force that lurks in every corner of our lives. From the news we consume, the economic systems we rely on, to the culture and values that shape our thoughts and actions.
They're not trying to scare us, but to "wake us up," make us aware, so we don't become victims in this game.
The things they emphasize most is the "importance of education." We need to understand Bitcoin, blockchain, and all these new technologies transforming our world. Not just "knowing" what they are, but "understanding" their mechanisms, their potential, their risks.
So we can decide how to use them, "for what," and "how."
Where does Thailand stand in this world where "Soft Power" is thriving?
Wichit and Piriya don't offer a clear-cut answer. Instead, they "invite" us to "ask questions," "think critically," and find our own answers.
We… as "citizens" of this new world… must be aware, learn, and adapt wisely to the changes. "Soft Power" isn't scary if we understand it and use it constructively.
We can turn "threats" into "opportunities."
The lessons from this conversation aren't just about "Soft Power" or "Bitcoin." They're about "awareness," "questioning," "critical thinking," and "taking responsibility" for the future of ourselves, our society, and our nation.
It's a wake-up call, revealing the "truth" of the world hidden beneath the "illusion" of "Soft Power." And it reminds us of the true "power" that lies in our hands…
the power to "choose," "decide," and "create" the future we want...
Decoding Wichit's Thoughts. "Soft Power" vs. "Hard Power" - The Game of Power in the Modern World
From the conversation, we see that Wichit views "power" beyond just weapons and military force. He defines it as the "ability to influence, persuade, control, or direct the behavior, thoughts, and decisions of others" without resorting to physical force or coercion.
Wichit sees a fascinating connection between Soft Power, Bitcoin, and national security in the digital age. Imagine a "power triangle" where each side influences and is intertwined with the others.
He divides "power" into two main forms..
First, there's "Hard Power," the traditional approach focused on using force, coercion, and direct control. It relies on tangible resources like military might, weapons, economic clout, or sanctions.
Think of examples like waging war, military occupation, controlling trade routes, or imposing economic sanctions.
Then there's "Soft Power." This new form of power emphasizes influence, persuasion, and attraction, making others "want" to follow without force or coercion.
Examples include using information to shape narratives and guide thinking, employing culture and entertainment to create values and trends that influence behavior, or using economic systems to incentivize desired actions.
Wichit believes that in today's world, Soft Power is gaining more influence and impact than Hard Power.
Why?
Because beliefs, values, and information can spread and penetrate people's minds easier and faster than brute force or coercion.
He compares modern warfare to "throwing percentages at each other in the air." Meaning that the fight for dominance in this era is no longer about physical destruction like in the past. It's a battle on an invisible battlefield, where the stakes are "information," "beliefs," and "influence."
In Wichit's view, Bitcoin can be both a "tool" and a "weapon" in the game of Soft Power.
And ultimately, "power," in any form, has both light and dark sides. It depends on the user, whether they choose to use it for creation or destruction...
When "Influence" Becomes a "Chain" on Thai Society
Yes, Soft Power has a glamorous, alluring side, evident in movies, music, TV shows, food, fashion, and tourism, all of which contribute to Thailand's income and image.
But there's a dark side... one that slowly erodes our thoughts, values, and identity... without us even noticing.
Look around… Is our younger generation today more obsessed with Korean dramas, Western series, K-pop, and designer brands than Thai movies, music, fabrics, or cuisine?
Do they dream of living like idols, celebrities, rather than ordinary Thais?
This is the consequence of Soft Power, influencing us to want to "be" and "have" like others, forgetting our roots, our identity, and our own values.
The Government Uses Soft Power to Control the People Too!
Ever wonder… why people believe government pronouncements more than news from fellow citizens? Why we accept unfair policies without much resistance?
Is Soft Power in the hands of the government used to craft an image, hide the truth, distract, and control people's thoughts?
I don't know... We need to observe and find the answers.
Are Today's Youth "Victims" or "Awakened"?
The younger generation, raised with the internet, social media, and global entertainment, is more susceptible to Soft Power's influence. But... they also have the potential to be aware, to question, to analyze, and to break free from the chains of manipulation.
Don't let influence become your prison…
Be "aware," "question everything," and "be yourself"
This is just a taste of what's discussed in the full video. To truly savor the "flavor" of "Soft Power" and "Bitcoin," you gotta watch the whole thing.
Watch more > Alt+Tab Season 2 EP4 : "พี่ชิต" ดร.วิชิต ซ้ายเกล้า
Trust me... you'll be blown away by the depth and intensity of the conversation.
"One listen is not enough."
Let me tell you… This video is "heavy," "dense," and "intense." Even me had to rewind several times to let it all sink in.
But it's "worth it," I promise. You'll "decode" the world today, understand the mechanics of "power" and "money" in a way no one's ever explained before.
So why share it?
Because "truths" like these shouldn't be hidden. "Knowledge" like this should be "spread" to "everyone."
But… to be honest, this video is "deep," "complex," and "hard to grasp" for the average person. So we have to transform ourselves into "interpreters," "translating" the "divine language" into "human language." Explain it simply, clearly, and visually.
Remember… sharing is not just "talking," it's about communication that's easy to understand, relatable, and resonates with the listener.
Because knowledge is precious… if it's "shared."
PS. Wichit's ideas and concepts regarding Soft War are heavily influenced and inspired by the book "Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin" by Major Jason P. Lowery. (2023)
-
@ b5b32b81:b7383d03
2024-10-22 23:27:40Just assume everyone is a spook homie Trust no one but the code homie
-
@ 599f67f7:21fb3ea9
2024-10-20 11:32:36LNDhub-ek zure zorroa erraz inportatzea ahalbidetzen du bateragarriak diren aplikazioetan. Bitcoin Txoko LNbits zorroa progresiboko web aplikazio (PWA) modura gorde dezakezun arren zure telefonoan, Zeus edo BlueWallet bezalako aplikazio natibo batek erabiltzaile-esperientzia hobea eta segurtasun handiagoa eskaintzen du.
Alby erabiliz, zorroa zure nabigatzailearen luzapenean ere inporta dezakezu, webgunean Lightning ordainketak egiteko eta Nostr zap-ak egiteko erraztasun handiagoz. Zorionez, zorro hauek guztiek hizkuntza komun bat ulertzen dute, LNDhub izenekoa.
Gida honetan, zorroa zure nabigatzailera eta telefonora nola inportatu azalduko dugu. Zorroa nabigatzailean eta telefonoan erabili nahi baduzu, hasi Alby konfigurazioarekin, pausoetako batek zorroa Zeus-era erraz inportatzeko aukera emango baitizu. Baina zorroa soilik zure telefonoan erabili nahi baduzu, zuzenean Zeus atalera jo dezakezu.
Alby
nostr:nprofile1qqsyv47lazt9h6ycp2fsw270khje5egjgsrdkrupjg27u796g7f5k0s8jq7y6 nabigatzailearen luzapena da, Lightning eta Nostr nabigatzailera ekartzen dituena. WebLN protokoloa erabiliz, luzapenak webguneetan fakturak automatikoki detekta eta ordaintzen ditu, eta Lightning bidez webguneetan saioa hasteko aukera ematen du. Gainera, Lightning gune gogokoenetan aurrekontuak ezar ditzakezu. Luzapen honek NIP-07 protokoloa erabiliz Nostr sinadura gisa ere funtziona dezake, zure giltza pribatua web bezeroetan sartzea baino askoz seguruagoa dena.
Zer behar dut?
- Chrome edo Firefox luzapenak onartzen dituen web nabigatzailea.
- LNbits zorroa. Oraindik zorro bat ez baduzu, joan gure zorroen orrira eta sortu bat.
- (Aukerazkoa) Zeus konfiguratzeko mugikor bat.
1. LNDhub luzapena gaitzea zure LNbits zorroan
Nabigatzailean, joan zure zorroaren estekara. Egin klik Extensions atalean eta gaitzazu
LNDhub
luzapena. Gaitu ondoren, joan LNDhub luzapenaren orrira.2. Alby luzapena instalatu
Joan getalby.com-era eta egin klik
Add Browser Extension
botoian. Instalatu luzapena zure nabigatzailearen luzapen dendetik. Ezarri desblokeatzeko pasahitza eta gorde toki seguruan.3. Inportatu Alby-ra
Hurrengo pantailan, aukeratu
Connect
, eta ondoren aukeratuLNDhub
. Itzuli zure LNDhub luzapenera eta kopiatu konexioaren URL-a. Itsatsi hori LNDhub esportazioaren URI eremuan. SakatuContinue
. Orain LNbits zorroa LNDhub bidez konektatuta eduki beharko zenuke!💡 Aukeratu dezakezu Invoice URL eta Admin URL artean. Bi hauek Alby-ri zure LNbits zorroarekin elkarreragiteko baimen desberdinak ematen dizkiote: - Invoice URL-ak fakturak sortzea eta ordainketak jasotzea ahalbidetzen du. - Admin URL-ak ordainketak bidaltzeko aukera ere ematen du.
4. (Aukerazkoa) Zeus konfiguratu Alby-rekin
Orain LNbits zorroa Alby-rekin konektatu duzunez, Zeus-en ere erraz inportatu dezakezu. Ireki luzapena, egin klik zure zorroaren izenean, eta joan
Account Settings
atalean.Account
azpian aurkituko duzuConnect your mobile wallet
aukera. SakatuConnect
, eta Zeus-ekin eskaneatzeko QR kode bat erakutsiko dizu.Zeus aurretik instalatu ez baduzu, joan zeusln.app-era eta deskargatu Zeus zure mugikorreko sistema eragilerako. Zeus deskargatu ondoren, joan
Settings
>Add a new node
atalera. Hemen, Alby-k erakusten dizun QR kodea eskaneatu eta zorroa inportatu dezakezu.Listo! Orain Lightning-aren indarra zure eskuetan duzu. Jainko baten moduan sentitzen al zara jada?
Zeus
nostr:nprofile1qqsrf5h4ya83jk8u6t9jgc76h6kalz3plp9vusjpm2ygqgalqhxgp9g84ctjf kode irekiko aplikazio bikaina da, zure nodo propioa mugikorrean konektatzeko aukera ematen duena. Lightning nodo nagusi guztiak onartzen ditu, hala nola LND, CLN eta Eclair, bai eta Tor bidezko zein clearnet bidezko konexioak ere. Azkenaldian, beren LSP (Lightning Service Provider) propioa iragarri dute.
Zer behar dut?
- Android edo iOS telefono bat.
- LNbits zorroa ikusi ahal izateko beste gailu bat (QR kodea eskaneatzeko).
- LNbits zorroa eskuragarri izatea. Zorro bat oraindik ez baduzu, joan gure zorroen orrira eta sortu bat.
1. Zeus deskargatu
Deskargatu Zeus aplikazioa zure sistema eragilerako hemen.
2. LNDhub luzapena gaitzea zure LNbits zorroan
Zure LNbits zorroaren orrian, egin klik
Extensions
atalean eta gaitzazuLNDhub
luzapena. Gaitu ondoren, ireki LNDhub luzapenaren orria.3. Inportatu Zeus-en
Joan
Settings
>Add a new node
atalera Zeus-en. Eskaneatu nahi duzun zorroa inportatzeko.💡 Aukeratu dezakezu Invoice URL eta Admin URL artean: - Invoice URL-ak fakturak sortzea eta ordainketak jasotzea ahalbidetzen du. - Admin URL-ak ordainketak bidaltzeko aukera ere ematen du.
QR kodea eskaneatu ondoren, Zeus-en eremu guztiak automatikoki beteko dira. Zorroarentzat ezizena ere gehitu dezakezu.
Orain,
Save Node Config
sakatu eta zorroa zure mugikorretik kontrolatu dezakezu!Bonus
Zeus-ek ezaugarri interesgarriak ere eskaintzen ditu, hala nola gai pertsonalizatuak, prezioen bihurketak, lurker modua eta biometria bidezko egiaztapena. Gida honen esparrutik haratago doazen ezaugarriak dira hauek, baina aplikazioa erabili eta zuk zeuk aurkitu ditzakezu!
-
@ 599f67f7:21fb3ea9
2024-10-20 11:28:08LNDhub te permite importar fácilmente una billetera en aplicaciones compatibles. Si bien puedes guardar tu billetera Bitcoin Txoko LNbits en tu teléfono como una aplicación web progresiva (PWA), una aplicación nativa como Zeus o BlueWallet ofrece una mejor experiencia de usuario así como un mayor nivel de seguridad. Con Alby, también puedes importar la billetera a la extensión de tu navegador para facilitar los pagos Lightning en la web y para los zaps de Nostr. Por suerte para nosotros, todas estas billeteras hablan un lenguaje común llamado LNDhub.
En esta guía cubriremos cómo importar la billetera a tu navegador y a tu móvil. Si quieres usar tu billetera tanto en el navegador como en tu móvil, empieza con la configuración de Alby, ya que uno de los pasos te permitirá importar fácilmente tu billetera también a Zeus. Pero si sólo te interesa utilizar la billetera en tu móvil, puedes pasar directamente a la sección de Zeus.
Alby
nostr:nprofile1qqsyv47lazt9h6ycp2fsw270khje5egjgsrdkrupjg27u796g7f5k0s8jq7y6 es una extensión de navegador que lleva Lightning y Nostr a tu navegador. Utilizando el protocolo WebLN, esta extensión puede detectar facturas LN en paginas web y pagarlas, así como posibilita iniciar sesión en sitios web con Lightning. También puedes fijar presupuestos para tus sitios favoritos de Lightning. Por otro lado también puedes utilizarla para firmar en Nostr utilizando NIP-07, lo cual es mucho más seguro que ingresar tu clave privada en clientes web.
¿Qué necesito?
- Un navegador web que soporte extensiones Chrome o Firefox
- Acceso a tu billetera LNbits. Si todavía no tienes una billetera LNbits, dirígete a nuestra página de billeteras y crea una
- (Opcional) Un dispositivo móvil para configurar Zeus
1. Habilita la extensión LNDhub en tu LNbits wallet
Dirígete a tu billetera LNbits. Haz clic en
Extensiones
y habilita la extensiónLNDhub
. Una vez se haya habilitado, dirígete a la página de extensión de LNDhub.2. Instala la extensión Alby
Dirígete a getalby.com y instala la extensión desde el store de extensiones del navegador. Configura tu contraseña de desbloqueo y guárdala en un lugar seguro.
3. Importar a Alby
(Esta es una billetera de prueba. No hay fondos en ella. ¡No muestres a nadie tu URI de exportación real!)
En la siguiente pantalla, elige
Conectar
y luego eligeLNDhub
. Vuelve a tu extensión LNDhub y copia la URL de conexión. Pégala en el campoURI de exportación de LNDhub
. Pulsa continuar. ¡Ahora deberías haber estado conectado a tu billetera de LNbits con LNDhub!💡 Puedes elegir entre la URL de la factura (Invoice URL) y la URL de administración (Admin URL). Le dan a Alby diferentes permisos para interactuar con tu cartera de LNbits.
- La URL de factura te permite crear facturas y recibir pagos
- La URL de administración también te permite enviar pagos
4. Configurar Zeus con Alby (opcional)
Ahora que ya has conectado tu LNbits con Alby, también puedes importarlo de una manera sencilla a Zeus con Alby. Abre la extensión, haz cilc en el nombre de tu billetera y navega a la configuración de la cuenta. En
Wallet Settings
>General
se encuentra la opción de conectar tu billetera móvil. Al pulsar conectar, se mostrará un código QR para escanear desde Zeus.Si no tienes instalada Zeus con anterioridad, dirígete a zeusln.app y descarga la aplicación de Zeus para tu sistema operativo móvil.
Una vez tengas descargado Zeus, entra en
Configuración
>Añadir un nuevo nodo
. Aquí puedes escanear el código QR que te muestra Alby para importar la billetera.Voilà! Ahora tienes el poder de Lightning al alcance de la mano ¿Ya te sientes como un dios?
Zeus
nostr:nprofile1qqsrf5h4ya83jk8u6t9jgc76h6kalz3plp9vusjpm2ygqgalqhxgp9g84ctjf es una formidable aplicación de código abierto que permite conectar tu propio nodo a tu dispositivo movil. Es compatible con todas las principales implementaciones de nodos Lightning, como LND, CLN y Eclair, así como conexiones a través de Tor y clearnet. Recientemente también han anunciado su propio LSP (Lightning Service Provider).
¿Qué necesito?
- Teléfono Android o iOS
- Otro dispositivo en el que puede acceder a tu billetera LNbits (para mostrar el código QR para escanear)
- Acceso a tu billetera LNbits. Si todavía no tienes una billetera LNbits, dirígete a nuestra página de billeteras y crea una
1. Descarga Zeus
Puedes descargar la aplicación Zeus para tu sistema operativo aquí.
2. Habilita la extensión LNDhub en tu billetera LNbits
Dirígete a tu billetera LNbits. Haz clic en
Extensiones
y habilita la extensiónLNDhub
. Una vez habilitada, abre la pagina de la extensión LNDhub.3. Importar a Zeus
Ve a
Configuración
>Añadir un nuevo nodo en Zeus
.Escanea la cartera que quieras instalar.
💡 Puedes elegir entre la URL de la factura (Invoice URL) y la URL de administración (Admin URL). - La URL de la factura te da permiso para generar facturas y recibir pagos. - La URL de administración también te permite enviar pagos.
Una vez que hayas escaneado el código QR, todos los campos en Zeus deberían rellenarse automáticamente. También puedes añadir un apodo para tu billetera.
¡Ahora puedes guardar la configuración del nodo y controlar la billetera desde tu teléfono!
Extra
Zeus también ofrece funciones interesantes como temas personalizados, conversiones de precios, modo acechador y verificación biométrica. Estos temas están más allá del alcance de esta guía, ¡juega en la aplicación y descubre todas esas características por ti mismo!
-
@ 126a29e8:d1341981
2024-05-22 06:47:20Esta es la traducción de una carta de Ross Ulbricht que se publicó en su blog en Septiembre de 2019. Podéis leer el artículo original aquí: https://rossulbricht.medium.com/bitcoin-equals-freedom-6c33986b4852
Algo especial sucedió en el primer año después de que Satoshi nos regalara Bitcoin. Algo que nadie esperaba y que muchos pensaban que era imposible. Intenta imaginar Bitcoin en aquel entonces, antes de que pudieras comprar cosas con él, antes de que hubiera un tipo de cambio, antes de que nadie supiera realmente qué pasaría con él, si es que pasaba algo. Bitcoin no empezó como dinero. Se convirtió en dinero, pero lo hizo de forma distinta a cualquier dinero anterior. A pesar de todas las cosas que Bitcoin ha hecho posibles, a pesar de todas las formas en que está cambiando nuestro mundo, no apreciamos plenamente o ni siquiera entendemos lo que sucedió en aquellos primeros días, cuando era sólo un juguete para geeks.
Cualquier otro dinero anterior al Bitcoin -en la larga historia de la civilización humana- se valoraba por razones distintas a su uso como dinero. El ganado en África, los sellos de correos en las prisiones, las conchas marinas y los metales preciosos se han utilizado como dinero y encajan en este patrón. La única excepción es el dinero fiduciario -algo declarado como dinero por una autoridad-, pero incluso las monedas fiduciarias nacionales estuvieron en su día respaldadas por algo con valor previo, como el oro.
Bitcoin cambió todo eso. Bitcoin no tenía ningún valor previo y nadie estaba obligado a utilizarlo, pero de alguna manera se convirtió en un medio de intercambio. Las personas que no entienden y se preocupan poco por Bitcoin pueden, sin embargo, aceptarlo como pago porque saben que puede ser utilizado para pagar por otra cosa o ser intercambiado por dinero convencional.
La gente suele mencionar las pizzas que se compraron por diez mil bitcoins y, en retrospectiva, se burlan del tipo que se comió lo que se convertiría en un almuerzo multimillonario. A mí me interesa más la persona que renunció a dos pizzas en perfecto estado por meros bitcoins. ¿Qué vio en esos bits y bytes, en esa firma digital de algo que la gente llamaba cadena de bloques? Lo que motivó al vendedor de pizzas pudo haber llamado también la atención de los primeros mineros, que no podían vender pero acumulaban alegremente. Quizá inspiró a los que simplemente regalaban bitcoins por miles. Fuera lo que fuese, era algo nuevo.
La teoría económica clásica dice que un intercambio no se produce a menos que ambas partes valoren más lo que reciben que lo que entregan. Entonces, ¿de dónde viene el valor? Bitcoin nunca debería haber despegado, pero lo hizo. Incluso un producto nuevo tiene algún tipo de valor, y los primeros en adoptarlo corren el riesgo de no obtener el valor de su dinero, pero aún así esperan ganar con el intercambio.
En cambio, los primeros usuarios de Bitcoin no tenían ni idea de lo que sabemos ahora. Todo lo que tenían era un sueño, una convicción y el entusiasmo suficiente para convertir un artilugio digital en un fenómeno multimillonario del que sólo estamos empezando a ver los efectos.
Te diré lo que creo que pasó, aunque lo cierto es que nadie lo sabe. Es casi magia que Bitcoin pudiera surgir de la nada y, sin valor previo ni decreto de autoridad, convertirse en dinero. Pero Bitcoin no se originó en el vacío. Fue la solución a un problema con el que los criptógrafos llevaban lidiando muchos años: Cómo crear dinero digital sin autoridad central que no pudiera falsificarse y en el que se pudiera confiar.
Este problema persistió durante tanto tiempo que algunos dejaron la solución a otros y soñaron en cambio con cómo sería nuestro futuro si el dinero digital descentralizado llegara a existir de alguna manera. Soñaban con un futuro en el que el poder económico del mundo estuviera al alcance de todos, en el que el valor pudiera transferirse a cualquier lugar con sólo pulsar una tecla. Soñaban con que la prosperidad y libertad dependieran únicamente de las matemáticas de una encriptación robusta.
Bitcoin nacía pues en terreno fértil y era reconocido por quienes lo habían estado esperando. Fue un momento histórico para ellos, mucho más importante que las pizzas o las facturas de la electricidad generadas por la minería. La promesa de libertad y el encanto del destino dieron energía a la comunidad inicial. Bitcoin se adoptó consciente y espontáneamente como dinero mientras nadie lo veía, y nuestro mundo nunca volverá a ser el mismo.
https://freeross.org
-
@ 4ba8e86d:89d32de4
2024-10-20 10:12:19M5Stick-NEMO: Firmware para Pegadinhas de Alta Tecnologia em Dispositivos M5Stack ESP32 , Este projeto oferece uma solução eficaz sem comprometer a qualidade, ideal para quem busca uma experiência educativa e divertida no universo do hacking.
https://nostrcheck.me/media/public/nostrcheck.me_2674216785970862911706546228.webp
Desenvolvido por Noah Axon-n0xa, o M5Stick-NEMO é um projeto pessoal que surgiu da vontade de aprender mais sobre o desenvolvimento do ESP32 com o Arduino IDE. Inspirado por desafios populares na comunidade de tecnologia, NEMO replica pegadinhas comuns, proporcionando uma experiência educativa e divertida.
Características Principais:
- Portal NEMO WiFi: um captive portal login que tenta criar credenciais de e-mail de engenharia social - salva nomes de usuário e senhas no cartão SD (se inserido em um leitor compatível)
- Porta TV B-Gone para desligar dispositivos controlados por infravermelho.
- Spam de emparelhamento de dispositivo AppleJuice iOS Bluetooth.
- Spam de notificação de dispositivo Bluetooth para SwiftPair (Windows) e Android.
- Spam de WiFi com SSIDs engraçados, WiFi Rickrolling e modo aleatório.
- Scanner SSID WiFi: exibe e clona SSIDs próximos.
- Relógio digital ajustável pelo usuário com suporte do M5 Stick RTC.
- Configurações apoiadas por EEPROM para rotação, brilho, escurecimento automático e SSID do Portal NEMO.
- Nível da bateria e créditos no menu de configurações.
Interface de Usuário:
- Três controles principais: Home, Próximo e Selecionar.
Portal NEMO:
No modo NEMO Portal, o NEMO ativa um Hotspot WiFi aberto chamado "Nemo Free WiFi" (configurável em portal.h) com servidores DNS, DHCP e Web ativados.
-
O Portal NEMO exibe uma página de login falsa que afirma fornecer acesso à Internet se você fizer login.
-
Este é um ataque de engenharia social e registrará o nome de usuário e as senhas inseridas na página.
-
Nos detalhes do Wifi Scan, você pode clonar um SSID existente na lista de verificação. Sair do Portal NEMO limpará o SSID Evil Twin
-
Você pode visualizar as credenciais capturadas conectando-se ao portal a partir do seu próprio dispositivo e navegando até http://172.0.0.1/creds
-
Você pode definir um SSID personalizado conectando-se ao portal a partir do seu próprio dispositivo e navegando até http://172.0.0.1/ssid
-
Se o seu dispositivo suportar EEPROM para configurações, o SSID personalizado inserido será salvo como padrão, mesmo se estiver desligado.
-
Se o seu dispositivo tiver um leitor de cartão SD com um cartão formatado em sistema de arquivos FAT inserido, os nomes de usuário e senhas serão registrados em nemo-portal-creds.txt no cartão SD para você ler mais tarde.
-
O suporte a cartão SD só está habilitado por padrão na plataforma M5Stack Cardputer. Ele pode ser habilitado em dispositivos M5Stick, mas um leitor de cartão SD deve ser construído e conectado ao pino do painel frontal.
-
O Portal NEMO deve ser usado apenas em compromissos profissionais com um escopo válido de trabalho, fins educacionais ou de demonstração.
O armazenamento, venda ou uso de informações pessoais sem consentimento é contra a lei.🤓
Instalação:
-
Visite o site oficial: M5Stack Docs https://docs.m5stack.com/en/download
-
Baixe o programa oficial M5Burner.
-
Procure pelo projeto "NEMO For M5Stick C Plus".
-
Conecte o M5 à porta USB do seu PC.
-
Abra o M5Burner, selecione o projeto e clique em "Burn".
Experimente algumas funções do FlipperZero no seu M5. Para recursos adicionais e a liberdade de personalização, compile e baixe diretamente o programa "NEMO-M5Stick C Plus" no GitHub do projeto. Isso não só permite explorar, mas também modificar e aprimorar o projeto de acordo com suas preferências.
Repositório oficial no GitHub
https://github.com/n0xa/m5stick-nemo
Assista a um tutorial sobre a implementação do M5Stick-NEMO.
https://youtu.be/uFzQTzZo-6E?si=BJJzNmiN0Jzw42Eu
https://youtu.be/uTeCbR_hWjc?si=l88w_Hl3EXuKa6gv
Além disso, você pode aprimorar seu M5 com o MURAUDER, um conjunto abrangente de ferramentas ofensivas e defensivas WiFi/Bluetooth para o ESP32.
Encontre-o no GitHub: ESP32Marauder
https://github.com/justcallmekoko/ESP32Marauder
Assista a um tutorial sobre a implementação do MURAUDER:
https://youtu.be/GQPzgYksdkg?si=dWN-GwEP5r6hk9IC
-
@ b5b32b81:b7383d03
2024-10-22 23:20:02Test Content
-
@ 45bda953:bc1e518e
2024-10-19 15:24:18This post will be edited and refined over time.
Eschatology is the study of Biblical prophecy pertaining to what is commonly referred to as the end times. Bitcoin is the transformation of Austrian school economics theory into an efficient and applicable method driven by natural incentives and free market consensus mechanisms.
What happens when eschatology is viewed through a Bitcoin inspired world view?
In this thesis I contend that it is possible and very probable that the consequences of what Satoshi Nakamoto created in Bitcoin and the prophecies surrounding Jesus Christ with regards to the second coming and a thousand year kingdom of peace and prosperity convalesce into a very compelling argument for Biblical prophecy fulfilment.
...
No one would argue that modern major banks are today more powerful than kings of old and governments are mere puppets to the sway that the banking empires hold over them.
In Biblical prophecy when kings and powers are mentioned people rarely think of banking but nothing is comparable to the immense scale of wealth, power and territory controlled directly or indirectly by banks.
IMF, BIS, the FED and Blackrock are where the levers of power are pulled in the current dispensation. Governments restructure more frequently than these institutions whom endure and exercise unmerited influence over said governments and the public interests they claim to represent.
An excerpt from the King James Bible, Daniel chapter 2 describes prophetically the ages of man and its rotations of power.
Interesting to note that it is symbolically portrayed in monetary/industrial metals. All used as tokens for trade, symbols of wealth and manufacture.
Gold, silver, bronze, iron and clay. Gold has been a dominant symbol of power and wealth through millennia. Silver, brass and iron ores are mainly industrial metals although they all had prominent turns as coinage. Due to the debasement and concentration of gold specifically.
Clay on the other hand is only a symbol of power in construction and iron has never been used in construction to the extent it is in the 20th and 21st century. Skyscrapers are the symbols of money and power today, i.e. big bank and government buildings.
Daniel Chapter 2:24–45
24Therefore Daniel went to Arioch, whom the king had appointed to destroy the wise men of Babylon. He went and said thus to him: “Do not destroy the wise men of Babylon; take me before the king, and I will tell the king the interpretation.”
25Then Arioch quickly brought Daniel before the king, and said thus to him, “I have found a man of the captives of Judah, who will make known to the king the interpretation.”
26The king answered and said to Daniel, whose name was Belteshazzar, “Are you able to make known to me the dream which I have seen, and its interpretation?”
27Daniel answered in the presence of the king, and said, “The secret which the king has demanded, the wise men, the astrologers, the magicians, and the soothsayers cannot declare to the king. 28But there is a God in heaven who reveals secrets, and He has made known to King Nebuchadnezzar what will be in the latter days. Your dream, and the visions of your head upon your bed, were these: 29As for you, O king, thoughts came to your mind while on your bed, about what would come to pass after this; and He who reveals secrets has made known to you what will be. 30But as for me, this secret has not been revealed to me because I have more wisdom than anyone living, but for our sakes who make known the interpretation to the king, and that you may know the thoughts of your heart.
31“You, O king, were watching; and behold, a great image! This great image, whose splendor was excellent, stood before you; and its form was awesome. 32This image’s head was of fine gold, its chest and arms of silver, its belly and thighs of bronze, 33its legs of iron, its feet partly of iron and partly of clay. 34You watched while a stone was cut out without hands, which struck the image on its feet of iron and clay, and broke them in pieces. 35Then the iron, the clay, the bronze, the silver, and the gold were crushed together, and became like chaff from the summer threshing floors; the wind carried them away so that no trace of them was found. And the stone that struck the image became a great mountain and filled the whole earth.
36“This is the dream. Now we will tell the interpretation of it before the king. 37You, O king, are a king of kings. For the God of heaven has given you a kingdom, power, strength, and glory; 38and wherever the children of men dwell, or the beasts of the field and the birds of the heaven, He has given them into your hand, and has made you ruler over them all — you are this head of gold. 39But after you shall arise another kingdom inferior to yours; then another, a third kingdom of bronze, which shall rule over all the earth. 40And the fourth kingdom shall be as strong as iron, inasmuch as iron breaks in pieces and shatters everything; and like iron that crushes, that kingdom will break in pieces and crush all the others. 41Whereas you saw the feet and toes, partly of potter’s clay and partly of iron, the kingdom shall be divided; yet the strength of the iron shall be in it, just as you saw the iron mixed with ceramic clay. 42And as the toes of the feet were partly of iron and partly of clay, so the kingdom shall be partly strong and partly fragile. 43As you saw iron mixed with ceramic clay, they will mingle with the seed of men; but they will not adhere to one another, just as iron does not mix with clay. 44And in the days of these kings the God of heaven will set up a kingdom which shall never be destroyed; and the kingdom shall not be left to other people; it shall break in pieces and consume all these kingdoms, and it shall stand forever. 45Inasmuch as you saw that the stone was cut out of the mountain without hands, and that it broke in pieces the iron, the bronze, the clay, the silver, and the gold — the great God has made known to the king what will come to pass after this. The dream is certain, and its interpretation is sure.”
I speculate that the toes of iron and clay represent the world banking empire. Skyscrapers are constructed from iron and cement. Different forms of clay is a necessary cement ingredient. Architecture has always been used as a symbol of dominance by rulers especially true of systems who use awe as a means to cause feelings of insignificance in the individual thereby asserting their power at low cost. Ironically it never costs the ruler to create these structures, the cost is always carried by the people in time, resources and energy.
Skyscrapers and large construction are the modern symbols of money and power. Not so much kings, palaces and temples. The stone breaking the power of the statue has to break something contemporary other than kings and palaces if it is to be eschatological prophecy fulfilled in our time.
https://www.britannica.com/technology/cement-building-material/History-of-cement
The invention of portland cement usually is attributed to Joseph Aspdin of Leeds, Yorkshire, England, who in 1824 took out a patent for a material that was produced from a synthetic mixture of limestone and clay.
https://www.thoughtco.com/how-skyscrapers-became-possible-1991649
Later, taller and taller buildings were made possible through a series of architectural and engineering innovations, including the invention of the first process to mass-produce steel.
Construction of skyscrapers was made possible thanks to Englishman Henry Bessemer, (1856 to 1950) who invented the first process to mass-produce steel inexpensively.
You watched while a stone was cut out without hands,
No hands needed when the stone is an idea.
As a thought experiment, imagine there was a base metal as scarce as gold but with the following properties:\ — boring grey in colour\ — not a good conductor of electricity\ — not particularly strong, but not ductile or easily malleable either\ — not useful for any practical or ornamental purpose\ \ and one special, magical property:\ — can be transported over a communications channel
Greshams Law illustrated in slow motion picture.
1: The banks collapse. Being fundamentally weak because of zero reserve lending, any student of Austrian economics has been correctly predicting banking collapse, and have incorrectly been advocating gold as the solution to this collapse. Many of the big economies are valued through their housing market. Housing will be demonetised (Iron and clay economy) meaning shelter and property will become affordable to the average wage earner again. The large cement and iron structures become redundant. Everyone will work from home and a value to value economy will make banks seem like relics from an age of stupidity and evil.
2: Industrial metal iron will not be for mega structures that contain speculators and bookkeepers who have fiat jobs slaving for fiat money. Iron will be used to improve the lives of individuals. Iron as coinage is already demonetised.
3: Brass is demonetised as coinage and only valuable in industry. Ammunition, music, plumbing etcetera.
4: Silver has been a terrible money throughout history and when the silver investors wake up to the fact that they are holding onto a redundant asset with zero monetary properties compared to the alternative they will dump their holdings, crashing the silver market and subsequently reducing the prices of producing -
solder and brazing alloys, batteries, dentistry, TV screens, smart phones microwave ovens, ad infinitum. To quote Jeff Booth. "Prices always fall to the marginal cost of production."
5: The final Rubicon is gold, people get excited about the Bitcoin exchange traded funds but it is nothing compared to the value proposition when gold pundits, large investment funds, governments pension funds and reserve banks finally realise that gold is worthless as money in this new dispensation.
To illustrate the point more vividly.
Ezekiel 7:19
They shall cast their silver in the streets, and their gold shall be removed: their silver and their gold shall not be able to deliver them in the day of the wrath of the LORD: they shall not satisfy their souls, neither fill their bowels: because it is the stumbling block of their iniquity.
What we are witnessing is the biggest rug pull the world has ever seen. In this future metals will exclusively be used for industrial use cases after being stripped of their monetary premium.
This collapse is something that happens slowly over a long period of time. More or less one hour.
Revelation 18 verse 11–19 (The fall of Babylon)
And the merchants of the earth shall weep and mourn over her; for no man buyeth their merchandise any more: The merchandise of gold, and silver, and precious stones, and of pearls, and fine linen, and purple, and silk, and scarlet, and all thyine wood, and all manner vessels of ivory, and all manner vessels of most precious wood, and of brass, and iron, and marble, And cinnamon, and odours, and ointments, and frankincense, and wine, and oil, and fine flour, and wheat, and beasts, and sheep, and horses, and chariots, and slaves, and souls of men. And the fruits that thy soul lusted after are departed from thee, and all things which were dainty and goodly are departed from thee, and thou shalt find them no more at all. The merchants of these things, which were made rich by her, shall stand afar off for the fear of her torment, weeping and wailing, And saying, Alas, alas, that great city, that was clothed in fine linen, and purple, and scarlet, and decked with gold, and precious stones, and pearls! For in one hour so great riches is come to nought. And every shipmaster, and all the company in ships, and sailors, and as many as trade by sea, stood afar off, And cried when they saw the smoke of her burning, saying, What city is like unto this great city! And they cast dust on their heads, and cried, weeping and wailing, saying, Alas, alas, that great city, wherein were made rich all that had ships in the sea by reason of her costliness! for in one hour is she made desolate.
TLDR - No more money printer go BRRR. means death to the bourgeoisie cantillionaire class.**
Is it realistic to assume that all the worlds monetised industries collapse to fair value in one hour?
Coming back to eschatology, 2 Peter 3:8
But, beloved, be not ignorant of this one thing, that one day is with the Lord as a thousand years, and a thousand years as one day.
Eschatology students use this verse to speculatively project the fulfilment of Biblical prophecies with regards to their predicted time of occurrence. Now let’s apply this to Babylon falling in one hour.
1000 (one day) divided by 24 (hours) equals 41,6 years (one hour)
Since the first block was mined in January 2009 you add 41,6 years you get a completion date of 2050 a.d
Remember, this stone (Bitcoin) becomes a great mountain and fills the whole earth. A kingdom which shall never be destroyed; and the kingdom shall not be left to other people; it shall break in pieces and consume all these kingdoms, and it shall stand forever. The dream is certain, and its interpretation is sure.
But contemporary sources must reflect this probability if it is a good theory. https://www.newsbtc.com/news/50-of-population-to-use-bitcoin-by-2043-if-crypto-follows-internet-adoption/
If the banking system is first to collapse we can give it +- 10 years and we are already 14 years in since (Genesis Block) the stone struck the feet. People are slow to see the reality of the world they are living in. If all this is accurate then the world banking system is doomed.
https://www.youtube.com/watch?v=exK5yFEuBsk
Regards
Echo Delta
bitbib
-
@ a012dc82:6458a70d
2024-10-19 12:51:04Table Of Content
-
The Current State of Bitcoin ETFs
-
The 'Silver Bullet' Solution
-
The Role of ARK Invest
-
Implications for the Future
-
Conclusion
-
FAQ
In the dynamic and rapidly changing landscape of cryptocurrencies, Cathie Wood's ARK Invest has consistently been a pioneer, leading the charge with innovative strategies and investment products. The latest development from the firm is a groundbreaking strategy for their Bitcoin ETF filing, a solution they have intriguingly dubbed the 'Silver Bullet'. This approach, while shrouded in some degree of mystery, aims to address regulatory concerns that have long plagued the cryptocurrency sector. It promises to pave the way for a more secure, transparent, and efficient future for Bitcoin investments, potentially revolutionizing the way we perceive and interact with this digital asset.
The Current State of Bitcoin ETFs
Exchange-Traded Funds (ETFs) have become a popular investment vehicle in the financial world. They offer diversified exposure to a particular asset class or sector, allowing investors to mitigate risk while capitalizing on market trends. However, the creation of a Bitcoin ETF has been a contentious issue. Regulatory bodies, particularly the U.S. Securities and Exchange Commission (SEC), have expressed concerns over the potential for market manipulation and the need for robust investor protection measures. This has led to a stalemate, with several Bitcoin ETF proposals being rejected or left in regulatory limbo.
The 'Silver Bullet' Solution
ARK Invest's 'Silver Bullet' solution is a novel and ambitious approach designed to address these regulatory concerns head-on. While the specifics of this strategy remain undisclosed due to confidentiality and strategic reasons, it is believed to involve a blend of advanced technology and stringent compliance measures. The 'Silver Bullet' is not just a solution; it's a statement of intent, a commitment to providing greater transparency, reducing the risk of market manipulation, and ensuring robust investor protection. It's a testament to ARK's belief in the potential of Bitcoin and their determination to overcome the regulatory hurdles that stand in its path.
The Role of ARK Invest
Under the visionary leadership of Cathie Wood, ARK Invest has emerged as a strong advocate for cryptocurrencies and the transformative potential of blockchain technology. The firm's active management style, combined with its unwavering focus on disruptive innovation, has led to significant returns for their investors and cemented their reputation as trailblazers in the investment world. The introduction of the 'Silver Bullet' solution is another testament to ARK's commitment to pushing the boundaries of traditional finance, challenging the status quo, and driving the adoption of innovative financial products.
Implications for the Future
If successful, the 'Silver Bullet' solution could have far-reaching implications for the future of Bitcoin and the broader cryptocurrency sector. It could revolutionize the way Bitcoin ETFs are viewed by regulatory bodies, potentially leading to a shift in perception and a softening of the regulatory stance. This could pave the way for more widespread acceptance of Bitcoin as a legitimate and regulated asset class. The potential impact of this cannot be overstated. It could lead to an influx of institutional investors into the Bitcoin market, further driving its growth, increasing its liquidity, and promoting its adoption on a global scale.
Conclusion
The 'Silver Bullet' solution introduced by ARK Invest represents a significant and potentially game-changing step forward in the quest for a Bitcoin ETF. While the road to regulatory approval may still be fraught with challenges and uncertainties, this innovative approach offers a promising glimpse into the future of Bitcoin investments. As we continue to navigate the uncharted waters of cryptocurrency regulation, it is clear that firms like ARK Invest are not just observers but active participants, leading the charge towards a more secure, transparent, and inclusive financial future.
FAQ
What is the 'Silver Bullet' solution by ARK Invest? The 'Silver Bullet' is a novel strategy introduced by ARK Invest for their Bitcoin ETF filing. While specific details are confidential, it's designed to address regulatory concerns, aiming to provide greater transparency, reduce market manipulation risk, and ensure investor protection.
Why is the 'Silver Bullet' solution significant? If successful, the 'Silver Bullet' could revolutionize how Bitcoin ETFs are viewed by regulatory bodies, potentially leading to more widespread acceptance of Bitcoin as a regulated asset class. This could attract more institutional investors into the Bitcoin market, driving its growth and adoption.
What is ARK Invest's role in the cryptocurrency market? Led by Cathie Wood, ARK Invest is a strong advocate for cryptocurrencies and blockchain technology. The firm's focus on disruptive innovation has led to significant returns for investors and the introduction of the 'Silver Bullet' solution is another testament to ARK's commitment to pushing the boundaries of traditional finance.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 188302bb:9052db11
2024-10-19 11:45:49$75/year in bitcoin or eth.
If you want to know more join our discord or telegram
But the just is over 8k live channels from across the globe, over 20,000 on demand movies and tv shows and up to 3 connections per subscription for $75/year.
Bitcoin or eth accepted.
Works with tivimate, emby, plex, zymotv and kodi.
originally posted at https://stacker.news/items/730963
-
@ d830ee7b:4e61cd62
2024-05-10 14:03:50จุดเริ่มต้นของตำนาน
ท่ามกลางแสงแดดเจิดจ้าและลมทะเลเย็นสบายของหาดเมืองแกลง ชายหนุ่มรูปร่างกระทัดรัดนามว่า "ซุป" กำลังนั่งจดจ่ออยู่หน้าจอคอมพิวเตอร์ ดวงตาเป็นประกายฉายแววความสนใจขณะไล่อ่านบทความวิชาการทางด้านเศรษฐศาสตร์ ความรู้ไม่ได้เป็นเพียงแค่ตัวอักษรบนหน้าจอ แต่มันคือแรงบันดาลใจ เปรียบเสมือนขุมทรัพย์ที่รอการขุดค้นสำหรับเขา
ซุป ไม่ใช่หนุ่มนักเรียนหัวกะทิหรือบัณฑิตจบใหม่จากรั้วมหาวิทยาลัยดัง แต่เป็นชายหนุ่มธรรมดาที่หลงใหลในศาสตร์แห่งการจัดสรรทรัพยากรอันหายาก เศรษฐศาสตร์ ไม่ว่าจะเป็นสำนักคลาสสิคหรือออสเตรียน ล้วนดึงดูดความสนใจของเขาให้เข้าไปสำรวจอย่างลึกซึ้ง ยิ่งเรียนรู้ ซุปยิ่งค้นพบความมหัศจรรย์ของศาสตร์นี้ มันไม่ใช่แค่ทฤษฎีบนหน้ากระดาษ แต่สะท้อนอยู่ในทุกๆ การกระทำของมนุษย์
มันเหมือนเวลาที่เราไปเที่ยวทะเล.. เราไม่ได้แค่เห็นน้ำทะเลสีฟ้าสวยงาม แต่เราสัมผัสได้ถึงไอเย็นของลมทะเล ได้ยินเสียงคลื่นซัดสาด ได้กลิ่นอายของเกลือ ความรู้ด้านเศรษฐศาสตร์เองก็เช่นกัน เราจะมองเห็นมันได้ในทุกๆ การตัดสินใจ ทุกๆ การกระทำ ตั้งแต่การซื้อของในร้านสะดวกซื้อ ไปจนถึงการเลือกอาชีพ
หนึ่งในขุมทรัพย์ความรู้ที่ซุปหลงใหลมากที่สุด คือ เศรษฐศาสตร์สำนักออสเตรียน โดยเฉพาะแนวคิดเรื่อง "มูลค่าอัตวิสัย" (Subjective Value) ทฤษฎีนี้สอนให้เขาเข้าใจว่ามูลค่าของสิ่งต่างๆ ไม่ได้ขึ้นอยู่กับต้นทุนการผลิต หรือแรงงานที่ใส่ลงไป แต่มันขึ้นอยู่กับการประเมินของแต่ละบุคคล สิ่งที่สำคัญสำหรับคนหนึ่ง อาจดูไร้ค่าสำหรับอีกคน และมูลค่าของสิ่งเดียวกันก็อาจเปลี่ยนแปลงไปตามกาลเวลาและสถานการณ์
ซึ่งก็เหมือนกับตอนเรายังเด็กๆ ของเล่นชิ้นโปรดอาจเป็นตุ๊กตากันหมีตัวเก่าๆ แต่วันนี้ ตุ๊กตาตัวนั้นอาจถูกเก็บไว้ในกล่องใต้เตียงไปแล้ว เพราะความต้องการของเราเปลี่ยนไป เราให้คุณค่ากับสิ่งอื่นๆ มากกว่าเมื่อเวลาผ่านไป
ความหลงใหลในเศรษฐศาสตร์สำนักออสเตรียนนำพาซุปไปรู้จักกับ อ.พิริยะ และทีมงาน Right Shift กลุ่มคนรุ่นใหม่ที่มุ่งมั่นเผยแพร่ความรู้ทางเศรษฐศาสตร์อย่างเข้าใจง่าย ซุปกลายเป็นแฟนตัวยง ติดตามผลงานแทบทุกชิ้น และใฝ่ฝันว่าสักวันหนึ่งจะได้มีโอกาสร่วมงานกับทีม แต่ด้วยความขี้อายและอ่อนน้อมถ่อมตน ซุปจึงไม่เคยกล้าเอ่ยปาก เขาเลือกที่จะเป็นผู้สนับสนุนอยู่ห่างๆ อย่างเงียบๆ
บางครั้ง.. ความฝันก็เหมือนเมล็ดพันธุ์ เราต้องหมั่นรดน้ำ พรวนดิน และดูแลมันอย่างดี ถึงแม้จะไม่รู้ว่ามันจะเติบโตงอกงามเมื่อไร แต่ถ้าเรายังคงดูแลมันต่อไป สักวันหนึ่งมันจะผลิดอกออกผลให้เราได้ชื่นชม
จุดเปลี่ยนแห่งโชคชะตา
ชีวิตของซุป.. เหมือนเรือเล็กที่ล่องลอยไปตามกระแสน้ำ มีความสุขกับการเรียนรู้ เสพย์ติดความรู้ด้านเศรษฐศาสตร์และมีความฝันเล็กๆ ที่อยากร่วมงานกับทีม Right Shift
วันหนึ่ง.. โชคชะตาก็เล่นตลก เหมือนส่งคลื่นลูกใหญ่ซัดเข้ามาหาเรือลำน้อยของซุป
Right Shift กำลังประสบปัญหาขาดแคลนนักตัดต่อวิดีโอคลิป จนกระทั่ง Jakk Goodday หนึ่งในผู้ก่อตั้ง ต้องลงมาทำเองแก้ขัดไปก่อน ข่าวนี้แพร่สะพัดไปถึงหูของซุป เขาถึงกับอุทานออกมาเบาๆ
"เอ๊ะ.. นี่มันโอกาสของเราหรือเปล่านะ?"
สถานการณ์แบบนี้มันเหมือนตอนเราเดินเล่นอยู่ริมชายหาด แล้วเจอขวดแก้วที่ถูกคลื่นซัดมาเกยตื้น ข้างในมีกระดาษเขียนข้อความลอยอยู่ เราจะเก็บมันขึ้นมาอ่านไหมหรือจะปล่อยให้คลื่นซัดมันกลับลงทะเลไป?
ความคิดมากมายวนเวียนอยู่ในหัวของซุป เขาไม่ใช่มืออาชีพ แต่ก็พอมีฝีมือด้านการตัดต่ออยู่บ้าง จะลองเสี่ยงดูดีไหมนะ? ถ้าไม่ลอง.. ก็คงไม่มีโอกาส แต่ถ้าลองแล้วไม่สำเร็จล่ะ? จะกลายเป็นตัวตลกหรือเปล่านะ?
ในที่สุด.. ซุปก็ตัดสินใจ "เอาวะ! ลองดูสักตั้ง อย่างน้อยก็ได้พิสูจน์ตัวเอง"
เขาส่งข้อความไปหา Jakk บอกเล่าความสามารถและความตั้งใจ พร้อมกับยื่นมือเข้าช่วยเหลือ
บางครั้ง.. โอกาสก็มาในรูปแบบของปัญหา คนที่มองเห็นโอกาสและกล้าที่จะคว้ามันไว้ ก็จะประสบความสำเร็จ
สิ่งที่เกิดขึ้นหลังจากนั้นมันราวกับความฝัน Jakk ตอบรับและให้โอกาสซุปเข้ามาทดลองงาน ความกดดันถาโถมเข้ามาอย่างหนัก แต่ซุปก็พยายามอย่างเต็มที่ เขาใช้ความรู้ด้านเศรษฐศาสตร์สำนักออสเตรียนในการประเมินคุณค่าของโอกาสนี้ มันมีค่ามากกว่าความสบายใจในฐานะแฟนคลับ มากกว่าความกลัวที่จะล้มเหลว
"ความกลัว คือ กำแพงที่กั้นระหว่าง ตัวเรา กับ ความฝัน"
ซุปทุ่มเททุกอย่างให้กับงาน ไม่เคยเกี่ยงงอนหรือบ่นว่าเหนื่อย เพราะสำหรับเขา.. นี่คือโอกาสทอง มันคือการได้ทำงานที่รักร่วมกับทีมที่เขาชื่นชม
ทฤษฎีมูลค่าอัตวิสัยสอนให้เรารู้ว่า มูลค่าของสิ่งต่างๆ ไม่ได้ขึ้นอยู่กับปัจจัยภายนอก เช่น ราคา หรือ ต้นทุนการผลิต แต่มันขึ้นอยู่กับ การประเมินของแต่ละบุคคล
การตัดสินใจครั้งสำคัญของซุป นำพาเขาไปสู่เส้นทางใหม่ เส้นทางที่เต็มไปด้วยความท้าทาย แต่ก็เต็มไปด้วยโอกาสเช่นกัน เส้นทางที่เขาจะได้เรียนรู้ เติบโต และสร้างคุณค่าให้กับตัวเองและสังคม การตัดสินใจของซุปนั้นมันช่างสอดคล้องกับหลักการของเศรษฐศาสตร์สำนักออสเตรียนที่เน้นการกระทำของมนุษย์ การประเมินมูลค่า และการตัดสินใจ
วันเวลาแห่งการสร้างคุณค่า
แสงไฟจากจอคอมพิวเตอร์ยังคงสาดส่องใบหน้าของซุป.. ดวงตาของเขาจดจ้องอยู่กับเส้นเวลา ตัดต่อ เรียบเรียง ประกอบร่าง วิดีโอคลิปแต่ละชิ้นให้สมบูรณ์ งานที่ได้รับมอบหมายไม่ใช่งานง่าย แต่ซุปไม่เคยปริปากบ่น เขาก้มหน้าก้มตาทำงานของตัวเองไปอย่างเต็มที่
"นี่มันคือความฝันของเราเลยนะ จะมัวบ่นทำไมกัน" ซุปพึมพำกับตัวเอง
ซุปในตอนนี้ก็เหมือนนักปีนเขาที่กำลังไต่ขึ้นสู่ยอดเขา เส้นทางอาจจะลำบาก ขรุขระ และเต็มไปด้วยอุปสรรค แต่ทุกย่างก้าวก็คือ ความท้าทาย และความภาคภูมิใจ
แม้จะไม่ได้รับผลตอบแทนมากมาย แต่สำหรับซุป ความสุขที่ได้รับจากการทำงานมันมีค่ามากกว่าเงินทอง เขาได้เรียนรู้อะไรใหม่ๆ มากมาย ได้ฝึกฝนทักษะ ได้สร้างสรรค์ผลงาน และที่สำคัญที่สุด คือ ได้เป็นส่วนหนึ่งของทีมที่เขารัก
ในทางเศรษฐศาสตร์สำนักออสเตรียน เราเรียกสิ่งนี้ว่า "การประเมินมูลค่าโดยการใช้ประโยชน์ที่มีค่าน้อยที่สุด" (Valuation by the Least Valuable Use) หมายความว่า.. เมื่อคนเราต้องตัดสินใจ เราจะประเมินมูลค่าของสิ่งต่างๆ โดยพิจารณาจากประโยชน์ที่เราจะได้รับจากการใช้งานนั้นๆ
ในกรณีของซุป.. การทำงานกับ Right Shift อาจไม่ได้ทำให้เขาร่ำรวย แต่เขาได้รับประสบการณ์ ความรู้ และความสุข ซึ่งสิ่งเหล่านี้มีมูลค่าสำหรับซุปมากกว่าเงินทอง
บางครั้ง.. คุณค่าของสิ่งต่างๆ ก็ไม่สามารถวัดได้ด้วยเงิน
นอกจากนี้.. การทำงานกับ Right Shift ยังเปิดโอกาสให้ซุปได้พบปะผู้คนมากมาย ทั้งคนดัง ผู้เชี่ยวชาญ และบุคคลที่น่าสนใจ ซึ่งเป็นเหมือน "อรรถประโยชน์ส่วนเพิ่ม" (Marginal Utility) ที่เติมเต็มความสุขในการทำงานของเขา
เหมือนเวลาเรากินข้าวจานแรกอาจจะอร่อยมากเพราะเราหิว แต่พอจานที่สอง จานที่สาม ความอร่อยก็เริ่มลดลง จนกระทั่งเราอิ่ม จนไม่อยากกินอีกแล้ว
ประสบการณ์ใหม่ๆ ก็เช่นกัน ครั้งแรกที่ได้เจออาจจะตื่นเต้น ประทับใจ แต่พอเจอบ่อยๆ ความตื่นเต้นก็จะลดลง แต่ความทรงจำและความรู้สึกดีๆ ยังคงอยู่
แนวคิดเรื่อง "อรรถประโยชน์ส่วนเพิ่ม" ช่วยอธิบายว่า ทำไมคนเราถึงแสวงหาประสบการณ์ใหม่ๆ แม้ว่าความตื่นเต้นจะลดลงตามกาลเวลา
ซุป ยังคงทำงานอย่างหนัก พัฒนาตัวเองและสร้างสรรค์ผลงาน เขาไม่รู้ว่าอนาคตจะเป็นอย่างไร แต่เขารู้ว่า.. เขาได้เลือกเส้นทางที่ถูกต้องแล้ว เส้นทางที่เขาได้สร้างคุณค่าให้กับตัวเองและสังคม
"ความสุข ไม่ได้อยู่ที่ปลายทาง แต่อยู่ในระหว่างทาง"
บทเพลงแห่งการแบ่งปัน
เวลาผ่านไป.. ซุปสั่งสมประสบการณ์และความรู้มากขึ้น จากชายหนุ่มขี้อาย เขากลายเป็นนักตัดต่อมือฉมัง และที่สำคัญคือความรู้ด้านเศรษฐศาสตร์สำนักออสเตรียนที่สั่งสมมาตลอดมันเริ่มผลิดอกออกผล
ซุป อยากแบ่งปันความรู้ อยากให้คนอื่นๆ ได้สัมผัสความมหัศจรรย์ของศาสตร์นี้เหมือนที่เขาเคยสัมผัส เขาปรึกษากับ Jakk และ อิสระ (น้องเล็กในทีม) ซึ่งมีความสนใจในเรื่องเดียวกันและต่างก็มีแรงปรารถนาที่จะจะเผยแพร่มันเช่นกัน
ซุป: "พี่ Jakk, อิส ผมอยากทำรายการเกี่ยวกับเศรษฐศาสตร์สำนักออสเตรียน พี่คิดว่าไงครับ"
Jakk: "ไอเดียดีนะซุป แต่จะทำยังไงให้มันเข้าใจง่าย ไม่น่าเบื่อ ไม่เอาศัพท์แสงบ้าบอคอแตกนะ"
อิสระ: "พี่ซุปเล่าเรื่องเก่ง เราทำเป็นนิทานก็ได้นี่ครับ"
ซุป: "นิทานอิสซุป เหมือนที่ อ.พิริยะ ตั้งให้อะหรอ เออ.. ชื่อนี้ เข้าท่าดีนะ"
และแล้ว "นิทานอิสซุป" ก็ถือกำเนิดขึ้น รายการที่นำเสนอความรู้ด้านเศรษฐศาสตร์สำนักออสเตรียนในรูปแบบง่ายๆ สบายๆ เข้าใจง่าย เสียงนุ่มๆ ของซุป บวกกับลีลาการเล่าเรื่องที่เป็นเอกลักษณ์ของอิสระ ดึงดูดผู้ชมได้อย่างมากมาย
เหมือนแม่น้ำที่ไหลรินลงจากยอดเขา นำพาธาตุอาหารไปหล่อเลี้ยง ต้นไม้ พืชพันธุ์และสัตว์น้อยใหญ่ ความรู้ก็เช่นกัน เมื่อถูกแบ่งปันมันจะสร้างคุณค่าให้กับผู้รับและผู้ให้ ซุปมีความสุขที่ได้แบ่งปันความรู้ และยิ่งแบ่งปันเขาก็ยิ่งได้รับความสุขและคุณค่ามากขึ้น
นี่อาจคล้าย "กฎของอรรถประโยชน์ส่วนเพิ่มที่ลดลง" (Law of Diminishing Marginal Utility) เมื่อเรามีบางสิ่งบางอย่างมากขึ้น ความพึงพอใจที่ได้รับจากหน่วย (Unit) ที่เพิ่มขึ้นจะค่อยๆ ลดลง
แต่.. กฎนี้ใช้ไม่ได้กับ “ความรู้” และ “การแบ่งปัน” ยิ่งเรามีความรู้มากขึ้น ยิ่งเราแบ่งปันมากขึ้น ความสุขและ คุณค่าที่ได้รับก็จะยิ่งเพิ่มขึ้น ซึ่ง ซุป ก็เข้าใจหลักการนี้จึงเลือกที่จะแบ่งปันความรู้เพื่อสร้างคุณค่าให้กับสังคม และเติมเต็มความสุขให้กับตัวเอง
"นิทานอิสซุป" ไม่ได้เป็นเพียงแค่รายการ แต่เป็นพื้นที่ ที่ซุปได้แสดงออกถึงความรักและความหลงใหลในเศรษฐศาสตร์สำนักออสเตรียน เขาไม่ได้ทำเพื่อชื่อเสียงหรือเงินทอง แต่ทำเพื่อแบ่งปันและสร้างคุณค่าให้กับสังคม
การให้ คือ การได้รับ ที่ยิ่งใหญ่ที่สุด
"นิทานอิสซุป" จึงเป็นมากกว่านิทานวิชาการ มันคือบทเพลงแห่งการแบ่งปัน บทเพลงที่ ซุป บรรจงแต่ง เพื่อส่งต่อความรู้และแรงบันดาลใจให้กับผู้คน
"เพราะ.. ความรู้ คือ แสงสว่าง ที่ช่วยขับไล่ความมืดมน"
ก้าวสู่แสงไฟ
นิทานอิสซุป กลายเป็นจุดเริ่มต้นของเส้นทางใหม่ เส้นทางที่นำพา ซุป ก้าวออกจากเงามืดไปสู่แสงไฟ เหมือนดอกไม้ที่เบ่งบานท่ามกลางแสงแดด อวดสีสันและกลิ่นหอม ดึงดูดผึ้งและผีเสื้อให้เข้ามาดอมดม
ซุป ไม่ใช่แค่นักเล่านิทาน แต่เขาได้ค่อยๆ กลายเป็นหนึ่งในอินฟลูเอนเซอร์ในวงการบิตคอยน์ไทยอย่างช้าๆ ภายใต้ฉายา "ประธานซุป" เขาได้รับเชิญไปบรรยาย ออกรายการ และร่วมงานกับบุคคลที่มีชื่อเสียงมากมาย
ความสำเร็จ มันก็มักจะมาพร้อมกับความรับผิดชอบและความคาดหวัง เส้นทางของ ซุป ไม่ได้ถูกโรยด้วยกลีบกุหลาบ เขาต้องตัดสินใจครั้งสำคัญหลายครั้ง เช่น การทิ้งรายได้จากงานฟรีแลนซ์, การสละโอกาสทางการเมือง เพื่อทุ่มเทให้กับ Right Shift
“การตัดสินใจ” คือ กระบวนการเลือกทางเลือกหนึ่ง เหนือทางเลือกอื่นๆ โดยพิจารณาจาก การประเมินมูลค่าอัตวิสัย
ซุป เลือกที่จะเสียสละสิ่งที่คนอื่นมองว่ามีค่า เพื่อสิ่งที่เขามองว่ามีค่ามากกว่า นั่นคือ.. ความฝัน ความสุข และ การสร้างคุณค่าให้กับสังคม
"การเสียสละ คือ บทพิสูจน์ ของความมุ่งมั่น"
ตลอดเส้นทาง ซุป ได้รับการสนับสนุนและคำแนะนำ จาก Jakk Goodday ผู้ที่เชื่อมั่นในศักยภาพของเขา ตั้งแต่วันแรก ความสัมพันธ์ระหว่าง ซุป และ Jakk สะท้อนให้เห็นถึงความสำคัญของ "การแลกเปลี่ยนที่เป็นประโยชน์ร่วมกัน" (Mutually Beneficial Exchange) ซึ่งเป็นหัวใจสำคัญของ เศรษฐศาสตร์สำนักออสเตรียน
Jakk เห็นคุณค่าในตัว ซุป จึงให้โอกาสและสนับสนุนเขา ในขณะที่ ซุป ก็ตอบแทนด้วยการทำงานอย่างเต็มที่ และ สร้างคุณค่าให้กับทีม Right Shift
การให้ และ การรับ นั้นเป็นวัฏจักรที่สร้างสรรค์ และ ยั่งยืน
เส้นทางของ "ซุป" จากแฟนคลับสู่ประธานซุป เป็นบทเรียนชีวิตที่สอนให้เรารู้ว่า.. ความฝัน ความมุ่งมั่น การเสียสละ และการสร้างคุณค่า คือ สิ่งสำคัญที่นำพาเราไปสู่ความสำเร็จ
และทุกคน ก็มีศักยภาพที่จะสร้างคุณค่า และประสบความสำเร็จ ในแบบของตัวเอง
คุณค่าที่แท้จริง
เรื่องราวของ "ซุป" ไม่ได้เป็นเพียงแค่เรื่องราวของความสำเร็จ แต่เป็นบทเรียนชีวิตที่สอนให้เราเข้าใจถึงคุณค่าที่แท้จริง
เหมือนต้นไม้ใหญ่ที่เติบโตแผ่กิ่งก้านสาขา ให้ร่มเงาและผลิดอกออกผล ซุป เปรียบเสมือนต้นไม้ต้นนั้น เขาเติบโต จากเมล็ดพันธุ์เล็กๆ ที่หลงใหลในความรู้ ด้วยการหมั่นรดน้ำ พรวนดิน ใส่ปุ๋ย คือความมุ่งมั่น ความอดทน และ การเสียสละ จนกระทั่งเติบใหญ่ แผ่กิ่งก้านสาขาให้ร่มเงา คือการแบ่งปันความรู้และผลิดอกออกผล คือความสำเร็จและการเป็นแรงบันดาลใจให้กับผู้อื่น
หลักการของ ทฤษฎีมูลค่าอัตวิสัย (Subjective value) สะท้อนให้เห็นในทุกๆ การตัดสินใจของ ซุป
การประเมินมูลค่า >> ซุป ประเมินคุณค่าของโอกาส ประสบการณ์ และความสุข มากกว่าเงินทองและชื่อเสียง การเสียสละ >> ซุป ยอมสละรายได้และโอกาสทางการเมือง เพื่อหันมาทำในสิ่งที่เขารักและเชื่อมั่น ความอดทน >> ซุป ทำงานหนัก พัฒนาตัวเองและอดทนรอคอย จนกระทั่งประสบความสำเร็จ การสร้างคุณค่า >> ซุป แบ่งปันความรู้และสร้างแรงบันดาลใจ ให้กับผู้อื่น
เรื่องราวของ ซุป สะท้อนให้เห็นถึง "ปฏิทรรศน์น้ำ-เพชร" (Water-Diamond Paradox) ซึ่งเป็นแนวคิดใน เศรษฐศาสตร์สำนักออสเตรียน ที่อธิบายว่า.. ทำไมสิ่งที่จำเป็นอย่าง น้ำ ถึงมีราคาถูก ในขณะที่สิ่งฟุ่มเฟือยอย่าง เพชร ถึงมีราคาแพง
ในชีวิตจริง.. สิ่งที่สำคัญสำหรับคนหนึ่ง อาจไม่ได้สลักสำคัญสำหรับอีกคน และมูลค่าของสิ่งต่างๆ ก็ขึ้นอยู่กับ บริบทและความต้องการของแต่ละบุคคล
ความสุข และ ความสำเร็จ ไม่ได้มีสูตรสำเร็จตายตัว แต่ละคนต้องค้นหาและสร้างมันขึ้นมาเอง
ซุป ค้นพบ “คุณค่าที่แท้จริง” ของชีวิต เขาไม่จำเป็นต้องมีเงินทองมากมาย หรือมีชื่อเสียงโด่งดัง แต่เขามีความสุขกับการได้ทำในสิ่งที่รักและสร้างคุณค่าให้กับสังคม
“จงค้นหาคุณค่าที่แท้จริงของชีวิต และ ใช้ชีวิตให้มีความหมาย”
"คุณค่าของคน อยู่ที่ผลของงาน"
11 พฤษภาคม เป็นวันคล้ายวันเกิดของ ซุป บทความนี้ผมจึงอุทิศน์ให้กับเขา และขอให้เจ้าตัวมีความสุขในการมุ่งมั่นสร้างคุณค่าในแบบของตัวเองสืบต่อไป ขอให้ทุกคนได้ร่วมอวยพรและให้กำลังใจเพื่อนคนเก่งของเราคนนี้กันด้วยครับ
ภาคผนวก
Subjective Value มองคุณค่าผ่านเลนส์ของตัวเอง
ทฤษฎีมูลค่าอัตวิสัย (Subjective Value) เปรียบเสมือนแว่นตาพิเศษที่ช่วยให้เราเข้าใจว่าทำไมคนเราถึงมองเห็น "คุณค่า" ของสิ่งต่างๆ แตกต่างกัน
ลองนึกภาพว่าเรากำลังดูภาพวาด abstract บางคนอาจมองว่ามันสวยงาม มีเอกลักษณ์ ในขณะที่บางคนอาจมองว่ามันดูยุ่งเหยิง ไม่มีความหมาย
ทฤษฎีนี้บอกเราว่า "คุณค่า" ไม่ได้ติดมากับสิ่งของ หรือถูกกำหนดโดยปัจจัยภายนอก เช่น ต้นทุนการผลิตหรือแรงงานที่ใช้ แต่ "คุณค่า" เกิดขึ้นจากการประเมินของแต่ละบุคคล ขึ้นอยู่กับความต้องการ ความชอบ ประสบการณ์ และสถานการณ์ของแต่ละคน
นักเศรษฐศาสตร์สำนักออสเตรียนเชื่อว่า "มนุษย์" เป็นศูนย์กลางของกิจกรรมทางเศรษฐกิจ และการตัดสินใจของมนุษย์นั้นขับเคลื่อนด้วย "มูลค่าอัตวิสัย" ที่พวกเขามีต่อสิ่งต่างๆ
ยกตัวอย่างง่ายๆ
คนที่กำลังหิวโหย อาจมองว่า "ข้าวเปล่า 1 จาน" มีค่ามาก แต่สำหรับคนที่เพิ่งกินอิ่มมา ข้าวเปล่าจานนั้นอาจไม่มีค่าเลย
นักสะสมงานศิลปะ อาจยอมจ่ายเงินมหาศาลเพื่อซื้อภาพวาด แต่สำหรับคนที่ไม่เข้าใจศิลปะ ภาพวาดนั้นอาจดูไร้ค่า
นักเรียนที่กำลังเตรียมสอบ อาจมองว่า "เวลา 1 ชั่วโมง" มีค่ามาก แต่สำหรับคนที่กำลังว่าง เวลา 1 ชั่วโมงอาจไม่มีค่าอะไรเลย
การเข้าใจ "ทฤษฎีมูลค่าอัตวิสัย" ช่วยให้เรายอมรับความแตกต่างและเคารพการตัดสินใจของผู้อื่น เพราะสิ่งที่สำคัญสำหรับเราอาจไม่สำคัญสำหรับคนอื่น และที่สำคัญ "มูลค่า" ยังสามารถเปลี่ยนแปลงไปตามกาลเวลาและสถานการณ์
โทรศัพท์มือถือรุ่นเก่า ที่เมื่อก่อนอาจมีมูลค่ามาก แต่ตอนนี้อาจกลายเป็นของสะสมหรือ ขยะอิเล็กทรอนิกส์
บ้านหลังเก่า เมื่อก่อนอาจเคยเป็นบ้านในฝัน แต่ตอนนี้อาจทรุดโทรม จนต้องซ่อมแซม
เรื่องราวของ "ซุป" สะท้อนให้เห็นถึงการเปลี่ยนแปลงของ "มูลค่า" เขาเคยให้คุณค่ากับความสบายใจในฐานะแฟนคลับ แต่เมื่อมีโอกาสเขาก็เปลี่ยนมาให้คุณค่ากับการทำงาน การสร้างคุณค่า และการแบ่งปันความรู้
"ทฤษฎีมูลค่าอัตวิสัย" จึงเป็นเครื่องมือสำคัญที่ช่วยให้เราเข้าใจการตัดสินใจ พฤติกรรม และการกระทำของมนุษย์ ทั้งในชีวิตประจำวันและในระบบเศรษฐกิจ
เลือกสิ่งที่ดีที่สุด ณ เวลานั้น
"การประเมินมูลค่าโดยการใช้ประโยชน์ที่มีค่าน้อยที่สุด" (Valuation by the Least Valuable Use) ฟังดูอาจจะซับซ้อนทำความเข้าใจได้ยาก แต่จริงๆแล้วมันคือหลักการง่ายๆ ที่เราใช้ในการตัดสินใจในชีวิตประจำวัน
เวลาเราเข้าไปในร้านขายเสื้อผ้าที่มีเสื้อผ้ามากมายหลากหลายแบบ เราจะเลือกซื้อ เสื้อผ้าตัวไหน?
เราคงไม่เลือกซื้อเสื้อผ้าทุกตัวในร้าน แต่จะเลือกเสื้อผ้าที่ตอบโจทย์ความต้องการของเรามากที่สุด ณ เวลานั้น เช่น เสื้อผ้าที่ใส่ไปทำงาน เสื้อผ้าที่ใส่ไปเที่ยว หรือเสื้อผ้าที่ใส่ไปออกกำลังกาย
ทฤษฎีนี้อธิบายว่า.. เมื่อคนเรามีสินค้าหรือบริการหลายอย่าง เราจะเลือกใช้สินค้าหรือ บริการที่ตอบสนองต่อความต้องการที่เร่งด่วนที่สุดก่อน
ยกตัวอย่างเช่น..
เราอาจจะมีการแบ่งเงินเป็นหลายก้อน แต่ก้อนที่เราจะใช้ก่อน คือก้อนที่เราต้องการใช้ มากที่สุด ณ เวลานั้น เช่น ค่าอาหาร ค่าเดินทางหรือค่าเช่าบ้าน การตัดสินใจของคนเรา จึงขึ้นอยู่กับความต้องการและสถานการณ์ ณ เวลานั้น
ดังนั้น "การประเมินมูลค่าโดยการใช้ประโยชน์ที่มีค่าน้อยที่สุด" จึงเป็นหลักการที่ช่วยให้เราจัดลำดับความสำคัญ และเลือกสิ่งที่ดีที่สุดสำหรับตัวเรา ณ เวลานั้น
ซุป ก็ใช้หลักการนี้ในการตัดสินใจ เช่น การเลือกทำงานกับ Right Shift แม้ว่า จะไม่ได้รับ ผลตอบแทนมากมายนัก แต่เขาได้รับความสุขและประสบการณ์ ซึ่งมีค่ามากกว่าสำหรับเขา
อิ่มเอม...แต่ไม่เท่าเดิม
"กฎของอรรถประโยชน์ส่วนเพิ่มที่ลดลง" (Law of Diminishing Marginal Utility) เป็นกฎพื้นฐานทางเศรษฐศาสตร์ที่อธิบายถึงความรู้สึก "อิ่มเอม" ที่ลดลง เมื่อเราบริโภคสินค้าหรือบริการมากขึ้น
ลองนึกภาพว่าเรากำลังกินพิซซ่า ชิ้นแรกอร่อยมาก ชิ้นที่สองก็ยังอร่อยอยู่ แต่พอชิ้นที่สาม ชิ้นที่สี่ ความอร่อยก็เริ่มลดลง จนกระทั่งเราอิ่ม และไม่อยากกินอีกแล้ว
นั่นเป็นเพราะ "อรรถประโยชน์ส่วนเพิ่ม" (Marginal Utility) หรือความพึงพอใจที่ได้รับ จากการบริโภค สินค้าหรือบริการ จากหน่วย (Unit) เพิ่มเติมนั้นลดลง
กฎนี้อธิบายว่า ยิ่งเราบริโภคสินค้าหรือบริการมากขึ้น ความพึงพอใจที่ได้รับจากหน่วย เพิ่มเติมจะลดลง
ยกตัวอย่างเช่น..
เสื้อผ้าตัวใหม่อาจจะทำให้เรารู้สึกดี ตื่นเต้น แต่พอมีเสื้อผ้าเยอะๆ ความตื่นเต้นก็จะ ลดลง
เงินก้อนแรกที่เราหามาได้ อาจจะมีค่ามาก แต่พอมั่งคั่งเงินก้อนต่อๆ ไปก็จะมีค่าน้อยลง
กฎนี้สอนให้เรารู้จักพอเพียง และเห็นคุณค่าของสิ่งที่เรามี
อย่างไรก็ตาม "กฎของอรรถประโยชน์ส่วนเพิ่มที่ลดลง" มีข้อยกเว้น เช่น ความรู้ และ การแบ่งปัน ตามที่ได้กล่าวถึงในบทความ
win-win situation
"การแลกเปลี่ยนที่เป็นประโยชน์ร่วมกัน" (Mutually Beneficial Exchange) เป็นหัวใจสำคัญของระบบเศรษฐกิจ และเป็นเหตุผลที่ทำให้คนเรา "ค้าขาย" กัน
เวลาเราไปตลาด เราเอาเงินไปแลกกับอาหาร แม่ค้าได้เงิน เราก็ได้อาหาร ต่างคนต่างได้ประโยชน์ การแลกเปลี่ยนจะเกิดขึ้นก็ต่อเมื่อ ทั้งสองฝ่าย เชื่อว่า พวกเขาจะ "ได้" มากกว่า "เสีย"
นักเศรษฐศาสตร์สำนักออสเตรียน เชื่อว่า การแลกเปลี่ยนที่เป็นประโยชน์ร่วมกันเกิดขึ้นได้ เพราะคนเรามี "มูลค่าอัตวิสัย" ที่แตกต่างกัน
ยกตัวอย่างเช่น..
ชาวนามีข้าวแต่ไม่มีปลา ชาวประมงมีปลาแต่ไม่มีข้าว ทั้งสองจึงแลกเปลี่ยนสินค้ากัน เพื่อ เพื่อตอบสนองความต้องการของตัวเอง
นายจ้างต้องการคนทำงาน ลูกจ้างต้องการรายได้ ทั้งสองจึงทำสัญญาจ้าง เพื่อแลกเปลี่ยน แรงงานกับเงินเดือน
การแลกเปลี่ยนช่วยให้คนเราได้สินค้าและบริการที่หลากหลาย มากกว่าที่จะผลิตเอง ทั้งหมด นอกจากนี้ การแลกเปลี่ยนยังกระตุ้นให้เกิดการพัฒนาและนวัตกรรม เพราะผู้ผลิตต้องแข่งขันกัน เพื่อตอบสนองความต้องการของผู้บริโภค
"การค้า คือ การสร้างสรรค์ ความมั่งคั่ง ร่วมกัน"
แกะปริศนา "ปฏิทรรศน์น้ำ-เพชร"
มาถึงตรงนี้.. หลายคนอาจจะสงสัยว่าทำไม "น้ำ" ซึ่งเป็นสิ่งที่จำเป็นต่อการดำรงชีวิต ถึงมีราคาถูกหรือบางที่ก็ฟรี ในขณะที่ "เพชร" ซึ่งเป็นแค่เครื่องประดับกลับมีราคาแพงหูฉี่
เหมือนเวลาเราไปร้านอาหาร เราสั่ง "ข้าวผัด" จานใหญ่ราคา 50 บาท แต่ "ไข่ดาว" ฟองเล็กๆ ราคา 10 บาท ทำไมข้าวผัดถึงถูกกว่า ไข่ดาว ทั้งที่ ข้าวผัดมี ข้าว ผัก เนื้อสัตว์ เครื่องปรุง ตั้งหลายอย่าง
คำตอบอยู่ที่ "ความขาดแคลน" (Scarcity) และ "อรรถประโยชน์ส่วนเพิ่ม" (Marginal Utility) ซึ่งเป็นแนวคิดสำคัญในเศรษฐศาสตร์สำนักออสเตรียน
น้ำ มีอยู่มากมาย ในขณะที่ เพชร นั้นหายาก น้ำ แก้วแรกอาจจะช่วยชีวิตเราได้ แต่ น้ำ แก้วที่ 10 อาจจะทำให้เราจุก
"อรรถประโยชน์ส่วนเพิ่ม" หมายถึง ความพึงพอใจที่ได้รับจากการบริโภคสินค้าหรือ บริการในหน่วย (Unit) เพิ่มเติม (ในจำนวนมากขึ้น)
เมื่อน้ำมีอยู่มาก เราจึงประเมินมูลค่าของน้ำแก้วที่ 10 ต่ำ เพราะมันไม่ได้ตอบสนองความต้องการที่เร่งด่วน แต่เพชรที่หายาก ทำให้แม้แต่เพชรเม็ดเล็กๆ ก็ยังมีมูลค่าสูง
คุณค่า ไม่ได้ขึ้นอยู่กับความจำเป็นหรือความฟุ่มเฟือย แต่ขึ้นอยู่กับความขาดแคลนและ การประเมินมูลค่าของแต่ละบุคคล
ดังนั้น ปฏิทรรศน์น้ำ-เพชร (Water-Diamond Paradox) จึงไม่ใช่ความขัดแย้ง แต่เป็น การสะท้อนให้เห็นถึงหลักการพื้นฐานของเศรษฐศาสตร์ นั่นคือ มูลค่า เป็นเรื่องส่วนบุคคล และขึ้นอยู่กับบริบท
เรื่องราวของ "ซุป" ก็เช่นกัน.. เขาประเมินมูลค่าของ ความรู้ ความสุข และการสร้างคุณค่า สูงกว่าเงินทองและชื่อเสียง
เขาเลือกที่จะเดินบนเส้นทางที่คนอื่นอาจมองว่า "ขาดแคลน" คือ เส้นทางที่ไม่ได้เต็มไปด้วยเงินทองหรือชื่อเสียง แต่เป็นเส้นทางที่เต็มไปด้วย ความสุข ความหมาย และคุณค่า
"ความสุข ที่แท้จริง หาซื้อไม่ได้ ด้วยเงิน"