-
@ fd208ee8:0fd927c1
2024-10-20 18:19:48(Please note that this is not official financial or business advice, but rather a description of something we have done, on an informal basis.)
A long, long time ago
It's been nearly a year, since nostr:nprofile1qydhwumn8ghj7argv4nx7un9wd6zumn0wd68yvfwvdhk6tcpypmhxue69uhkummnw3ezuetfde6kuer6wasku7nfvuh8xurpvdjj7qpqs3ht77dq4zqnya8vjun5jp3p44pr794ru36d0ltxu65chljw8xjqv5atj2 came into being, mostly as a lark, involving a couple of members of our private chat group. Our initial plan was to work toward bounties, but Nostr bounties are a bit of a biased, uncertain thing, and our enthusiasm for that quickly waned.
So, what to do? Here we are, we three (nostr:npub1ecdlntvjzexlyfale2egzvvncc8tgqsaxkl5hw7xlgjv2cxs705s9qs735, nostr:npub1wqfzz2p880wq0tumuae9lfwyhs8uz35xd0kr34zrvrwyh3kvrzuskcqsyn, and I): IT professionals with little time, but plenty of intellectual energy, a Slack chat, a GitHub repo, and lots of frustration with the Nostr status quo.
We were, you see, Nostr end-users. We loved the idea of the protocol, but we were being regularly stymied by the poor quality of many implementations.
- Why can I not login? Oh, they fixed the login! Nope, still can't login.
- If I press this button, it says it sent, but it didn't send. Where note?
- They announced a new feature, but I tried it and it didn't work. Oh well.
- I noticed a bug in the client, reported it, and the issue is just rotting away in the project repo. Ignored.
- The website/relay/repo was here... yesterday. Today it has disappeared, and taken my zaps with it.
It was enough to make us want to tear our hair out. We decided that what Nostr needed... what it really needed... was a Nostr Stable Version. Nothing glamorous. Nothing exotic. Nothing busy or excitable. Just something that stayed where you initially found it, ran, and actually worked. Something where you could report a bug and receive a prompt response. Maybe even something, where you could pay a reasonable fee and be allowed to have expectations of some particular service being returned. And who better to build such a version, than people who want to use it, themselves?
Things working is an underrated concept
I know that the very idea of software running as expected and websites not appearing and disappearing suddenly, based upon what some particular developer had for lunch, tends to be met with little but scorn, from hardened, seasoned Nostriches (who are convinced that bugs are all features), but I think the majority of potential users would see it differently.
I'm with the majority, on this one.
I like to click "save" buttons and have them save. If I publish something, I want it to appear under my list of published somethings. I like to type in the website address I always type in, and have it magically appear on my screen, as if there were a little man sitting at controls in my laptop, just waiting for me to write H-T-T-P-S... and then jump to attention.
My unreasonable expectations have no bounds, it is true. But unreasonable people are also people, so we would also like to have our own unreasonable things to play with. Scorn away. My save button will save, and my published something will publish, and my website will load every damn time, just to spite you.
In the larger scheme of things, you see, we win even if we fail, if we at least increase the competition enough, that things working becomes the new standard. We can simply prove, definitively, that it is possible for Nostr things to work, if they are built by people who care if they work. If we also have fun together, learn something new, and come up with some cool, novel use cases, then that's pure profit.
We can only win, at this endeavor.
Where to start?
Name that brand
So, we had a team, we had a business idea, and we had a heck of a lot of motivation. What we didn't have, is a name. (Never underestimate the importance of naming things.)
We decided to name ourselves "GitCitadel" because "git" sounds techy, hints at our GitRepublic project, and is reminiscent of open-source development, and "citadel" reminds us of Bitcoin. The republic is at home in the citadel, naturally. All other products also live in the same citadel, hence the naming-convention of prefacing everything with "GC" (i.e. "GC Alexandria", "GC Sybil", "GC Aedile", etc.).
Brand yourself
The next thing we did, was rent a domain and run a webserver on it. This is an important step because it gives you an Internet presence, allows you to have company NIP-05 and email addresses (a form of promotion), and it's simply exciting to have one. Feels so much more "official" and it helps increase the name-recognition of your company.
Define yourself
We then sat down, together, over the Internet, and figured out who we are. Not who we individually are, but who we are, as a company. A company, after all, (according to the Cambridge Dictionary) is "an organization that produces or sells goods or services in order to make a profit". Now, a company's profits don't have to be monetary, but they should be something tangible. A company, in other words, is a team of people working toward some defined goal.
What is our goal? Well, we decided to think it over, sat down with the newer additions to the company (you can see who they are, on our project wiki page, and came up with a Vision and a Mission:
The vision is what the overall goals of the company are, whereas the mission describes how those goals shall be achieved. Now, this is a sort of lofty, abstract statement, so it was important that we posted it someplace publicly (to keep ourselves accountable) and look at it regularly, so that we can ponder it and realign whatever we are currently working on, with this statement. We know the statement is well-designed, if considering it helps us make decisions about what to do next.
Pay yourselves
(I'm going to switch from "we" to "you", here, as it's easier to write this part, but let's just pretend I didn't.)
The next thing on the list, is to arrange the finances, usually by setting up a Geyserfund, with an associated wallet, and then deciding how the funds from the wallet will be dispersed or stored. (I won't tell you how we are handling that, as that's internal company business, but I'm sure you'll think of something clever, yourselves. Or just google it.)
I would encourage you to arrange to pay yourselves profits. Not merely because your idea is going to make you all fabulously wealthy and internationally famous (although, that is obviously true), but because profits are the most pure form of communication that consumers in the market have with its producers, and one of the best ways to make decisions and measure increases in efficiency (increasing profits and/or output, while keeping prices steady or falling).
Cutting off this signal, in order to look pious to outsiders, is to shoot yourself in your free-market foot. Nobody says that you have to spend your profits on the proverbial lambo and a bimbo. You could donate them to charity, reinvest them, or store them for your nephews to inherit, but pay them out, you should. You don't have to love money, to value it as a tool and use it shrewdly. Money is a measure, and companies should regularly measure themselves: against their previous state, against their potential state, and against their competition.
(Also, you can use money to buy a lambo and a bimbo, but you didn't hear that from me.)
Organize yourselves
Once you've been working together, for a while, you'll find that you need to figure out how to organize yourselves. The first step is to...
Form a board of directors.
Stop laughing. I'm serious.
Any company has at least two roles (President and Secretary), ideally held by two different people, so any single-proprietor company is a man down. Find a different person, to be your Second, even if they're just your confident, who lets you cry on your shoulder on The Bad Days, when your code refuses to compile, and can tell people that you've become a Bitcoin millionaire and have gone on a sabbatical to hike the Himalayas and will be back in 3 months on The Very Good Days. Because business man was not meant to be alone.
If, like us, you're a small herd of people and have already been working together for a while, then this step is actually really, really fun. Just think about what people are already doing, and put a label on it. That role is now defined and it is clear who is in charge of what.
Scientists become "Chief Science Officer" or "Scientific Advisor". The person who always writes the okay, so this is what we've decided comment in the thread becomes the Secretary, the one managing the Lightning wallet and worrying over paying for the servers is the CFO, the person running the remote server becomes the CTO, and so on and etc.
And everyone knows who the CEO is. Everyone always knows. They do. Just write it down.
Agree how to disagree
Now, have the secretary write up a Member's Agreement. It's a contract between the members, about whatever the group thinks is important concerning the way the company will operate. According to Investopedia, common topics are:
Is this legally binding? Probably not. Maybe. I don't know and wouldn't tell you, even if I did. But it's emotionally binding, which is arguably more important.
Writing things down is an advanced form of naming things and it provides clarity, helps to manage expectations, and allows you to define a working agreement before Real Money shows up and taints your interaction. You're just accepting tips, at the moment. Everyone is calm and cheerful, so now is your best time to negotiate.
Keep it very simple and only address the most basic things. If you wish to incorporate, at a later date, then you just take this to a registered agent, or other experienced person, and have them tidy up any loose ends and add the fine print.
Go forth, together
This has probably taken you weeks, or even months, but you're now a company. Get a logo and a company npub, start dropping the company name into your notes, and get on with the business of being in business.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ 09fbf8f3:fa3d60f0
2024-10-14 15:41:08既然说是一款Web版的软件,也就是对应客户端版而开发的,如果你的歌曲都保存在NAS上,那么这款软件就非常适合你;如果你的歌曲都保存在电脑本地,那么可以直接使用客户端版的同名软件。
01
MusicTagWeb的特色 这款软件刚开始在 Github 上开源的时候,笔者就注意到了,不过当时功能还刚有个雏形、不太完善,就没有推荐给大家。经过开发者一段时间的辛勤付出,现在看来功能和管理能力基本上都已经完成了,具体的功能点和特性如下:
支持批量自动修改音乐标签 支持音乐指纹识别,即使没有元数据也可以识别音乐 支持整理音乐文件,按艺术家,专辑分组 支持文件排序,按照文件名,文件大小,更新时间排序 支持plex专辑类型,新增配置显示/隐藏字段 修复不同类型音频文件的专辑类型 新增歌曲语言整理文件 优化自动打标签匹配算法 新增智能刮削标签源,集成多个平台的标签源,按匹配度排序 支持繁体匹配,新增消息中心展示自动刮削不匹配的数据 支持保存专辑封面文件,支持自定义上传专辑封面 简单适配H5端,支持手机端访问 支持wma,wmv格式, 修复自动刮削报错停止的问题 音轨号,光盘号 格式优化,优化匹配规则 对新增的音乐文件后台自动刮削,无感知刮削。修复.ape文件读取报错的问题 新增自定义层数的整理文件,新增根据刮削状态排序,修复大写的音乐后缀名识别不到 新增数据库挂载映射
其实上面没有提到,这款软件支持从6个音乐平台刮削歌曲信息,安全起见,具体是哪6个平台笔者就不说了,感兴趣的朋友可以接着往下看,自己跑起来就知道了。
02
安装MusicTagWeb MusicTagWeb目前仅支持Docker部署,在你的NAS上,可以使用Docker和Docker Compose两种方式来部署,任选一种即可。
1、Docker方式
docker run -d \ --restart=unless-stopped \ -p 8001:8001 \ -v /path/to/your/music:/app/media \ -v /path/to/your/config:/app/data \ xhongc/music_tag_web:latest
2、Docker Compose方式
version: '3' services: music-tag: image: xhongc/music_tag_web:latest container_name: music-tag-web restart: unless-stopped ports: - "8001:8001" volumes: - /path/to/your/music:/app/media:rw - /path/to/your/config:/app/data
以上两种方式中,/path/to/your/music改成你的音乐文件夹路径,/path/to/your/config改为MusicTagWeb的配置文件路径。
03
使用MusicTagWeb 使用Docker启动MusicTagWeb后,在浏览器中使用IP+端口号打开系统,然后输入用户名和密码即可登录,默认的用户名和密码均为admin,建议登录后进行修改。
1、登录系统 Username 和 Password 均输入admin,邀请码不需要填。
2、首页主屏
主屏分成两栏(实际是三栏,还有一栏在操作的时候会显示出来),左边是音乐文件目录,右边默认是一张占位图片。
3、单个编辑/刮削歌曲信息
选择一个歌曲文件,这时候界面就是三屏了,右侧一栏变成两栏,分别显示歌曲元数据和音源搜索结果。搜索和设置完成后,点击保存信息按钮,即可完成对歌曲元数据的编辑。
最后
详细教程去官网: https://xiers-organization.gitbook.io/music-tag-web V1版够用了,V2收费的,68一个激活码。
-
@ 3589ce32:ef4269ad
2024-10-24 19:13:56Bitcoin y la Descentralización:
Bitcoin se centra en la soberanía individual, la libertad financiera y la descentralización. Su filosofía se basa en la confianza en un sistema sin intermediarios, donde cada individuo tiene control sobre sus recursos. La descentralización de Bitcoin refleja un despertar hacia la autonomía personal, la autosuficiencia y la búsqueda de la verdad fuera de estructuras de poder tradicionales.
UCDM enseña la no-dualidad, el perdón y la percepción correcta, destacando que el amor es lo único real y que todo lo demás es una ilusión. La idea es la de liberarse de la mentalidad de escasez (tan presente en el dinero tradicional) y fomentar una mentalidad de abundancia, confianza y cooperación.
El Vedanta Advaita es una filosofía no dualista que enseña que solo hay una realidad última, y que todo es una manifestación de esa unidad. La dualidad es una ilusión. Guardando ciertas distancia, podríamos decir que la unidad subyacente del Advaita se refleja en la idea de una red descentralizada y sin fronteras, como Bitcoin, la cual conecta a las personas sin intermediarios. También ¿Cómo superar la ilusión del ego y la dualidad para alcanzar una verdadera libertad? Hablaremos de esto en otra ocasión …
-
@ bd32f268:22b33966
2024-10-24 17:57:26A atualidade acostumou-nos a uma lânguida linguagem devido à cultura do politicamente correto e ao crescente relativismo em que vivemos. A confusão é tanta que já não se chamam os bois pelos nomes e este ambiente faz com que inclusive desconheçamos o significado das palavras. A este respeito temos visto cada vez mais indefinição sobre o que são os vícios e sobre o que são as virtudes. Tal é a confusão que por vezes trocamos o significado de uns pelos outros.
A coragem e a convicção facilmente passam por orgulho e arrogância, a castidade passa por beatice e por aí segue a confusão com muitos outros termos.
A inversão de valores é tão disseminada que atrocidades como a pornografia, o aborto, o adultério entre outras atrocidades são celebrados como conquistas civilizacionais. A sua disseminação é de tal forma que hoje a pessoa média já banalizou e normalizou completamente estes aspectos.
“Primeiro estranha-se depois entranha-se.”
Fernando Pessoa
Enquanto isto acontece por um lado, por outro a defesa da família, da identidade e da tradição são abertamente atacadas como se se tratassem de produtos de uma cultura opressora que deve ser combatida por todos os meios. Por agora a perseguição destas ideias é ainda maioritariamente realizada através da exclusão social e económica, no entanto, não são escassos os exemplos da história em que essa perseguição assume uma outra dimensão.
Desta forma, está criado um paradigma e um sistema de incentivos que premeia a pessoa que colabora com o sistema vigente. Tanto é assim que se multiplicam cada vez mais os exemplos de programas de quotas e subvenções que permitem, a quem possui um grau mais avançado de assimilação ideológica progredir socialmente atalhando o caminho para o fazer.
“Assim, toda a árvore boa produz bons frutos, porém a árvore má produz frutos maus. Não pode a árvore boa produzir frutos maus, nem a árvore má produzir frutos bons (…)”
Mateus 7:17-18“Assim, toda a árvore boa produz bons frutos, porém a árvore má produz frutos maus. Não pode a árvore boa produzir frutos maus, nem a árvore má produzir frutos bons (…)”
> Mateus 7:17-18*
Desengane-se quem pensa que no paradigma pos-moderno não há moralização, sacerdotes e uma matriz religiosa, tudo isso existe.
Os psicólogos, para mal da nossa sociedade, são crescentemente os sacerdotes desta religião pagã, aquela que baseada numa filosofia e antropologia erradas vai corrompendo intelecto e coração.
Nesta nova ordem social, que em abono da verdade é já antiga, a inversão de valores é tal que já a própria vida humana é sacrificada no altar do clima em abono da “mãe” natureza. Regredimos ao tribalismo que nos sugere que a natureza vale mais que a vida humana.
Este é apenas um exemplo dos rituais de sacrifício proporcionados pela “nova” religião. Um outro exemplo que podemos dar é o da castração química e física de crianças e jovens no altar da falsa compaixão e empatia. Ainda um outro exemplo que podemos dar é o da promoção do homossexualismo, do transexualismo e da não-monogamia como caminhos saudáveis a seguir, sacrificando a vida de muitos jovens confusos no altar da inclusão. Muitos mais exemplos poderiam ser dados, porque à medida que esta “nova” religião aumenta a sua ortodoxia os rituais vão ficando cada vez mais assombrosos.
Estes rituais têm por base uma apologia ao anti logos, quer isto dizer que procuram negar tudo o que é conhecimento básico sobre a realidade e sobre a verdade. A própria razão e lógica não se sustentam quando vemos situações como a de homens a competir em desportos femininos. As leis desta nova ordem são: “procura a felicidade (aqui muitas vezes entendida como o prazer) como fim último da vida “; “todas as opiniões são certas e não há uma verdade”; “Não servirás a nenhuma autoridade”; “não seguir o vício é opressão e seguir o vício é liberdade”.
Neste ambiente inóspito, quem quiser preservar a honra e a virtude terá cada vez mais dificuldade uma vez que a dissidência desta nova religião não é aplaudida, pelo contrário é anatematizada. Porém, importa dizer que independentemente da época há sempre espaço para o heroísmo e para a transformação destas dificuldades em degraus para que o indivíduo se possa distinguir dos demais pelas suas virtudes. Onde o vício abunda também maior o destaque será em relação à graça, como uma pedra preciosa reluzente no meio da lama que aparenta brilhar mais intensamente aos nossos olhos tal é o contraste, ou como uma luz na escuridão que se distingue facilmente.
###### Casper David Friedrich - dreaming man in church ruins
-
@ e968e50b:db2a803a
2024-10-24 17:53:49https://whosaidit.vercel.app/
I made a quiz for you. Let me know if you have any feedback. Please don't share your results or any spoilers here. I've already had some...uh...let's call if fun...sharing with friends and family. Much to @DarthCoin and many other stackers' chagrin, the purpose of this is not to convince people not to vote, although that may be the affect for some. I'm just trying to challenge people's thinking.
Also, it would be really easy for me to change any of the content. Let me know if you have feedback. I want to make this as effective and accurate as possible.
https://whosaidit.vercel.app/
originally posted at https://stacker.news/items/738766
-
@ 4ba8e86d:89d32de4
2024-10-11 22:59:29Livro de Estratégia , Cripto-Anarquia, Tradecraft, Zonas Autônomas Temporárias, e Contracultura ~ Smuggler e XYZ
PDF do livro em português: https://raw.githubusercontent.com/cypherpunksbr/a-segunda-esfera/master/segundaesfera.pdf
Livro em audiobook: https://archive.org/details/second-realm-digital/
Texto em português: https://cypherpunks.com.br/documentos/a-segunda-esfera/#livro-de-estrat%C3%A9gia
Opaque link
https://opaquelink.sirion.io/
Cyberpunk , Criptoanarquia , extremismo de privacidade, segurança, estratégia.
anarplex net
https://anarplex.sirion.io/
arquivos e projetos relacionados a: cripto-tribos, phyles , cripto-anarquia , agorismo, provedor de serviços darknet.
Thank you, @EricSirion, for hosting the websites, @TheRealSmuggler thanks for the content. Eles contêm alguns dos conteúdos cypherpunk e cripto-anarquistas mais importantes que existem. Se você ainda não os conferiu, dê uma olhada há muito para explorar.
-
@ 84b0c46a:417782f5
2024-10-11 22:34:10- 1:nan:
- 2
- 2irorio絵文字
- 1nostr:npub1sjcvg64knxkrt6ev52rywzu9uzqakgy8ehhk8yezxmpewsthst6sw3jqcw
- 2
- 2
- 3
- 3
- 2
- 1
|1|2| |:--|:--| |test|:nan:|
---
:nan: :nan:
- 1
- 2
- tet
- tes
- 3
- 1
-
2
t
te
test
-
19^th^
- H~2~O
-
@ 5e5fc143:393d5a2c
2024-10-11 22:26:08Just revisiting some quick tips for #newbies #pow #public #blockchain users only.
if you just getting started with bitcoin or any pow crypto coins or been using or storing them for a while, you not must forget the roots and fundamentals.
Hot Wallet — It gets connected to live internet at some point in time essentially to sign / send a tx i.e. spending transaction — exposes the private key of the address from in the process
Cold Wallet — It never ever gets connected or online and can always keep receiving inbound amounts Paper wallets are best n cheapest form of cold wallet that can used once n thrown away.
Cold wallets need to either “import”ed or “sweep”ed in order to used or spend — https://coinsutra.com/private-key-import-vs-sweep-difference/
Any thin #wallet is always dependent on connectivity to live up2date node server where-as self-sufficient qt / cli wallet takes a while to sync up to latest block height in order to be usable.
Beginners should always resist the attraction of quick and fast — thin n 3rd party wallets and always start a long learning journey of core wallets of any coin — either “qt” GUI wallet or command line “coin-cli” wallet
Almost all #proofofwork #blockchains i.e. #POW has #node #wallet - everyone who use support he #public #blockchain secures own you coin value
You can run fullnode either on clearnet or over onion 🧅 #BTC has >55% of nodes running in onion out of total 15000+ live fullnodes and 50000+ bitcoincore wallets around blockheight 777000 . Other notable pow chains are #LTC #RVN and rest are babychains for now !
Always delete hot wallet to test practice restoration before sending any large refunds to it to be safe.
Large funds are always best to keep in self custody node wallets rare n occasional use
Final word — Cannot see private key 🔑 or seed 🌱 in any wallet means not your coin. 😲
Use wallet which u learn or understand best only
That’s all for now n Thank you 🙏 ! ⚡️ https://getalby.com/p/captjack ⚡️
Some Cold wallet nostr posts nostr:note1p6ke5wqshgxtfzj5de3u04hejl2c5ygj8xk8ex6fqdsg29jmt33qnx57y2 nostr:note1rse0l220quur6vfx0htje94ezecjj03y6j7lguwl09fmvmpt6g3q0cg7yw nostr:note1q5w8dyjuqc7sz7ygl97y0ztv6sal2hm4yrf5nmur2tkz9lq2wx9qcjw90q
some nostr specific lightning ⚡️ Layer2 wallets with blockchain mainnet option nostr:naddr1qqsky6t5vdhkjm3qd35kw6r5de5kueeqf38zqampd3kx2apqdehhxarjqyv8wue69uhkummnw3e8qun00puju6t08genxven9uqkvamnwvaz7tmxd9k8getj9ehx7um5wgh8w6twv5hkuur4vgchgefsw4a8xdnkdgerjatddfshsmr3w93hgwpjdgu8zdnswpuk2enj0pcnqdnydpersepkwpm8wenpw3nkkut2d44xwams8a38ymmpv33kzum58468yat9qyt8wumn8ghj7un9d3shjtngv9kkuet59e5k7tczyqvq5m2zcltylrpetrvazrw45sgha24va288lxq8s8562vfkeatfxqcyqqq823ckqlhc8 related blog post nostr:naddr1qqxnzd3cxyenjv3c8qmr2v34qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qydhwumn8ghj7mn0wd68ytn4wdjkcetnwdeks6t59e3k7tczyp6x5fz66g2wd9ffu4zwlzjzwek9t7mqk7w0qzksvsys2qm63k9ngqcyqqq823cpdfq87
-
@ af9c48b7:a3f7aaf4
2024-10-23 19:16:52Chef's notes
These "crackers" go well as a chip alternative when having carnivore tacos, as well as serves as a general snack. They are not really shelf stable and will get stale fairly quickly. I would recommend eating them within 24 hours of baking.
While any thickness of cheese can be used, I've found that the ultra thin sliced cheese works the best.
Details
- ⏲️ Prep time: 5
- 🍳 Cook time: 40-45 minutes depending on your oven.
- 🍽️ Servings: 1-2
Ingredients
- Ultra Thin Sliced Cheese (pick your favorite type)
- Parchment Paper
Directions
- Preheat oven to 250 degrees.
- While the oven is preheating, line a baking sheet with parchment paper.
- Take the individually sliced cheese and cut into any size you prefer. I recommend cutting in 4 equal squares for use as traditional cracker or "chip" when eating tacos.
- Place on the parchment paper allowing space between each cheese slice.
- Bake in a 250 degree oven for 40-45 minutes checking periodically to determine the cheese has achieved your desired level of crispness.
- One your cheese is done, remove from the oven and place the cheese slices on a paper towel to cool and allow for excess oil to drain.
- Place in a ziplock back and eat within 24 hours.
-
@ fa0165a0:03397073
2024-10-23 17:19:41Chef's notes
This recipe is for 48 buns. Total cooking time takes at least 90 minutes, but 60 minutes of that is letting the dough rest in between processing.
The baking is a simple three-step process. 1. Making the Wheat dough 2. Making and applying the filling 3. Garnishing and baking in the oven
When done: Enjoy during Fika!
PS;
-
Can be frozen and thawed in microwave for later enjoyment as well.
-
If you need unit conversion, this site may be of help: https://www.unitconverters.net/
-
Traditionally we use something we call "Pearl sugar" which is optimal, but normal sugar or sprinkles is okay too. Pearl sugar (Pärlsocker) looks like this: https://search.brave.com/images?q=p%C3%A4rlsocker
Ingredients
- 150 g butter
- 5 dl milk
- 50 g baking yeast (normal or for sweet dough)
- 1/2 teaspoon salt
- 1-1 1/2 dl sugar
- (Optional) 2 teaspoons of crushed or grounded cardamom seeds.
- 1.4 liters of wheat flour
- Filling: 50-75 g butter, room temperature
- Filling: 1/2 - 1 dl sugar
- Filling: 1 teaspoons crushed or ground cardamom and 1 teaspoons ground cinnamon (or 2 teaspoons of cinnamon)
- Garnish: 1 egg, sugar or Almond Shavings
Directions
- Melt the butter/margarine in a saucepan.
- Pour in the milk and allow the mixture to warm reach body temperature (approx. + 37 ° C).
- Dissolve the yeast in a dough bowl with the help of the salt.
- Add the 37 ° C milk/butter mixture, sugar and if you choose to the optional cardamom. (I like this option!) and just over 2/3 of the flour.
- Work the dough shiny and smooth, about 4 minutes with a machine or 8 minutes by hand.
- Add if necessary. additional flour but save at least 1 dl for baking.
- Let the dough rise covered (by a kitchen towel), about 30 minutes.
- Work the dough into the bowl and then pick it up on a floured workbench. Knead the dough smoothly. Divide the dough into 2 parts. Roll out each piece into a rectangular cake.
- Stir together the ingredients for the filling and spread it.
- Roll up and cut each roll into 24 pieces.
- Place them in paper molds or directly on baking paper with the cut surface facing up. Let them rise covered with a baking sheet, about 30 minutes.
- Brush the buns with beaten egg and sprinkle your chosen topping.
- Bake in the middle of the oven at 250 ° C, 5-8 minutes.
- Allow to cool on a wire rack under a baking sheet.
-
-
@ ff1a68c4:ec9831cf
2024-10-24 14:49:33Año 2147. La misión de la nave Odisea VII tenía como objetivo estudiar las lunas de Júpiter. Nadie esperaba que se encontraran con lo que estaba a punto de revelar el gigante gaseoso. A bordo, cinco astronautas, expertos en astrobiología y física cuántica, orbitaban el coloso, maravillados por sus tormentas eternas y sus mares de hidrógeno líquido.
Durante meses, la tripulación había lanzado sondas y drones a través de la atmósfera turbulenta, recogiendo datos imposibles de descifrar. Era como si el planeta se resistiera a la intrusión, ocultando secretos detrás de las franjas de nubes y la Gran Mancha Roja.
El comandante Foster, junto con la doctora Elena Ivankov, detectaron una anomalía: un patrón en las corrientes eléctricas de Júpiter que parecía regular, como un latido. Al principio, lo atribuyeron a fenómenos naturales, pero la regularidad era inquietante. Eran pulsaciones precisas, organizadas, como los de un corazón titánico, aunque tan lentas que requerían equipo especializado para percibirlas.
“Esto no es solo una tormenta más”, murmuró Elena frente a la pantalla holográfica. “Es… es un ciclo controlado.”
El equipo empezó a conectar las piezas. Las corrientes de viento y los campos magnéticos de Júpiter no se movían al azar; parecían responder a la posición de otros planetas en el sistema solar. Cada vez que la gravedad de Saturno o Marte interactuaba con Júpiter, las pulsaciones cambiaban, como si ajustara su frecuencia para estabilizar las órbitas.
Foster frunció el ceño, ajustando sus datos en el simulador gravitacional. “Si estos latidos controlan la dinámica del sistema solar, ¿qué pasaría si se detuvieran?”
“Ningún planeta sobreviviría”, respondió Ivankov, con los ojos fijos en la pantalla.
Fue entonces cuando tomaron la decisión más osada de la misión: enviar una sonda mucho más profunda de lo que cualquier nave había llegado antes, para penetrar en las capas interiores de Júpiter. Las sondas anteriores habían sido destruidas, pero esta nueva, equipada con inteligencia cuántica adaptativa, podía reaccionar a los cambios a una velocidad inimaginable. La llamaron Ecos.
Cuando Ecos descendió, las lecturas empezaron a volverse más extrañas. Júpiter parecía estar "sintiendo" la presencia de la sonda. Las pulsaciones aumentaron, y el campo magnético se distorsionó. Ecos transmitió imágenes de lo que se encontró en el núcleo del planeta: una estructura titánica, más grande que cualquier ciudad humana, compuesta de una sustancia orgánica fusionada con energía pura.
"¿Estás viendo lo mismo que yo?", susurró Foster, incapaz de procesar lo que estaba ante sus ojos.
Ivankov asintió en silencio, sus dedos temblando sobre el teclado. "Júpiter… no es solo un planeta. Es un organismo vivo."
La tripulación permaneció en silencio mientras la sonda transmitía imágenes y datos. Era como si el planeta mismo estuviera compuesto de órganos que regulaban la estabilidad gravitacional del sistema solar. Un ser inconcebible, de una escala tan vasta que su única función era equilibrar fuerzas cósmicas. Cada tormenta, cada rayo, cada pulso magnético, todo formaba parte de su regulación.
"Este 'ser' mantiene el equilibrio", reflexionó el comandante, su voz era apenas un susurro entre el zumbido de los sistemas de la nave. "Si interfiéramos demasiado, podría romper la frágil danza de los planetas."
La doctora Ivankov, profundamente impactada, sugirió la teoría más radical: "Júpiter no solo es consciente… sino que actúa como una especie de guardián del sistema solar. Un ser con un propósito tan simple como vasto: mantener el equilibrio entre los cuerpos celestes. Si alguna anomalía cósmica amenazara el equilibrio, Júpiter respondería, ajustando las órbitas, corrigiendo las trayectorias."
Entonces llegó la transmisión final de Ecos: "Interferencia detectada. Estructura orgánica ha reconocido nuestra presencia. Cambios en los latidos. Aumento de la presión. Reacción… inminente."
El corazón de Júpiter había comenzado a acelerarse.
"No deberíamos haber venido tan lejos", dijo Foster, tomando el mando de la nave. "Es un ser que no entiende nuestras intenciones. Lo único que sabe es que estamos perturbando el equilibrio."
Con los latidos de Júpiter resonando en sus oídos, la tripulación inició una retirada rápida, temiendo que cualquier alteración en ese organismo colosal pudiera desestabilizar el sistema solar entero.
Mientras se alejaban, observaron cómo las tormentas del gigante gaseoso volvieron a la calma, y el pulso volvió a estabilizarse.
"Júpiter sigue latiendo", susurró Ivankov, mirando la vasta esfera a lo lejos.
Quizás, pensó la tripulación, no era el momento para que la humanidad supiera demasiado sobre su lugar en la delicada danza del cosmos.
-
@ 5e5fc143:393d5a2c
2024-10-11 22:23:45Objective: Share technique n tools create awareness among nostriches
Description: Everyone using nostr will get annoyed by 1. Rougue DM, rouge reply from fraud npubs impersonating some famous accounts 2. Advertising scripts / bots replying or sending unwanted list of things 3. AI bots repeating or replying to every note u post
It is most a user responsilty to deter or mitigate those and have clean timline on whichever nost client you r using
Methods and Action:
The below may sometime client specific and you need navigate and find similar action in you fav. client
To be continued ...
Enjoy surfing nostr - we are learning - we grow together
I am not part of core team or expert just sharing own experience for you benefit. This is not only way to do things - so if you learn or know useful or similar feel free add in comment.
Thank you again!
NPUB LOOK
-
@ 23acd1fa:0484c9e0
2024-10-23 09:21:33Chef's notes
Cocoa powder: You can use 100% natural unsweetened cocoa powder or Dutch-processed cocoa powder – both work well.
Gluten free flour: There are many different gluten free flours on the market. I tested this recipe using White Wings All Purpose Gluten Free flour. I recommend choosing a gluten free flour that says it can be subbed 1:1 for regular plain or all purpose flour.
*Chocolate chips: Double check your chocolate chips are gluten free if you are making this brownie for someone who is celiac.
Cook times: Cook times will vary depending on your oven, but you’ll know these brownies are done when they firm up around the edges and no longer wobble in the middle. Keep in mind they will continue to cook slightly as they cool. You can also check they’re done by inserting a skewer into the middle of the brownie. If the skewer emerges with only a few crumbs on it, they’re ready. If it is covered in wet, gooey batter, keep baking the brownies and check them in another 5 minutes.
Storage: Brownies will keep well in an airtight container at room temperature or in the fridge for up to 5 days. To serve warm, microwave each brownie for 20 seconds. You can also freeze these brownies to enjoy at a later date. Simply thaw at room temperature and then microwave if you prefer them warm.
Serving Size: 1 brownie Calories: 278 Sugar: 26.4 g Sodium: 22.9 mg Fat: 15.5 g Carbohydrates: 34.1 g Protein: 3 g Cholesterol: 77.3 mg Nutrition information is a guide only.
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 35 min
- 🍽️ Servings: 12
Ingredients
- 170 grams (3/4 cup) unsalted butter, melted
- 200 grams (1 cup) caster sugar or granulated sugar
- 90 grams (1/2 cup) brown sugar
- 1 teaspoon vanilla extract
- 3 large eggs
- 40 grams (1/2 cup) cocoa powder
- 70 grams (1/2 cup) gluten free plain or all purpose flour
- 75 grams milk or dark chocolate chips*
Directions
- Preheat the oven to 180 C (350 F) standard / 160 C (320 F) fan-forced. Grease and line an 8-inch square pan with baking or parchment paper, ensuring two sides overhang.
- In a large mixing bowl, add melted butter and sugars and gently whisk together. Add vanilla extract and stir.
- Add the eggs, one at a time, stirring in-between, then sift in the cocoa powder and flour. Stir until just combined. Add chocolate chips.
- Pour the brownie batter in the prepared pan and place in the oven. Bake brownies for approximately 30-35 minutes or until they no longer wobble in the middle.
- Leave brownie in pan and transfer to a wire rack to cool completely. These brownies are quite fragile so if you can, transfer to the fridge for an hour before cutting into squares to serve.
-
@ 5e5fc143:393d5a2c
2024-10-11 22:20:52Nostr is censorship resistant freedom protocol !!!
OBJECTIVE:
In nutshell this is jumpstart guide for fresh newbie who wanna try out nostr and also for anyone who wanna spread the info in other social media.
HOWTO: Dummies guide to start using nostr
Open browser - > visit iris.to or snort.social Click on Name or New Account – follow steps That’s it – you are in nostr now -- can browse most notes n indepth guides about nostr now and also post note / comment / ask something #asknostr (save n backup you nsec priv key carefully or make additional one later)
video #tutorial #onboarding normies 2 nostr
Get a mobile app Amethyst or Getcurrent.io or Primal later, Get a NIP05 profile checker, Get browser extension Alby wallet Once you become advanced user – explore, search and change as needed as you learn more Remember: Nobody can block/suspend/delete/remove/ban you in nostr !!! Relays servers are important. Also ZAPs are important https://habla.news/tony/welcome-to-nostr https://habla.news/u/captjack@nostrich.love/1681579356819
Any expert or power user nostrich volunteer please cut/paste text, insert screenshot in any other social media you like and think is good for nostr. mastadoon/fediverse/tiktok/meta/wechat/weibo/...
https://justpaste.it/arqgs nostr:note19v0zcp6rnwnry9vjp028qrd37zjcx3e6fpeu3pa7dm8mq48x6a7seye5g8 nostr:note19v0zcp6rnwnry9vjp028qrd37zjcx3e6fpeu3pa7dm8mq48x6a7seye5g8
OPTIONAL Lightning Wallet⚡️ : 🐝 GetAlby🐝 is easiest n also power LN wallet to learn n use Open browser - > visit https://getalby.com/auth/users/new Choose a unique username and strongpaswrd (save / backup elsewhere properly) That's it - you now have Bitcoin Lightning wallet LN-BTC and you now receive and send SATS Play with it learn more about advance features of Alby. Also now can use nostr ⚡️ZAPs ⚡️
Those using PC/Mac can install "getalby browser extension" addon firefox/safari/kiwi preferred.
On mobile install bluewallet and setup new LNWallet->Getalby LNDHub
Also Move medium to large funds to self-custody Liquid BTC wallet like Sideswap or Aqua or Marina Move any extra large funds to BTC mainnet bech32 seqwit address wallet if not spending soon as store-of-value ignoring high mainnet gas fee.
Re-posting - use iris.to or primal.net to start with
Thank you ! 💜🤙 Welcome to Nostr 💜🤙
-
@ 06639a38:655f8f71
2024-10-24 14:49:08Project Name
Nostr
Project Description
Nostr (Notes and Other Stuff Transmitted by Relays) is an open, censorship-resistant, and decentralized communication protocol designed for simplicity and resilience. Unlike traditional platforms, Nostr doesn’t rely on centralized servers. It already supports various use cases with free, open-source clients—offering alternatives to platforms like Twitter/X, Meetup.com, Excel 365, healthcare system and more. We will help you get started with Nostr.
Nostr has seen remarkable adoption and growth within the open-source community, evidenced by over 12,500 GitHub stars, 500+ forks, and contributions from more than 350 developers. The protocol has catalyzed the creation of an impressive ecosystem of over 390 projects, including mobile and web clients, relays, tools, and services that further enhance Nostr’s functionality. With over 70 tools and 48 libraries, developers can integrate Nostr into a wide array of applications—ranging from chat platforms to file storage and even decentralized marketplaces. These resources help to build decentralized, censorship-resistant systems without the need for centralized servers. Whether you’re working on peer-to-peer markets, privacy-focused messaging apps, or decentralized social media, Nostr’s ecosystem offers the tools.
Project website
https://github.com/nostr-protocol
Source code
https://github.com/nostr-protocol/nips
Project Theme
World Wide Web
Do you want a stand for the entire event or just for one day?
Entire event
Why do you want to be at FOSDEM?
We want to be at FOSDEM because it’s the perfect place to connect with like-minded developers and open-source enthusiasts who share our passion for decentralization, innovation, and building open permissionless technologies. FOSDEM fosters collaboration and the growth of community-driven projects and Nostr is a natural fit as a real grassroots project with its open protocol and commitment to build communication technology with resilience and simplicity in mind.
By being at FOSDEM, we aim to raise awareness, share knowledge and inspire others to explore the potential of decentralized communication systems. We also want to engage with the FOSS community and gain feedback to help Nostr grow. If people are really interested in how they can use Nostr we will show the possibilities, demo existing clients and provide in-depth explanations of how the protocol can replace the social layer (with user accounts in living a database) in existing software.What is the relation between the project and the primary contact?
Jurjen works with the community to promote its development, onboard new developers, and contribute to its open-source ecosystem. My role includes helping to raise awareness of Nostr's potential, organizing events, and supporting adoption by providing educational resources and technical guidance.
What is the relation between the project and the secondary contact?
Sebastian (37) is an independent creative / fullstack web developer who is the maintainer of a PHP helper library supported by OpenSats. Besides this project he is also making contributions with developing Nostr modules for Drupal.
“Since I've been online on the internet (1998), I'm highly interested in online communities, social networking and new ways of digital interactions. The internet has changed radically in the last decade and that change is not serving our interests. It's fair to say the web is broken in many ways. With Nostr we can fix this.”Social media links
npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft
(Jurjen)
npub1qe3e5wrvnsgpggtkytxteaqfprz0rgxr8c3l34kk3a9t7e2l3acslezefe
(Sebastian)
npub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa
(Tanja)
npub1nkmta4dmsa7pj25762qxa6yqxvrhzn7ug0gz5frp9g7p3jdscnhsu049fn
(Kevin)Anything else you like to add?
We’d also like to highlight that Nostr was created by Fiatjaf, an anonymous founder, which aligns with its principles of openness and decentralization. As an open protocol, Nostr is designed to evolve and find its own way, just like the foundational protocols of the internet. Importantly, Nostr is not a blockchain project—there are no tokens, no costs, and no barriers. It’s also not a platform nor a NFT. It’s purely decentralized, built for resilience and simplicity. While payment solutions like Bitcoin can be integrated, they are optional, not intrinsic to the protocol. This makes Nostr accessible and flexible, truly embodying the spirit of the open internet.
Nostr is more than just a technological protocol; it’s about the energy, problem-solving, and sense of hope that draws people in. Even newcomers can play a significant role in the ecosystem, gaining insight from the outside while discovering the protocol’s potential. Tanja, for example, isn’t from a tech background, yet after just three months, she’s taken on a major organizational role. She’s been spreading the message of freedom of speech and is leading the Nostr Booth LATAM tour, where volunteers, entrepreneurs, and Nostr-based businesses come together, supported by the entire community, to raise awareness about Nostr. Her passion for decentralization and open collaboration also drives her efforts to bring Nostr to FOSDEM, where she will help connect the project with like-minded developers and open-source advocates.
Please reach out to us if there are any questions. We’re really looking forward to presenting Nostr as a protocol at one of the best places where free and open-source software is flourishing.
This content will be used for a FOSDEM stand submission via https://pretalx.fosdem.org/fosdem-2025-call-for-stands/
-
@ 9349d012:d3e98946
2024-10-23 04:10:25Chef's notes
Ingredients
4 tablespoons (1/2 stick) butter 2 ounces thinly sliced prosciutto, cut into thin strips 1 1/4 cups orzo (about 8 ounces) 3 cups low-salt chicken broth 1/2 teaspoon (loosely packed) saffron threads, crushed 1 pound slender asparagus, trimmed, cut into 1/2-inch pieces 1/4 cup grated Parmesan cheese Parmesan cheese shavings
Preparation
Melt 2 tablespoons butter in large nonstick skillet over medium-high heat. Add prosciutto and sauté until almost crisp, about 3 minutes. Using slotted spoon, transfer to paper towels to drain. Melt 2 tablespoons butter in same skillet over high heat. Add orzo; stir 1 minute. Add broth and saffron; bring to boil. Reduce heat to medium-low, cover, and simmer until orzo begins to soften, stirring occasionally, about 8 minutes. Add asparagus; cover and simmer until tender, about 5 minutes. Uncover; simmer until almost all liquid is absorbed, about 1 minute. Remove from heat. Mix in prosciutto and 1/2 cup grated cheese. Season to taste with salt and pepper. Transfer to large bowl. Garnish with Parmesan shavings. Makes 6 servings.
Details
- ⏲️ Prep time: 30
- 🍳 Cook time: 30
Ingredients
- See Chef’s Notes
Directions
- See Chef’s Notes
-
@ 75d12141:3458d1e2
2024-10-23 00:20:14Chef's notes
A childhood favorite of mine! Just don't go too crazy with the scallions as you don't want to overpower the pork flavor.
Details
- ⏲️ Prep time: 15
- 🍳 Cook time: 15-20 mins
- 🍽️ Servings: 3-5
Ingredients
- 1 pound of lean ground pork
- 1 tablespoon of diced scallions
- Ground black pepper (optional)
Directions
- Lightly coat your palms with olive oil to prevent the meat from sticking to you and to assist in keeping its ball form
- Mix the ground pork and diced scallions in a large bowl
- Roll the pork into the preferred portion size until it feels like it won't fall apart
- Cook in a skillet for 15-20 mins
-
@ 5e5fc143:393d5a2c
2024-10-11 22:15:54We are now given a choice of digital freedom #nostr .
Creativity for every nostrich is now unleashed from the cage of bigtech censorship , rules and algo. But freedom comes with responsibility so pick right one(s). I will try share here some learning experience both technical and also from fundamental point of view. Just wanted kick start this article n fill as we go like living reference document.
Nostr itself is an application layer protocol that can used beyond just social media mirco or long blogging. Each nostr client heavily dependent on back-end servers call nostr "Relay servers" or in short "rs" or "relays" Relays can hosted anywhere in clearnet internet, onion net , vpn , i2p , nym Relays are controlled by their respective admins based NIP specs that they select to implement according to own decisions. Relays can have certain ToS (Terms of Service) Rules to adhered too.
New users can choose and pick client or app (ios / android/ windows) with preset of relays in the simplest form , but other advanced users need to do a regular manual relay management.
Relay management is an active regular task based on where when n how you are using.
Relay list are saved within you npub profile backup file which can edited and broadcast anytime.
Relay management is an active regular task based on where when and how you are using.
Relay list always need to be updated time to time as and when needed.
2 Users MUST a common RELAY between them even if one only need to follow another. Occasionally you may notice certain npub accounts you are following already but cannot see frequent notes publish by them – one of cause maybe you not sharing a common relay
Most nostr client applications has SETTINGS where user choose add/remove relays Also user choose which function to enable - READ or WRITE
Relay list for your account is always saved within you npub profile backup file which can edited and broadcast anytime. Hence any app or browser when u login with you npub the same relay list will be enforced. There could valid reasons why u need have list for if you trying to save bandwidth and traveling.
Functions in app.getcurrent.io and primal.net app for mobile apple or android are ideal for user traveling abroad and wanted to save bandwidth since relay management is done the providers in backend and saves hassle for basic usage.
Remember if someone is selecting relay on your behalf then you may not be necessarily able to pull and get some specific and special content that you may need. Such providers like coracle and nostrid also give option to override the default relays they selected.
Relay types: They can be categorized by various features or policy or technologies.
FREE PUBLIC Relays vs PAID PUBLIC Relays
PAID relays provide unrestricted access / write / filtering options than FREE relays but both are public clearnet relays. Just subscribing to PAID relays will not solve all problems unless you choose the relays properly and enable settings correctly.
Private Replay or Tor Relays – normally not easily visible until unless someone tell you. You can also host own private relay not opened to internet of archive and back of your own notes.
The technical landscape in nostr can be fast changing as more NIPs get proposed or updated. Relays admin can choose implement certain NIPs or not based on policy or technical limitations.
Example NIP33 defines “long notes” aka blogs as you now reading this in habla site which #1 UI and site for "Editable" long notes – some relays donot implement or allow this. NIP07 is used for client authentication like nos2x and is implemented by all relays in fact. Nostr is so fasting changing-hence many links many broken Pushing long note again.
To be continued again ... reference pics will added later also Hope this help you understand "why when what" to tune and maintain active set of proper relays. Relay Proxy, Relay aggregator or Relay multiplexer – Paid, Public, Free, Private, Event, Relays That’s all for now n more later ... Thank you 🙏 ! ⚡️ https://getalby.com/p/captjack ⚡️ PV 💜 🤙
References: https://habla.news/relays https://relay.exchange/ https://relays.vercel.app/ https://nostr.info/relays/ https://nostrudel.ninja/#/relays
Related Articles: https://thebitcoinmanual.com/articles/types-nostr-relays/ nostr:naddr1qqd5c6t8dp6xu6twvukkvctnwss92jfqvehhygzwdaehguszyrtp7w79k045gq80mtnpdxjuzl9t7vjxk52rv80f888y5xsd5mh55qcyqqq823cf39s98 https://habla.news/u/current@getcurrent.io/1694434022411
-
@ 5e5fc143:393d5a2c
2024-10-11 22:12:06Now test old reliable front end Stay tuned more later
-
@ e968e50b:db2a803a
2024-10-11 17:12:07The increasingly inaccurately named weekly crossword puzzle is up!
The theme is Halloween. I'm posting in the bitcoin territory because I'm really hoping that this week's crossword will be a gateway drug[^1]. It's easy and themed off of a famous holiday (at least in the Western world, sorry international folks, lemme know if there's a theme you'd like to see). However, there's bitcoin links and stacker news links everywhere. Share it with your friends who like newspaper puzzles and hopefully they'll stumble into some bitcoin stuff.
Week 5's puzzle still has an unclaimed bounty on it, although somebody's already made 7000 sats from a deposit by @OneOneSeven himself. If you would also like to contribute to this bounty-avoider, you can do so at bc1qswcrkuu5mfs2vg9y52xc2543zmnqmz3j9jwnyn, but I'd just recommend solving the damn riddle yourself.
There's no bounty this week. Just have fun and share with friends. I may add an alternative UI later on, similar to week 5.
https://stackernewscrosswordpuzzle7.vercel.app/
[^1]: That's actually the goal of all of these, but I think some just end up being too difficult or bitcoin themed for the average Joe.
originally posted at https://stacker.news/items/719445
-
@ ff1a68c4:ec9831cf
2024-10-24 14:47:03En un mundo en constante evolución, la ciencia nos ofrece valiosas herramientas para mejorar nuestra calidad de vida y prevenir enfermedades neurodegenerativas como la demencia. A partir de los consejos de especialistas y datos de estudios recientes, he reunido una síntesis de enfoques clave que coinciden en varios puntos esenciales. Aquí te presento un resumen práctico:
El modelo MEDALS: Los pilares del bienestar
El acrónimo MEDALS nos recuerda los aspectos fundamentales que pueden ayudar a mantener una buena calidad de vida:
- Meditación: La práctica regular de la meditación reduce el estrés, mejora la concentración y contribuye a un mayor bienestar emocional.
- Ejercicio: El movimiento es vital para la salud física y mental. Mantener una rutina de ejercicio regular no solo fortalece el cuerpo, sino también el cerebro.
- Dieta: Una alimentación equilibrada es clave. Optar por una dieta rica en nutrientes, como la mediterránea, promueve un cerebro saludable.
- Apreciación: Practicar la gratitud y el aprecio por las pequeñas cosas de la vida puede elevar nuestro bienestar emocional y mental.
- Love (amor) y Learning (aprendizaje): Mantener vínculos afectivos y relaciones cercanas fortalece la mente. El aprendizaje continuo mantiene el cerebro activo y en constante crecimiento.
- Sueño: Dormir lo suficiente y de forma reparadora es crucial para la regeneración cerebral y la memoria.
Manantiales de la fuerza interior: Una guía integral para el bienestar
Otra perspectiva ofrece una visión holística de cómo cuidar cuerpo y mente. Estos son los cinco manantiales de energía interior que contribuyen a un estado óptimo de bienestar:
- Sueño profundo y reparador: Un buen descanso nocturno es el pilar del equilibrio físico y mental.
- Alimentación sana e hidratación: Mantener una dieta nutritiva y una adecuada hidratación es esencial para el buen funcionamiento del cerebro y del cuerpo.
- Respiración consciente: Practicar ejercicios de respiración ayuda a reducir el estrés y aumenta la claridad mental.
- Ejercicio y relajación: Alternar entre actividad física y momentos de descanso es fundamental para evitar el agotamiento.
- Actitud mental positiva: Mantener una mentalidad optimista y enfocada en el crecimiento nos ayuda a enfrentar mejor los retos de la vida.
6 Reglas anti-demencia: Proteger el cerebro a largo plazo
Algunos expertos proponen un enfoque más específico para la prevención de la demencia:
- Vínculos sociales: El cerebro es un órgano social. Mantener relaciones cercanas y participar en actividades grupales es clave para su salud.
- Ejercicio físico: El cuerpo y la mente están conectados. La actividad física regular mejora el rendimiento cerebral.
- Curiosidad y aprendizaje continuo: Mantener el cerebro activo con nuevos intereses y aprendizajes es crucial para prevenir su deterioro.
- Buena alimentación: Optar por alimentos ricos en Omega-3 y seguir una dieta mediterránea favorece la salud cerebral.
- Manejo del estrés: El estrés crónico es un enemigo del cerebro. Aprender a relativizar las situaciones y ver los desafíos como oportunidades puede reducir su impacto.
- Dormir bien: Un sueño adecuado es esencial para la reparación y el funcionamiento óptimo del cerebro.
Hallazgos de The Lancet: Factores modificables y no modificables en la prevención de la demencia
Uno de los estudios más importantes sobre la prevención de la demencia, publicado en The Lancet, destaca los factores modificables que pueden influir en nuestro futuro cognitivo:
- Formación continua: Aprender y mantenerse intelectualmente activo durante toda la vida puede retrasar el deterioro cognitivo.
- Cuidado de la audición: Proteger la audición desde la juventud es crucial. En la vejez, el uso de audífonos puede ayudar a mantener el estímulo auditivo.
- Salud emocional: El estrés crónico, la ansiedad y la depresión son factores de riesgo importantes para el desarrollo de la demencia.
- Ejercicio físico y salud metabólica: Evitar el sedentarismo, el sobrepeso, la diabetes y los niveles elevados de colesterol LDL reduce el riesgo de enfermedades neurodegenerativas.
- Protección contra golpes en la cabeza: Los traumatismos craneales aumentan el riesgo de demencia. Protegerse es fundamental.
- Reducción de tóxicos: Evitar el tabaco, el consumo excesivo de alcohol y la exposición a contaminantes ayuda a preservar la salud cerebral (ej. filtros para el aire o en la llave del agua)
- Vida social activa: El aislamiento social es un factor de riesgo para la demencia. Mantenerse involucrado en grupos y actividades sociales es clave.
- Suplementos: Aunque no son esenciales, algunos suplementos como arándanos, vitamina D, Omega-3, y magnesio pueden ser beneficiosos en casos de deficiencia.
Implementar estos principios no solo mejorará la calidad de vida en el presente, sino que también reducirá significativamente el riesgo de desarrollar demencia en el futuro. Vivir de manera consciente, cuidar el cuerpo y nutrir la mente son las claves para una vida larga y saludable.
-
@ 45bda953:bc1e518e
2024-10-11 15:58:073 standard cycles later.
Albin was lying on a two meter high rock outcropping. It was warm from Ceb light but he dared not move. His adrenalin was pumping but he could scarcely take a breath for fear of being heard. His thumping heart was so loud it made him paranoid. He crawled forward and peeked over the edge of the low precipice. A dangerous and savage escaped slave was on his trail, ready to scalp and gut him. If only he could flee to his safe zone. He heard a long low whistle from across the valley. A light flashed from amongst some dense shrubbery at an estimated two hundred metres away. He pulled a mirror from his pocket preparing to return the signal. “This increases my chances.” He thought to himself. He knew that their common enemy was behind him and could not possibly see the reflection of Ceb light if he directed said light perpendicularly away from the hunter. He flashed with his mirror five times towards his ally, two second counts between each flash. No immediate response... he waited. Light flashed from the shrubbery and immediately he became aware of movement in the tall grass behind him. He resisted the urge to look back over his shoulder. The sweat exploded off his forehead. He remained still. It seemed like minutes though it was only a few seconds. Light flashed again.
Grassy movement sounds recurred, heart now racing. Third flash. A burst of movement from the rear left at around eight O clock. Albin turned his head and pressed his right cheek against the cooking rock. A tanned thirteen year old youth raced past below him at unbelievable speed. Scruff cloth pants, barefoot with no shirt and a trailing headband. Albin pushed himself up to his hands and knees. “If there is fifty meters distance between us I could risk running for the manor.” The shrubs on the other side of the valley started to rock violently and birthed a boy in a buttoned up shirt with leather shoes and woven short breeches all tailor made. The boy ran with all his might towards the Domitian manor. “This is my chance.” Albin scrambled off the rock and sprinted towards the manor jumping and dodging the hindering bushes and stones. The other party moving parallel to him across the valley. Seth caught sight of Albin but did not change target and kept course. He held a small blunt wooden object caught up to his first victim and proceeded to stab his prey in the back with it. “Ha, you're dead!” Seth exclaimed while immediately changing course to intersect his secondary target before he gets inside the safe zone. “Not fair. It’s not fair you cheat!” The belligerent player cried dismally. Seth did not care for the accusation. He was determined to get two kills and be victorious. Albin felt less secure in his current situation and began to doubt his previous assessment of fifty meters and thought that an earlier head start might have been a more favourable risk assessment. “Don't panic Albin, focus.” He reproved himself. Recalculating his speed in comparison to the speed of his hunter, estimated the future point of contact. Veering to the right he sagaciously aimed for the far corner of the estate gardens, increasing the distance of his run to the demarcated safe zone considerably more for his rival than for himself. The race became more intense with the hunter closing in... “I’m alive!” Was the triumphant breathless utterance as the knife swiped past the back of his neck mere centimetres. Albin fell on the trimmed lawn panting. Looking back he saw Seth in a similar condition of respiratory suffering. The loser was still far away grumbling and kicking at the weeds. Seth grinned, “I almost had you.” Albin just nodded in agreement. “I'm thirsty... water, milk or wattle gum juice.” “Wattle gum juice!” Seth exclaimed without hesitation. Albin knew that the slave would never say no to the delicacies and confections of the common people but gave him the option to choose either way. He brushed the grass clippings off his clothes and entered through the back door of the manor. In the kitchen he poured juice into three demure clay mugs whilst noticing emanations of a heated conversation from the foyer. His curiosity bested him. Albin went in and sat himself down on the staircase and gulped at his beverage. The adults scarcely noticed him. “The people are ready to accrue for themselves better prospects in the colony!” The tradesman appealed with fervour. “Your proposals would be sensible under normal circumstances but colonial expansion is best suited for peacetime.” Domitius riposted. “This war has been going for almost 3 standard cycles, are the people supposed to stall their dreams and ambitions for some vaguely defined purpose. Please consider that an expansion program will be beneficial to the war effort eventually.” Domitius knew that he was being evasive and dishonest. He was finding it more difficult to guide the colony according to his vision, their growing despondency was worsened by his deflecting their requests with indirect excuses. Domitius did not want to rule with force, his exerting authoritarian command would only foster resentment towards him among the Kaspian landowners. “We do not have a militia. How would we keep an influx off world slaves servile if the war seems to tilt against the Empire?” Domitius replied with rhetoric. “It is a valid concern. Mechanical labour is the solution. We should convene a council to address these issues and come to consensus.” The traders uncompromising insistence pushed Domitius past the limit of his patience. “This will not turn into a democracy! Tell me what you require and I will consider it, if I do not agree with you I will annul it and appoint an inquisitor to judge and punish all who dissent!” The tradesman lost his composure and shrunk back. “My lord, I am reluctant to admit... there are no requests.” “No requests?” “Yes my lord.” Domitius was puzzled. The tradesman’s son came into the room with his cup of wattle juice and sat down next to Albin. “Father Ecknard very recently informed me of the news... I had applied for a licence half a cycle previously.” Domitius felt uneasy. “What news?” “... A licence has been issued from Kaspa Prime... they are sending extractors to Hithe III.” Domitius went pale. Thousands of implications flooded his mind. Economic problems, ecological issues and a very much more complex political situation. He remained unresponsive for a moment. “I understand. Isidor, you may go.” The tradesman bowed lower than was required of him then reached towards his son. “I apologise for my insolence.” Domitius ignored the man who quickly left the premises. Domitius looked at his son. “Never become too familiar with your subjects, they become derisive. Damn it! He has created more problems for us than he could comprehend.” “Yes pappa.” He agreed with his father instinctively. “Pappa? Are we going to see real space ships!”
“We are...” Domitius appreciated his son's innocence. “big ones.” He smiled with all but his eyes.
Juela Prime - Capitol
Emilien was waiting patiently in the office lobby of a towering high rise structure. One of thousands of competing banks on the Juel Capitol. He had a valid appointment and felt annoyed by the guard hanging around near him and kept noticing the suspicious glances. “What are you looking at.” he hissed from under his hood. “You a spacer?” “Maybe.” The guard did not follow up on his question, he did not leave either. The door slid open and a impeccably well groomed secretary beckoned at him. “Mr Dierre is ready for you.” “Thank you sweetheart.” He brushed past her sticking a pernicious grin right in her face, she gagged. “Welcome Mr Emilien, I hope you had a good trip.” The bank chief executive greeted with outstretched arms. “Nice suit, I always have good trips. Is it very expensive?” The spacer gestured toward the fabric while looking around and sizing up the situation. “More than you know.” The executive smugly responded and proceeded to open a cabinet containing differently labelled flasks filled with various hues of alcohol. “I know quite a lot.” Emilien licked his lips. The banker hesitantly offered a serving which was accepted without vacillation. “I always thought that you void jumpers would be more reluctant accepting unverified consumables?” Dierre smiled a questioning look. Emilien swallowed the strong fluid and inhaled deeply. “I have a clone ready. And an implant that up links me directly to my pod. Don't think that if I have to wake up in a fresh body that I won't remember this place, including your mug.” Emilien tapped lightly on his temple seeming threatening and postured while he spoke. The banker nodded in uneasy amusement. “Excellent, excellent. Ahem, The reason we contacted you Mr Emilien, is because we are in business...” He promptly helped himself to a second glass of... whatever alcohol it was, anticipating a speech and a job description. “...the business of war. Currently we are supplying arms to the Juela fleet, who are at war with the Magarrian Empire. They are for the most part, boycotting our factories... which is a shame really, but understandably so. The Shiv Unity are supporting our enemy logistically yet have not joined them in active combat. We are trying to coax Osteri aggression, but they have occupied themselves in... other endeavours and don't seem as willing as usual to assault Magar territories.” The capsuleer frowned and feigned curiosity. “Why would you suppose that be?” He interjected. “We are not sure... don't interrupt me, you break my train of thought.” The banker lied and it did not escape his attention. “Continue by all means.” He waved a bottle at the executive leaning back into a comfy black leather chair. “If we get the upper hand in this war we could control vital Magar territories, the profits our companies could absorb from the moons and planets would be virtually tax free and help to continue fund the war effort...” Emilien cut him off with a snide sarcasm. “How philanthropic. I watch your news propaganda...” Emilien slowly sat upright and uncannily performed like a popular Juel news anchor. “Breaking news. The Magar Empire are allegedly oppressing... slaves, it is reported that the war has driven them to desperation and are driving their labour forces harder than what is... morally justifiable. Any petitions made or pleas for leniency, no matter how trivial is met with... corporal punishment. We must be vocal about their plight and fight for... freedom and liberty. You are with The Report. See you next time, and remember, peace everywhere for all.” He mockingly mimics a news anchor's plastic monotone while folding up and shifting around imaginary papers. The secretary sniggered softly from behind her desk, Dierre frowned. Emilien slouched back into his chair. “What would you have me do boss?” The banker remained silent. “Excuse me one moment.” Dierre touched a pad on his desk, privacy panels slid up separating Dierre from his guest and the lady. He opened comms to an unknown voice. Emilien auto tuned up his sonic receptors slightly and closed his eyes listening in uninvited but inconspicuously. "Yes Dierre, make it quick." “Right, good afternoon sir. I am not sure about this character, Mr Emilien, should we not rather employ one of our own for this contract.” “What? No! There is no one else with the expertise and or reputation required for this investment. He has no prior affiliation to us no, no record. Dierre, just hire the man and stop whining like a little bitch! I don't need this type of crap. This was prearranged, what I don’t need is uncalled for opinionated inputs. We have made the decision and you, you explain what we require of them. So explain to the space clone what we need him to do and how much we are going to pay him for it!” The silence was awkward. “Wh... Yes sir.” The banker was keeping good composure under the condescending circumstances. Emilien smiled, a sly joy filling his soulless being. The comms line closed and the privacy panels retreated into the floor to reveal to the banker Emilien, sitting there grinning like an idiot. “How much are you going to pay me?” “Don't you want to know details of the job concerned?” “No. Just show me the figures in sat.” The director handed him a pad. Emilien looked at the glowing screen, his smiled recurred. “I accept this mission.” He glanced over at the secretary who was unassumingly recording minutes at her desk. “Doing anything tonight sweetheart?” She grimaced. Emilien stood up, “Dierre my good fellow I have to go, need to prepare for whatever it is you corpo scumbags are going to make me do.” “Don't you want to know the details involved?” “Send the info to my pod.” “It is sensitive information.” Emilien indifferently stared at Dierre. “I have a secure line... bitch.” Disbelief shot across his face.
He walked out of the room, looked back grinning an impossibly large grin and winked at the lady. “See you later sweetheart.” She quickly had the door slide closed. "That was unsettling." She mumbled to herself.
...
scifi
-
@ 4ba8e86d:89d32de4
2024-10-11 15:42:46Lançada como YubiKey Classic em 2008, permite autenticação com um toque no botão para gerar um código único. Inicialmente compatível com OATH-HOTP, evoluiu para suportar U2F, NFC e FIDO2. Com o lançamento da YubiKey 5 Series, tornou-se ainda mais versátil na proteção de contas digitais em diversas plataformas. A Yubico continua inovando para aprimorar a segurança e a autenticação online.
Chaves de Segurança: Um Reforço Essencial para a Autenticação em Dois Fatores
As chaves de segurança são dispositivos de autenticação que desempenham um papel crucial na verificação de identidades online. Funcionando de maneira semelhante às chaves tradicionais, elas são inseridas ou tocadas em dispositivos conectados, como computadores e celulares, para confirmar a autenticidade do usuário. Embora possam ser usadas como única forma de autenticação, é mais comum utilizá-las como um complemento à senha tradicional.
A senha é o método de autenticação mais conhecido e amplamente utilizado, pois é algo que apenas o usuário sabe. O processo é simples: inserir a senha e obter acesso. No entanto, esse método apresenta riscos, uma vez que o vazamento ou o roubo da senha pode permitir o acesso não autorizado a locais que deveriam ser restritos apenas ao proprietário da conta.
Para mitigar esses riscos, surgiu a autenticação em dois passos (2FA), também conhecida como autenticação em dois fatores ou em duas etapas. Como o nome sugere, ela adiciona uma etapa adicional antes de conceder o acesso ao usuário legítimo.
Essa etapa extra envolve algo que o usuário possui, complementando o conhecimento da senha. Em um sistema devidamente configurado, ambos os elementos são necessários para liberar o acesso. Um exemplo comum de 2FA é o uso de tokens de banco, que antigamente vinham em cartões plásticos ou chaveiros digitais (hoje, geralmente estão no celular).
O método mais básico de 2FA, ainda amplamente utilizado, é o envio de senhas temporárias por mensagem de texto (SMS). Após inserir a senha, o sistema envia uma senha temporária descartável para o celular do usuário, que deve ser inserida para obter acesso. No entanto, o uso de SMS para 2FA é considerado frágil, uma vez que as mensagens podem ser interceptadas ou acessadas por terceiros caso o número do usuário seja clonado ou o celular seja roubado.
Os aplicativos OTP (One-time password), ou senhas descartáveis, são uma alternativa mais segura. Eles operam na mesma lógica do SMS, mas assumem a forma de um aplicativo instalado no celular, reforçando a natureza do elemento "possuir". Ao contrário de um número de celular, o próprio celular é mais único e não pode ser clonado. Além disso, os aplicativos OTP contam com medidas de segurança, como bloqueio por senha e/ou biometria. Exemplos populares desses aplicativos incluem o Aegis Authenticator e RaivoOTP Ao configurar o aplicativo para o sistema desejado, as senhas temporárias são geradas e exibidas no próprio aplicativo, exigindo acesso físico ao celular para obtê-las.
As chaves de segurança físicas representam o próximo nível nessa escala de segurança. Em vez de digitar ou colar senhas temporárias, a própria chave de segurança é utilizada como segundo fator de autenticação. Esse recurso é possível graças ao protocolo aberto FIDO U2F (Universal 2nd Factor), desenvolvido pela Aliança FIDO (Fast Identity Online).
Para utilizar as chaves de segurança em computadores, basta inseri-las em uma porta USB, enquanto em celulares, o dispositivo é tocado na chave para a comunicação via NFC (Near Field Communication), um padrão de comunicação sem fio. Em ambos os casos, ocorre uma troca de dados criptografados entre a chave e o dispositivo, usando um mecanismo de desafio-resposta que libera o acesso em caso de sucesso. Embora pareça um processo complexo, para o usuário final, a utilização é bastante simples.
Graças à evolução do protocolo para o FIDO2, as chaves de segurança também podem ser utilizadas como o único meio de autenticação. As linhas YubiKey 5 e Security Key, da fabricante Yubico, são exemplos de chaves de segurança que funcionam com o FIDO2.
A seguir, abordaremos algumas dúvidas comuns sobre o uso de chaves de segurança:
Não é necessário usar 2FA em todas as ocasiões: A maioria dos serviços permite que você defina um dispositivo confiável, como um celular ou computador, para que, em futuros acessos, apenas a senha seja exigida, ou nem isso seja necessário. No entanto, é importante garantir que o dispositivo confiável esteja devidamente protegido, por meio de criptografia, para evitar comprometimentos de segurança. De nada adianta ter 2FA ativado em uma conta se o dispositivo utilizado não estiver adequadamente seguro.
Chaves de segurança são únicas: É importante ter em mente que as chaves de segurança são dispositivos únicos. Isso significa que, se você perder a chave, não será possível transferir as configurações para outra chave. Além disso, as chaves de segurança não possuem qualquer vínculo formal com o usuário, como um nome de usuário ou senha. O vínculo existe apenas entre a chave e as contas que dependem dela para conceder acesso. É semelhante a uma chave física: ela protege a propriedade, mas não está diretamente ligada ao usuário.
Perda do celular ou chave de segurança: Caso você perca seu celular ou chave de segurança, existem soluções para recuperar o acesso. A primeira opção é ter outro dispositivo confiável configurado ou com sessão ativa nas contas. Nesse caso, é possível acessar as configurações dos serviços/aplicativos e desativar o 2FA. A segunda opção é ter salvo os códigos de backup fornecidos por muitos serviços. É importante guardar esses códigos de backup em um local extremamente seguro, como um papel impresso, pois eles são uma opção nuclear para recuperar o acesso à conta, independentemente de qualquer outra medida de segurança.
Dois métodos de 2FA paralelos: É possível utilizar dois métodos de 2FA em paralelo, como uma chave de segurança e um aplicativo OTP. Isso pode ser necessário caso você tenha dispositivos que não possuem portas USB compatíveis ou tecnologia NFC, como iPads ou celulares Android mais simples.
A configuração de uma chave de segurança pode variar de acordo com o serviço utilizado, mas, em geral, envolve a escolha da opção desejada e a confirmação por meio da inserção da chave ou de uma senha descartável gerada pelo aplicativo. Como exemplo, vamos ver como configurar uma chave de segurança no Twitter:
- Clique na aba "Mais" e depois em "Configurações e privacidade".
- Acesse "Segurança e acesso à conta" e clique em "Segurança".
- Em seguida, clique em "Autenticação em duas etapas" ou acesse diretamente este link.
- Na página de configuração da 2FA, o Twitter apresentará três opções: "Mensagem de texto" (SMS), "Aplicativo de autenticação" e "Chave de segurança". Para configurar a chave de segurança, clique na caixa de seleção ao lado dessa opção.
- O Twitter solicitará a senha novamente por medida de segurança. Em seguida, um pop-up aparecerá pedindo para inserir a chave no computador. Siga as instruções para ativar a chave. A ativação da chave de segurança envolve tocar com o dedo na área designada para garantir a presença física do usuário e mitigar ataques remotos.
- Após a ativação, o Twitter pedirá um nome para a chave e exibirá um "código nuclear" de backup, que permite o acesso direto sem 2FA caso a chave seja perdida.
Quando você for fazer login novamente, após inserir a senha, um pop-up do navegador solicitará a chave de segurança. O processo é semelhante ao da configuração: basta inserir e ativar a chave. Em dispositivos com NFC, basta tocar a parte superior do celular na chave de segurança para liberar o acesso.
Você pode adquirir as chaves de segurança diretamente na loja oficial https://www.yubico.com/br/store/ , que realiza envios para o país. Os preços variam de acordo com o modelo da chave e a forma de aquisição. Outra opção é procurar por vendedores independentes em marketplaces como o Amazon. Vale ressaltar que investir em uma chave de segurança é uma decisão pessoal e depende do nível de segurança desejado e do valor atribuído à proteção de suas contas.
Embora as chaves de segurança possam ser consideradas o "Santo Graal" da autenticação em dois fatores, é importante ressaltar que, caso você ainda não utilize 2FA em suas contas, é altamente recomendável configurar um aplicativo OTP. Confia somente em senhas torna-se arriscado com os crescentes vazamentos de dados e a intensificação de tentativas de golpes.
As chaves de segurança físicas, como a YubiKey, desempenham um papel crucial na autenticação em dois fatores (2FA), fortalecendo a segurança em contas online. Oferecendo uma abordagem mais segura em relação ao 2FA por SMS e aplicativos OTP, essas chaves proporcionam uma camada adicional de proteção, Embora sejam um investimento pessoal, a crescente importância da segurança digital torna essas chaves uma opção valiosa para proteger nossas identidades e dados online.
O U2F-TOKEN pode ser uma excelente opção para pessoas que gostam de criar e personalizar suas próprias ferramentas de segurança. Ao transformar placas STM32F103 e EFM32HG em tokens U2F, o firmware oferece uma solução econômica e versátil para autenticação de dois fatores (2FA).
As vantagens de utilizar o U2F-TOKEN incluem:
-
Customização: O U2F-TOKEN é um projeto de código aberto, o que significa que você pode personalizar e modificar o firmware de acordo com suas necessidades específicas.
-
Custos Baixos: As placas STM32F103 e EFM32HG são amplamente disponíveis e acessíveis em termos de preço, tornando o U2F-TOKEN uma alternativa econômica a outras soluções de tokens de autenticação.
-
Controle Total: Ao criar e montar seu próprio token U2F, você tem controle total sobre o processo e pode garantir a segurança do dispositivo.
-
Experiência de Aprendizado: Ao trabalhar com o U2F-TOKEN, você pode adquirir experiência em programação, compreender melhor o funcionamento de autenticação de dois fatores e aprofundar seus conhecimentos em segurança da informação.
-
Flexibilidade: O U2F-TOKEN suporta várias placas, permitindo que você escolha o hardware que melhor se adequa às suas necessidades.
Observação: é importante lembrar que trabalhar com firmware e hardware de baixo nível requer conhecimentos técnicos sólidos e cuidado, para evitar danos aos dispositivos ou problemas de segurança. Caso você não tenha experiência em programação ou eletrônica, pode ser útil buscar orientação e conhecimentos adicionais antes de iniciar o processo de criação do U2F-TOKEN.
O U2F-TOKEN é uma ótima opção para entusiastas que desejam explorar e criar suas próprias ferramentas de autenticação de dois fatores, mas é importante ter a devida cautela e conhecimento técnico ao lidar com esses projetos.
https://github.com/gl-sergei/u2f-token
https://youtu.be/o4t2rp66i-w
-
@ 4ba8e86d:89d32de4
2024-10-11 15:34:52Com o Pidgin, os usuários podem se conectar e se comunicar com pessoas em diferentes redes e serviços de mensagens instantâneas através de uma única interface.
A história do Pidgin remonta a 1998, quando Mark Spencer lançou a primeira versão do software de mensagens instantâneas chamado "Gaim". Inicialmente, o Gaim suportava apenas o protocolo de mensagens ICQ, permitindo que os usuários se conectassem e se comunicassem com seus contatos do ICQ. Posteriormente, o Gaim expandiu seu suporte para incluir outros protocolos de mensagens instantâneas, como AIM, MSN, Yahoo e IRC. Essa capacidade de se conectar a várias redes de mensagens instantâneas em um único aplicativo tornou o Gaim extremamente popular entre os usuários que desejavam gerenciar suas diversas contas em um só lugar. No entanto, em 2007, o projeto Gaim enfrentou problemas legais relacionados a questões de marca registrada com a America Online (AOL), empresa proprietária do serviço de mensagens instantâneas AIM. Para evitar conflitos e possíveis ações legais, o projeto Gaim foi renomeado para Pidgin.
O Pidgin oferece recursos comuns de mensagens instantâneas, como bate-papo em grupo, transferência de arquivos, emoticons, histórico de mensagens e notificações. Além disso, ele suporta plugins que estendem sua funcionalidade, permitindo recursos adicionais, como criptografia de mensagens, suporte a voz e vídeo, integração com serviços de redes sociais, entre outros.
Uma das vantagens do Pidgin é sua capacidade de se conectar simultaneamente a várias contas de diferentes serviços, permitindo que os usuários gerenciem várias contas de mensagens instantâneas em um único aplicativo.
Como cliente XMPP, o Pidgin permite que os usuários se conectem a servidores XMPP, como o servidor do próprio Tor, e se comuniquem com usuários XMPP em várias redes. Ele suporta recursos básicos do XMPP, como presença, envio de mensagens e participação em bate-papos em grupo.
O Pidgin é um software amplamente utilizado e bem estabelecido, conhecido por sua estabilidade e facilidade de uso. Sua versatilidade em suportar diferentes protocolos de mensagens instantâneas o torna uma escolha popular para usuários que desejam centralizar suas comunicações em um único aplicativo.
O aplicativo Pidgin funciona como um cliente de mensagens instantâneas que permite se comunicar com usuários de diferentes redes e serviços usando uma única interface. Aqui está uma descrição detalhada de como o Pidgin funciona:
-
Instalação e Configuração: Após baixar e instalar o Pidgin em seu dispositivo, você precisará configurar suas contas de mensagens instantâneas. Isso envolve fornecer as informações de login para cada serviço que deseja usar, como nome de usuário, senha e servidor correspondente.
-
Conexão com Servidores: Após configurar suas contas, o Pidgin se conectará automaticamente aos servidores correspondentes de cada serviço de mensagens instantâneas que você configurou. Ele estabelecerá uma conexão com cada servidor para verificar a presença de novas mensagens ou contatos online.
-
Lista de Contatos: Uma vez conectado aos servidores, o Pidgin exibirá uma lista de contatos, onde você poderá ver quais de seus contatos estão online, offline ou indisponíveis. A lista de contatos mostrará o status de cada contato, permitindo que você saiba se eles estão disponíveis para conversar.
-
Iniciar Conversas: Para iniciar uma conversa com um contato, você pode clicar duas vezes no nome dele na lista de contatos ou selecionar a opção "Iniciar bate-papo" no menu. Uma nova janela de conversa será aberta, permitindo que você troque mensagens de texto com o contato selecionado.
-
Recursos Adicionais: O Pidgin oferece recursos adicionais por meio de plugins. Você pode instalar plugins para estender a funcionalidade básica do Pidgin, como criptografia de mensagens, suporte a voz e vídeo, integração com serviços de redes sociais e muito mais. Os plugins permitem personalizar o Pidgin de acordo com suas necessidades e preferências.
-
Notificações e Histórico: O Pidgin exibirá notificações quando você receber uma nova mensagem, mesmo se o aplicativo estiver minimizado. Além disso, ele mantém um histórico de suas conversas, permitindo que você visualize mensagens anteriores e pesquise por palavras-chave.
7.O Pidgin implementa medidas para proteger a comunicação dos usuários. Por exemplo, por meio de plugins, é possível adicionar criptografia de mensagens para garantir que as conversas permaneçam privadas e seguras. O Pidgin também possui recursos de autenticação e suporte para conexões seguras, garantindo que as informações de login e dados de comunicação estejam protegidos durante o uso do aplicativo.
O Pidgin resolve alguns problemas comuns relacionados à comunicação em mensagens instantâneas.
-
Centralização de contas: Com o Pidgin, você pode centralizar todas as suas contas de mensagens instantâneas em um único aplicativo. Isso significa que você não precisa ter vários programas abertos ou alternar entre diferentes aplicativos para se comunicar com contatos em diferentes redes. O Pidgin permite que você gerencie todas as suas contas em uma única interface.
-
Compatibilidade de protocolos: O Pidgin suporta uma ampla variedade de protocolos de mensagens instantâneas, como XMPP/Jabber, AIM, ICQ, MSN, Yahoo, IRC e outros. Isso significa que você pode se comunicar com contatos em diferentes redes usando um único aplicativo, em vez de ter que usar um cliente específico para cada serviço. O Pidgin oferece uma solução conveniente para a incompatibilidade entre diferentes serviços de mensagens instantâneas.
-
Simplificação da comunicação: Ao usar o Pidgin, você pode trocar mensagens com contatos de diferentes redes em uma única janela de conversa. Isso simplifica a comunicação, pois você não precisa alternar entre diferentes aplicativos ou janelas para conversar com pessoas em redes diferentes. O Pidgin oferece uma interface unificada para todas as suas conversas, tornando mais fácil e conveniente se comunicar com contatos em várias redes.
-
Recursos adicionais através de plugins: O Pidgin permite a instalação de plugins que estendem sua funcionalidade básica. Isso significa que você pode adicionar recursos adicionais, como criptografia de mensagens, suporte a voz e vídeo, integração com serviços de redes sociais e muito mais. Os plugins permitem que você personalize o Pidgin de acordo com suas necessidades e preferências, adicionando recursos adicionais que podem melhorar sua experiência de comunicação.
-
Histórico de mensagens: O Pidgin mantém um histórico de suas conversas, permitindo que você visualize mensagens anteriores e pesquise por palavras-chave. Isso é útil para recuperar informações ou referências de conversas anteriores. O histórico de mensagens do Pidgin pode ser especialmente útil em situações de trabalho ou colaboração, onde você pode precisar revisitar informações compartilhadas em conversas passadas.
O Pidgin é projetado para facilitar a comunicação entre usuários de diferentes redes de mensagens instantâneas, oferecendo uma interface unificada e recursos comuns para troca de mensagens. Ele permite que você gerencie várias contas em um só lugar, simplificando sua experiência de mensagens instantâneas.
https://www.pidgin.im/
https://keep.imfreedom.org/pidgin/pidgin/
https://github.com/pidgin/pidgin
-
-
@ d5c3d063:4d1159b3
2024-10-24 14:37:08ปรัชญา อาวุธแห่งเหตุผลและเสรีภาพในโลกแห่งความขัดแย้ง
https://image.nostr.build/b3e2278447703b23c18d6b8dd98986b700958acbbe06b3cca6ce7efa55b6c1ad.jpg
โลกที่เราอาศัยอยู่เปรียบเสมือนสมรภูมิแห่งความคิด แนวคิดต่างๆ ถูกนำมาถกเถียงและท้าทายอยู่เสมอเพื่อค้นหาและพิสูจน์ความจริง ความขัดแย้งนี้ปรากฏชัดในหลายมิติ เช่น การปะทะกันระหว่างเหตุผลกับความงมงาย เสรีภาพกับการถูกบังคับ ปัจเจกนิยม (Individualism) กับลัทธิรวมหมู่ (Collectivism) และทุนนิยมกับสังคมนิยม ท่ามกลางความสับสนวุ่นวายนี้ ปรัชญาทำหน้าที่เสมือนป้อมปราการแห่งเหตุผลและเสรีภาพ เป็นเครื่องมือสำคัญที่ช่วยให้เราเข้าใจและวิเคราะห์โลกที่เต็มไปด้วยความขัดแย้ง พร้อมกับนำทางชีวิตของเราอีกด้วย .
ปรัชญาในบริบทนี้ มิใช่เพียงแสงเทียนริบหรี่ในห้องสมุด หากแต่เป็นอาวุธแห่งเหตุผล ที่ใช้ในการต่อสู้กับความคิดที่บิดเบือนและการใช้อำนาจในทางที่ผิด เพื่อปกป้องและส่งเสริมเสรีภาพของมนุษย์ มันคือดาบเพลิงที่ลุกโชนในสนามรบแห่งความคิดที่ช่วยให้เรามองทะลุผ่านมายาคติ ความเชื่อที่ไร้เหตุผล และการโฆษณาชวนเชื่อ ทั้งยังช่วยให้วิเคราะห์ข้อมูลอย่างมีวิจารณญาณและตัดสินใจบนพื้นฐานของหลักฐานและตรรกะ นำไปสู่การเข้าถึงความจริง ตัวอย่างที่เห็นได้ชัดคือการเซ็นเซอร์ข้อมูลข่าวสาร ซึ่งถูกใช้เป็นเครื่องมือในการบิดเบือนข้อมูล ปลุกปั่นอารมณ์ เป็นการใช้อำนาจในทางที่ผิด ปิดกั้นการเข้าถึงความจริง เพื่อควบคุมความคิดของประชาชน .
หัวใจสำคัญของปรัชญาคือ การใช้เหตุผล หลักฐาน และตรรกะ ในการแสวงหาความจริง เพื่อนำไปสู่ การตัดสินใจที่ถูกต้อง ปรัชญาฝึกฝนให้เรามีวิจารณญาณ ไม่หลงเชื่ออะไรง่ายๆ และไม่ยอมรับความคิดเห็นใดๆ โดยปราศจากการตรวจสอบอย่างถี่ถ้วน ปรัชญาสอนให้เราตั้งคำถาม เช่น ใครเป็นคนพูด ? มีหลักฐานอะไรสนับสนุน ? มีมุมมองอื่น ๆ อีกหรือไม่ ? ข้อสรุปนี้ขัดแย้งกับข้อเท็จจริงหรือหลักการพื้นฐานใด ๆ หรือไม่ ? ก่อนที่จะตัดสินใจเชื่อหรือยอมรับความคิดเห็นใด ๆ เพราะการยอมรับความคิดเห็นโดยไม่ผ่านการไตร่ตรอง อาจนำเราไปสู่การตัดสินใจที่ผิดพลาดและตกเป็นเหยื่อของการบิดเบือน .
ปรัชญายังส่งเสริมความเข้าใจในคุณค่าของเสรีภาพและความสำคัญของปัจเจกบุคคล เสรีภาพในการคิดการแสดงออกและการใช้ชีวิต เป็นสิ่งจำเป็นสำหรับการพัฒนาศักยภาพของมนุษย์ เพื่อการสร้างสรรค์สังคมที่เจริญรุ่งเรือง ปรัชญาช่วยให้เราตระหนักถึงสิทธิและหน้าที่ของตนเองในฐานะปัจเจกบุคคลและเพื่อปกป้องเสรีภาพเหล่านี้จากการถูกคุกคามจากอำนาจรัฐหรือแนวคิดแบบคติรวมหมู่ สังคมที่มีความยุติธรรมมีเสรีภาพและมีความเจริญรุ่งเรือง คือสังคมที่เคารพในสิทธิและเสรีภาพของปัจเจกบุคคลที่ส่งเสริมการใช้เหตุผลนั้น ล้วนมีรากฐานอยู่บนระบบเศรษฐกิจแบบทุนนิยม เพราะทุนนิยมเป็นระบบที่สอดคล้องกับหลักการเหล่านี้ โดยเปิดโอกาสให้ทุกคนมีส่วนร่วมในการสร้างความมั่งคั่งและเติบโตอย่างอิสระ .
ในโลกที่ความขัดแย้งทางความคิดทวีความรุนแรงและข้อมูลข่าวสารแพร่กระจายอย่างรวดเร็ว ปรัชญามิใช่เพียงทางเลือก แต่เป็นเกราะป้องกันที่ขาดไม่ได้ การศึกษาปรัชญา การฝึกฝนการใช้เหตุผลและการตั้งคำถาม คือการลงทุนที่คุ้มค่าที่สุดสำหรับอนาคต เพราะมันจะช่วยให้เรามีภูมิคุ้มกันต่อการถูกชักจูง การหลอกลวงและการใช้อำนาจในทางมิชอบ เป็นก้าวสำคัญในการสร้างสังคมที่เสรี มีความยุติธรรมและการเจริญรุ่งเรืองอย่างแท้จริง ดังนั้น เวลามีค่า…ศึกษาปรัชญา ฝึกฝนการใช้เหตุผล และอย่าปล่อยให้ความงมงายและอคติครอบงำจิตใจ เพื่อที่เราจะสามารถเป็นผู้กำหนดชีวิตของตนเองได้และใช้ชีวิตอย่างมีอิสระ มีเหตุผล และสร้างสรรค์คุณค่าตามที่เราเลือก เพื่อบรรลุศักยภาพสูงสุดของเราในฐานะปัจเจกบุคคล
Siamstr #Philosophy #ปรัชญา
-
@ 4ba8e86d:89d32de4
2024-10-11 15:18:56MAPAS HISTÓRICOS DAS REDES DE COMPUTADORES Uma série de mapas históricos da ARPANET, Internet, Usenet e outras redes de computadores, traçando como essas redes pioneiras cresceram e se desenvolveram.
A pesquisa pioneira de Paul Baran na década de 1960, que imaginou uma rede de comunicações que sobreviveria a um ataque de um grande inimigo. O esboço mostra três diferentes topologias de rede descritas em seu RAND Memorandum, "On Distributed Communications: 1. Introduction to Distributed Communications Network" (agosto de 1964). A estrutura de rede distribuída ofereceu a melhor capacidade de sobrevivência.
https://void.cat/d/LQoEpXMKVSqHgPP8MpdNaA.webp
Um esboço do mapa da possível topologia da ARPANET por Larry Roberts . O mapa foi desenhado no final dos anos 1960 como parte do planejamento da rede.
(Digitalizado de Where Wizards Stay Up Late: The Origins of the Internet , por Katie Hafner e Matthew Lyon, página 50.)
https://void.cat/d/GLMfYfU4K4GMK21VqmQ1oL.webp
No início ....
https://void.cat/d/MMrLYEjZdPK1Edc8vao6v8.webp O primeiro nó na ARPANET na University California Los Angeles (UCLA) em 2 de setembro de 1969. (Fonte: "Casting the Net", página 55)
https://void.cat/d/PFExNH9thZNtGuhAKM146Y.webp Um mapa ascii muito simples do primeiro link de rede na ARPANET entre UCLA e SRI retirado do RFC-4 Network Timetable , por Elmer B. Shapiro, março de 1969.
https://void.cat/d/SqxUWWkv9rM95ujxbToLz9.webp Até o final do ano, existem quatro nós na "ARPA NETWORK", conforme mostrado no esquema acima. Estes foram a Universidade da Califórnia em Los Angeles (UCLA), a Universidade da Califórnia em Santa Bárbara (UCSB), a Universidade de Utah e o Stanford Research Institute (SRI). (Fonte: "Casting the Net", página 56. Veja também a linha do tempo do Museu do Computador .)
https://void.cat/d/KhMyRNeCWLoEnCoNMaJuuH.webp A ARPANET cresceu rapidamente à medida que mais sites foram conectados. O mapa acima mostra a situação em setembro de 1971 e o abaixo é de outubro de 1980, que inclui um link de pacote de satélite UCL em Londres. (Fontes: "Lançando a Rede", página 64; CCR, página 93)
https://void.cat/d/BKXX9CmdA22vDjNm4S6Sju.webp https://void.cat/d/2h47fzeDRpjppZ8h4MBh8k.webp Mapas de rede lógica mapeando o crescimento de sites conectados à ARPANET no início dos anos 1970.
https://void.cat/d/6HehrpyqGZi3gRNR6Am9z9.webp https://void.cat/d/S2xnxHVdDmqczSsVJh1jXd.webp RFC-432 Network Logical Map , tem um mapa semelhante da ARPANET em dezembro de 1972.
https://void.cat/d/6qkdvUuvC1LR1BNSmg59zZ.webp O mapa acima mostra a topologia da ARPANET em março de 1977. Ele foi escaneado por Larry Press do ARPANET Completion Report , Bolt, Beranek e Newman, Burlington, MA, 4 de janeiro de 1978.
https://void.cat/d/4naQvrz53sK26S8d39vCEj.webp "ARPANET, outubro de 1980"
https://void.cat/d/Pv6hZYXNjKEJMrRxPrqzAb.webp Este mapa de aparência interessante mostra o estado do núcleo da Internet em agosto de 1987. Pode ser descrito como a "Internet em um chip" . Esta versão colorida foi fornecida por Craig Partridge.
https://void.cat/d/TxoEABfV4oT6aLCku7FohG.webp O estado da ARPANET em outubro de 1989, perto do fim de sua vida, com apenas alguns nós restantes. Foi finalmente desativado em 1990, tendo sido amplamente substituído pelo NSFNET. (Fonte: CCR, página 110)
https://void.cat/d/HktWMjS6JMTvRY9F952CwF.webp https://void.cat/d/2CVKLYe26YpGzzSMcb4VN3.webp
Mapas da MILNET (Defense Data Network) nos Estados Unidos e Europa, desde 1989. A MILNET se separou da ARPANET em 1984. (Fonte: Directory of Computer Networks , editado por Tracey L. Laquey, Digital Press, 1990).
A topologia do BITNET em 1981 (mapa parcial) https://void.cat/d/KijDBdASxbQuCTLNBEWVY7.webp
A infra-estrutura NSFNET e topologia em 1991.
https://void.cat/d/9V4ug2uViat1jzxbier6X1.webp https://void.cat/d/JqTp3Jerr6JipdP6iq6gbs.webp https://void.cat/d/VNriyNuf2nkGitBTjet1rb.webp (Fonte: NSFNET postscript maps from
https://void.cat/d/6NtYLMXaoVMcoMfZQR9na8.webp Um esboço da rede de comutação de pacotes no Reino Unido proposto por Donald Davies, um pioneiro em redes na década de 1960. (Fonte: National Archive for the History of Computing , digitalizado com permissão de Janet Abbate's, "Inventing the Internet", 1999, página 31).
https://void.cat/d/LiQ9NCHDShKnbsKXGjMpzH.webp Estes mapas mostram a estrutura da JANET , a rede acadêmica e de pesquisa do Reino Unido, em 1992. O mapa acima mostra conexões internacionais com links de 256 Kbps para a Europa e o link transatlântico "Fat-Pipe" para os EUA rodando a 768 Kbps. Não é de surpreender que a capacidade desses links tenha aumentado maciçamente desde então.
https://void.cat/d/AxbiwXJbuVnVkFPikEo3ae.webp
LINK : https://personalpages.manchester.ac.uk/staff/m.dodge/cybergeography/atlas/historical.html
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:44:52Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10.5 ounce) each condensed beef noodle, bean with bacon, and cream of celery soup
- 2 Soup cans water
- 2 TBSP chopped parsley
- 1 TBSP Worcestershire
Directions
- Combine soups and water.
- Add parsley and Worcestershire
- Heat to simmer.
-
@ 4ba8e86d:89d32de4
2024-10-24 14:03:14O Collabora Office é uma suíte de escritório baseada em código aberto que oferece uma alternativa viável e de qualidade ao popular pacote Office da Microsoft. Desenvolvido pela Collabora, uma empresa líder em serviços de consultoria e desenvolvimento de software de código aberto, o Collabora Office oferece uma gama completa de aplicativos de produtividade para a plataforma Android, incluindo processador de texto, planilha, apresentação e muito mais.
Recursos e Funcionalidades.
O Collabora Office oferece uma ampla gama de recursos e funcionalidades para dispositivos Android, comparáveis aos encontrados em outras suítes de escritório populares. Além das funcionalidades básicas, como criação e edição de documentos de texto, planilhas e apresentações, o Collabora Office suporta formatos de arquivo comuns, como o formato OpenDocument (ODF) e o formato do Microsoft Office (OOXML). Isso significa que você pode facilmente compartilhar e colaborar em documentos com usuários de outras suítes de escritório.
Uma característica notável do Collabora Office para Android é a capacidade de edição colaborativa em tempo real. Vários usuários podem trabalhar simultaneamente em um documento, visualizando as alterações em tempo real. Isso torna a colaboração em equipe mais eficiente, permitindo que os membros trabalhem juntos em projetos sem a necessidade de trocar arquivos várias vezes.
O Collabora Office para Android possui uma interface intuitiva e fácil de usar, projetada especificamente para dispositivos móveis. Isso garante uma experiência de usuário fluida e permite que os usuários aproveitem ao máximo os recursos e funcionalidades do aplicativo em seus smartphones ou tablets.
Uma das principais vantagens do Collabora Office para Android é o fato de ser baseado em código aberto. Isso significa que o software é desenvolvido de forma transparente e está disponível para qualquer pessoa utilizar, estudar, modificar e distribuir. A natureza de código aberto do Collabora Office traz vários benefícios, incluindo:
-
Custos reduzidos: O Collabora Office para Android é gratuito para download e uso, eliminando a necessidade de licenças caras. Isso é particularmente atraente para pequenas empresas e usuários domésticos que buscam uma alternativa acessível ao pacote Office tradicional.
-
Personalização e flexibilidade: Como o código-fonte está disponível, desenvolvedores e usuários avançados podem personalizar e adaptar o Collabora Office para Android às suas necessidades específicas. Isso permite criar soluções personalizadas e integrar o software a outros sistemas e fluxos de trabalho existentes.
-
Segurança: Com a comunidade de código aberto constantemente analisando e auditando o software, eventuais vulnerabilidades de segurança são identificadas e corrigidas rapidamente. Além disso, os usuários podem ter maior confiança na privacidade de seus dados, uma vez que podem verificar como o software lida com as informações.
O Collabora Office para Android é uma alternativa sólida e de código aberto ao pacote Office da Microsoft. Com recursos abrangentes, capacidade de edição colaborativa em tempo real e uma interface otimizada para dispositivos móveis, ele se tornou uma escolha popular entre empresas e usuários individuais que desejam uma solução de produtividade acessível e personalizável para seus dispositivos Android. Além disso, a natureza de código aberto do Collabora Office traz vantagens significativas, como custos reduzidos, flexibilidade e segurança aprimorada. Se você está em busca de uma alternativa confiável e gratuita ao pacote Office tradicional para Android, vale a pena considerar o Collabora Office como uma opção viável.
https://www.collaboraoffice.com/
https://github.com/CollaboraOnline/online
-
-
@ 4ba8e86d:89d32de4
2024-10-24 13:52:57Tecnologia de escalonamento #Bitcoin Layer-2 baseada no conceito de statechains, que permite que chaves privadas para depósitos BTC (UTXOs) sejam transferidas com segurança entre proprietários fora da cadeia.
Mercury Layer é uma implementação de um protocolo statechain de camada 2 que permite a transferência e liquidação fora da cadeia de saídas de Bitcoin que permanecem sob a custódia total do proprietário o tempo todo, enquanto se beneficia de transações instantâneas e de custo zero. A capacidade de realizar esta transferência sem exigir a confirmação (mineração) de transações em cadeia tem vantagens em uma variedade de aplicações diferentes.
um sistema de transferência e controle de propriedade do Bitcoin, especificamente focado em saídas de transações não gastas (UTXOs),
um resumo detalhado dos principais elementos e procedimentos do sistema:
-
Saída de Transação Não Gasta (UTXO): UTXO é a unidade fundamental que representa valor e propriedade no Bitcoin. Cada UTXO é identificado por um ID de transação (TxID) e um número de índice de saída (n) e possui duas propriedades essenciais: valor em BTC e condições de gasto, definidas em um Script. As condições de gasto geralmente envolvem uma chave pública que requer uma transação assinada com a chave correspondente.
-
Transferência de Propriedade sem Transação On-Chain: O sistema permite a transferência de propriedade de UTXOs controlados por uma única chave pública (P) de uma parte para outra sem a necessidade de executar transações na cadeia (on-chain) do Bitcoin ou alterar as condições de gasto. Isso é facilitado por um mecanismo chamado "Statechain Entity" (SE).
-
Compartilhamento de Chave Privada: A chave privada (s) para a chave pública P é compartilhada entre o SE e o proprietário. No entanto, nenhuma das partes conhece a chave privada completa. Isso requer cooperação entre o proprietário e o SE para gastar o UTXO.
-
Atualização/Transferência de Chave: A propriedade do UTXO pode ser transferida para um novo proprietário através de um processo de atualização de chave. Isso envolve a substituição do compartilhamento de chave privada do SE para que corresponda ao compartilhamento de chave do novo proprietário, tudo sem revelar compartilhamentos de chave ou a chave privada completa.
-
Transações de Backup: Além da transferência de propriedade, o sistema inclui transações de backup que podem ser usadas para reivindicar o valor do UTXO pelo atual proprietário, caso o SE não coopere ou desapareça. Essas transações são assinadas cooperativamente pelo proprietário atual e pelo SE e possuem um bloqueio de tempo (nLocktime) que permite a recuperação dos fundos em uma altura de bloco futura especificada.
-
Mecanismo de Redução do Backup de Timelock: Para limitar o número de transferências possíveis durante um período de tempo, o sistema utiliza um mecanismo de decremento do nLocktime. O usuário é responsável por enviar as transações de backup no momento adequado.
-
Cadeias Estaduais (Statechains): O sistema opera usando cadeias estaduais, que são uma camada adicional que permite a transferência de propriedade de UTXOs. O SE precisa seguir o protocolo, mas não armazena informações sobre compartilhamentos de chave anteriores.
-
Cegagem (Blinding): O servidor da camada Mercury (SE) é cego, o que significa que não tem conhecimento das moedas que está assinando. Isso é alcançado através do uso de criptografia de chave pública para ocultar informações de chave privada compartilhada entre as partes.
-
Protocolo de Camada Mercury: O protocolo detalha os procedimentos desde o depósito inicial até a transferência de propriedade, atualizações de chave, retiradas ordenadas e recuperação de backup.
-
Recuperação de Backup: Caso o SE não coopere ou desapareça, o proprietário atual pode recuperar os fundos, enviando a transação de backup quando o nLocktime for atingido.
-
Publicação de Compartilhamento de Chaves: O SE não tem acesso aos IDs de transação individuais das moedas, mas publica compartilhamentos de chaves públicas para cada moeda na lista de ativos. Essa lista é comprometida com a blockchain para provar a exclusividade da propriedade.
Este sistema é projetado para fornecer uma maneira segura e eficiente de transferir e controlar a propriedade do Bitcoin, permitindo a recuperação de fundos em caso de problemas com o servidor.
No sistema de controle de propriedade de saídas de transações não gastas (UTXOs), cada UTXO é uma chave compartilhada composta por duas partes: o proprietário e o servidor de compartilhamento. Juntos, eles colaboram para criar transações de backup com bloqueio de tempo, que transferem a propriedade da UTXO para o novo proprietário. Durante essa transferência, a chave pública compartilhada permanece inalterada, mas o compartilhamento da chave do servidor é atualizado por meio de um Protocolo de Computação Multifuncional (MPC) para se alinhar apenas com o novo proprietário. Essa atualização resulta na criação de uma nova transação de backup, direcionada à chave pública do novo proprietário, com um tempo de bloqueio mais curto.
A confiabilidade do servidor é essencial, pois ele é responsável por excluir o compartilhamento de chave anterior. Isso garante que não seja possível conspirar com os proprietários anteriores. O proprietário atual pode gastar a UTXO a qualquer momento, desde que o faça em cooperação com o servidor. No entanto, se o servidor for desligado ou desaparecer, o proprietário atual deve aguardar até que o tempo de bloqueio expire antes de enviar sua transação de backup.
É importante ressaltar que o remetente nunca possui a chave privada completa; ele possui apenas uma parte do compartilhamento. Assim, todas as transações requerem a assinatura conjunta do servidor. Quando a UTXO é transferida para um novo proprietário, o compartilhamento do servidor é atualizado para que ele não possa mais assinar em nome do proprietário anterior, apenas em nome do novo proprietário. Esse sistema de transações de backup com bloqueio de tempo é projetado para proteger contra cenários de não cooperação ou apreensão do servidor, garantindo a segurança das UTXOs e a integridade da rede.
https://github.com/layer2tech/mercury-wallet
https://mercurylayer.com/
https://twitter.com/TTrevethan/status/1689929527420387328?t=0f5oF6w_ZRjWRYGah3HX8Q&s=19
-
-
@ 4ba8e86d:89d32de4
2024-10-11 15:13:50Tutorial feito por Grom Mestre ⚡ Poste original Abaixo.
Part 1: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227366/tutorial-instalando-kleopatra-criando-primeiro-chaves-parte?show=227366#q227366
Part 2: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227377/tutorial-importando-exportando-chaves-p%C3%BAblicas-kleopatra
Part 3: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227397/tutorial-criptografando-descriptografando-kleopatra-parte
Parte 4: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/227406/tutorial-fazendo-ba
TUTORIAL DE PGP USANDO O KLEOPATRA.
Instalação do Kleopatra O Kleopatra, como citado no post anterior, está disponivel para Linux e Windows. Em Linux ele pode ser instalado facilmente através do respectivo gerenciador de pacotes da sua distribuição. Alguns exemplos de comandos para algumas distros são:
ArchLinux : sudo pacman -S kleopatra
Debian : sudo apt install kleopatra
Fedora : sudo dnf install kleopatra
O Kleopatra também está disponível como pacote em Flatpak, porém nos meus testes eu tive problemas na sua utilização. Portanto, para esse tutorial estarei usando a versão empacotada pelo Debian 12. Em Windows o Kleopatra se encontra disponível no pacote Gpg4win, o qual contém, além do Kleopatra, o GnuPG e outros utilitários que podem ser úteis.
No nosso caso nós só precisaremos mesmo do dois primeiros. O link para download do Gpg4win se encontra aqui https://www.gpg4win.org/download.html
CRIANDO O SEU PRIMEIRO PAR DE CHAVES
Ao iniciar o Kleopatra pela primeira vez a seguinte tela será mostrada caso nenhuma chave esteja presente no seu sistema. Nesse caso apenas clique em 'Novo Par de Chaves' ou acesse a opção em Arquivo -> Novo Par de Chaves OpenPGP https://image.nostr.build/26a5a8b057ade36bc2957d714cb19fc1172cf5a8d844f37f52996064019386a3.jpg
Ao clicar nessa opção a seguinte janela será aberta: https://image.nostr.build/28d2a94c44f8bd2b90eb057a3e7b603a57ce483fe24dd1c9ba8ed416d0a9b93c.jpg
Os campos 'Nome' e 'Endereço de e-mail' são apenas formas convenientes de identificar a chave. A outra forma seria decorar o fingerprint da chave, o que é algo bem inviável de ser fazer.
Marque a opção 'Proteger a chave gerada com uma senha' para que ao utilizar a sua chave ou tentar importar a chave secreta uma senha seja solicitada. É extremamente recomendado que você use senhas muito longas (+20 caracteres) com uma alta entropia para inviabilizar ataques de força bruta. Use ferramentas como o gerador de senhas do KeePassXC https://keepassxc.org/download/ para isso caso você deseje.
Clicando na botão 'Configurações Avançadas' você pode selecionar qual é o algoritmo que será usado para a criação das chaves. Nesse tutorial usaremos o algorítmo de curva eliptica, pois se trata de um método mais avançado, que gera chaves menores e computacionalmente mais eficientes. https://image.nostr.build/bdee90a538fb9923b0d325e77d1a0275261319309554d40340cc7f96c38a4d34.jpg
Nas configurações avançadas, marque as seguintes opções:
• Material da Chave : ECDSA/EdDSA usando curva ed25519
• '+ ECDH' (Elliptic Curve Diffie-Hellman) usando cv25519
• Assinatura : Necessário caso você deseje gerar assinaturas digitais
A validade da sua chave é arbitrária, mas na dúvida coloque por um périodo de dois anos a partir da data da sua criação. Se você quiser inclusive você pode configurar para que ele nuca expire. Isso pode ser alterado depois caso você deseje.
Após isso, clique em OK para fechar as configurações avançadas e em OK para iniciar a geração das suas chaves. Uma caixa de diálogo vai solicitar a inserção da senha para proteger a sua chave. Depois de inserí-la e clicando em OK aguarde alguns instantes. Se tudo ocorrer como conforme uma mensagem vai aparecer sinalizando que a chave foi gerada com sucesso. https://image.nostr.build/07ca42b77ef9dd29dabef930083e99eb16e6b2562952d930f469a5fb210b0326.jpg
Sua chave agora vai aparecer na listagem de certificados do Kleopatra. https://image.nostr.build/2fbbc351937200dc32fce7d6a44c025385da4b06d6b86edd37fbaa8f71815bae.jpg
IMPORTANDO E EXPORTANDO CHAVES PÚBLICAS NO KLEOPATRA.
2.1 Importando chaves públicas.
Agora vamos aprender como importar as chaves públicas de outros usuários presentes na internet. Para esse exemplo eu usarei a chave pública do usuário nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk presente em seu perfil.
Uma informações importante de comentar é que as chaves públicas podem ser exportadas de duas formas: como um binario ou codificada em base64. Nesse tutorial usaremos as chaves codificadas em b64, porém saibam também que elas podem estar em outro formato perfeitamente reconhecível pelo Kleopatra.
Para isso vamos abrir o Bloco de Notas do Kleopatra, um seção do programa que nos permite criptografar rapidamente pequenos trechos de texto e importar as chaves em base64.
Abra o Bloco de Notas do Kleopatra clicando no ícone de paineis do Kleopatra. https://image.nostr.build/d4ffb93f7cb034a9946d9fc62e33953b1bc9ab9ad6737e47f3f03c90a7eb96bb.jpg
Copie e cole a chave pública no campo de texto e clique em seguida em 'Importar um Bloco de Notas' https://image.nostr.build/10817763d82b4f7f9dfffb81e351ff93539214a09e2e80aa68fa7eb6a8c52b0a.jpg
Uma nova janela vai abrir nos solicitando o reconhecimento do certificado do usuário. Como nós usamos o eficiente método chamado "Confia", apenas clique em Importar para dar prosseguimento. https://image.nostr.build/b9724052f9215dfbd44cd80e45b8755c24e1db6c96a674195d538d43b11b83e6.jpg
Na janela seguinte vamos certificar a chave do Ms.Lilith usando a nossa chave privada criada anteriormente, bastando selecioná-la no campo 'Certificar com:' e clicar em 'Certificar'. Se tudo ocorrer como previsto uma caixa de mensagem vai aparecer indicando que a operação foi um sucesso. Você pode ver que agora a chave do Ms.Lilith aparece no painel de certificados do Kleopatra. https://image.nostr.build/b2bba7b0fe957f050bd4a30300d3cedce7dd2d9a42000c9bc976e578f820d7ef.jpg https://image.nostr.build/f2ec4c6efc0b5f85474f7f6350b5ae1795db226e055856f516479d8c89b7bb3c.jpg https://image.nostr.build/de42e6b1007d9bde17becd35d6c3b43c70dd6f0b0dedd6f6d195ffc7cf99f952.jpg
2.2 Exportando a nossa chave públlica
Como dito anteriormente, as chaves podem se apresentar tanto no formato binário como base64. Vamos agora exportar a nossa chave de modo que ela possa ser facilmente compartilhada em um site ao estilo pastebin. Para isso, no painel de Certificados, clique com o botão direito na sua chave e selecione 'Detalhes' https://image.nostr.build/2ed1c1ab468ae4ddc9b572a8212d28d489888817be05952143508cc4125ade94.jpg
Na nova janela, clique em Exportar, a qual vai mostrar a sua chave em formato texto que poderá ser facilmente copiada e colada no local adequado. https://image.nostr.build/99fe855e2c4915272f9f66da9cd2ee8078588bc78d13b413a7033bdc23a0bf30.jpg https://image.nostr.build/adc99c06f25d5068231f9c7ddaea37ce6d42739741d8d8405f72c0ef72fa5abc.jpg
CRIPTOGRAFANDO E DESCRIPTOGRAFANDO NO KLEOPATRA.
3.1 Criptografando e assinando arquivos
A criptografia e a assinatura de arquivos e textos usando o Kleopatra é extremamente simples e intuitiva. No nosso exemplo eu vou criptografar e assinar um arquivo de imagem usando a minha própria chave, já que usando a chave pública de outra pessoa me impossibilitaria de descriptografa-la depois. Lembre-se que você também pode usar o Bloco de Notas do Kleopatra para criptografar e assinar rapidamente textos curtos e copiá-los em formato base64.
Clique na opção 'Assinar / Criptografar'. O gerenciador de arquivos será aberto para selecionar um ou mais arquivos que você deseja criptografar. No nosso caso eu vou criptografar o arquivo de imagem do meu avatar. https://image.nostr.build/4887157ace62d508760f322c42bf457edcad7c0d86048aa8d048d8d60b87ada4.jpg https://image.nostr.build/be69a6689618b2ec42ac8fe19de3d6d8e0f1eddb67abc852251701a69e111e4e.jpg
Uma janela abrirá perguntando pelas chaves que você deseja usar para assinar e criptografar. Usarei nesse cenário a mesma chave para ambos os processos, porém em situações onde se almeja a segurança das informações entre as partes marque apenas a opção 'Criptografar para outros' e selecione as chaves das pessoas em questão. Feito as devidas seleções clique em 'Assinar / Encriptar'. Uma janela será mostrada confirmando o sucesso da operação.
Verifique o arquivo gerado no diretório do arquivo original
3.2 - Criptografando textos pelo Bloco de Notas
As mesmas operações que foram feitas com um arquivo podem ser repetidas facilmente através do Bloco de Notas. As figuras a seguir ilustram esse processo.
Primeiro escreva o texto que você pretende cifrar e em seguida clique na aba 'Destinatários'
Na aba 'Destinatários' marque a opção 'Assinar' e selecione a sua chave; desmarque a opção 'Criptografar para mim' e marque a opção 'Criptografar para outros'; clique no botão a direita do campo de endereços e selecione a chave do destinatário; clique em OK e em seguida em 'Assinar/Encriptar o Bloco de Notas'; se tudo ocorreu corretamente uma mensagem de aviso vai aparecer confirmando a operação. https://image.nostr.build/36413d5411ccdef78f79a2192e157df04fde9a52193da71484450370a3169dcc.jpg https://image.nostr.build/502182e96066e186ec2858fb5f302e413b873386b891737b4af8a61678108b6e.jpg
Verifique o arquivo gerado no diretório do arquivo original https://image.nostr.build/d99b16e664a60040965c5c6fea99b2565781f4a0530b6f20950d344958fc1751.jpg
3.2 - Criptografando textos pelo Bloco de Notas
As mesmas operações que foram feitas com um arquivo podem ser repetidas facilmente através do Bloco de Notas. As figuras a seguir ilustram esse processo.
Primeiro escreva o texto que você pretende cifrar e em seguida clique na aba 'Destinatários' https://image.nostr.build/05641dcc33576aedce283de7cfc7328597136bee6018670d334178cf1ea21a0c.jpg
Na aba 'Destinatários' marque a opção 'Assinar' e selecione a sua chave; desmarque a opção 'Criptografar para mim' e marque a opção 'Criptografar para outros'; clique no botão a direita do campo de endereços e selecione a chave do destinatário; clique em OK e em seguida em 'Assinar/Encriptar o Bloco de Notas'; se tudo ocorreu corretamente uma mensagem de aviso vai aparecer confirmando a operação. https://image.nostr.build/b3c811ace9e16e90c9d17d6e6e9cbdc22679712eb56a11998d6030c88e10bc50.jpg https://image.nostr.build/e9c0485087fdbb475965ab8782f76be0c56748383f1125c0362bc5824a88e2c8.jpg https://image.nostr.build/9b167f2e4868ef125ec9f4cde87edee56e0c10e582563282c78ac7e30776a672.jpg
Descriptografar é basicamente o processo inverso, bastando copiar o bloco de mensagem PGP no Bloco de Notas e clicar em 'Descriptografar/Verificar bloco de notas'
Descriptografar é basicamente o processo inverso, bastando copiar o bloco de mensagem PGP no Bloco de Notas e clicar em 'Descriptografar/Verificar bloco de notas' 3.3 - Descriptografando arquivos
Descriptografar é tão simples quanto criptografar arquivos e textos, bastando clicar na opção Descriptografar / Verificar e selecionar os arquivos em questão. Só lembrando que todas essas operações podem ser executadas a partir do Bloco de Notas do Kleopatra para a sua conveniência. https://image.nostr.build/dc9d62a58e28dd192f937be33b4e0a487bb22a340f8dc1b34108b8a345eae0b2.jpg https://image.nostr.build/50ab5e3b0166513f2b0d0277b929c3c5501e19adf579abc7b8c6978b7d99e93d.jpg https://image.nostr.build/2bd0eb41988d2035de7680ca5055d86b7f72c7cf7b8dd674f6b24bfcada3c1a0.jpg
FAZENDO BACKUP DAS CHAVES SECRETAS E CHECKSUMS.
4.1 - Fazendo backup da sua chave privada
AVISOS!
1 - É de suma importância que você tenha ao menos duas cópias de backup da sua chave privada devidamente protegida em mídias de tipos distintos. Um exemplo seria ter uma cópia em um pendrive e outra no seu celular dentro de um contêiner criptografado com LUKS2, Veracrypt ou até mesmo chaveiros do KeePassXC.
2 - Em hipótese alguma coloque as suas chaves na nuvem em texto plano, pois já é de conhecimento público que Google, Microsoft, Apple e afins, por mais que criptografem seus dados nos servidores, possuem cópias da chave e usam-nas para diversos fins como análise de tráfego, indexação de conteúdo, coleta de analytics e entre outros. Vocês podem conferir detalhes dessa brecha para o OneDrive abaixo:
Microsoft OneDrive: https://privacy.microsoft.com/en-us/privacystatement [Archive.org]: Productivity and communications products, “When you use OneDrive, we collect data about your usage of the service, as well as the content you store, to provide, improve, and protect the services. Examples include indexing the contents of your OneDrive documents so that you can search for them later and using location information to enable you to search for photos based on where the photo was taken”.
Feito as considerações iniciais, vamos dar prosseguimento ao tutorial.
Abra o painel de certificados do Kleopatra, clique com o botão direito na sua chave e seleciona a opção 'Backup das chaves secretas'. https://image.nostr.build/c395ac3e1a0c079ac0fd9df505e1192fa323c67073c17cc984bef707dfa87214.jpg
Selecione o nome do arquivo de destino e clique em Salvar https://image.nostr.build/820b4d1eade32f4d5d985b91a0e76b083bb2e4c255f5dfd3c310036c87a33366.jpg https://image.nostr.build/a06c64da448deec7d159730a772b74149c738a79560add5586f7ae3e5282c1f1.jpg
Eventualmente a senha da sua chave poderá ser solicitada, mas nesse caso ela não foi pois a senha dela estava armazenada em cache. Reforçando: não coloque suas chaves secretas em um local inseguro.
4.2 - Checksum de arquivos
Operações de checksum são de suma importância quando desejamos verificar a integridade de um arquivo enviado pela internet ou verificar se os arquivos foram modificados durante o processo de transferência. Pense em casos no qual adversários realizam a interceptação dos seus arquivos pela rede e trocam-no por arquivos maliciosos contendo um malware. A checagem de checksum nos permite verificar essas alterações através de algoritmos de hash, que geram um número de tamanho fixo que muda mesmo que um único bit seja alterado no arquivo original. Por padrão o Kleopatra usa o sha256sum, o que é forte o suficiente para evitar colisões de hash, mas há algoritimos mais modernos como sha512sum que podem ser mais adequados.
Gerar um checksums no Kleopatra é muito simples. Basta selecionar a opção 'Arquivo -> Criar os arquivos de soma de verificação', selecionar o arquivo do qual você deseja gerar um checksum e salvar. https://image.nostr.build/dc17d84a2135b75154f05df0bdc2c42f4b3e2dafc944bf5476456aa2356389bc.jpg https://image.nostr.build/ee12b502148c2a49885d0989a3514a8c8fe65c85834dc8e98c8fa78c9efbb271.jpg https://image.nostr.build/17adbfa0ec4ad2b6ea116bf2796c734d7bfda22e8f6b48439b1eff4a57c779dc.jpg
Para verificar o checksum, basta ir em 'Arquivo -> Verificar arquivos de soma de verificação', selecionar o arquivo sha256sum.txt. Se a soma estiver correta o Kleopatra irá retornar um sinal positivo. https://image.nostr.build/3f6c0c537adb56490190cc00034ad911e7ea10c9cc0991ec8c93b48492080d09.jpg https://image.nostr.build/328823bfeae98a8c423371fe4bb484a85c2f9fdd6bae8b7c750af2f58781ab74.jpg https://image.nostr.build/62f7b644993677149f2a6b0320df3b9b01f9d07178222c8684542dbbb0e84108.jpg
Um processo que também é realizado em paralelo ao processo de checksum é a geração da sua assinatura digital, já que esse também pode e será alterado por um agente malicioso para evitar suspeitas. É muito comum que desenvolvedores de distros Linux forneçam além do checksum a assinatura desse checksum para evitar essas falsificações.
4.4 Considerações finais
Com isso eu finalizo esse breve tutorial de uso do PGP através do Kleopatra. Espero que façam bom uso dos conhecimentos adquidos aqui e busquem conhecer mais dessa ferramenta. Alguns recursos como smart cards, publicação de chaves públicas em keyservers e outros não serão citados aqui. Deixo isso para vocês pesquisarem por conta própria por não serem triviais. Espero em breve ver mais usuários do fórum conscientes da importância dessa ferramenta na internet em geral.
Até a próxima. Пока Пока Grom.
-
@ 9e69e420:d12360c2
2024-10-24 13:10:08Kamala Harris delivered a sharp critique of Donald Trump, comparing him to Adolf Hitler during a recent speech. She referenced comments made by former Chief of Staff John Kelly, who disclosed that Trump expressed admiration for Hitler while in office.
![Kamala Harris] (https://i.nostr.build/iyRm5cJo9YuRgh3M.png)
Harris stated, "It is deeply troubling and incredibly dangerous that Donald Trump would invoke Adolf Hitler."
She warned that if re-elected, Trump could seek unchecked power and compare him to a dictator. Harris emphasized the importance of understanding Trump's intentions and the implications for America’s future. Her remarks coincided with the fast-approaching election, intensifying her campaign's rhetoric against Trump.
-
@ 6bae33c8:607272e8
2024-10-11 15:02:11It’s been a bad season so far, 9-15-1 through five weeks, and I really haven’t been unlucky. Sure there were some tough beats, but the better barometer is whether you’re on the right side of blowouts, and I haven’t been. It is what it is, and there’s still Q3 and Q4 to make some money. After I went 2-3 last week, Q2 is pretty much over.
But I’m still gonna make my picks:
Jaguars +2 vs Bears (London) — Trevor Lawrence played much better last week, and the Bears are missing some key pieces in the secondary. Plus Jacksonville is used to making this trip
Ravens -6.5 vs Indigenous Peoples — The Peoples have been killing me of late, but they haven’t faced anyone really good yet, and the Ravens qualify, on both sides of the ball. I the IP get a dose of reality.
Colts +2.5 at Titans — It probably hurts that Anthony Richardson is likely to start, but I still think he’s better than Will Levis. This was my fifth choice among the games.
Chargers -3 at Broncos — The Chargers should be healthier off the bye, and the Broncos make for a good sell high.
Falcons -6 at Panthers — The Panthers are a doormat, and the Falcons seem to have finally found their rhythm with Kirk Cousins.
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:41:04Chef's notes
Add cooked rice to stretch. Serve with celery for crunch. Top with Parmesan cheese for a nice change. You can also use red or yellow sweet peppers instead of or along with the green peppers.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 TBSP Chopped green pepper
- 2 TBSP Chopped onion
- Dash oregano
- 2 TBSP butter
- 1 Can (10.5 ounce) condensed tomato soup
- 1 Soup can Water
Directions
- Cook green pepper, onion, oregano in butter until tender.
- Add soup, and water.
- Heat till simmer, stirring often.
-
@ 4ba8e86d:89d32de4
2024-10-11 14:23:07Ele foi projetado para minimizar o rastreamento e a impressão digital, oferecendo uma alternativa para navegar na internet com mais privacidade, além da Rede Tor. O navegador possui a mesma qualidade de privacidade do Tor Browser e pode ser usado em conjunto com uma VPN confiável.
A Mullvad VPN AB, proprietária do navegador, faz parte da empresa-mãe Amagicom AB, cujo nome é derivado da palavra suméria "ama-gi", que significa "liberdade" ou "voltar à mãe" no contexto da escravidão. A empresa acredita em uma internet livre, livre da vigilância em massa e da coleta de dados indiscriminada.
Essa abordagem é baseada na convicção de que a coleta excessiva de dados e a vigilância em massa têm consequências negativas para o desenvolvimento da sociedade. A empresa defende uma internet onde todos tenham direito à privacidade, liberdade de expressão e resistência à censura. Acreditam que a privacidade é a base de uma sociedade próspera e livre, e que a vigilância em massa leva ao controle totalitário.
O Mullvad Browser foi desenvolvido com o objetivo de promover a liberdade na internet, oferecendo aos usuários uma opção de navegação com foco na privacidade e minimização da coleta de dados. Ele é uma alternativa para aqueles que desejam proteger sua privacidade online, juntamente com o uso de uma VPN confiável.
Uma das principais características do Mullvad Browser é sua forte proteção contra impressões digitais, semelhante à do Projeto Tor. A ideia é que todos os usuários do navegador apareçam como um só, minimizando assim a coleta de dados e a identificação individual.
O navegador também possui recursos de privacidade, como modo de navegação privada ativado por padrão, bloqueio de rastreadores de terceiros com o uBlock Origin e ausência de telemetria, ou seja, não há coleta de dados exclusivos para melhorar o desempenho do navegador.
O Mullvad Browser segue um modelo de negócio transparente, sem intenção de ganhar dinheiro com o próprio navegador. Em vez disso, a empresa visa gerar receita por meio do serviço VPN do Mullvad. A privacidade é colocada em primeiro lugar, tanto pela Mullvad VPN quanto pelo Projeto Tor, e ambos têm histórico comprovado nesse sentido.
https://github.com/mullvad/mullvad-browser
https://mullvad.net/pt/download/browser/linux
https://mullvad.net/pt/browser
-
@ ff6187a2:ddbe1be7
2024-10-24 12:54:45Happy Halloween
-
@ 472f440f:5669301e
2024-10-11 14:20:54As we sprint toward the 2024 US Presidential election the case for using bitcoin as an asset to store value for the long term has never been stronger. The insanity of the incumbent power structure is being laid bare and it is becoming impossible to ignore the headwinds that the Borg faces moving forward.
Yesterday morning and earlier today it became clear that inflation is rearing its head again. Not ideal for the soft landing Jerome Powell and Yellen are signaling to the markets after the first Fed Funds rate cut in years.
It seems like the yield curve predicted this earlier this week when it inverted after a temporary normalizing period after the Fed's rate cut. Futhermore, it is becoming glaringly obvious that running historically high fiscal deficits while interest rates were at multi-decade highs was a pretty bad idea. As James Lavish points out, the data from the CBO earlier this week shows that the US federal government is running a deficit that is 13% higher than it was last year. This is at a time when real wages are still depressed, inflation is still suffocating American consumers and the private sector job market for American citizens is cratering.
Speaking of the job market, the numbers that came in yesterday were worse than expected: The effect of Hurricane Helene should certainly be taken into consideration when looking at this jobs miss. However, even with the miss we know that these numbers have been under reported for years to make the economy seem healthier than it actually is. Even with Helene's effect taken into consideration this print will likely be revised higher 3-6 months from now.
All of this points to a breaking point. A breaking point for the economy and, more importantly, a breaking point for overall confidence in the US government and its ability to operate with any semblance of fiscal responsibility. The chart that Pierre Rochard shares in the tweet at the top of this letter is the only chart that matters for anyone attempting to gauge where we find ourselves on the path to bitcoin realizing its full potential.
There is $133 TRILLION worth of value sitting in global bond markets. Bitcoin is a far superior asset to store one's wealth in. Bond markets are beholden to the whims of the actors who issue those bonds. In the case of the US Treasury market, the largest bond market in the world, the US government. And as we have pointed out above, the US government is recklessly irresponsible when it comes to issuing debt with a complete inability to pay it back on the long-term. Inflation is up, the jobs market is cratering for the native born Americans who actually pay taxes, and the push toward a multi-polar geopolitical landscape is becoming more pronounced by the day. All of this points to a long-term weakening in demand for US treasuries.
The only way out of this mess is to overtly default on this debt or inflate it away. The latter will most certainly be the route that is taken, which positions bitcoin extremely well as people seek the confines of an asset that cannot be debased because it cannot be controlled by a central authority. The levels of sovereign debt in the world are staggering. Do not let the bitcoin price consolidation of the last six months lull you into a state of complacency. Even the results of the Presidential election won't have a material effect on these dynamics. Though, a Donald Trump presidency would certainly be preferable if you prefer to see relatively sane policy enacted that would provide you with time to find safety in bitcoin. But, in regards to this sovereign debt crisis, that is the only benefit you can hope for; more time to prepare. I'll leave you with some thoughts from Porter Stansberry:
"We are about to see the final destruction of the American experiment. Every economist knows this (see below) is correct; but nobody is going to tell you about it. I’ll summarize in plan English: We are fucked.
-
Debt is growing much faster than GD and interest expense is growing much faster than debt; and the real growth in entitlement spending hasn’t even begun yet.
-
Progressive taxation means nobody will ever vote for less spending + the combined size of government employees and dependents, there’s no way for America’s actual taxpayers (about 20m people) to ever win an election, so the spending won’t stop growing and, ironically, inflation will make demands for more spending to grow.
-
Inflation undermines both economic growth and social cohesion. The purple hair man-women weirdos are only the beginning; what comes next is scapegoating jews, blacks, immigrants and a huge increase in violence/domestic terror.
Get ready America. This election has nothing to do with what’s coming. And neither Trump nor Kamala can stop it.
Our experiment in freedom and self-government died in 1971 (when all restraint on government spending was abandoned with the gold standard.) You can only live at the expense of your neighbor until he runs out of money.
And that day is here."
Final thought... I hope my tux still fits for this wedding. Enjoy your weekend, freaks.Use the code "TFTC" for 15% off
-
-
@ 9e69e420:d12360c2
2024-10-24 11:51:32Dr. Johanna Olson-Kennedy, a leading advocate for trans youth care, withheld a $10 million study funded by taxpayers on the effects of puberty blockers, which found no improvement in mental health among participants.
She feared the findings would be "weaponized" against transgender care. Critics argue that her decision violates research standards and denies vital information to the public. The study tracked 95 children, revealing that 25% had mental health issues prior to treatment, contradicting Olson-Kennedy's claims of good overall mental health. Experts stress the importance of publishing research regardless of outcomes.
Sauce: https://nypost.com/2024/10/23/us-news/doctor-refused-to-publish-trans-kids-study-that-showed-puberty-blockers-didnt-help-mental-health/
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:35:35Chef's notes
Serve with crackers
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- ¼ Cup Spam
- 1 TBSP butter
- 1 Can (10.5 ounce) gumbo soup
- 1 Soup can water
- Dash Tabasco
Directions
- Brown Spam in butter.
- Mix gumbo, water, and heat to simmer.
- Add Spam.
- Tabasco to taste
-
@ 4ba8e86d:89d32de4
2024-10-11 14:08:50Foi criado com o objetivo de fornecer aos usuários uma experiência de navegação mais privada e segura na internet. O LibreWolf é uma excelente alternativa ao Firefox, com algumas diferenças significativas em relação ao navegador da Mozilla.
O LibreWolf foi desenvolvido com foco na privacidade e segurança do usuário. Ele bloqueia rastreadores de terceiros, impede o envio de dados de telemetria e desabilita recursos de rastreamento de usuário que vêm ativados por padrão no Firefox. Além disso, ele vem pré-configurado com diversas extensões de privacidade, como uBlock Origin, Privacy Badger e HTTPS Everywhere, que ajudam a bloquear anúncios, scripts maliciosos e outras ameaças de segurança enquanto você navega na web.
Outra característica notável do LibreWolf é que ele usa o mecanismo de pesquisa Searx como padrão, em vez do Google. O Searx é conhecido por fornecer resultados de pesquisa mais privados e anônimos, sem rastrear as suas atividades online. O LibreWolf também possui suporte nativo ao Tor, que permite aos usuários acessar a internet anonimamente.
Além dos recursos de privacidade e segurança, o LibreWolf é muito semelhante ao Firefox em termos de usabilidade e funcionalidades. Ele é fácil de instalar e configurar, e possui um grande número de extensões disponíveis na sua loja de extensões.
O LibreWolf é uma excelente opção para usuários que buscam um navegador mais privado e seguro. Se você se preocupa com a sua privacidade online, vale a pena experimentar o LibreWolf. Ele é gratuito e de código aberto, o que significa que você pode baixá-lo e personalizá-lo de acordo com suas necessidades específicas.
https://librewolf.net/
https://github.com/librewolf-community
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:30:47Chef's notes
Trim down bread to fit serving bowl, if necessary, prior to broiling. Try using a biscuit cutter for perfect bread rounds. A cookie cutter could be used to treat children.
The addition of the vegetable juice creates a fuller flavor than the previous onion soup recipe.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10.5 ounce) condensed onion soup
- 1 Soup can water
- ½ Soup can V8 juice
- 2-3 slices French, or Italian bread, or Texas Toast
- Butter
- Parmesan cheese
Directions
- Combine soup and water.
- Heat to simmer.
- Place bread on baking sheet, butter, and top with cheese.
- Broil bread until browned.
- Ladle soup in bowl
- Top soup with bread
-
@ 45bda953:bc1e518e
2024-10-24 11:31:16Revelation Chapter 2:17
“He who has an ear, let him hear what the Spirit says to the churches. To him who overcomes I will give some of the hidden manna to eat. And I will give him a white stone, and on the stone a new name written which no one knows except him who receives it.”
Revelations is a mysterious book with some verses that seems to make very little sense.
Q: Why do we need names? A: To identify ourselves.
Same reason nature opted for us to have uniquely identifiable faces. But a name no one knows except him who receives it? Why would you need that?
When you are born you have very little in the way of personality and character. Doctor exclaims, “It’s a boy!” First verifiable identifier is recognised. One newborn baby looks very similar to another. For that reason they can accidentally be mixed up and given to the wrong mother at the hospital. But if the mother knows that she birthed a boy she would immediately know something is amiss if she gets handed a newborn girl. Gender is important as the first verifiable, unique identifier of the new being.
The newly confirmed male child gets issued a verbally spoken and symbolically scripted identifier. This identifier is known as a name. Name and surname please. These identifiers are of little consequence to the being who knows only feelings of pain and sensations of comfort. The survival of the biological spawn is dependant on the instinct to suckle and the tendency to cry at slight discomfort. This is the language of human instinct to cry and suck. As the toddler develops it starts to respond to the vocally repeated identifier (known as a name) to the point where it has been sufficiently trained to respond to the verbal enunciation of it. When you call for someone you are evoking hope that the entity being called to will respond by coming to your physical location so that you can share or enquire information. When the summons is answered by presence you maintain connection not by repetition of the name but by eye contact and directing conversation to the face of the person. The face being the most accurate point with which to verifiably establish identity.
In the book of Genesis Jacob is able to fool Isaac (His father) by exploiting his bad eyesight to steal an inheritance blessing from his older brother Esau. The face of Jacob was obscured through Isaac’s blindness which gave a false signal to the issuer of a blessing.
As our proverbial John Doe grows up he develops a personality and character which allows for people to gauge the levels of trust they are willing to risk on him. Character and personality are also unique identifiers. Mother knows best at who will be diligent when keeping their rooms clean and whose rooms she will have to clean for them. She can through experience predict outcomes using knowledge of character and personality as a reference. This information is valuable and can only be established or measured when there is an ongoing relationship where trust and responsibility are continuously tested and stressed.
We all have identifiers that are publicly displayed wherever we go.
: Physical appearance, Wedding ring, Tatoo
We have identifiers that represent or address us verbally and textually.
: Names, titles, seals, signatures, handwriting et cetera.
Ambiguous identifiers
: Left handed, smoker, married, divorced, affiliations, church, political views, phone number, address, favourite colour, drivers license ad infinitum.
In this digital world our identifiers are all exploitable by a large number of unidentifiable bad actors. This is weakness. If you are a man of character and strength but have no control over your identity. You are weak and defenceless in the eyes of these virtually indistinguishable, androgynous scammers, fraudsters, monopolies and governments.
We have to take digital sovereignty over our digital identities. That means we have to train our minds in the establishment of truth. The truth being...
Be true to thine self and let the truth about you be established by you. That means abandoning trust in third parties and know that no one is coming to save you and protect your personal data. Like there is no spoon in the matrix, there is also no institution who loves you enough to protect your identity in a digitally encrypted world. In some cases they might be legally obligated to, but who will take responsibility and how do you quantify and reverse the damage of leaked information. You don’t. No justice for the slave.
The spoon is a lie. It simply does not exist.
Revelation Chapter 2 verse 17
“He who has an ear, let him hear what the Spirit says to the churches. To him who overcomes I will give some of the hidden manna to eat. And I will give him a white stone, and on the stone a new name written which no one knows except him who receives it.”
If you have an identifier that only you know about then you have a private key. You can verify your holdings of assets. You can prove your identity on nostr. You can own not only the data but prove you are the source of it.
Anything that a trusted third party is currently doing for you, analog or digital is systemically being open sourced and you could do it for yourself with the press of a button. All you need is a white stone with a name on it no one else knows and be willing to carry the responsibility. You could then selectively reveal yourself to the world and prove it is you without exposing the you that is private. I will give an example to help you understand the power.
John 19:31–42
31 Therefore, because it was the Preparation Day, that the bodies should not remain on the cross on the Sabbath (for that Sabbath was a high day), the Jews asked Pilate that their legs might be broken, and that they might be taken away. 32 Then the soldiers came and broke the legs of the first and of the other who was crucified with Him. 33 But when they came to Jesus and saw that He was already dead, they did not break His legs. 34 But one of the soldiers pierced His side with a spear, and immediately blood and water came out.
One thing is certain, Jesus was verifiably dead. The Romans, Jews and disciples who were present at the execution and burial all concurred. He is dead. Deceased. Gone from the realm of the living. Roman soldiers were veritable experts at death and declaring the dead so.
A few days later some disciples were proclaiming excitedly about Jesus being alive. A certain guy named Thomas would not be had. You guys are crazy, trying to establish some weird cult by pretending a fantastic impossibility. Nope. They were adamant. He lives. They claimed, like a bunch of fanatics. Thomas, being the voice of reason says the following.
John 21:25
25 The other disciples therefore said to him, “We have seen the Lord.” So he said to them, “Unless I see in His hands the print of the nails, and put my finger into the print of the nails, and put my hand into his side, I will not believe.”
Thomas was a real Bitcoiner. He does not trust, he verifies.
Verification in progress.
The body of Jesus, should he have been alive will have been littered with scar tissue all across his back and legs. It would have been easy for Him to selectively reveal his identity to whoever he chose by exposing his body and letting them verify the proof of his identity without doubt. No one in world history has ever committed suicide by flogging and crucifixion so you cannot even fake or repeat it if you wanted to commit identity theft and pretend to be the Christ.
A proof of work hash in history so profound that civilisations collapsed on the realisation of its profundity. Another consequential exposition of identity verification is also expounded on by the gospel accounts.
Matthew 24:5
“For many will come in My name, saying, ‘I am the Christ,’ and will deceive many.
Eric Cason on the "What Bitcoin Did" podcast said that he thinks Bitcoin is a messianic event. I agree with him. Liberation from economic tyranny is messianic if a figure initiates the salvation process.
That would suggest that there will be messianic implications, namely identity fraud of messiah with the intent to deceive and extort.
Matthew 24:23
23 “Then if anyone says to you, ‘Look, here is the Christ!’ or ‘There!’ Do not believe it.
We have ourselves an example of this in Craig Wright who claims to be Satoshi Nakamoto. Yet he refuses to verify it by transferring Genesis bits. Like Thomas demands to see the scars of crucifixion so too must we demand to see on chain movement of Genesis coinbase block reward as proof of identity and proof of work from anyone who publicly makes a claim to the person of Satoshi Nakamoto. Historic records in the future might mark this dispensation, BWP (Before white paper) and ASN (After Satoshi Nakamoto) or something of this nature could stand in the annals of history, marking a era of mankind similar to BC, Before Christ and AD, anno domini, the year of our Lord.
Jesus is yet to give me a secret name like Satoshi already did.
Which leaves me wondering…
The simulacral spectre created by Satoshi is an ongoing rabbit hole,
I have no doubt.
...
bitbib
-
@ c0f9e286:5a223917
2024-10-24 09:37:21ตอนที่แล้วได้กล่าวถึงการตั้งบริษัท Holding Company เพื่อนำมาถือหุ้นในบริษัทลูก จุดประสงค์นอกจากจะเป็นการประหยัดภาษีแล้ว ยังง่ายต่อการควบคุม เนื่องจากแบ่งสัดส่วนการถือหุ้นกันตั้งแต่ต้น ซึ่งหากถือในนามบุคคลธรรมดาย่อมปกปิดตัวตนที่แท้จริงไม่ได้ ดังนั้นหลายๆบริษัทจึงนิยมตั้ง Offshore Holding (Holding ที่ตั้งในต่างประเทศ) เข้ามาถือหุ้นบริษัท Holding ในประเทศอีกทีหนึ่ง
นั่นแปลว่าวุ่นวายกับการตั้งบริษัท Offshore Holding แค่ครั้งเดียว หลังจากนั้นก็นำมาถือหุ้นใน Holding ในประเทศเพื่อเป็นเจ้าของทุกๆบริษัทในเครือ ซึ่งมีอำนาจควบคุม บังคับบัญชา และสั่งการโดยไม่จำเป็นต้องเปิดเผยตัวตนที่แท้จริง
ส่วนถ้าจะถามว่าไปตั้ง Offshore ประเทศไหนดี อันนี้ขึ้นกับวัตถุประสงค์ของแต่ละท่าน ซึ่งไม่มี One Size fits all บางคนตั้ง Offshore มาเพื่อรับเงินก้อนใหญ่จากการขายหุ้น และไม่ได้ต้องการปกปิดตัวตนอะไรมากมายก็อาจจะไปตั้ง Offshore ที่ Hong Kong หรือ Singapore
แต่ถ้าวัตถุประสงค์ต้องการที่จะปกปิดตัวตน อาจจะไปตั้งในประเทศอย่าง Seychells, Vanuatu, Mauritius หรือ BVI เป็นต้น ซึ่งประเทศเหล่านี้มักมีนโยบายไม่เปิดเผยตัวตนของบุคคลที่เป็นเจ้าของหุ้นในบริษัท และที่สำคัญ ประเทศเหล่านี้บางทียอมให้นิติบุคคลต่างประเทศเข้ามาเป็นผู้ถือหุ้นได้ 100% (กฎหมายไทยในการตั้งบริษัทต้องมีผู้ถือหุ้น 2 คนขึ้นไป และหากไม่มีโรงงานในไทย หรือได้รับสิทธิ BOI ต่างชาติสามารถถือหุ้นได้ไม่เกิน 49%)
ดังนั้นหาก Offshore Company 1 ชั้นยังไม่พอ คุณก็ตั้ง Offshore ไปเลย 2 ประเทศเช่น ผมอาจจะตั้ง Offshore แรกที่ Vanuatu ซึ่งผมถือหุ้น 100% (ในนามบุคคล) แล้วจึงไปก่อตั้งอีก 1 บริษัทอีกแห่งที่ Seychells โดยให้ Vanuatu Offshore เข้าไปถือหุ้น 100% ในนามบริษัท แล้วผมจะนำ Seychells Offshore มาถือหุ้นใน Thailand Holding อีกทีหนึ่ง ซึ่งหาก Thailand Holding ไม่ได้มีโรงงาน หรือได้รับสิทธิ BOI แปลว่า Seychells Offshore จะเข้าไปถือหุ้นได้ไม่เกิน 49% ส่วนอีก 51% คุณควรหานอมินี หรือคนในครอบครัวที่ไม่ได้กังวลเรื่องความเป็นส่วนตัวเข้ามาถือหุ้นแทน และอาจจะจำกัดสิทธิออกเสียงผ่านกลไกการถือหุ้นบุริมสิทธิ์แทน เอาเป็นว่าเดี๋ยวจะงง แต่ให้เข้าใจไว้ว่า 51% ที่ถือหุ้นแทนมีช่องทางที่ทำให้เสียง Vote หรือสิทธิในการรับเงินปันผลน้อยกว่าฝั่ง 49% ซึ่งเดี๋ยวจะหาเวลาอธิบายเรื่องนี้โดยละเอียดอีกครั้งหนึ่ง
แปลว่าหากทางรัฐบาลไทยตรวจสอบรายชื่อผู้ถือหุ้นหรือทรัพย์สินของคุณ หากใช้การถือทรัพย์สินแบบนี้ย่อมไม่มีทางที่รัฐจะรู้เลยว่าคุณเป็นเจ้าของทรัพย์สิน หรือกิจการอะไรกันแน่ และหากรัฐบาลไทยต้องการตรวจสอบจริงๆ การจะไปตรวจพิสูจน์ว่าใครถือหุ้น หรือมีสิทธิในการครอบงำบริษัทจะเป็นเรื่องยากมาก
ซึ่งหากคุณคิดว่านี่ยังเป็นส่วนตัวไม่พอละก็… แน่นอนมีวิธีที่จะเพิ่มความเป็นส่วนตัวมากขึ้นกว่าเดิม ซึ่งมีอีก 2 วิธี และสามารถนำมาใช้ร่วมกับวิธีนี้ได้ ส่วนจะเป็นวิธีอะไรนั้น รอติดตามตอนต่อไป
Own Nothing and be Happy ในแบบฉบับ Elite เป็นไงบ้างครับ เริ่มเห็นภาพหรือยังว่าทำไมตระกูลดังๆอย่าง Rothschild สามารถปกป้องความเป็นส่วนตัวของพวกเขาไว้ได้โดยที่คนนอกไม่รู้เลย ก็เพราะเครื่องมือแบบนี้ไง
realeakkrit #siamstr #privacy
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:25:20Chef's notes
Try using a biscuit cutter for perfect bread rounds. A cookie cutter could be used to treat children.
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10.5 ounce) condensed onion soup
- 1 Soup can water
- 2-3 slices French, or Italian bread, or Texas Toast
- Butter
- Parmesan cheese
Directions
- Combine soup and water.
- Heat to simmer.
- Place bread on baking sheet, butter, and top with cheese.
- Broil bread until browned.
- Ladle soup in bowl
- Top soup with bread
- Trim down bread to fit serving bowl, if necessary, prior to broiling.
-
@ e88a691e:27850411
2024-10-11 13:17:16An opinionated guide to Sauna.
Introduction
Updated from the Sauna, October 7th 2024
After years of experimenting with different sauna types, I’ve developed strong opinions on the subject. The purpose of this article is to share these opinions with anyone who is interested in them and, hopefully, help others get more out of their sauna experience.
I’m certain my opinions will offend some, including all the people who (in my view) are doing it wrong. I know that saunas are important to many cultures around the world and that my strongly held opinions may offend some of those cultures.
Mind you, although I grew up in South America, I do have a fair amount of slavic blood in me. When I was a child, my grandfather regularly took me with him to the shvitz. One of my fondest memories from this time was the “Scottish Bath”, which involves standing against the sauna wall, execution-style, so that someone can spray you with freezing water from a high pressure hose. I’ve never heard of this outside of South American and can’t attest to whether it has any real Scottish origins.
The various health claims about using a sauna are beyond the scope of this article. All I have to say is that, like many things in my life, like Bitcoin, the meat/keto diet, and fasting, I find sauna to be yet another cheat code to life: it’s a simple thing that just makes life a lot better. If you want a good primer on scientific health benefits of sauna, I recommend starting with this article by Rhonda Patric. She goes in depth.
To be clear, it should go without saying that I am not a medical expert or professional. None of the opinions below are, or should be interpreted as, medical advice. There are many people for whom sauna use is not recommended. It would be prudent for any sauna user to consult with his or her doctor before entering a sauna.
Thanks to S. for taking the time to do a very helpful first review of this article. And thanks to The Wife for helping make my words legible and helping me make time to sauna–I don’t know which sacrifice was bigger.
Banya or Nothing
When I talk about saunas, I’m talking about a sauna with a stove, either wood or electric, that allows for steam. I call this “Banya style”. To be clear, I’m distinguishing between saunas and steam baths. Steam baths have their own place, but they aren’t my thing and I don’t consider them saunas.
A breakdown of the main types of saunas may be helpful, so you know which to avoid:
- Wet saunas, which are typically cedar rooms with wood burning or electric stoves onto which you throw liquid to create steam (I call this “Banya style”);
- Dry saunas, which are typically cedar rooms with wood burning or electric stoves without added steam (like Korean style saunas); and
- Infrared saunas, which, unlike traditional saunas, don’t heat the surrounding air. Instead, they use infrared panels to warm your body directly.
In my opinion, it’s Banya style or nothing. I’m not a huge fan of dry saunas, and I don’t even bother with infrared saunas. Infrared is a fiat-shitcoin. I want steam!
How to Sauna
Sauna Etiquette
If you read no other part of this already-too-long-article, read this.
Saunas are social places. There are proper ways of being in a sauna with others, and there are ways to do it wrong. You don’t want to be the person who ruins it for everyone. Here are some important etiquette tips:
Silence vs. Chatting: It’s not a question of whether you have to stay silent in a sauna or if it’s ok to talk. It depends on the circumstances and who else is around. If you’re using a sauna that isn’t your own, ask the staff about the preferred custom. The noise level in a sauna differs depending on the group in the sauna at a particular time. If you do want to chat with others, there’s nothing wrong with that. But, pay attention to whether there are others in the sauna who'd prefer it quiet. And definitely do NOT be obnoxiously loud – yes, I’m looking at you bachelor(ette) group who just discovered the Russian Banya.
Coming and Going: People rotate in and out of the sauna at different paces, so there will be people coming and going during your shvitz. But there are ways to come and go that are considerate and proper.
Keep the f-ing door closed (which was the working title of this article). Once you leave, don’t come back inside moments later. Doing so disturbs your fellow sauna users, lets out the all-important steam, and prevents the sauna from reaching an appropriate temperature.
If you’re in the sauna with a group of friends, try to coordinate your comings and goings so you’re all on the same cycle.
If you can only last 5 min at a sauna, don’t go in too often at the risk of ruining it for others (assuming it’s not your own private sauna).
Be fast when closing the sauna door when you come or leave. Otherwise, you will get dirty looks from others and may even hear mumbles of “quick quick, fast fast” from a Gray Beard. And you will deserve it.
Never open the door right after someone puts water on the stove to make steam. It’s all about the steam. Don’t waste it.
Controlling the heat: if you can’t handle the heat in the sauna, don’t just turn the heat down, because it ruins it for others. Instead, go to a lower bench or get out and take your break. Saunas are meant to be hot. That’s the whole point.
Personal Hygiene: Shower before you go into the sauna. Don’t wear perfume, smelly deodorant, or fragrant lotions. Smells get amplified in a sauna. Have a towel under you, don't leave your drippings behind. Best yet, make a Z with your towel, this covers your butt and down under your feet.
Clothing: sauna is not a place for wearing clothing. It is a place to get back to nature. If you are shy, just wrap a towel around yourself. People ask if I don't feel awkward, the answer is no. Who cares, humans naked is not novel. In many countries, it is strictly forbidden to wear clothing or bring anything but a towel into the sauna. It's understandable that may not be possible in North American public saunas on mix gender "family" days. If you have to wear something, then wear something 100% cotton or marino wool. You don't want plastic being backed into your genitals. One more thing, leave the watch out as it gets hot and will burn you. Also, flip-flops/sandals, stay outside.
Some saunas sell body scrubs and masks for you to apply before or in the sauna. Note that once in the heat, these can get goopy and drippy and may melt into your eyes and mouth. So (in this opinionated guides’ wife’s opinion), they are better in theory than reality.
Adding Oils and scents: As discussed below, it can be nice to add certain oils and other scents to the steam. But if there are others in the sauna, ask first before you do.
Where and how to sit: Hot air rises. So, the higher benches are hotter and the lower benches are cooler. If you are a newbie, pick a lower bench so you don’t have to leave as quickly and open the door unnecessarily.
It’s great to lay down in the sauna, but if it gets crowded, sit up to make room for others.
When moving around to find your seat, don’t walk on the benches in your sandals. Leave your sandals outside the sauna or on the sauna floor.
Sauna Temperature
In most proper Russian style Banyas you will find temperatures of 80-95 degrees celsius, which, in my opinion, is the best range. Thats near your body. "Offical" on the dial will he 100-120C. But sometimes you want to take it a little easier or last a little longer in the sauna. In these cases, 65-85 at body, dial at 80-100. degrees celsius will do.
However, if your sauna is below 85 degrees celsius on the dial, you might as well just go hide under your bed sheets and not waste your time.
At some saunas in hotels, gyms, or spas, you may not be allowed to set the sauna as high as you’d like (see below). There are many tricks to circumvent these frustrating restrictions, but my legal counsel has advised me not to go into any details here.
Sauna Duration
The amount of time you spend in the sauna is a matter of personal preference and depends on the number of cycles you do (more on cycles, below).
For your first round, my opinion is that most people should try to last 15 minutes in the sauna. If a sauna is at the proper temperature, most people will struggle to stay inside any longer. If you can stay inside for 20-30 minutes, your sauna is probably too cold and/or there is not enough steam. Many saunas have hourglasses inside to keep time, and I’ve never seen a sauna hourglass with more than 15 minutes, which should be a good hint.
My preferred is;
Cold Plunge => Sauna 15 min => Cold Plunge => Hydrate with Salt & Water, Rest 5-10min => Sauna 15min => Cold Plunge => Hydrate with Salt & Water, Rest 5-10min => Sauna 15min => Cold Plunge => Hydrate with Salt & Water, Rest
if you can rest in the sun even better (no sunscreen poison please). You can add alcohol drinks to the hydration if you feel comfortable with that. But only add food after the last cycle.
For subsequent rounds, hydration starts to play a bigger role in how long you stay inside. Most people seem to last longer on their first round than on their second or third. If you can do 15 minutes on your second round, great. But 5-10 minutes is also fine.
Sauna Cycles
The traditional Russian Banya method (and in this writer’s opinion, the best method) is to do sauna cycles. Go into the sauna and just stay as long as you can take it (up to 15 minutes or so). Then take a cold shower and/or cold plunge (see below). Then robe-up and go relax with water, tea or beer. Once you start feeling “normal” again, repeat. For me, three cycles is the sweet spot. I’ll do more cycles if I’m spending the day at the Banya facility. If I’m at home, where I often sauna every other day, I find just one or two cycles does the trick. Sometimes I add a cycle or two on the weekend.
Occasionally, I like to go into the sauna as it’s warming up and before it reaches optimum heat (i.e. at around 60 degree celsius). This way, I can stay longer in the sauna for my first round (about 30-40 minutes). If I take this approach, I generally only do one more short round after my cold plunge.
Cold showers and plunges
In my experience, you want to take a cold shower or a cold plunge (or both, plunge is better) after the sauna cycle.After you come out of the sauna, immediately jump into cold plunge for a bit, i don't like to stay too long. Some Banya facilities will have a bucket filled with cold water that you can pull with a string to let the water pour over you, pull a couple times. The banyas may also have a cold pool of water into which you can plunge for a bit.
If I’m at my country place, after I get out of the sauna I jump into the cold lake. If it’s winter, I like to roll in the snow, which is satisfying. Some cultures would say that it’s not a real sauna experience unless you roll in at least one foot of snow.
After your cold shower or plunge, put on a warm robe and go relax before going back into the sauna. I like to relax for 5-20 minutes, depending on how much time I have. This allows the body’s temperature to decrease slowly. I do not recommend going directly back into the sauna after your cold plunge. If you don’t give yourself enough time after the cold plunge, you will overheat and won’t last very long when you return to the sauna.
Position
There really are no rules here. The way you position yourself in the sauna depends on your mood and preference, and there are many options. For example, you can sauna seated with your legs hanging down or with your knees up. You can lie down if there’s room. My favorite position is to lie down on my back with my legs up against the wall and, assuming the ceiling is low enough, with my feet stretched against the ceiling. This is a great way to stretch the hamstrings (check out stretching under “Sauna Activities”, below).
Choosing whether to sit on a higher bencher or lower bench is the best way to control the temperature you experience without adjusting the room temperature itself. You will notice the heat in the sauna increases exponentially every inch you go up. If you are struggling to stay in the sauna but don’t want to get out just yet, try moving down to a lower bench to last a little longer. Lying on the floor is the coolest spot and a great place for kids to start getting exposed to saunas.
There is no shame in going to lower benches or even the floor, there is only shame in opening the door before 15min
Getting Steamy
Without steam, the sauna would just be a sad, hot oven (I’m looking at you, infrared sauna).
The steam in the sauna has many benefits but most importantly it increases the thermal coupling of your body to the air and it feels great.
The amount of steam in the sauna is a matter of personal taste. You don’t want to make it into a steam room (remember, steam rooms are NOT saunas). But, you do want the sauna to be very moist. I find that two to four ladles of water in a mid-size sauna every five to seven minutes does the trick. Keep it between 50-60% humidity.
I keep a bucket of water in the sauna at all times so that I can continue to ladle water as I shvitz. Make sure to get a wood bucket and a metal ladle with a wooden handle. Wood ladles will crack, and if the handle is metal, it’ll burn you when you grab it.
If, when you enter the sauna, it’s already been on for a while, the wood is likely to already be wet and the sauna full of steam, so you may not need to add too much water. However, if you’ve just turned on the sauna and the wood walls are dry, you will need to ladle more water to make the air moist enough. If the sauna is too moist for comfort, open the door and let it dry out a bit (obviously, only do this in a private sauna).
Essential oils and even beer can all be added to the water to create scented steam. I recommend starting your sauna with just water, and add the scent as you get going.
You can try all sorts of different essential oils. I’ve tried everything from oak and cedar to tangerine and cinnamon (gag) essential oil. In the end, there are really only two oils that are worth it, in my opinion. The first is eucalyptus. I’ve experimented with different types of eucalyptus oil, and the variety you use makes a difference. My favorite is eucalyptus globulus. I also like diluted pine tar oil.
When you settle on your essential oil, add a healthy dose of the oil to the ladle filled with water. Never put the oil onto the oven directly. It’ll just burn.
In a few Russian facilities, I’ve seen Gray Beards pour Russian beer onto the oven and it was actually quite nice. It’s almost like being in a cozy bakery while you sweat
Some people like to place a salt brick or compressed solid blocks in their sauna from time to time. Put the salt block on the stove and pour water over it. The steam takes on a saltiness that feels nice. If a salt block is not available, you can get a cast iron teapot, fill it up with salt water, and place it on top of the stove.
And for my most important steam tip, I recommend using the “towel spin”. This is an effective and underrated technique to help circulate steam in the sauna. After creating steam, take your towel above your head and spin it around hard, like a ceiling fan. This movement works like a convection oven and spreads and equalizes the heat and steam throughout the room. It might make the folks sitting lower down in the sauna a little hotter, but that's what they’re there for, isn’t it?
Hydration
Being hydrated is important to having a positive sauna experience. You will lose a lot of your body’s water in the sauna. Ideally, start to hydrate well up to an hour before your sauna. I like to add a pinch of salt to my water to encourage water retention.
Do not bring any drinks into the sauna (the exception being a dedicated steam-beer, see above). Have your water or beverage when you’re outside the sauna, resting. If you find you need to drink water inside the sauna in order to cool yourself down, then it’s time for you to get out and allow your body a cool-down.
When you’re outside the sauna, don’t immediately down a glass of super cold water because you will cool down your internal body too fast. Personally, I like to drink warm tea after my first two cycles. After my second cycle, I enjoy a beer (pre-keto days), soup, or vodka drink. When non-keto, I do enjoy adult drinks in the cycles.
If you are doing a sauna while on a multi-day fast, you need to have water and salt, at a minimum. Otherwise, you will deplete your natural reserve of electrolytes and not be able to think straight.
Sauna Frequency
When it comes to frequency, if you are not in the equatorial heat do it every day. I now do mornings and end of day if I can. so 2x 2-3x cycles. In the summer, living in a hot & humid location, I sauna a lot less frequently. My desire to sauna is greatly diminished because I spend a lot of time in the sun and heat.
What to wear
Sauna Hat: I highly recommend wearing a Russian/Finish style wool hat when you’re inside the sauna. It may seem counterintuitive, but wearing a hat keeps your head cooler. An overheated head is not good for your brain. Wearing the hat stops you from overheating and lets you stay longer in the sauna. The temperature in a sauna is significantly hotter the higher in the room you are, and one’s head is at the top of the body (for most people). So protect your brain in style with a felt sauna hat. If you don’t have a felt sauna hat, buy one. They are easily found online. But in the meantime, you can wrap a dry towel around your head. Don’t forget to take your sauna hat off as you relax between cycles so your head can cool down.
Clothing: These days, many public saunas will have family days, men-only days, and women-only days. For obvious reasons, you’re only allowed to sauna naked if you’re attending one of the single-sex days.
If you’re at home, there’s no good reason to wear shorts or a bathing suit. Sauna naked. It's a lot more pleasant.
If you do wear clothing in the sauna, be careful with items with materials like metal or plastic attached. Things like pins, buttons, or string-ends will get very hot and probably burn you. Remember to take off any heat-conductive jewelry and leave your smart watch outside, as the heat will ruin its battery.
Don’t wear your robe inside the sauna. A robe is what you wear outside when relaxing or eating. If you wear it inside, you’ll overheat (and look like an idiot). Go ahead and sweat out that body shame robe-free. You can bring a towel into the sauna to sit on, if you want.
Shoes or sandals are highly recommended in public facilities. I mean, there are many people walking around wet. Ew. But keep your sandals outside the sauna itself, or on the sauna floor.
Sauna activities.
Don’t overthink it. Sitting in a sauna is activity enough, in my opinion. But there are some sauna activities you can do:
Veniks/Viht beating: these are bundles of leaves (commonly birch, oak, or eucalyptus) that are pre-soaked in hot water. Someone with both strength and capacity to exert themselves in the heat will beat your whole body with the leaves. This exfoliates your skin and also gets the plant oils to permeate your skin. And it’s very relaxing. If you’re at a sauna facility, don’t just grab any bundle you see lying around - that belongs to someone else and veniks aren’t shared. You have to bring your own or buy them at the front desk.
Stretching: this is a great activity to do in the sauna, but make sure to go very easy. Your muscles will be super warm and you don’t want to overdo it and hurt yourself.
Exercise or Sex: your heart better be in good shape if you try out these high intensity activities in the sauna. If you engage in the latter, you better be in your own home sauna. With respect to the former, I think doing some leg-ups can be very satisfying.
Phone use: If you’re at home, it’s nice to use your sauna time to shit-post on Twitter or read an article, if you feel like it. Just keep your phone close to the colder, lower parts near the floor or it’ll overheat and shut down. You can also place the phone outside of the air vent and play a podcast! The Bitcoin.review is great ;)
Napping: I don’t recommend this. If you fall asleep or pass out, you will probably die due to overheating or dehydration.
Chatting: Saunas are great places for conversations (subject to the caveats I address above). Note that nowadays, microphone modules are both very tiny and can withstand high temperatures, so it’s no longer recommended to reenact mafia movie sauna scenes.
Eating and Drinking: As discussed above, never have food or drink inside the sauna. But when you finish your sauna, take advantage of whatever snacks the facility offers. For Russian joints, the soups, fish roe and dry salty fish snacks are great. Again, don’t eat before your sauna; wait until you’re done. Some places will have bottled salty-ish lake water, and beer seems to be a good source of salts and re-hydration. Vodka drinks are nice sometimes, too. My favorites are vodka with beet juice and horseradish, vodka with pickle juice, or just a chilled shot of Zubrowka (vodka infused with bison grass). Teas are also very enjoyable post-sauna. I prefer non-caffeinated berry teas. Some Banyas even offer free tea to patrons.
Ready to Sweat It Out?
Thanks to this fantastic guide to sauna, you’re now feeling confident and excited to seek out a solid sauna. So where do you go?
Where to Find a Sauna
Spas: Spas are not the best place to have an optimal sauna experience. Saunas at spas are typically not hot enough and spas have annoying staff whose job it is to enforce idiotic rules and practices that prevent you from having a real sauna experience.
Gyms & Hotels: These are some of the worst places to sauna. For liability reasons, these saunas tend to be too cold and there are often mechanisms that prevent you from raising the temperature. Here, you’ll often see saunas with glass doors, which may look chic, but are inefficient and stupid because they don’t seal properly and leak steam. Gyms and hotels are high traffic areas, so people who don’t know what they are doing are constantly coming and going from the sauna, which, as we discussed, is a sauna no-no. If you still want to try the sauna at your gym or hotel, I recommend going in naked. It’ll deter people from joining you and ruining the little steam you managed to get going.
Traditional bath houses (Banyas): These usually offer a great experience because they deliver a super hot sauna, good cold baths and plunges, delicious food and drinks, and knowledgeable staff.
Home: Yes, you can build a great sauna in your own home! You can create a small space in your basement, turn a closet or cold room into a sauna, or just add an outdoor hut or barrel sauna in your backyard. This is the best way for you to control the whole experience and do it often. As with anything, the easier it is to access, the more you will do it.
Build it. They will Come
Many people have asked me for details about sauna building. If you’re ready to build your own personal home sauna, here are some important considerations.
Materials
Saunas are insulated rooms, most commonly finished with cedar tung and groove slats. Cedar is used because it doesn’t rot with moisture. You don’t want treated wood as it will release all the bad stuff that keeps the wood from rotting into the air when heated. Cedar interior is often placed over a vapor barrier, followed by insulation and then the outer wall. Many outdoor saunas are not insulated. They simply have a single layer of cedar 2x6 planks functioning as both the interior and exterior. Non-insulated saunas need much more heating power in the winter.
Structure
For indoor saunas, you may want to find a bricklayer to build something for you. Traditional facilities often have brick-lined rooms and very large wood-burning stoves.
You can buy prefab outdoor saunas, which are often sheds or barrels. After experimenting with both, I’ve concluded that barrel saunas are inferior, even though that’s what I have at my country property. This is because barrels have concave ceilings and inner walls. This means the benches are lower and the curve makes the topmost part of the ceiling (and the hottest part) the furthest from you, or inaccessible. The spinning towel trick really helps in the barrel.
When it comes to buying a sauna, go with the most traditional structure possible. They are based on thousands of years of evolution and knowledge.
Portable tent saunas are fun, but impractical because you have to set them up before each use.
Bench height inside the sauna is important. I think the top-most bench should be very near the ceiling. This way, when you’re lying down, you can use the ceiling to stretch the hamstrings. As a rule of thumb, bench length should allow you to lie down completely. It is also nice to have at least one lower bench for visitors or less intense sauna days.
Sauna Ovens
There are two main types of sauna ovens: wood burning and electrical (with gas heating being available, but not common). If the location you are building allows for it, go with electrical. It’s practical and easy to get going quickly. This means you will use it more often. Wood burning saunas are romantic and smell great, but it is a lot more work to get a fire going, especially in the winter.
Opt for oven sizes that are recommended or above recommended for the size of the sauna. A larger oven means more thermic inertia, more rocks for steam, and therefore less time to warm up the room. Bigger is better. The Scandinavians make the best quality ovens.
Oven controllers
There are two types of temperature control devices: the analog cooking-style or the digital type. I think, due to liability and safety, all ovens have a timer that max out at one hour.
The digital oven controllers are fantastic and I have one in the city in my basement sauna.
However, you have to consider your environment. For me, temperatures in the winter can reach below -30C and in the summer, over 40C. This massive range can take a toll on outdoor equipment and materials. For this reason, I opted for an analog controller for my outdoor sauna in the country, since the weather will likely ruin the electronics of the digital controller.
I would avoid ovens with analog pre-heat timers. They are great in theory, but the implementation is utter garbage. The timer won’t be precise and it’ll just lead to frustration, for example, when you thought you set the oven to start in three hours, but it actually started in two hours and already turned off.
Important Sauna Gear
Windows are nice to have, especially if you have a view to enjoy. Opt for at least a cedar door with a little window. Do not go with modern glass door styles. They are crap. They have gaps, no insulation, and let in too much light.
Saunas need thermometers and hygrometers (to measure humidity). The thermometers should be rated for saunas and be visible inside. This is both for safety and bragging rights.
I think having an hourglass inside your sauna is a must. Being able to know for sure how long you’ve been inside is important, since your sense of timing inside the sauna may be off depending on the state of your mind and body on a given day. You shouldn’t wear a watch inside the sauna, since it’ll overheat or break. Having a clock visible from the inside is also a good idea, especially if you sauna often and have a wife and kids who you don’t want to leave you.
Air circulation is an often-overlooked but important part of a sauna design. Saunas should not have stale air. The best sauna design creates natural “real convection” by placing an air intake under the oven wall and another at the top opposite wall. This allows fresh air to enter the sauna while in use. Be sure to add regulators, since you don’t want to cool the sauna or expel all steam. Without regulators you may get too much or too little air in. With too much air, you may cool the sauna down too much and/or lose too much steam.
Nice Things to Have
Lights are optional but welcome additions. It can be unpleasant to have no lighting at all, especially in an outdoor sauna on a cold, dark night. Lights should be warm-temperature and low power. I recommend an oven light, since they don’t sweat the heat (get it?) and are often low power.
Put a baking tray under your oven–thank me later.
Wood “pillows” for your head are nice and don’t get sweat-stained and stinky, like a fabric pillow.
Keep some extra felt hats near your sauna so when you or your guests forget their hat, you still have easy access to one.
I like to keep a couple of essential oils on the floor of the sauna, for easy access. If you keep the oils too high in the sauna, they’ll get too hot and spoil.
I place some duck boards over floor tiles in the sauna to prevent cold feet.
I also like to keep a small, natural broom inside the sauna to sweep up any dirt or leaves that come into the sauna on people’s feet.
Final words
As you can tell, I have some strong opinions when it comes to the proper way to enjoy a sauna. My hope is that my musings will help you to maximize your own sauna experience.. If you follow this guide, I’m certain you will benefit from and enjoy the sauna as much as I do and, just maybe, you too will develop your own strongly held opinions that will most definitely offend me.
Thanks for reading, please close the F-ing door.
ps, you can get a Bitcoin Honey Badger Sauna Hat here
- EOF
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:19:57Chef's notes
Serve with coleslaw, and chips on the side. Pictured here using English muffin, with a side of mung bean sprouts.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- ¼ Cup Chopped onion
- 2 TBSP Chopped green pepper
- 1 TBSP butter
- 1 LB Ground beef
- 1 can (10.5 ounce) bean with bacon soup
- ½ Cup water
- ⅓ Cup ketchup
- Hamburger buns, toasted
Directions
- Cook onion and green pepper in butter until tender.
- Add crumbled ground beef, brown
- Add soup, water, and ketchup
- Heat to simmer, stir often for five minutes.
- Spoon on buns, serve.
-
@ a828c9af:ea95c44c
2024-10-24 08:25:30The Philippines is a goldmine for businesses seeking new markets. With a booming economy and a population exceeding 100 million, it presents a vibrant and diverse consumer landscape that, when maximized, can offer businesses a considerable market with a growing purchasing power.
Moreover, the country's e-commerce sector has exploded in recent years, with sales hitting $17 billion in 2021 alone. As consumer behavior rapidly evolves due to technology and changing preferences, there's never been a better time to enter the Philippine market than today.
5 Ways to Tap into the Philippine Market
To succeed in the Philippine market, you need a strategic approach that resonates with the country's diverse and dynamic consumer base. Here are five proven methods to help you engage effectively.
1. Digital services and marketing
In the Philippines, a solid online presence is crucial to reach your target audience. Use social media, content marketing, and search engines to build meaningful connections almost instantly.
2. Cashless and online payment methods
Filipino consumers prefer secure and convenient payment options. Offering various cashless and online payment methods can enhance their shopping experience and give your business a competitive edge.
3. Fashion eCommerce
Fashion eCommerce is booming in the Philippines. A visually appealing website with high-quality images, detailed product descriptions, and easy navigation can attract fashion-conscious Filipinos.
4. Localized content and engagement
Tailor your content to your customers' culture and values to connect with the Philippine market. Using the local language, cultural references, and relatable imagery can deepen customer engagement and build trust.
5. Responsive customer support
Excellent customer support builds trust and loyalty. When you offer timely, helpful responses through chatbots and automation while maintaining a personal touch ensures customer satisfaction.
Check this infographic to learn more about consumer trends in the Philippines and how to take advantage of them to tap into this lucrative market.
-
@ ec965405:63996966
2024-10-11 11:53:23Gratitude
In light of all the doom, gloom, and meaningless state sponsored violence in the world these days, I want to practice shedding light on some dope things I have going on lately that I am grateful for. To start, I'm always grateful for my dog's health and companionship. Kaido is a 4 year old 15 lb Chiweeny with an under bite and a big attitude who never lets anybody sneak up behind me.
I'm grateful for the community I've plugged into since I made my Nostr keys and won a creator account with nostr.build in a blog contest last year. I'm coming out of the Creator Residency at nos.social this month with a new group of internet friends and was even just awarded a grant from Yakihonne to spin up a relay for a youth organization I am involved with.
My grant proposal writing skills are sharpening thanks to my participation in a cohort of young "World Builders" who meet weekly via video chat to learn the ins and outs of fundraising and building ethical social impact organizations. A friend of mine I recently reconnected with introduced me to the facilitator of this group, a professional in the development space on a mission to "hack" the non profit sector by training the next generation of youth leaders. It's exactly what I needed to evolve my writing skills and apply for funding to build the better world I want to see for the next generation.
The friend who connected me and I met as foster youth members of a California-based social impact organization dedicated to transforming policy and practice in the foster care and juvenile justice systems. We fell out of touch after high school before crossing paths again a few years ago while I was a staff member at the organization. He's now a professional software developer who runs a learning community dedicated to helping folks learn programming and get into tech roles. My participation in the community has rekindled a passion for computers and the internet that started back in middle school when I first flashed a custom firmware on my Playstation Portable but paused in high school as I became increasingly sick of the internet and more interested in politics and media production. These days, I find myself increasingly sick of the corporate politics and media that define our shared realities and more interested in fixing the internet.
Crisis
In today's perpetual state of polycrisis, systems-involved youth (which include unhoused, foster, and incarcerated youth or orphans) are among the most vulnerable in our society. Higher rates of trauma-induced mental illness culminate into poor life outcomes for this population, including higher rates of unemployment and incarceration. Compounding this is the fact that they use social media at higher rates than other demographics due to a lack of robust social support networks, making them prime targets for bullies and human traffickers on the web. The Center for Humane Technology reports on their website that "more screen time is associated with mental health and behavioral problems, poor academic performance, and worse sleep" for youth.
We had a situation at the California-based organization I mentioned where a frustrated youth member created a "finsta" (fake Instagram account) to drag the Executive Director (one of the founding youth members of the organization in the 80's) and some staff (including me) through the digital mud. The youth tagged the organization's account and spread hurtful memes and rumors throughout our network. It even sparked a staff rebellion in which a disgruntled coordinator sent out a letter to our network detailing their personal beef with management and announcing their departure. A petition of no confidence in the Executive Director was circulated, resulting in their resignation from the organization they helped start decades ago. Needless to say, the whole thing left the community pretty traumatized and we lost a few great staff members.
I can't help but imagine how the situation would have played out if our organization had something like a white-listed Nostr relay to organize our community around instead of an Instagram account. The burner account would not have been able to post anything to the relay, so the memes and rumors probably wouldn't have spread as far or as quickly as they did. The white-listed youth members of the communications committee I ran could have posted content to the relay to ensure verified information was spread throughout the membership. Maybe this kind of setup would have created an environment for the frustrated member to feel more connected to the organization and it's mission and prevented such a mess from ever taking place. In the moment, I felt powerless to stop it.
Digital Neighborhoods
When I catch myself feeling down about the state of the world and how powerless I've felt to change it over the last year, I try to remember Rabble's metaphor about building digital neighborhoods in the recent presentation he gave at Nostriga. Before long, I'm reaching for my digital construction hat on my way to my computer to jot some ideas down. I've heard a lot of lip service at different non profits I've worked for over the years be given to the idea of safe physical spaces for youth (like playgrounds and soccer fields), but I never heard this idea extended to the digital spaces where the majority of young people spend an increasing amount of their time. These days, I serve on the board of directors for a different organization that I intend to build a digital neighborhood for with the Yakihonne Relay Grant I was awarded recently. I've been building transnational support networks for youth involved in state care with the International Foster Care Alliance since 2016 when I first trained a delegation of Japanese foster youth on community organizing strategies. There are a few reasons why I think Nostr is a natural fit for systems-involved youth.
-
Confidentiality laws surrounding minors in state care make it hard for organizations like ours to engage them in storytelling on social media because of the personal identifying information required to participate on corporate platforms. A Nostr key pair empowers a youth with a layer of anonymity in line with one of the tips in the Child Welfare Gateway's Social Media Factsheet about limiting the sharing of personal information. This anonymity grows their capacity to share painful pasts intentionally and with purpose. Since Nostr profiles can't be traced to a personal identity, youth advocates are empowered to use their voice to make a difference.
-
For foster youth who are disempowered in all other areas of their lives, ownership of their identity and data gives them control over how they present themselves and engage with others online. This gives way for an increased sense of connectedness, personal capacity, and resilience in storytelling without fear of being tokenized. Our organization's web presence will evolve into a powerful tool for narrative change and foster deeper connections among youth members globally, strengthening their cultural identities while contributing to a broader conversation on child welfare reform.
-
Next generation features and a vast app ecosystem will transcend geographical boundaries and time zones, significantly enhancing communication and collaboration between organizations in the alliance. In particular, in app translations provided by many Nostr clients will allow youth to socialize with their counterparts in other countries across language barriers and facilitate smoother communication.
What's not to look forward to? I'm grateful to be part of this movement and for the opportunities the community has provided for me up until now. We've come a long way since GeoCities and Myspace but, in the words of Tim Berner's Lee, "The future is still so much bigger than the past."
-
-
@ 18bdb66e:82eb5e5d
2024-10-21 23:04:53Chef's notes
Use slotted spoon to place green beans on toast.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- ¼ cup Chopped onion
- 2 TBSP butter
- 1 Can (10 ½ ounces) condensed cream of chicken soup.
- ⅓ cup milk
- 1 can (5 ounce) chicken, or 1 cup diced cooked chicken
- 2 boiled eggs, sliced
- 4 Slices of toast
- French style green beans, cooke
Directions
- Cook onion in butter until soft, not brown
- Mix soup, milk, chicken, and most eggs, add to onion. (Reserve some egg for garnish)
- Heat through stirring often.
- Heat beans, divide equally and spoon on toast.
- Top beans with chicken.
- Garnish with remaining egg.
-
@ 4f82bced:b8928630
2024-10-11 11:14:58Getting into Malawi was quite a logistical journey. A 14-hour bus from Dar Es Salaam > 2-hour shared taxi > 10-minute bike ride > border crossing > 1-hour shared taxi > 2-hour shared taxi.
Mind you, these shared taxis try to double the normal occupancy of the vehicle. A 15-seater van will squeeze in 25 people and maybe some livestock. A 6-person hatchback? Let’s fit 12 into it! Don’t expect personal space in these vehicles. You will have a memory of a lifetime!
Malawi, a poor country, relies heavily on foreign aid. In 2024, $3.35 billion will be lent to further programs in agriculture, healthcare, education, sanitation, and more. We met countless foreigners who'd come to Malawi 5-10 years ago for volunteer work and never left. It makes sense why. The locals are kind, giving, and willing to lend a hand. A fitting title for this country, 'the warm heart of Africa.'
Given the economic state of affairs, it was no surprise that the infrastructure was lacking. The Malawian Kwacha has seen better days. In 2022, the Central Bank of Malawi devalued the Kwacha by [25%]((https://www.africanews.com/2022/05/27/malawi-kwacha-gets-25-weaker/), and in 2024, a further 44%! Imagine waking up one day and realizing your money is worth 44% less than the previous night.
The country's crowning jewel, Lake Malawi, is the [3rd largest freshwater lake in Africa], and 5th in the world (by volume). It's the lifeline for the country, providing food and water. With nearly 1000 species of fish, this is the most species-rich lake in the world. We had the opportunity to visit a lakeside community and were shocked to see how clean it was. The roads had plastic and garbage, but the lake was pristine! A few factors were at play: natural filtration by the lake, limited industrial activity, and general awareness of the community to reduce waste to avoid polluting their primary food source.
A Bitcoin community in Malawi (Bitcoin Boma) is building awareness of the economic, social, and environmental benefits of bitcoin for Malawi. We had the opportunity to meet the local bitcoin community (Bitcoin Boma) at their monthly event. Similar themes from the previous countries emerged. Their currency is losing too much value, things are unaffordable, and students are losing hope in securing a brighter future for themselves. There are no easy answers to these tough problems. At the very least, they have access to monetary technology that does not discriminate and is open to all.
Malawi was the last place on earth we'd imagine getting a tattoo. An artist came highly recommended and we did it! His shop now accepts bitcoin, joining an Airbnb host within the community.
Off to Zambia next.
Sources: - Malawi overview. World Bank - Malawi kwacha gets 25% weaker. Africanews - Malawi kwacha 44% drop. BBC - Lake Malawi. Africa Geographic - Bitcoin Boma. Bitcoin Boma on X
-
@ ff18165a:dd7ca7f0
2024-10-19 18:23:51Chef's notes
- DO NOT add too much Peppermint Extract! It’s extremely strong and it will make your milkshake way too strong if you add more than a few drops.
- Feel free to be creative with your toppings. We used Caramel Flavored Whipped Topping and it turned out great!
Details
- ⏲️ Prep time: 5 min
- 🍳 Cook time: 2 min
- 🍽️ Servings: 1
Ingredients
- 1 1/2 cup Milk
- 2 drops Peppermint Extract
- 2 packets Stevia
- 1 cup Ice
- 2 drops Green Food Coloring
- Green Sprinkles
- 1 Crushed Peppermint Candy
- 2 Mint Leaves
Directions
-
- Blend together until smooth and frothy
-
- Pour into a tall glass
-
- Top with listed toppings
-
- Add straw and enjoy
-
@ 8dac122d:0fc98d37
2024-10-11 10:59:56(FOR ENTERTAINMENT PURPOSES ONLY) The Babylon Observer present:
Mystery Paper Documentary Series
An episodic documentary series about the origins and mechanisms of the mysterious paper documents that appear to fund and control commerce in our modern world. Inspired by the experiences and research of Cal Washington.
Available from https://babylonobserver.com/mystery-paper/
originally posted at https://stacker.news/items/718979
-
@ 6bae33c8:607272e8
2024-10-11 08:55:22I have Jordan Mason in three leagues, two of which are NFFC, including the Primetime. It’s especially frustrating watching the 40-minute edited version because you miss all the sideline updates and real-time updates you’d get on Twitter. You just have to watch the game and hope he comes back. It turns out Mason has a shoulder injury, and we’ll know more later today. It bodes badly he tried to return to the game (to my great relief) but then left in pain after one play.
My other rooting interest was against Jaxon Smith-Njigba who I moved to my bench. I am almost psychotic about not wanting to make lineup errors (knock on wood, I’ve made relatively few so far this year), so I really wanted him not to have a big day. He’s tough to predict because one week he’ll have 16 targets, the next three. My feeling was Geno Smith wouldn’t have much time to throw, so if JSN got targets, they’d mostly be short, and I have Tank Dell (without Nico Collins) in for now instead (I could also use JK Dobbins.)
While lineup errors are inevitable in the aggregrate, any particular one is avoidable. The Mason injury is horrible, but he got me nine points at least, and there was nothing I could have done about that. I also had the 49ers -3.5 in my home picking pool, and it’s always nice to start the week with the Thursday night win.
``` Brock Purdy is a very good quarterback. He’s as poised in the pocket as anyone in the league other than maybe Patrick Mahomes, and he’s an underrated scrambler. I saw a Twitter post where he says he’s faster in the 10-yard split that Deebo Samuel or Christian McCaffrey, and they showed from the Combine it’s actually true.
It’s really too bad Mason got hurt because his backup Isaac Guerendo got 99 yards, which would have been his, and Kyle Juszczyk got a last-minute TD. Still it could have been worse. Guerendo is an obvious pickup, pending the news on Mason.
Deebo Samuel got his on one big play, and George Kittle scored twice. Brandon Aiyuk has been a huge fantasy bust this year.
I also had Kenneth Walker going in the Staff Dynasty League where I’m in first place, but I have both my QBs (Sam Darnold and Mahomes) on bye (and Mason), and no one will trade me a QB, so it was huge that Walker scored that TD and started catching passes in garbage time.
I also enjoyed seeing DK Metcalf (zero shares) get a long TD called back due to a false start and Tyler Lockett (who few people start) get the TD catch instead. JSN was perfect — enough to maintain my confidence in him, but not so much that I regretted benching him. He saw some end zone targets too.
Geno Smith had his worst game — he missed a couple open receivers and threw two bad picks. He only took one sack though after getting destroyed by the Giants and Lions the previous two weeks. ```
I have Jordan Mason in three leagues, two of which are NFFC, including the Primetime. It’s especially frustrating watching the 40-minute edited version because you miss all the sideline updates and real-time updates you’d get on Twitter. You just have to watch the game and hope he comes back. It turns out Mason has a shoulder injury, and we’ll know more later today. It bodes badly he tried to return to the game (to my great relief) but then left in pain after one play.
My other rooting interest was against Jaxon Smith-Njigba who I moved to my bench. I am almost psychotic about not wanting to make lineup errors (knock on wood, I’ve made relatively few so far this year), so I really wanted him not to have a big day. He’s tough to predict because one week he’ll have 16 targets, the next three. My feeling was Geno Smith wouldn’t have much time to throw, so if JSN got targets, they’d mostly be short, and I have Tank Dell (without Nico Collins) in for now instead (I could also use JK Dobbins.)
While lineup errors are inevitable in the aggregrate, any particular one is avoidable. The Mason injury is horrible, but he got me nine points at least, and there was nothing I could have done about that. I also had the 49ers -3.5 in my home picking pool, and it’s always nice to start the week with the Thursday night win.
-
Brock Purdy is a very good quarterback. He’s as poised in the pocket as anyone in the league other than maybe Patrick Mahomes, and he’s an underrated scrambler. I saw a Twitter post where he says he’s faster in the 10-yard split that Deebo Samuel or Christian McCaffrey, and they showed from the Combine it’s actually true.
-
It’s really too bad Mason got hurt because his backup Isaac Guerendo got 99 yards, which would have been his, and Kyle Juszczyk got a last-minute TD. Still it could have been worse. Guerendo is an obvious pickup, pending the news on Mason.
-
Deebo Samuel got his on one big play, and George Kittle scored twice. Brandon Aiyuk has been a huge fantasy bust this year.
-
I also had Kenneth Walker going in the Staff Dynasty League where I’m in first place, but I have both my QBs (Sam Darnold and Mahomes) on bye (and Mason), and no one will trade me a QB, so it was huge that Walker scored that TD and started catching passes in garbage time.
-
I also enjoyed seeing DK Metcalf (zero shares) get a long TD called back due to a false start and Tyler Lockett (who few people start) get the TD catch instead. JSN was perfect — enough to maintain my confidence in him, but not so much that I regretted benching him. He saw some end zone targets too.
-
Geno Smith had his worst game — he missed a couple open receivers and threw two bad picks. He only took one sack though after getting destroyed by the Giants and Lions the previous two weeks.
-
-
@ d3f06d83:7ff53dc3
2024-10-15 00:30:10Chef's notes
This is the beginning of a great pizza.
Details
- ⏲️ Prep time: 15 min
- 🍳 Cook time: 0
- 🍽️ Servings: 0
Ingredients
- 1 cup of pizza flour or bakery flour (00 flour)
- 1 zatchet of yeast (7g)
- 1 cup of water
- 1 spoon of honey (or sugar)
- 2 Litre container with a lid
Directions
- Pour the water in a 2L container
- Add honey/sugar and stir
- Add the yeast and stir. Wait 15 minutes or until the yeast is active (bubbling)
- Slowly mix the flour avoiding clumps
- Close the lid and leave in the fridge overnight
-
@ 97fc03df:8bf891df
2024-10-24 07:53:50A Value Internet Sharing Bitcoin’s Consensus Security
Author: BEVM, October 2024
Abstract
Super Bitcoin is a value-based internet centered on BTC, and share Bitcoin's consensus security. This value internet not only inherits the security of the existing Bitcoin network but also transcends BTC's current limitations of being solely used for transfer, providing the Bitcoin network infinite potential for scalability and flexibility.
While the Lightning Network [2] inherits Bitcoin's network security and offers partial scalability solutions, it still falls short in supporting smart contracts and further enhancing scalability. We propose a five-layer architecture for Super Bitcoin using the Bitcoin network as the kernel layer, maintaining system security and transaction irreversibility through the proof-of-work (PoW) consensus mechanism; we build an efficient communication layer based on the Lightning Network, facilitating rapid transmission of asset information while preserving Bitcoin's decentralized nature; we introduce the Taproot Consensus as the extension layer, abstracting Lightning Network communication and asset information to provide a standardized interface for the upper virtual machine layer; we set up a multi-chain layer, also known as the fusion layer, which consists of multiple lightning chains secured by BTC consensus, integrating any mainstream virtual machine (VM) to achieve a "Multi-chain interconnection“ and ”multi-chain interoperability” unified by BTC consensus; finally, we support the application layer, providing developers with rich tools and interfaces to build a decentralized application (DApp) ecosystem, all sharing the security of BTC consensus.
1. Introduction
As the pioneer of cryptocurrencies, Bitcoin (BTC), through its proof-of-work (PoW) consensus mechanism and decentralized network structure, has garnered an immense level of consensus, becoming a supranational currency. This security stems from the perfect combination of its vast network hash power and economic incentives. The birth of Bitcoin not only ushered in a new era of decentralized digital currency but also pointed the way for the subsequent development of blockchain technology. However, the limitations of Bitcoin’s scripting language soon became apparent, as it only supports simple value transfers and limited contract logic, unable to meet the demands of more complex decentralized applications.
The evolution of blockchain technology is essentially all about expanding and enhancing Bitcoin's capabilities. Vitalik Buterin, the founder of Ethereum, initially envisioned adding smart contract functionality to Bitcoin. However, due to the technological constraints of the time and the limitations of the Bitcoin network, Ethereum had to establish its own independent consensus system. While this approach allowed for the creation of Turing-complete smart contracts, it also introduced new security risks and scalability challenges. Many projects followed suit, building independent blockchain ecosystems, gradually diverging from and even forgetting the original intention of extending Bitcoin’s capabilities.
However, two key factors remind us of the need to reconsider this direction. First, the continued rise in Bitcoin’s value relative to other cryptocurrencies like Ethereum has validated the trust people place in its security and stability. Second, the collapse of Luna/UST, which wiped out nearly $100 billion in market value, highlighted the severe security vulnerabilities present in independent consensus chains, especially when faced with complex economic models and rapidly growing network value.
In this context, we introduce Super Bitcoin to create a true value internet sharing Bitcoin's consensus security. It fundamentally differs from the existing Bitcoin Layer 2 solutions: traditional Bitcoin Layer 2 solutions (such as the Lightning Network) mainly achieve fast payments through off-chain state channels and limited scripts, while sharing Bitcoin's consensus security but lacking flexibility. Meanwhile, sidechains like Stacks or Layer 2 solutions, although they support smart contracts, still rely on independent multi-signature mechanisms for security, thus not fully inheriting the security of the Bitcoin mainnet.
2. Technical Background
To fully understand the proposed solution, it is necessary to first review the background and development of several key technologies. This chapter briefly introduces the Lightning Network, the Substrate framework [3], BEVM's Taproot Consensus, and the multi-chain interoperability system to provide a foundation for understanding our solution.
2.1 Lightning Network
The Lightning Network is a Layer2 scaling solution for Bitcoin, with its core design principles detailed in the BOLT (Basis of Lightning Technology) specifications. These specifications not only ensure the efficient operation of the Lightning Network but also ingeniously achieve deep integration with the consensus security of the Bitcoin mainnet. Several parts of the BOLT specifications play a key role in sharing Bitcoin’s consensus security.
BOLT #2 and BOLT #3 provide detailed guidelines on the lifecycle management of payment channels and the structure of transactions. The opening of a channel involves creating a multi-signature output on the Bitcoin blockchain, while closing the channel requires broadcasting the final state to the mainnet. BOLT #3 specifically defines commitment transactions, which are the core mechanism by which the Lightning Network shares Bitcoin's consensus security. Each time the channel state is updated, a new commitment transaction is generated, which can be broadcast to the Bitcoin mainnet if needed. The design of commitment transactions ensures that even if one party in the channel becomes uncooperative, the other party can still close the channel by broadcasting the most recent commitment transaction and receive their due funds. This mechanism directly relies on Bitcoin’s consensus rules and security, meaning the Lightning Network’s security is essentially guaranteed by the Bitcoin network.
BOLT #5 defines the penalty mechanism for channel closures. This mechanism introduces the concept of "revocating private keys," effectively preventing participants from broadcasting outdated channel states. If dishonest behavior is detected, the honest party can use these keys to punish the other party on the Bitcoin main chain, thereby ensuring the accuracy of the channel state and enforcing honest behavior among participants through Bitcoin's consensus mechanism.
Additionally, the commitment transaction format specified in BOLT #3 connects Lightning Network transactions to Bitcoin's fee market through "anchor outputs." This not only enhances the security of transactions but also ensures that Lightning Network transactions can still be confirmed promptly during periods of network congestion.
These meticulously designed specifications collectively ensure that the Lightning Network, while providing fast and low-cost transactions, can still fully leverage Bitcoin's robust consensus security.
2.2 Substrate Framework
The Substrate framework is a highly modular blockchain development toolkit written in Rust, providing a powerful and flexible technical foundation for the implementation of Super Bitcoin. Its core strength lies in its pluggable Pallet system, where these pre-built functional modules serve as "blockchain Legos," enabling us to quickly and efficiently assemble and customize the desired features.
For Super Bitcoin, Substrate's modular design is crucial. It allows us to flexibly build and integrate various functional components on top of the shared Bitcoin consensus security. By leveraging Substrate's Pallet, we can easily support and integrate different virtual machine environments, thereby increasing the system's flexibility and adaptability. This design not only accelerates the development process but also provides Super Bitcoin with powerful scalability, allowing it to better meet the evolving needs of the blockchain ecosystem.
Super Bitcoin utilizes these features of Substrate to customize the BEVM-stack framework, which enables one-click deployment of lightning chains.
2.3 Taproot Consensus
BEVM’s Taproot Consensus integrates Bitcoin’s Taproot upgrade [4] technology. This technology combines several key elements: Schnorr signatures [5] provide signature aggregation capabilities, Merkelized Abstract Syntax Tree (MAST) support complex conditional scripts, and Musig2 enables two-round communication in multi-signature schemes. Through the combination of these technologies, BEVM successfully implements a decentralized threshold signature network with (t, n) support.
Additionally, BEVM leverages Bitcoin SPV (Simplified Payment Verification) technology to achieve lightweight decentralized block header synchronization. This allows transaction verification without downloading the full blockchain data, enabling BEVM to synchronize with the BTC mainnet in a decentralized manner. In Super Bitcoin architecture, Taproot Consensus plays a key role as the extension layer: it interfaces with the Lightning Network below, abstracting and integrating asset information, and provides standardized interfaces for different virtual machine execution environments above, realizing the transmission and utilization of asset information.
Such design makes Taproot Consensus a core component of the Super Bitcoin architecture. It not only inherits the security and privacy-preserving characteristics of the Bitcoin network but also provides rich functional support for upper-layer applications.
2.4 Multi-Chain Interoperability System
The concept of a multi-chain interoperability system was first introduced by Polkadot. Polkadot [6] is a multi-chain interoperability system based on the Substrate framework, sharing the security of DOT consensus, and using parachains for application chain expansion. Correspondingly, Super Bitcoin is a multi-chain interoperability system built on Bitcoin and the Lightning Network, sharing BTC consensus security, and using Lightning Chains for application chain expansion.
The differences between the two are as follows:
-
Shared Consensus Security: Both Polkadot and Super Bitcoin’s multi-chain networks achieve shared consensus security, but Polkadot shares DOT consensus, while Super Bitcoin shares Bitcoin consensus. The strength of BTC’s consensus is far greater than that of DOT. Theoretically, the security of the Super Bitcoin architecture is 200 times higher than that of the Polkadot network. This "200 times" represents the current ratio of BTC’s $1.3 trillion market cap to DOT’s $6.5 billion market cap. Therefore, the Lightning Chains on Super Bitcoin offer approximately 200 times the security of Polkadot's parachains.
-
Application Chain Architecture: Super Bitcoin’s lightning chain is deployed with one click based on BEVM-stack, whereas on Polkadot, parachains are deployed via Substrate with one-click.
-
Cross-Chain Communication Protocol: Super Bitcoin uses lightning channels as the communication protocol between Lightning Chains, while Polkadot uses XCMP as the communication protocol between parachains.
3. System Architecture
3.1 System Architecture Overview
Super Bitcoin is a five-layer architecture protocol built by BEVM guided by the three problems of blockchain - decentralization, security and scalability.. This protocol is based on the Bitcoin protocol and utilizes the Lightning Network for efficient peer-to-peer communication. To extend the functionality of Lightning Network nodes, Super Bitcoin integrates Taproot Consensus and combines Bitcoin SPV, Schnorr signatures, MAST contracts, and a BFT PoS consensus mechanism to achieve scalable state management and transaction processing.
On this foundation, Super Bitcoin further integrates multiple virtual machines, including WASM, EVM, SVM, MoveVM, and CairoVM, creating a multi-chain system based on lightning chains that offers a diverse range of smart contract execution environments. This modular framework significantly enhances the system's scalability and flexibility while maintaining the decentralized nature of the Bitcoin network. Importantly, all lightning chains share the Bitcoin network's consensus security, ensuring that the system remains highly secure as it scales.
3.2 Kernel Layer
The Bitcoin network serves as the kernel layer of Super Bitcoin, maintaining the security and irreversibility of the entire system through the Proof-of-Work (PoW) consensus mechanism. This decentralized peer-to-peer electronic cash system primarily supports BTC transfers and basic opcode execution, managing state using the UTXO model. The Bitcoin network’s block structure and transaction data serve as the input for the Lightning Network, providing reliable foundational data for the upper layers. Although Bitcoin’s scripting system is not Turing-complete, it can support the most basic smart contract functionality through stack-based operations, conditional checks, and cryptographic functions. The network maintains a block time of approximately 10 minutes using a difficulty adjustment algorithm and uses Merkle tree structures to optimize transaction verification efficiency. The security and decentralization of this foundational layer provide a robust consensus security foundation for the entire Super Bitcoin architecture, while its simple design and limited scripting capabilities offer a stable and predictable environment for upper-layer expansion.
3.3 Communication Layer
The Lightning Network serves as the communication layer of Super Bitcoin, achieving efficient asset information transmission while sharing the BTC consensus security. It acts as a bridge between users and the Super Bitcoin ecosystem, enabling bidirectional payment channels through a Hashed Time Lock Contract (HTLC), supporting multi-hop routing and atomic swaps. Users can establish state channels with Super Bitcoin nodes to deposit funds and conduct instant off-chain transactions.
Super Bitcoin nodes, as specialized Lightning Network nodes, not only maintain direct channels with users but also remain compatible with the existing Lightning Network by implementing the BOLT (Basis of Lightning Technology) specifications. This design allows users to leverage the existing Lightning Network infrastructure for cross-node, cross-chain payments and value transfers, providing a secure communication foundation for the lightning chains.
3.4 Extension Layer
Taproot Consensus serves as the extension layer in Super Bitcoin, playing a critical role in connecting the Lightning Network with the upper-layer lightning chains. It abstracts the asset information transmitted through the Lightning Network and converts it into blockchain data that can be processed by the upper layers, balancing the payment efficiency of the Lightning Network with the logical needs of upper-layer applications.
This expansion layer integrates Bitcoin SPV, Schnorr signatures, MAST (Merkelized Abstract Syntax Tree) structures, and a BFT (Byzantine Fault Tolerance) PoS consensus mechanism to achieve multiple functions:
1. Connecting the Lower Layer :Bitcoin SPV enables lightweight block header verification, allowing nodes to synchronize with the Bitcoin network in a decentralized manner, providing reliable on-chain data input for the Lightning Network.
2. Information Processing and Storage: The PoS-based blockchain network provides distributed storage of Lightning Network channel states. It also processes information for BTC and Taproot Assets, supplying necessary data for upper-layer applications. This mechanism ensures data redundancy and resistance to censorship.
3. Security Assurance : Decentralized threshold signatures replace the local key management system of Lightning Network nodes, enhancing key security and flexibility. The aggregation feature of Schnorr Signatures is used to construct a (t, n) threshold signature network, replacing the traditional single-key management model of the Lightning Network.
4. Privacy and Complexity : The MAST structure allows complex conditional scripts to be represented on-chain as a single hash, improving both privacy and script complexity. Through these mechanisms, the Taproot Consensus extension layer effectively converts verified Lightning Network data into standardized blockchain states. While ensuring security and privacy, it enhances the overall system's performance and scalability. It not only connects the underlying Bitcoin and Lightning Networks but also provides the upper-layer applications with rich and reliable data and functional support.
#### 3.5 Fusion Layer The Fusion Layer reflects the scalability of Super Bitcoin. It builds on top of Taproot Consensus and utilizes the extensibility of the Substrate framework to achieve a multi-chain interconnected system. Its key features include:
1. Scalable Multi-Chain Architecture: Supports the deployment and interconnection of an unlimited number of lightning chains, with BEVM serving as a special lightning chain responsible for managing cross-chain interactions and resource scheduling.
2. Heterogeneous Compatibility and Standardized Protocols: Compatible with multiple virtual machines (such as MoveVM, CairoVM, SVM, EVM) and achieves atomic asset exchange and state synchronization through a standardized cross-chain protocol based on the Lightning Network.
3. Shared Security and Flexible Consensus: All lightning chains inherit the security of the Bitcoin network, while adopting a pluggable consensus design, with the default being a Taproot-compatible BFT variant.
4. Ecosystem Expansion: Facilitates the rapid migration of existing blockchain technologies, extending the decentralized BTC ecosystem to various Turing-complete blockchain applications.
With these features, the Fusion Layer enables Super Bitcoin to evolve into a highly scalable, secure, and interoperable multi-chain ecosystem, providing robust infrastructure support for blockchain innovation.
3.6 Application Layer
The Application Layer is built on top of Super Bitcoin's multi-chain architecture, offering developers a diverse decentralized application (DApp) ecosystem. Leveraging the security, scalability, and interoperability of the underlying layers, it supports the deployment of applications on any Turing-complete virtual machine. Developers can choose to quickly deploy proprietary application chains within the lightning chain framework, or they can deploy various applications directly on the lightning chains. All these applications and chains automatically inherit the consensus and security guarantees of the Bitcoin network.
The Application Layer integrates multiple smart contract execution environments, supporting programming languages such as Solidity (EVM), Move, Cairo, and Rust. The Application Layer lowers the entry barrier for developers and accelerates the innovation cycle. Through standardized API interfaces, developers can utilize Lightning Network channels to achieve decentralized cross-chain asset transfers and information exchanges. Additionally, it incorporates protocols like Taproot Assets, which are compatible with the Lightning Network, further enhancing cross-chain functionality.
Although the services provided by the Application Layer are similar to other VM-based public blockchains, it has two distinctive features: first, it allows the use of decentralized native BTC as the base currency for applications; second, the entire application layer shares the security of the Bitcoin network. Such design not only offers a rich development environment but also ensures that applications are built on solid security and native cryptocurrency support.
4. Shared Consensus Security
Shared BTC consensus security is the security core of our five-layer architecture. This concept is derived from Polkadot's shared security model, which Polkadot defines as Shared Security, also known as Pooled Security, is one of Polkadot's unique value propositions. In essence, it means that all parachains connected to Polkadot's relay chain benefit from the full security of the entire Polkadot network.
Our five-layer protocol architecture further extends this concept by leveraging the Bitcoin (BTC) network—currently recognized as the most secure blockchain consensus system—to ensure the security of the entire ecosystem. Compared to Polkadot's parachains, which share Polkadot's consensus security, our architecture is directly built on top of the Bitcoin network, sharing Bitcoin’s consensus security.
Existing BTC Layer2 solutions typically ensure security through cross-chain mechanisms or BTC staking, which only utilize part of Bitcoin’s consensus security. In contrast, our five-layer protocol is built on the Lightning Network, using HTLC (Hashed Timelockd Contract) and commitment transactions, with security fully dependent on BTC consensus. This design allows our system to fully inherit the consensus security of the Bitcoin network.
Specifically, our architecture achieves shared BTC consensus security through the following methods:
-
Leveraging the peer-to-peer channels of the Lightning Network to ensure that all transactions are ultimately settled on the Bitcoin mainnet.
-
Using HTLC commitment transactions, where each state update is protected by the consensus of the Bitcoin network.
-
Through the Taproot Consensus extension layer, extending Bitcoin's security features to more complex smart contract environments.
-
In the multi-chain system, all lightning chains share Bitcoin’s network consensus security, ensuring consistency and reliability across the entire ecosystem.
5. Lightning Chain
Based on the shared BTC consensus security, we utilize the lightning chain to create a Value Internet. To achieve this, the architecture of the lightning chain network is inspired by Polkadot's relay chain and parachain design:
-
Relay Chain: It serves as the central nervous system of the entire network, responsible for the overall security, cross-chain communication, and consensus mechanism. The relay chain does not execute specific application logic but focuses on coordinating the operations of the entire ecosystem.
-
Parachains: These are independent blockchains that run in parallel with the relay chain. Each parachain can have its own token economy and governance mechanism, achieving interoperability through the relay chain and sharing the security guarantees provided by the relay chain. Drawing from Polkadot’s design, Super Bitcoin proposes a multi-chain interoperability system based on Bitcoin and the Lightning Network. In this system, the Lightning Chain functions similarly to Polkadot's parachains, with the following unique characteristics:
Shared BTC Consensus Security: Unlike Polkadot’s independent consensus model based on PoS staking, Lightning Chain directly inherits the consensus security of the Bitcoin network, providing unprecedented security for the entire ecosystem.
-
Lightning Network Integration: Lightning Chain deeply integrates Lightning Network technology, enabling high-speed, low-cost transaction processing, significantly enhancing the throughput and efficiency of the entire system.
-
Scalability: Theoretically, an unlimited number of Lightning Chains can be deployed, with each Lightning Chain optimized for specific application scenarios or industry needs, offering a high degree of flexibility and scalability.
-
BEVM as the Core Coordinator: In this ecosystem, BEVM (Bitcoin-Enhanced Virtual Machine) acts as a special Lightning Chain, playing a role similar to that of Polkadot’s relay chain. It is responsible for the governance and resource allocation of the entire network, ensuring efficient collaboration between different Lightning Chains.
-
Shared Lightning Network Liquidity: All Lightning Chains share the same Lightning Network, which means they can access a common liquidity pool, improving capital efficiency.
These features not only highlight the innovative design of Lightning Chain but also underscore its fundamental differences from existing BTC Layer 2 solutions. By directly sharing Bitcoin network consensus security and Lightning Network liquidity, Lightning Chain achieves a qualitative leap in both security and interoperability.
5.1 Lightning Chain
The Lightning Chain is the core component of Super Bitcoin that directly interacts with users. Its main responsibilities include handling user transactions, managing asset mapping, and executing smart contracts.
5.1.1 BTC Asset Mapping
Lightning Chain functions as both a node in the Lightning Network and a PoS (Proof of Stake) network. In this system, BTC is locked within the Lightning Network, while L-BTC represents the user's BTC balance in their Lightning Chain account. The mapping process between these two ensures the consistency and security of the assets. The specific BTC-to-L-BTC mapping process is as follows: - The user establishes a channel with the Lightning Chain via the standard Lightning Network protocol. - The user deposits A BTC into the Lightning Network channel. - As the Lightning Chain operates as a PoS network, the validators within the network observe this new BTC deposit. - Once more than two-thirds of the validators reach consensus and confirm the BTC deposit event, the Lightning Chain will issue A L-BTC accordingly.
This process ensures that the issuance of L-BTC always maintains a 1:1 ratio with the BTC locked in the Lightning Network channel. It's important to note that L-BTC is self-custodied by the user, so there is no need to worry about asset security. Additionally, PoS consensus here is not used to secure L-BTC assets but acts as a distributed ledger for the state of the Lightning Network channel, solving the potential issue of data loss in local storage by Lightning Network nodes.
5.1.2 Smart Contract Interaction on the Lightning Chain
Interaction with smart contracts on the Lightning Chain follows a "authorize first, execute later" paradigm. In this process, users need to convert L-BTC into M-BTC, where M-BTC represents the asset that can interact with smart contracts on the Lightning Chain. The specific interaction process is as follows:
- Asset Preparation: The user holds A BTC in the Lightning Network state channel and decides to interact with a smart contract using 1 BTC.
- Authorization Operation: The user authorizes the Lightning Chain network to convert 1 L-BTC into 1 M-BTC. This step does not immediately execute the conversion but provides the necessary permissions for subsequent interactions.
- Smart Contract Invocation: The user initiates a smart contract call, specifying the use of 1 M-BTC. The Lightning Chain network checks the authorization and, upon confirming its validity, performs the following actions: destroys 1 L-BTC from the user’s balance, mints 1 M-BTC, and uses it directly for interaction with the smart contract.
- Transaction Execution: The smart contract executes the specified operation using the minted M-BTC.
This process enables the seamless application of Bitcoin assets within a smart contract environment while maintaining a clear separation between L-BTC, which functions as channel liquidity, and M-BTC, which serves as a medium for contract interaction.
5.2 System Chain
System Chain is the core coordination component of Super Bitcoin implemented through the upgraded BEVM (Bitcoin-Enhanced Virtual Machine). As a special Lightning Chain, it establishes direct connections with all regular Lightning Chains in the network, forming an efficient star topology structure. This design makes the System Chain the central hub of Super Bitcoin.
The System Chain is primarily responsible for incentivizing Lightning Network nodes and coordinating cross-chain interoperability, effectively managing the entire network to ensure its efficient operation. In terms of node incentives, the System Chain implements a complex and sophisticated mechanism. It uses a dynamic reward algorithm that adjusts reward distribution based on the activity level, liquidity provided, and overall contribution to the network. During this process, the System Chain considers multi-dimensional evaluation metrics, such as the node’s uptime, transaction throughput, and routing efficiency.
In terms of cross-chain interoperability, the System Chain plays a key coordination role, facilitating seamless interactions between different Lightning Chains. It implements a secure cross-chain communication protocol based on Hashed Time Lock Contract (HTLC), ensuring the security and reliability of message transmission. Additionally, the System Chain introduces an atomic swap mechanism, which effectively prevents potential loss of funds during cross-chain asset transfers. Furthermore, by defining a unified cross-chain asset standard, the System Chain simplifies the asset mapping process between different Lightning Chains, further improving the efficiency and convenience of cross-chain operations.
6. Economic Model
The economic model of BEVM (Bitcoin-Enhanced Virtual Machine) combines Bitcoin’s issuance mechanism with the functional characteristics of the Lightning Network. It aims to address the sustainable competitiveness of Super Bitcoin and provide a long-term incentive system for the Lightning Network.
At the core of this model is the combination of Lightning Network node incentives and a staking-mining mechanism. Lightning Network nodes that establish state channels with the BEVM network can participate in staking mining. Staking mining uses a Verifiable Random Function (VRF) to determine mining probabilities, rather than distributing rewards proportionally based on the staked amount.
During the staking mining process, participants stake BTC in state channels, and the system calculates the mining probability based on the VRF. For example, if three nodes stake 100 BTC, 10 BTC, and 1 BTC, their respective mining probabilities would be 90.09%, 9.01%, and 0.90%. This mechanism ensures that smaller stakers also have a substantial opportunity to earn rewards. A dedicated whitepaper on the economic model will be released for this section, so this document will not go into further details.
7. Future Development
7.1 Short-Term Goals
The short-term goals of Super Bitcoin focus on implementing core functionalities and building the necessary infrastructure. By realizing the proposed five-layer protocol, we will introduce smart contract functionality based on the Lightning Network while sharing BTC consensus security. For users, participating in Super Bitcoin ensures that the BTC they hold remains fully under their control. At the same time, they will be able to use BTC, Taproot Assets, and other native assets within smart contracts.
7.2 Long-Term Vision
The long-term vision of Super Bitcoin is to build a global Value Internet that shares BTC consensus security. We aim to design an incentive mechanism through an innovative economic model, promoting widespread use of Lightning Network nodes. Furthermore, we are committed to deeply integrating existing blockchain ecosystems with Super Bitcoin, enabling the free flow and interaction of BTC assets. By doing so, we aim to create a secure, efficient, and interoperable blockchain ecosystem where BTC becomes the core, and all blockchain consensus models share the security of the Bitcoin network. Ultimately, our goal is to enable the Bitcoin network to scale infinitely while maintaining decentralization.
7.3 Potential Challenges and Solutions
Super Bitcoin faces several potential challenges in achieving its goals. Transforming Lightning Network nodes into a full-fledged network involves complex technical challenges that require extensive testing. Another challenge is designing a better economic incentive model to attract enough Lightning Network node operators to adopt Super Bitcoin. Ensuring seamless communication and atomic swaps between different node networks is also crucial, and the team will focus on developing standardized protocols and interfaces to enhance network interoperability. As the system’s complexity increases, maintaining network security will become more challenging. Super Bitcoin will adopt rigorous security audit processes and consider introducing advanced cryptographic technologies to strengthen system security. As the number of lightning chains grows, managing the state and interaction between networks may pose scalability challenges. By actively addressing these challenges, Super Bitcoin aims to bring revolutionary changes to the Bitcoin and Lightning Network ecosystems, creating a more flexible, efficient, and scalable infrastructure.
8. Conclusion
The five-layer architecture introduced by Super Bitcoin not only solves the problem of existing BTC Layer 2 solutions not being able to share Bitcoin's consensus security but also addresses the limitation of the Lightning Network being restricted to payment scenarios. It perfectly combines the shared BTC consensus security with smart contract functionality. Our protocol uses the Bitcoin network as the core, ensuring the highest level of security. It leverages the Lightning Network to construct an efficient communication layer, significantly improving scalability and flexibility while preserving the security of the native BTC consensus. By introducing Taproot Consensus as the extension layer, it abstracts Bitcoin and Lightning Network data to provide actionable data for the upper layers. Through the multi-chain fusion layer formed by lightning chains, we achieve a "multi-chain interconnection" supporting the free flow of cross-chain assets. The application layer offers developers a rich set of tools, fostering the development of a diverse DApp ecosystem. Combined with the innovative VRF-based staking mining mechanism, Super Bitcoin adds an incentive layer to the Lightning Network and allows the decentralized Bitcoin network to have unlimited flexibility and scalability.
9. References
[1] Nakamoto, S. (2008). "Bitcoin: A Peer-to-Peer Electronic Cash System." https://bitcoin.org/bitcoin.pdf
[2] Poon, J., & Dryja, T. (2016). "The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments." https://lightning.network/lightning-network-paper.pdf
[3]Habermeier, S., et al. (2020). "Substrate: A modular framework for building blockchains." https://www.parity.io/substrate/
[4]Wuille, P., Nick, J., & Towns, A. (2019). "Taproot: SegWit version 1 spending rules." https://github.com/bitcoin/bips/blob/master/bip-0341.mediawiki
[5] Nick, J., Seurin, Y., & Wuille, P. (2020). "Schnorr Signatures for secp256k1." https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki
[6]Wood, G. (2016). "Polkadot: Vision for a heterogeneous multi-chain framework." https://polkadot.network/PolkaDotPaper.pdf
-
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:28:32Chef's notes
Serve with bread, and side salad
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10 ½ ounces) condensed chicken gumbo soup
- ½ Soup can tomato juice
- ½ Soup can water
- Croutons
Directions
- Add soup, juice, and water.
- Heat through, stirring often.
- Serve with croutons
-
@ bbba037f:33dd566c
2024-10-11 08:47:17Introduction
คุณ Josh เล่าว่าจุดเริ่มต้นของการเปลี่ยนแปลงในชีวิตของเขาเกิดขึ้นเมื่อ 2 ปีที่แล้ว ตอนที่เขามีลูกสาวน้อง Lela ซึ่งการรับบทบาทเป็นพ่อและแม่ มันเป็นเรื่องที่เจ๋งสุดๆ แต่ก็ตามมาด้วยการเปลี่ยนแปลง การจัดลำดับความสำคัญในชีวิต และการเรียนรู้สิ่งต่างๆ ที่เกิดขึ้นตามมาอีกมากมาย เช่น การแต่งตัวให้ลูก ซึ่งเขายังทำได้ไม่ดีนัก
คุณ Josh และคุณ Kelsey ภรรยาของเขา ต่างก็ประกอบอาชีพธุรกิจส่วนตัวและอยู่บ้านกันเป็นหลัก (work from home) เขาเป็นนักเขียนและภรรยาเป็นครูสอนคอร์สโยคะออนไลน์ ชีวิตของเขาทั้งสองคนนั้นยุ่งสุดๆ เพราะมีหลายสิ่งหลายอย่างที่ต้องจัดการให้เสร็จ ทั้งเรื่องงานและลูก หลายสัปดาห์ผ่านไป เขาเริ่มมีความคิดนึงเกิดขึ้นในหัว.. 'ชีวิตของเขาคงไม่มีเวลาว่างอีกแน่นอน' ซึ่งมันเหมือนจะจริงมากๆ ในวันนั้น
สิ่งนี้รบกวนจิตใจเขาอย่างมาก เพราะการเรียนรู้สิ่งใหม่ๆ เป็นสิ่งที่เขาชอบมากกว่าสิ่งอื่นใด และเรียนรู้สิ่งต่างๆ อย่างต่อเนื่องทำให้เขาเติบโตและพัฒนาตัวเองต่อไปได้เรื่อยๆ
The 10000 hour rule
เขาเริ่มเข้าไปห้องสมุด ร้านหนังสือ เพื่อค้นหาวิธีการที่เขาจะเรียนรู้สิ่งต่างๆ ได้เร็วที่สุด และเพื่อที่จะตอบคำถามว่า 'ต้องใช้เวลานานเท่าไหร่ถึงจะมีทักษะใหม่เกิดขึ้นได้' คำตอบคือ 10,000 ชั่วโมง หรือ กฎ 10,000 ชั่วโมง (The 10000 hour rule)! งั้นฉันคงไม่มีวันได้เรียนรู้อะไรใหม่อีกเลยแน่ๆ (เขาคิด)
10,000 ชั่วโมงนี่มันยาวนานมาก นานพอจะเป็น full-time job ได้เลยนะ พวกเราต่างเคยต้องเริ่มเรียนรู้สิ่งใหม่ๆ ในชีวิตกันใช่ไหม มันไม่เห็นต้องใช้เวลาขนาดนั้นเลย จริงๆ แล้วกฎ 10,000 ชั่วโมง มันออกมาจากงานวิจัยที่วัดประสิทธิภาพในระดับผู้เชี่ยวชาญ โดยศาสตราจารย์จากมหาวิทยาลัยรัฐฟลอลิด้า ชื่อคุณ K. Anders Ericsson. งานวิจัยนี้ทำในนักกีฬามืออาชีพ นักดนตรีระดับโลก ปรมาจารย์ด้านหมากรุก และเหล่าผู้เชี่ยวชาญด้านต่างๆ อีกมากมาย ซึ่งยิ่งใช้เวลาไปกับการเรียนรู้และฝึกฝนมากเท่าไหร่ คุณก็ยิ่งทำสิ่งนั้นได้ดีขึ้นตาม และ 10,000 ชั่วโมงคือระยะเวลาเฉลี่ยที่คุณจะขึ้นเป็นสู่การเป็นระดับต้นๆ ของวงการนั้น
นั่นหมายความว่า.. ต้องใช้ 10,000 ชั่วโมงสู่การขึ้นเป็นระดับท็อป ต้องใช้ 10,000 ชั่วโมงเพื่อที่จะกลายเป็นผู้เชี่ยวชาญ ต้องใช้ 10,000 ชั่วโมงเพื่อที่จะเก่งในสักเรื่องนึง และต้องใช้ถึง 10,000 ชั่วโมง เพื่อที่จะเรียนรู้เรื่องใดสักเรื่อง มันไม่จริงเลยครับ!
The learning curve
เขาเริ่มใช้เวลาที่ห้องสมุด CSU มากขึ้น เพื่อศึกษาว่าเพราะอะไร และค้นพบว่าในงานวิจัย ผู้เข้ารับการทดลองจะได้รับงานๆ นึง ซึ่งงานนั้นอาจจะต้องใช้ทักษะทางกายภาพหรือทางจิตใจ ผู้เข้ารับการทดลองส่วนใหญ่จะใช้เวลาค่อนข้างนานเนื่องจากนั่นคือสิ่งใหม่ในชีวิตพวกเขาและผลลัพธ์อาจจะไม่เป็นที่น่าพึงพอใจในช่วงแรก (กราฟ รูปที่ 1) แต่อย่างไรก็ตามการฝึกฝนตอนเริ่มต้นเป็นช่วงที่ส่งผลต่อประสิทธิภาพอย่างมาก และผู้คนต่างจะเริ่มเห็นผลลัพธ์ที่ดี แม้ว่าจะเพิ่งฝึกฝนไปได้เพียงระยะเวลาสั้น
ทีนี้ถ้าทักษะที่เราต้องการเป็นทักษะที่เราทำเพื่อตัวของพวกเราเอง เราก็ไม่สนใจว่ามันต้องใช้เวลาเท่าไหร่ แต่สิ่งที่เราสนใจคือเราทำมันได้ดีมากน้อยแค่ไหน (กราฟ รูปที่ 2) ตอนเริ่มแรกคุณอาจจะยังขาดคุณสมบัติอีกมากมาย แต่เมื่อคุณค่อยๆ เรียนรู้มันทีละนิด คุณจะเริ่มทำมันได้ดีและเร็วมาก จนถึงจุดหนึ่งที่เส้นกราฟจะเริ่มชะลอตัวหรือขยับช้าลง ซึ่งจุดนั้นการพัฒนาจะเริ่มยากขึ้นและใช้เวลาเพิ่มขึ้น
คำถามคือ 'เราต้องใช้เวลานานเท่าไหร่ จากจุดเริ่มต้นที่เรายังไม่มีทักษะอะไร ไปจนถึงจุดนั้นที่เรากล่าวมาก่อนหน้า' คำตอบคือ 20 ชั่วโมงครับ! ทีนี้ล่ะ ไม่ว่าเราจะอยากเรียนภาษา วาดรูป ตัดต้นไม้ทำฟืน คุณเพียงแค่ใช้ 20 ชั่วโมงในการตั้งใจจดจ่ออยู่กับมัน แล้วคุณจะประหลาดใจว่ามันเป็นไปได้และคุณจะทำมันได้ดีด้วย (ประมาณ 45 นาทีต่อวัน ประมาณหนึ่งเดือน)
Method
20 ชั่วโมง อาจจะดูเป็นตัวเลขที่ยากจะคิดคำนวณ แต่เขามีวิธีอันชาญฉลาด และเกิดประสิทธิภาพมากที่สุด อีกทั้งคุณยังสามารถทำมันได้อีกด้วย นั่นคือการ 'แยกองค์ประกอบ' (deconstruct) ทักษะที่เราอยากเรียนรู้ออกเป็นส่วนเล็กๆ เพราะทักษะส่วนใหญ่เรามักคิดมันคือเส้นเชือกมัดใหญ่และเต็มไปด้วยสิ่งที่ต้องรู้แตกต่างกันมากมายมัดรวมกันอยู่ เมื่อค่อยๆ แบ่งส่วนย่อยออกมา เราจะเห็นส่วนที่เราต้องการมันจริงๆ และเริ่มฝึกฝนสิ่งนี้ก่อน ซึ่งสิ่งนี้จะทำให้เราได้เพิ่มประสิทธิภาพการทำงานของเราได้ในระยะเวลาอันสั้น
ขั้นตอนถัดไปคือ คุณต้องเรียนรู้มากพอที่จะตรวจความถูกต้องด้วยตนเอง (self-correct) สิ่งนี้จำเป็นต้องใช้ 3-5 แหล่งข้อมูล (หนังสือ DVD ฯลฯ) แต่ห้ามใช้มันเป็นข้ออ้างในการผลัดวันประกันพรุ่ง! และค่อยๆ ขจัดอุปสรรค (Remove barriers) ออกไป อะไรก็ตามที่ขัดขวางการเรียนรู้ของคุณ เช่น TV และ internet
เมื่อปฏิบัติตามนี้ คุณจะค่อยๆ ใช้เวลาอย่างน้อย 20 ชั่วโมงต่อจากนี้อย่างตั้งใจและจดจ่อ (Practice for 20 hours) จากนั้นคุณจะเริ่มเผชิญหน้ากับ frustration barrier ซึ่งเป็นความรู้สึกเบื่อหน่ายหรือโง่เขลาในช่วงหนึ่งของการเรียนรู้ แต่สิ่งเหล่านี้จะผ่านไป เมื่อคุณมุ่งหน้าเรียนรู้สิ่งใดๆ ติดต่อกันยาวนานอย่างน้อย 20 ชั่วโมง มันยาวมากพอที่คุณจะได้รับรางวัลจากสิ่งที่คุณทำ และนี่คือ 4 ขั้นตอนง่ายๆ ที่คุณจะนำมันไปใช้เรียนรู้อะไรก็ได้
คุณ Josh ยกตัวอย่างการฝึกเล่น Ukulele ของเขาและเขานำมันมาเล่นโชว์บนเวทีด้วย ขั้นแรกคือเราต้องมี Ukulele สักเครื่อง เขาเริ่มต้นที่การติดตั้งสาย จูนเสียง และฝึกซ้อมมัน เขาเริ่มค้นหาเพลงและคอร์ดที่จะเล่นทางออนไลน์ และค้นพบว่าจำนวนคอร์ดนั้นมีมากมายหลายร้อยคอร์ด นั่นทำให้เขาเริ่มรู้สึกกลัวขึ้นมา แต่แท้ที่จริงแล้ว ในเพลงหนึ่งเพลง คอร์ดมันถูกใช้ซ้ำไปซ้ำมา กลายเป็นว่าการเล่น Ukulele ก็เหมือนเขาแทบไม่ต้องทำอะไรเลย เพราะเพลงส่วนใหญ่ใช้ประมาณ 4-5 คอร์ดเท่านั้นเอง
เขาเริ่มเล่นชุดเพลง medley จากเพลงป๊อปที่เขาเพิ่งเจอมา จากวงที่ชื่อว่า Axis of Awesome. (Whistles) ซึ่งเพลงทั้งหมดใช้เพียงแค่ 4 คอร์ด คือ G, D, Em and C (มักพบคอร์ดนี้ในทุกเพลงป๊อปด้วย) หลังเล่นเสร็จ เขายังกล่าวด้วยว่านี่คือการฝึกเล่นเพียง 20 ชั่วโมงของเขาเท่านั้น มันเจ๋งมากใช่ไหม
Conclusion
ไม่ว่าคุณจะอยากเรียนรู้อะไรใหม่ก็ตาม ความรู้สึกไม่เก่ง ไม่ถนัด (intellectual) ในตอนต้นนั้นจะเป็นกำแพงสำคัญที่มีผลต่อจิตใจของคุณ มันทำให้คุณรู้สึกกลัว รู้สึกโง่เขลา รู้สึกกลัว และรู้สึกไม่ดี (emotional) ซึ่งภาวะทางจิตใจนั้นมีผลมากที่สุด แต่ไม่ว่าจะเกิดอะไรขึ้น คุณจงใช้เวลา 20 ชั่วโมงใส่ไปกับทุกเรื่อง ทุกทักษะที่คุณอยากเรียนรู้ จงออกไปและทำมัน ขอให้มีความสุขครับ :)
4 simple steps *ย้ำอีกครั้ง
1. แยกองค์ประกอบ (deconstruct) 2. ตรวจความถูกต้องด้วยตนเอง (self-correct) 3. ขจัดอุปสรรค (Remove barriers) 4. Practice for 20 hours
Josh Kaufman is the author of the #1 international bestseller, 'The Personal MBA: Master the Art of Business', as well as the upcoming book 'The First 20 Hours: Mastering the Toughest Part of Learning Anything.' Josh specializes in teaching people from all walks of life how to master practical knowledge and skills. In his talk, he shares how having his first child inspired him to approach learning in a whole new way.
siamstr
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:20:20Chef's notes
Serve with bread, and side salad.
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10 ½ ounces) condensed chicken noodle soup
- ½ Soup can V8 juice
- ½ Soup can water
- Croutons
Directions
- Add soup, V8, and water.
- Heat through, stirring often.
- Serve with croutons
-
@ a012dc82:6458a70d
2024-10-11 05:39:57Table Of Content
-
- Supply and Demand
-
- Institutional Adoption
-
- Regulatory Environment
-
- Market Sentiment
-
- Bitcoin Halving
-
- Competition
-
- Technological Advancements
-
Conclusion
-
FAQ
Bitcoin, the first and most popular cryptocurrency, has had a tumultuous journey since its inception in 2009. It has experienced both sharp highs and crushing lows, but the value of Bitcoin has continued to rise steadily over the years. The reasons behind Bitcoin's value are complex, but there are several game-changing factors that have played a significant role in determining its value. In this article, we will discuss the top 7 game-changing factors that determine Bitcoin's value.
1. Supply and Demand
The most fundamental factor that determines the value of any asset is supply and demand. Bitcoin is no exception. Bitcoin's supply is limited to 21 million coins, and as of May 2023, approximately 18.7 million Bitcoins have already been mined. This limited supply makes Bitcoin a scarce asset, and as demand for Bitcoin increases, its value rises. Conversely, if demand falls, Bitcoin's value can drop.
2. Institutional Adoption
Institutional adoption is another game-changing factor that has influenced Bitcoin's value. In recent years, many large institutions, including PayPal, Square, and Tesla, have started to invest in Bitcoin. This institutional adoption has brought credibility to Bitcoin and helped to increase its mainstream acceptance. As more institutions invest in Bitcoin, its value is likely to continue to rise.
3. Regulatory Environment
The regulatory environment is another crucial factor that affects Bitcoin's value. Governments around the world have been struggling to come up with regulations for cryptocurrencies, and their actions can have a significant impact on the value of Bitcoin. If governments impose strict regulations that limit the use and adoption of Bitcoin, its value could fall. Conversely, if governments adopt more crypto-friendly policies, it could help to increase the value of Bitcoin.
4. Market Sentiment
Market sentiment refers to the overall mood and attitude of investors towards an asset. It can be influenced by a variety of factors, including news events, social media trends, and general economic conditions. Market sentiment can have a significant impact on the value of Bitcoin. If investors are optimistic about the future of Bitcoin, its value can rise. Conversely, if investors are pessimistic, its value can drop.
5. Bitcoin Halving
Bitcoin halving is an event that occurs approximately every four years when the number of Bitcoins rewarded to miners is cut in half. This event is designed to control the supply of Bitcoin and ensure that it remains a scarce asset. The previous halving events in 2012 and 2016 both led to significant increases in the value of Bitcoin. The next halving event is expected to occur in 2024, and many analysts believe it could lead to another surge in Bitcoin's value.
6. Competition
Bitcoin is not the only cryptocurrency in the market. There are thousands of other cryptocurrencies, including Ethereum, Ripple, and Litecoin, to name a few. Competition from other cryptocurrencies can have a significant impact on the value of Bitcoin. If investors shift their focus to other cryptocurrencies, it can cause Bitcoin's value to drop. Conversely, if Bitcoin remains the most popular and widely used cryptocurrency, its value is likely to continue to rise.
7. Technological Advancements
Finally, technological advancements can also have a significant impact on the value of Bitcoin. Bitcoin is built on a complex blockchain technology, and advancements in this technology can improve the speed and efficiency of Bitcoin transactions. This can help to increase the adoption of Bitcoin and, in turn, its value. Conversely, if Bitcoin technology falls behind other cryptocurrencies, it could cause its value to drop.
Conclusion
The value of Bitcoin is determined by a complex interplay of factors, including supply and demand, institutional adoption, the regulatory environment, market sentiment, Bitcoin halving, competition, and technological advancements. Investors who understand these factors and keep a close eye on them are more likely to make informed decisions about
FAQ
What is the most important factor that determines Bitcoin's value? The most important factor that determines Bitcoin's value is supply and demand. As demand for Bitcoin increases, its value rises.
How does institutional adoption impact Bitcoin's value? Institutional adoption brings credibility to Bitcoin and increases its mainstream acceptance, leading to a rise in its value.
What is Bitcoin halving? Bitcoin halving is an event that occurs approximately every four years when the number of Bitcoins rewarded to miners is cut in half to control the supply of Bitcoin.
How does competition from other cryptocurrencies affect Bitcoin's value? Competition from other cryptocurrencies can cause Bitcoin's value to drop if investors shift their focus to other cryptocurrencies. Conversely, if Bitcoin remains the most popular and widely used cryptocurrency, its value is likely to continue to rise.
How do technological advancements impact Bitcoin's value? Technological advancements can improve the speed and efficiency of Bitcoin transactions, increase its adoption, and, in turn, its value. However, falling behind other cryptocurrencies in technology could cause Bitcoin's value to drop.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:16:16Chef's notes
Serve with bread, and side salad.
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 can (10.5 ounces) condensed cream of mushroom soup
- 1 Can (10 ½ ounces) condensed chicken noodle soup
- 1 can (10.5 ounces) condensed vegetable soup.
- 3 Soup cans water
- Croutons
Directions
- Add soups, and water.
- Heat through, stirring often.
- Serve with croutons
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:11:19Chef's notes
Serve with crackers, or croutons, and side salad. Fiesta Nacho cheese soup gives a pleasant kick of flavor
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10.5 ounces) condensed Cheddar cheese soup
- 1 Cans (10 ½ ounces) condensed tomato soup
- 2 Soup cans water
- Bacon, fried and crumbled.
Directions
- Combine soups, and water.
- Heat through, stirring often.
- Garnish with bacon.
-
@ 1bda7e1f:bb97c4d9
2024-10-24 04:48:52Tldr
- Nostr relays help users post and read notes on the network
- Relay operators have launched a variety of relays for you to use
- You too can launch your own relay for any reason you like
- Launching your own relay gives you a lot of power in how you use Nostr
- Many relay softwares exist for you to use
- I launched a personal relay using HAVEN relay software on my VPS
- I am now more in control of saving notes, cutting spam, and protecting my privacy
- My personal relay is now hosted at relay.rodbishop.nz
What are Nostr Relays Anyway?
When you're a user of a social network, you post and read notes from other users on the network. In a centralised network like Twitter or Instagram the company's servers receive all user's notes and relay them to other users. On Nostr, there is no single company's servers to relay messages, so instead the task is taken up by relay operators.
Anyone can be a relay operator and they can run a relay for any purpose. When you start using Nostr you will usually be connected to any one of a number of "public" relays, and be able to post and receive notes from users on the network via these.
Configuring these relays can tailor your experience somewhat–for example the client Nostrudel allows you to select from Western or Japanese relay set.
It is also possible to set up your own relay to use for your own purposes. All kinds of people have launched relays for all kinds of purposes. For example, to:
- Power your own client
- Support your community
- Run a for-profit relay business
- Relay a certain a type of content you need
- Back up your own notes, decrease spam, or increase privacy
- Curate your own social feed with your own algorithm
Relay instances available to connect with
Today is an interesting time in relay-ops. The evolution of the technology has inspired users to experiment with diverse types of relays tailored to various needs. As a result there are very many relay instances in operation and available to connect with.
A few sites try to collate which relays are in operation, like nostr.info and xport.top and sesseor's relay list . These lists are long (Sessor's list counted 2,500+ relays) and it's not clear to me whether it's even possible to be comprehensive as relays may join or leave the network all the time.
Broadly speaking, relays might be available for different users to use in different ways:
- A relay where anyone can post, like relay.damus.io
- A paid relay where anyone can post after payment, to cut spam, like nostr.wine
- A "web of trust" relay where anyone can post if they are related to the owner's social graph, to cut spam, like nostrelites.org
- A speciality relay where a particular community can post, like nostr.com.au for #austriches (Australians)
- A relay where anyone can post just specific content, like purplepag.es for user profiles only
- A team relay for your company or organisation only
- A personal relay for your own personal use
Nostr.Band shows which of these available relays are most popular, such as relay.damus.io and nos.lol and eden.nostr.land
Relay softwares for you to launch your own
You may decide to launch you own relays, and if you do there are many different relay softwares to choose from:
- Simple, like Bucket (<100 lines of code)
- Widely used, like Nostream (top ranked on Github)
- Customisable, like Khatru (a framework for customised relays)
- Specialised, like HAVEN or Team Relay (for personal or teams relays, based on Khartu)
You can run these on your own server, or local machine, or phone or with a third-party host.
Aljaz provides a great resource with 45+ relay softwares to choose from.
In summary, at a high level,
- Anyone can connect to any of the relay instances that are available for them to use
- Anyone who wants to launch their own can select the relay software that best suit their needs, launch an instance, and have it used by whichever users they like
Reasons to Run Your Own Relay
As a normal user of a Nostr client there's no obligation to run a relay. But having your own relay does give you more power.
For my own journey down the #nostr rabbit hole, I was looking for a relay to:
- back up my notes
- decrease spam
- increase my privacy
- learn skills I could later use for running a community or team or paid relay
Backing up notes – When you post notes to a public relay there's no guarantee that the relay is going to keep them long-term. It's job is relaying your notes to other clients, not storing them. Running your own relay allows you to keep your notes online.
Decrease spam – To first spam we can use a "Web of Trust" model–in which users endorse other users as trustworthy. A "Web of Trust" relay will reject notes from parties too far removed from your network. Running your own relay makes you more difficult to spam.
Increasing privacy – When you connect to a public relay, they can determine personal information about you, such as your IP address. Running your own relay keeps things more private.
For communities and teams and paid relays – Many opportunities exist to tailor relays to certain users needs, be they businesses or communities or as a for-profit business. For me, I am hoping that running my own relay helps me learn skills I can use in these kinds of further ventures.
To start I decided to focus on a personal relay. However, when I really got under the hood, it turned out I would need multiple relays not just one.
The outbox model
Mike Dilger proposed the outbox model (originally called the gossip model) as a way for users to engage with the wider Nostr network. It's a great model that is helpful to understand, as it suggests to establish different relays for different purposes.
Many clients and relay softwares have now adopted and continued to elaborate on this model. An example is to run specialised relays for Outbox, Inbox, Chat and Private needs.
Outbox Relay (also called Home Relay)
- This relay is for notes you have written, so that everyone knows where to find your notes
- In a set up where you are running your own, this relay is restricted so that only you can post to it, and you should set up your clients to post your notes to it
- An advanced version may take any notes received to this relay and "blast" them to other public relays so that your notes get wider reach
Inbox Relay (also called Public Relay)
- This relay is for public notes that other users want you to see, so that you always find notes that are relevant to you, including all replies, comments, likes, and zap payments
- In a set up where you are running your own, this relay is where you should look for notes relevant to you, and you should set up your clients to read from it
- An advanced version may search other public relays for notes that tag you, and import them into this relay so that you never miss a relevant note
Chat Relay (also called Direct Message Relay)
- This relay is for private direct message notes from other users, so that you always find your direct messages and so that they stay private
- In a set up where you are running your own, this relay is restricted so that only you can read from it, and you should set up your clients to read from it
- An advanced version may cut spam by only accepting direct messages from other users within your Web of Trust
Private Relay
- This relay is for your private use only, so that you can store private drafts or thoughts
- Only you can write to it and only you can read from it (and so, it is a bit mis-named as it does not actually relay anything to anywhere at all)
- In a set up where you are running your own, it gives you true privacy for these notes
In summary as a user
- I post my notes to my outbox relay. Network users can read them there, and if the relay is advanced it will also blast the notes out to other relays on the network
- I read from my inbox relay. Network users know to reach me there, and if the relay is advanced it will also bring me notes from the wider network
- I can have private direct message conversations with others in my chat relay.
- I can save private notes in my private relay
For me, this model has a lot of appeal and I went looking for a personal relay which adopted this model and contained all of these features.
HAVEN as a personal relay
I decided to go with HAVEN relay software.
HAVEN is all four of the above relays in one–outbox, inbox, chat and private. It contains advanced features like blasting your notes from outbox to other relays, importing notes from other relays to your inbox, and preventing spam with Web of Trust.
HAVEN is written by Utxo the Webmaster . It is based upon the Khatru relay framework by Fiatjaf
Setting up HAVEN as a Personal Relay
I am mostly non-technical, but on my #Nostr journey I have been having success with technology set ups that use Docker.
- I have a cheap VPS which currently runs Albyhub and Phoneixd with Docker,
- My objective was to set up HAVEN to run alongside it, in a separate Docker on the same server. HAVEN does not include Docker by default, but Sebastix published a fork with Docker support.
To get HAVEN up and running in Docker on your VPS:
- Clone and configure HAVEN with the right variables
- Launch it in Docker on your VPS
- Check the URLs and logs to see your HAVEN running
- Configure a subdomain to point to the VPS
- Configure the VPS to reverse proxy to the Docker port
- Configure the relays in your favourite Nostr client
- Post a note to your outbox and see if it blasts!
Running HAVEN
I cloned Sebastix fork to start.
git clone -b docker_compose_support https://github.com/nostrver-se/haven.git cd haven
The software sets up all environment variables in the
.env
file, and comes with an.env.example
file. Duplicate and rename the file to.env
. Within the.env
file you need to set up the environment variables. The file is long but it contains lots of repetition and for the most part defaults can be retained–only a few changes are required:- Replace all instances of the default user npub with your own (for me,
npub1r0d8...
) - Change the default relay URL to your own (for me,
relay.rodbishop.nz
) - Replace all instances of the default name in the relay names (for me, "Rod's ...")
- Replace all instances of the default profile image with your own
To enable automatic blasting from your outbox, and importing to your inbox, the software comes with an example list of relays to blast and import from. See
relays_blastr.example.json
andrelays_import.example.json
. To use these features simply duplicate and rename these files torelays_blastr.json
andrelays_import.json
respectively. Within these files you can specify the public relays of your choice. I simply used the default list.There are other features available, such as backups and initial imports, but I decided to handle these later. To start with I wanted to launch the relay and test it.
To launch the relay run Docker Compose.
docker-compose up -d docker logs haven-relay
Then you should explore the logs in the command line and the ports in your browser to see if it launched successfully. The logs should show your web of trust has been built successfully and the browser should show simple landing pages.
The logs should show that the relay has queried the network and built a web of trust from your followers. Mine looked as follows.
2024/10/14 12:02:08 🌐 building web of trust graph 2024/10/14 12:02:16 🫂 total network size: 13296 2024/10/14 12:02:16 🔗 relays discovered: 335 2024/10/14 12:02:17 🌐 pubkeys with minimum followers: 9394 keys
Your browser should show you have four relays in operation, for example as follows.
your_IP_address:3355
(your outbox or home relay)your_IP_address:3355/private
(your private relay)your_IP_address:3355/chat
(your direct message relay)your_IP_address:3355/inbox
(your inbox relay)
That's it. Your relay is online.
Connecting HAVEN
Now all that remains is the plumbing to connect your domain, relay, and Nostr clients together.
Configure DNS
First, configure your domain. At a high level –
- Get your domain (buy one if you need to)
- Get the IP address of your VPS
- In your domain's DNS settings add those records as an A record to the subdomain of your choice, e.g.
relay
as inrelay.your_domain_name.com
, or in my caserelay.rodbishop.nz
Your subdomain now points to your server.
Configure reverse proxy
Next, you need to redirect traffic from your subdomain to your relay at port
3355
.On my VPS I use Caddy as a reverse proxy for a few projects, I have it sitting in a separate Docker network. To use it for my HAVEN Relay required two steps. I am sure that the way I do this is not very elegant, but it worked. If you prefer a different method, the HAVEN readme also comes with instructions on how to perform a similar setup using nginx.
For my method, my steps were as follows:
- Add configuration to Caddy's
Caddyfile
to tell it what to do with requests for therelay.rodbishop.nz
subdomain - Add the Caddy Docker network to the HAVEN
docker-compose.yml
to make it be part of the Caddy network
For the addition to the
Caddyfile
, I used as follows:relay.rodbishop.nz { reverse_proxy haven-relay:3355 { header_up X-Forwarded-For {remote} header_up X-Forwarded-Proto {scheme} header_up X-Forwarded-Port {server_port} } }
For the addition to the
docker-compose.yml
, I used as follows:``` networks: - caddy # Added this line to services to connect to the Caddy network
networks: caddy: external: true # Added this to section specify the Caddy network ```
Once your DNS configuration and reverse proxy setup are completed, you should now be able to access your Nostr client at
relay.your_domain_name.com
. For my set up, this wasrelay.rodbishop.nz
.Connecting your Nostr client
Most Nostr clients allow you to specify any relay you choose. My go-to client at the moment is Amethyst on Android. Amethyst allows you to specify discrete relays for each role in the outbox model which ties up very neatly with HAVEN.
- In the sidebar, select Relays
- For "Public Outbox/Home Relays" enter
relay.your_domain_name.com
- For "Public Inbox Relays" enter
relay.your_domain_name.com/inbox
- For "DM Inbox Relays" enter
relay.your_domain_name.com/chat
- For "Private Home Relays" enter
relay.your_domain_name.com/private
- Click Save to broadcast your new relays to the Nostr network.
Your new relay configuration is now live.
Testing your relay
Lastly, it's time to test. Amethyst provides a simple method to test this as it allows you to configure the relays used on each post.
- Create a test note, and then before you post it, edit your relays using the icon at the top
- Turn off all relays except your own outbox relay, and post the note
- Access your HAVEN docker logs with
docker logs haven-relay
and see if there is a log to indicate if the note was received and blasted to other public relays - Copy the
nevent
of the note, and attempt to find it in another client
If you're in luck, you may see something like this (the blasted note, and then users on the network responding to the note in turn).
2024/10/22 00:12:23 🔫 blasted 95c477af7e6b612bf5d1d94309d2d57377a0a67d2181cfbb42a2e3fbc0feeaaf to 26 relays 2024/10/22 00:13:50 🤙 new reaction in your inbox 2024/10/22 00:14:42 🫂 new reaction in your inbox 2024/10/22 00:14:45 ✅ new reaction in your inbox 2024/10/22 00:15:12 💜 new reaction in your inbox 2024/10/22 00:17:03 ✅ new reaction in your inbox 2024/10/22 00:17:03 🫂 new reaction in your inbox 2024/10/22 00:17:55 🫂 new reaction in your inbox 2024/10/22 00:19:02 📰 new note in your inbox
That's it. If you followed this successfully your personal relay is up and running.
What I did wrong so you don't have to
My first relay was too public
This blog comes after much trial and error. The first error I made was I set up a relay to use as a personal relay, but without any restrictions on use. I very quickly found other people discovered and started using my relay to save their own notes! This was unintended and I had to take it down.
Unfamiliar with Go language
I am mostly non-technical, and completely unfamiliar with Go. I got the project up and running with Go on my localhost–with a lot of help from my AI–but I then completely failed in migrating this to my VPS. Moving to Docker made the difference for me here.
I failed a few times due to a messy folder
After messing with Go, I moved to the Docker setup, but I started my work from a messy folder which contained remnants of the Go build, which caused various failures. Deleting the folder and cloning again from scratch solved the issue.
Trouble with Nostr.wine
I subscribe to the Nostr.wine paid relay, and I initially added it to the list of relays in my blaster. However, it didn't work, and the logs showed an error as follows
CLOSED from wss://nostr.wine: 'auth-required: this relay only serves private notes to authenticated users'
It seems my npub's subscription to Nostr.wine is not enough for it to permit my relay to blast notes to it. In the end, I removed Nostr.wine from my relay config, and kept Nostr.wine as a separate entry in my Client's outbox settings.
Failed to create web of trust graph
When I first launched the relay on my VPS, HAVEN failed to complete the Web of Trust graph, with a log that looked as follows (note the zeroes). As a result, no one would have been able to send me DM's to my Chat relay (it would flag every message as spam).
2024/10/14 12:02:08 🌐 building web of trust graph 2024/10/14 12:02:16 🫂 total network size: 0 2024/10/14 12:02:16 🔗 relays discovered: 0 2024/10/14 12:02:17 🌐 pubkeys with minimum followers: 0 keys
I never got to the bottom of why this was. In the process of trying to fix it I rebuild the container, and on the rebuild it spontaneously worked. Accordingly my lesson learned is "if in doubt, turn if off and on again".
Failed to run --import function
HAVEN comes with a function to import all your old notes from other public relays to your own outbox relay. When I run it I get an error as follows:
panic: Cannot acquire directory lock on "db/private". Another process is using this Badger database. error: resource temporarily unavailable
I have yet to work out the solution for this, and will update this note when I do so!
What's Next?
Over the past four blogs I have
- Mined a Nostr pubkey and backed up the mnemonic
- Set up Nostr payments with a Lightning wallet plus all the bells and whistles
- Set up NIP-05 and Lighting Address at my own domain
- Set up a Personal Relay at my own domain
This feels like a very comprehensive personal set up now. Also, I have uncovered some new rabbit holes and feel like I have some projects to tackle. Perhaps one of these?
- Set up a personal homepage with my Nostr feed to round-out my rodbishop.nz domain
- Experiment with different signers like Amber and Nsec.app and NFC cards
- Set up a paid relay for #austriches (Australians and Kiwis on Nostr)
- Set up a team relay to experiment with Nostr for business or community projects
- Or something else ... ?
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
Pura vida Nostr.
-
@ a012dc82:6458a70d
2024-10-24 02:48:43Table Of Content
-
Project A: Solar-Powered Mining Farms
-
Project B: Hydroelectricity-Powered Mining
-
Project C: Waste Heat Recovery
-
Project D: Energy-Efficient Mining Hardware
-
Project E: Proof of Stake (PoS) Consensus
-
Project F: Carbon Offset Initiatives
-
Conclusion
-
FAQ
The rising popularity of Bitcoin has raised concerns about its environmental impact. Traditional Bitcoin mining processes consume vast amounts of energy, contributing to carbon emissions and environmental degradation. However, there is a growing movement towards sustainable mining practices that aim to minimize the ecological footprint of cryptocurrency production. In this article, we will delve into the world of green Bitcoin mining and highlight six exciting projects that are leading the charge towards sustainable practices.
1. Project A: Solar-Powered Mining Farms
With solar energy being one of the cleanest and renewable sources available, Project A aims to harness its power for Bitcoin mining. By setting up solar-powered mining farms, this project significantly reduces reliance on fossil fuels and minimizes carbon emissions. Additionally, excess solar energy can be stored for later use, making mining operations more resilient and sustainable.
2. Project B: Hydroelectricity-Powered Mining
Project B taps into the potential of hydroelectricity, utilizing the power of flowing water to generate electricity for Bitcoin mining. Hydroelectric power is not only renewable but also provides a consistent and reliable energy source. By harnessing this form of energy, Project B aims to achieve sustainable mining operations while reducing the carbon footprint associated with traditional mining methods.
3. Project C: Waste Heat Recovery
Project C focuses on utilizing waste heat generated from industrial processes for Bitcoin mining. By capturing and repurposing this excess heat, mining operations become more energy-efficient and environmentally friendly. This approach not only reduces carbon emissions but also maximizes the use of resources that would otherwise go to waste, promoting a circular economy.
4. Project D: Energy-Efficient Mining Hardware
Project D tackles the sustainability challenge by developing energy-efficient mining hardware. By optimizing the design and performance of mining equipment, this project aims to reduce energy consumption without compromising mining capabilities. The use of advanced technologies and materials enables miners to achieve higher processing power with lower energy requirements, leading to more sustainable mining operations.
5. Project E: Proof of Stake (PoS) Consensus
Project E explores an alternative consensus mechanism called Proof of Stake (PoS), which requires significantly less energy compared to the traditional Proof of Work (PoW) algorithm. Instead of relying on computational power, PoS validates transactions based on the amount of cryptocurrency held by a participant. This shift in consensus mechanism can drastically reduce energy consumption and make Bitcoin mining more environmentally friendly.
6. Project F: Carbon Offset Initiatives
Project F recognizes that some carbon emissions may still be unavoidable in the mining process. To mitigate this impact, they focus on supporting carbon offset initiatives. By investing in projects that reduce or remove carbon dioxide from the atmosphere, such as reforestation or renewable energy projects, Project F aims to offset the environmental impact of Bitcoin mining, making it more sustainable in the long run.
Conclusion
As the demand for Bitcoin continues to rise, so does the need for sustainable mining practices. The projects mentioned above represent just a glimpse of the innovative solutions being developed to make crypto mining more environmentally friendly. By harnessing renewable energy sources, optimizing mining equipment, and exploring alternative consensus mechanisms, these projects are leading the race for sustainable mining. Through their efforts, they are shaping a future where Bitcoin and other cryptocurrencies can coexist harmoniously with a greener planet.
FAQ
What is sustainable mining? Sustainable mining refers to the practice of conducting mining operations while minimizing the negative environmental impact. It involves adopting strategies and technologies that reduce energy consumption, carbon emissions, and other ecological footprints associated with mining activities.
How does solar-powered mining work? Solar-powered mining harnesses the energy from the sun using solar panels to generate electricity. This clean and renewable energy source powers the mining equipment, reducing reliance on fossil fuels and minimizing carbon emissions.
What is the difference between Proof of Stake (PoS) and Proof of Work (PoW)? Proof of Stake (PoS) and Proof of Work (PoW) are two different consensus mechanisms used in blockchain networks. PoW relies on computational power to validate transactions, while PoS validates transactions based on the amount of cryptocurrency held by participants. PoS requires significantly less energy compared to PoW, making it more environmentally friendly.
How can waste heat recovery be used for mining? Waste heat recovery involves capturing and repurposing excess heat generated from industrial processes. This heat is used to power mining equipment, making the mining operations more energy-efficient and sustainable. It reduces the need for additional energy sources and minimizes waste.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com ** X: @croxroadnews**
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:05:38Chef's notes
Trim down bread to fit serving bowl, if necessary, prior to broiling. Top with Parmesan cheese.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10.5 ounce) condensed onion soup
- ½ Soup can water
- ½ Soup can V8 juice
- 4 Ounces sliced roast beef
- 2-3 slices French, or Italian bread, or Texas Toast
- Butter
- Parmesan cheese
Directions
- Combine soup, water, and V8 juice.
- Heat to simmer.
- Add roast beef, heat throug
- Ladle soup in bowl
- Top soup with bread
- Top bread with roast beef
-
@ 52adc2ef:9f4bc0ba
2024-10-11 02:07:57หลังจากที่เราทราบเป้าหมายทางเงินของเราเเล้ว จาก Part 2 ถ้าคิดเเบบง่าย คือ ทำงานเพิ่มเพื่อให้ได้รายได้มาทำให้ถึงเป้าเรา
เเละอีกทางนึงยอดฮิตเลย คือ มีสอนเยอะไปหมด หรือ ทุกคนต้องได้ยินกัน
คือ การลงทุน
ทำไมต้องลงทุน
เคยคิดมั้ยครับว่า ทำไม มันน่าจะเป็นสิ่งที่ต้องทำเหมือนสิ่งปกติไปเเล้วในสังคมใช่มั้ยครับ เเบบไม่รู่อิโหน่อิเหน่ ก็ต้องลงทุน ซื้อกองทุนเพื่อลดหย่อนภาษี มีคลิปเยอะมาก ในสื่อต่างๆ
แล้วเราไม่ลงทุนได้มั้ย
ถ้าให้ตอบคงต้องบอกว่า ไม่ได้ครับ
ใน Part ที่เเล้วมันมีตัวที่บีบเราอยู่ นั้นคือ เงินเฟ้อ
ถ้าเราวางเงินฝากธนาคารไว้เฉยๆหรือใส่ตุ่มไว้มูลค่าเงินของเราจะเสื่อมลงเเบบทบต้น (ทุกคนคงไม่อยากให้เงินที่หามาเหนื่อยระเหยไปเเน่นอน)
สมมุติ ให้เงินเฟ้อ 5% ต่อปี มีเงิน 100 บาท 1 ปีผ่านไป 100x5%=95 บาท เหลือเงิน 95 บาท 1 ปีผ่านไป 95x5%=90.25 บาท
เงินที่มีเราจับจ่ายได้น้อยลง ส่วนรายละเอียดเงินเฟ้อคืออะไร ไว้มาเเชร์กันอีกครั้งเป็นหัวข้อต่างหากเลยดีกว่าครับ
ทำให้เราต้องหาที่เก็บเงินในรูปแบบที่ต้องชนะเงินเฟ้อ ซึ่งถ้าการลงทุนเเบบทั่วไปที่คุ้นชินกัน
หุ้น หุ้นกู้หรือพันธบัตรรัฐบาล กองทุนรวม ทองคำ อสังหาริมทรัพย์
จากเป้าหมายของ Part ที่เเล้ว ยกตัวอย่าง อายุ 30 ปี
เงินที่ต้องการใช้ต่อเดือน 20,000 บาท (เอาเเบบคิดเป็นเงินปัจจุบันนะครับ) ต่อปี 240,000 บาท จำนวนปีหลัง 20 ปี เกษียณ สมมุติว่า 60 ปี อยู่ถึง 80 ปี(โดยเฉลี่ยน่าจะประมาณนี้) =4,800,000 บาท (เงินปัจจุบัน)
ให้เงินเฟ้อ 5 % ต่อปี
=12,735,828.98 บาท
ต้องเก็บเงินเดือนละ 15,213 บาทเเละลงทุนอย่างน้อยได้ 5% ต่อปีทุกปี (น่าจะไหวกันนะ)เก็บ 30 ปี
ในความเป็นจริงเวลาผ่านไป เราต้งมาคำนวนใหม่เพิ่มเติมด้วยเพราะ เงินเฟ้อ มันมีทุกปี ทำให้ยอดนี้เปลี่ยนเเปลงไปครับ ส่วนใครอยากลองกดคำนวนตามลิ้งค์นี้เลย https://www.bot.or.th/th/satang-story/financial-tools/savings-tools.html#tabs-d0275122dd-item-697da07f73-tab
เราลองหากองทุนผลตอบเเทนของปี 2024 มาดูได้ตามนี้เลยครับ
ทุกคนน่าจะทราบกันเเละเคยได้ยินว่าการลงทุนมีความเสี่ยง เราจึงต้องศึกษาเพิ่มเติม เรียนรู้เรื่องจิตวิทยาการลงทุน บริหารความเสี่ยง มีหลายๆเรื่องที่ต้องทราบ เพราะในตลาดมีคนเก่งๆกว่าเราเยอะมากก
หรือเเม้กระทั่งอสังหาริมทรัพย์ก็ต้องมีความรู้ในการเลือกซื้อ ทองคำก็เป็น Store of value ที่ดีที่พิสูจน์มานานเเล้ว เเต่เเนะนำเก็บเป็นทองจริงดีกว่านะครับ เเละอย่าซื้อทองที่ราคาถูกไป (เหมือนที่มีข่าว) มันไม่น่าจะมีจริง
มีอย่างอื่นอีกมั้ยที่ไม่ใช่ลงทุนเเบบดั้งเดิม
มีคนถามอยากเก็บเป็น Bitcoin ได้มั้ย ได้นะครับ ก็มี ลิ้งค์คำนวนว่าเก็บ BTC เท่าไหร่เกษียณได้
จากรูปลองเก็บเเบบเองเงินที่คิดข้างต้นจากเก็บเเบบทรัพย์สินดั้งเดิม 15,000 ต่อเดือน ใช้ 20,000 ต่อเดือนตอนเกษียณ สรุปอายุ 47 ปี รอดเเล้ว (อันนี้เเล้วเเต่ความกาว อยากดมกี่ป๋องก็กดปรับได้เลย) ลิ้งค์ทางนี้เลยครับผม (ต้องแปลงหน่วนเป็น USD นะ) https://calc.bitcoineracademy.com/?currentAge=30&lifeExpectancy=85¤tSavings=0&annualBuy=5454&bitcoinCagr=10&desiredRetirementIncome=7272&inflationRate=5&optimized=true
จากPartการลงทุน น่าจะพอเห็นภาพนะครับว่า มีเป้าหมายเเล้ว ลงทุนก่อน น่าจะดีกว่าเอาเงินไปลงทุนเลย เเต่เราไม่ได้ลงรายบะเอียดเเต่ละทรัพย์สินนะครับ เพราะอยากให้เห็นภาพรวมของการวางแผนก่อน สิ่งสำคัญคือรู้จำนวนเงินที่จะลงทุนหรือเเบ่งเงินเก็บในสินทรัพย์ที่เก็บมูลค่าได้ ดีกว่าเเน่นอน
มาถึงตรงนี้น่าจะเห็นภาพว่าเป้าหมาย ทำให้เรา วางเงินเป็นสัดส่วนมากขึ้น
ติดตาม Part สุดท้ายเป็นส่วนของสินเชื่อเเละประกัน ยังไงฝากด้วยนะครับบ
-
@ 13e63e99:25525c6a
2024-10-24 02:44:17Bitcoin has experienced a notable 129.2% price increase this year, with a solid 8.9% gain this month alone. This rise has been driven by an improving risk-on sentiment in the market, spurred by better-than-expected earnings from major Wall Street firms. The strong earnings reports have helped bolster investor confidence, contributing to a broader appetite for riskier assets like Bitcoin, which has been increasingly seen as a hedge against traditional financial uncertainties.
Additionally, growing speculation around a potential Federal Reserve rate cut in November has further fueled Bitcoin's momentum. Investors are factoring in the possibility that the Fed may pivot from its current monetary tightening, which could lead to a more favorable macroeconomic environment for assets like Bitcoin that thrive in low-interest-rate scenarios.
Moreover, the political landscape is playing a significant role in driving Bitcoin's price action. The increasing odds of pro-Bitcoin candidate Donald Trump winning the 2024 presidential election are adding to market optimism. Trump's favorable stance on cryptocurrency and his potential return to office are viewed by many investors as a catalyst for more crypto-friendly regulations and policies, further boosting Bitcoin's appeal.
In combination, these factors—improving market sentiment, potential Fed rate cuts, and political developments—are creating a bullish outlook for Bitcoin as we move toward the end of 2024. Investors are increasingly viewing Bitcoin as both a hedge and a speculative asset, positioning it well in the current economic and political climate.
Reference: Yahoo Finance
Tesla transfers $765 million to self-custody wallets, highlighting the importance of Bitcoin self-custody. Bitcoin self-custody refers to the practice of directly controlling and managing your own Bitcoin holdings, rather than relying on a third-party custodian such as a cryptocurrency exchange or wallet service. When you hold Bitcoin in self-custody, you are responsible for securely storing your private keys—unique cryptographic codes that grant access to your Bitcoin and allow you to send or spend it. This approach gives individuals full control over their assets and eliminates the need to trust a centralized institution with their funds.
Self-custody is a critical component of Bitcoin’s ethos, which emphasizes decentralization, financial sovereignty, and the ability to own and transfer wealth without reliance on intermediaries. By opting for self-custody, individuals are empowered to truly "own" their Bitcoin, free from the risks associated with third-party custodians, such as hacks, mismanagement, or insolvency. The mantra "Not your keys, not your coins" reflects the idea that if someone else holds your private keys, they effectively control your Bitcoin, and you are at risk of losing access.
The Importance of Multisignature in Bitcoin Self-Custody
While self-custody offers enhanced control and security, it also comes with the responsibility of safeguarding your private keys. Losing access to these keys means losing access to your Bitcoin permanently, which can be a daunting prospect. This is where multisignature (multisig) technology plays a crucial role in bolstering the security of Bitcoin self-custody.
Multisignature refers to a security feature that requires multiple private keys to authorize a Bitcoin transaction, rather than relying on a single key. For example, a 2-of-3 multisig setup might require two out of three designated keys to approve any movement of funds. This adds an extra layer of protection in several ways:
-
Enhanced Security: Multisig helps mitigate the risk of a single point of failure. If one key is lost, stolen, or compromised, the funds are still safe because the attacker would need access to multiple keys. This protects against theft, hacking, and loss of keys.
-
Redundancy and Backup: With a multisig setup, you can distribute your keys across different locations or devices, ensuring that even if one key is lost or damaged, you can still recover your funds using the remaining keys. For example, you might store one key on a hardware wallet, another in a safe, and give a trusted family member or service provider control of the third.
-
Shared Control: Multisig is particularly useful in shared ownership scenarios, such as for businesses, trusts, or family members who want joint control over Bitcoin holdings. It ensures that no single individual can act alone in transferring or spending the Bitcoin, which provides a governance structure and reduces the risk of rogue actors.
-
Mitigating Human Error: Managing private keys can be intimidating, especially for individuals new to Bitcoin. Multisig setups can reduce the risk of human error by allowing for the recovery of funds even if a single key is lost or forgotten. It provides a balance between the autonomy of self-custody and the security measures of traditional custodianship.
Multisignature solutions offer a powerful tool to enhance security, reduce risks, and provide flexibility in managing Bitcoin holdings. By combining self-custody with multisig, users can significantly reduce the likelihood of loss or theft while maintaining full control over their assets.Some prominent Multisig platforms: Unchained Capital, Lumin, Casa
Reference:Multis.co, Unchained Capital, Lumin, Casa
Bitcoin Hashrate Hits All-Time High, Signaling Stronger Network Security and Potential Miner Consolidation
The Bitcoin hashrate has reached a new all-time high of 791.6 exahashes per second (EH/s) on Oct. 21, reflecting the increasing security of the network. This rise, driven by advancements in mining hardware like ASICs, has been on a steady upward trend since 2021.
While a higher hashrate boosts the security of the Bitcoin network, it also increases the cost to mine 1 BTC, potentially leading to miner consolidation, especially for smaller firms with less efficient rigs. With the 2024 Bitcoin halving reducing block rewards, energy-efficient mining equipment will be essential for profitability.
Despite the rising mining costs, Bitcoin miners have not significantly increased their selling, minimal miner transfers to centralized exchanges during this period.
Reference: Ycharts, Cointelegraph
Nearly Half of Traditional Hedge Funds Now Invest in Digital Assets Amid Regulatory Clarity and ETF Launches
Nearly half of hedge funds focused on traditional assets now have exposure to cryptocurrencies, driven by clearer regulations and the launch of ETFs in the U.S. and Asia, according to the Global Crypto Hedge Fund Report by AIMA and PwC.
The report revealed 47% of traditional hedge funds now invest in digital assets, up from 29% in 2023. Of those, 67% plan to maintain their digital assets investments, while the rest intend to increase by year-end.
Hedge funds, once focused on spot trading, are now deploying more sophisticated strategies. In 2024, 58% traded crypto derivatives, up from 38% in 2023, while spot trading dropped to 25% from 69%.
Reference: Pwc
UAE Exempts Digital Assets Transactions from VAT, Aligning with Traditional Financial Services
The United Arab Emirates (UAE) has exempted cryptocurrency transactions from value-added tax (VAT), aligning the industry with several traditional financial services. Effective Nov. 15, this change retroactively applies to transactions dating back to Jan. 1, 2018. The Arabic version of the Federal Tax Authority’s update was released on Oct. 2, 2024, with the English translation following on Oct. 4.
This exemption clarifies that digital assets are not subject to the 5% VAT. It covers the exchange and transfer of ownership of cryptocurrencies, meaning all digital assets transfers and conversions are now VAT-exempt.
"The UAE has essentially classified virtual assets in the same category as traditional financial services, many of which are already VAT-exempt. This move legitimizes virtual assets," said Ankita Dhawan, a senior associate at the Métis Institute, a dispute resolution think tank.
Reference: CoinDesk, Cryptopolitan
We are going to El Salvador!
Our managing partner will be speaking at Adopting Bitcoin 2024! If you're a founder, entrepreneur, or Bitcoin enthusiast, feel free to reach out. We look forward to hearing from you!
Reference: X.com
LifPay NFC Card Manufacturing Program has officially launched!
Reference: X.com
-
-
@ 7362636d:eec5ab4c
2024-10-23 21:31:29/start
-
@ f685c7b9:b1be053e
2024-10-10 20:18:01Fiat truth #5 - Creatives, Communities and the Road to Hyperbitcoinization
The fact that bitcoin is not a currency of exchange is, obviously, fiat-information. It is not a common currency of exchange--yet. But, it is a currency of exchange here on SN, Nostr, and at any vendor that wants it to be.
If we are to believe we will see the day when Bitcoin becomes the currency of global exchange and hyperbitcoinization happens, then we have to believe in the power of culture to sway politics.
Breitbart's doctrine says, "politics is downstream from culture." Bitcoiners must believe this to be true. If you don't, this is how I see it happening:
-
Bitcoin attracts creatives and frees up their time for creative pursuits. This happens because its hard af.
-
Creatives generate communities meet-ups that use/hold bitcoin.
-
These communities use a decentralized communication protocol (Nostr).
-
Nostr facilitates exchange of decentralized hard money (Bitcoin), enabling easy V4V monetization. This attracts more creatives.
Rinse and repeat.
What communities are you contributing to on Nostr?
FR nostr:nprofile1qyvhwumn8ghj7emjda6hquewve5kzar2v9nzucm0d5hsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0qqs0dpw8hy20n6caf7ddqwn8yumr83p2rladg09xmuw87phlkxlq20slrm2xh
originally posted at https://stacker.news/items/718072
-
-
@ 18bdb66e:82eb5e5d
2024-10-14 23:58:32Chef's notes
Serve with side salad.
Details
- ⏲️ Prep time: 10 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 3 sausage links cut into penny sized slices, or two patties crumbled
- 2 Cans (10 ½ ounces) condensed minestrone soup
- 1 can (10.5 ounces) condensed tomato soup.
- 3 Soup cans water
- Croutons
Directions
- Brown sausage in saucepan
- Add soups, and water
- Heat through, stirring often.
- Garnish with croutons
-
@ 8dac122d:0fc98d37
2024-10-10 19:49:23Maxims of Commercial Law [^1]
There are ten essential maxims or precepts in commercial law. Here they go:
1. 1. WORKMAN IS WORTHY OF HIS HIRE.
The first of these is expressed in Exodus 20:15; Lev. 19:13; Mat. 10:10; Luke 10"7; II Tim. 2:6. Legal maxim: "It is against equity for freemen not to have the free disposal of their own property."
1. 2. ALL ARE EQUAL UNDER THE LAW
The second maxim is "Equality before the law" or more precisely, ALL ARE EQUAL UNDER THE LAW. (God's Law - Moral and Natural Law). Exodus 21:23-25; Lev. 24: 17-21; Deut. 1;17, 19:21; Mat. 22:36-40; Luke 10:17; Col. 3:25. "No one is above the law". This is founded on both Natural and Moral law and is binding on everyone. For someone to say, or acts as though, he is "above the law" is insane. This is the major insanity in the world today. Man continues to live, act, believe, and form systems, organizations, governments, laws and processes which presume to be able to supercede or abrogate Natural or Moral Law. But, under commercial law, Natural and Moral Law are binding on everyone, and no one can escape it. Commerce, by the law of nations, ought to be common, and not to be converted into a monopoly and the private gain of the few.
1. 3. IN COMMERCE TRUTH IS SOVEREIGN
This one is one of the most comforting maxims one could have, and your foundation for your peace-of-mind and your security and your capacity to win and triumph -- to get your remedy -- in this business. IN COMMERCE TRUTH IS SOVEREIGN. (Exodus 20:16; Ps. 117:2; John 8:32; II Cor. 13:8 ). Truth is sovereign -and the Sovereign tells only the truth. Your word is your bond. If truth were not sovereign in commerce, i.e., all human action and inter-relations, there would be no basis for anything. No basis for law and order, no basis no accountability, there would be no standards, no capacity to resolve anything. It would mean "anything goes", "each man for himself", and "nothing matters". That's worse than the law of the jungle. Commerce. "To lie is to go against the mind". Oriental proverb: "Of all that is good, sublimity is supreme."
1. 4. TRUTH IS EXPRESSED IN THE FORM OF AN AFFIDAVIT.
(Lev. 5:4-5; Lev. 6:3-5; Lev. 19:11-13: Num. 30:2; Mat. 5:33; James 5: 12). An affidavit is your solemn expression of your truth. In commerce, an affidavit must be accompanied and must underlay and form the foundation for any commercial transaction whatsoever. There can be no valid commercial transaction without someone putting their neck on the line and stated, "this is true, correct, complete and not meant to mislead." When you issue an affidavit, it is a two edged sword; it cuts both ways. Someone has to take responsibility for saying that it is a real situation. It can be called a true bill, as they say in the Grand Jury. When you issue an affidavit in commerce you get the power of an affidavit. You also incur the liability, because this has to be a situation where other people might be adversely affected by it. Things change by your affidavit, in which are going to affect people's lives. If what you say in your affidavit is, in fact, not true, then those who are adversely affected can come back at you with justifiable recourse because you lied. You have told a lie as if it were the truth. People depend on your affidavit and then they have lost because you lied.
1. 5. AN UNREBUTTED AFFIDAVIT STANDS AS TRUTH IN COMMERCE.
(12 Pet. 1:25; Heb. 6:13-15;) Claims made in your affidavit, if not rebutted, emerge as the truth of the matter. Legal Maxim: "He who does deny, admits."
1. 6. AN UNREBUTTED AFFIDAVIT BECOMES THE JUDGMENT IN COMMERCE.
(Heb. 6:16-17;). There is nothing left to resolve. Any proceeding in a court, tribunal, or arbitration forum consists of a contest, or duel, of commercial affidavits wherein the points remaining unrebutted in the end stand as truth and matters to which the judgment of the law is applied.
1. 7. IN COMMERCE FOR ANY MATTER TO BE RESOLVED MUST BE EXPRESSED.
(Heb. 4:16; Phil. 4:6; Eph. 6:19-21). No one is a mind reader. You have to put your position out there, you have to state what the issue is, to have someone to talk about and resolve. Legal Maxim: "He who fails to assert his rights has none.
1. 8. HE WHO LEAVES THE BATTLEFIELD FIRST LOSES BY DEFAULT
The primary users of commercial law and those who best understand and codified it in Western civilization are the Jews. This is Mosaic Law they have had for more than 3500 years past which is based upon Babylonian commerce. This one is: HE WHO LEAVES THE BATTLEFIELD FIRST LOSES BY DEFAULT. (Book of Job; Mat. 10:22;) This means that an affidavit which is unrebutted point for point stands as "truth in commerce" because it hasn't been rebutted and has left the battlefield. Governments allegedly exist to resolve disputes, conflicts and truth. Governments allegedly exist to be substitutes for the dueling field and the battlefield for so disputes, conflicts of affidavits of truth are resolved peaceably, reasonably instead of by violence. So people can take their disputes into court and have them all opened up and resolved, instead of going out and marching ten paces and turning to kill or injure. Legal Maxim: "He who does not repel a wrong when he can, occasions it".
1. 9. SACRIFICE IS THE MEASURE OF CREDIBILITY
(NO WILLINGNESS TO SACRIFICE = NO LIABILITY, RESPONSIBILITY, AUTHORITY OR MEASURE OF CONVICTION). Nothing ventured nothing gained. A person must put himself on the line assume a position, take a stand, as regards the matter at hand. and One cannot realize the potential gain without also exposing himself to thew potential of loss. (One who is not damaged, put at risk, or willing to swear an oath on his commercial liability to claim authority) (Acts 7, life/death of Stephen). for the truth of his statements and legitimacy of his actions has no basis to assert claims or charges and forfeits all credibility and right Legal Maxim: "He who bears the burden ought also to derive the benefit".
1. 10. SATISFACTION OF A LIEN.
In commerce a lien or claim can be satisfied in any one of three ways. (Gen. 2-3; Mat. 4; Revelation.). By someone rebutting your affidavit, with another affidavit of his own, point by point, until the matter is resolved as to whose is correct, in case of non-resolution. You convene a Sheriff's common law jury, based on the Seventh Amendment, concerning a dispute involving a claim of more than $20. Or, you can use three disinterested parties to make judgment. The only other way to satisfy a lien is to pay it.
Legal Maxim: "if the plaintiff does not prove his case, the defendant is absolved".
10. A LIEN OR CLAIM CAN BE SATISFIED ONLY THROUGH REBUTTABLE BY AFFIDAVIT POINT BY POINT, RESOLUTION BY JURY, OR PAYMENT.
Commercial Law is non-judicial. This is pre-judicial (not prejudice). This is timeless. This is the base, the foundation beneath which any government or any of their court systems can possibly exist or function.
That means what the courts are doing, and what all governments are ultimately adjudicating and making rules about, are these basic rules of Commercial Law. When you go into court and place your hand on the Bible you say, "I swear the truth, the whole truth, and nothing but the truth..." you have just sworn a Commercial Affidavit.
It's the conflict between Commercial Affidavits of Truth that gives the court something to talk about, that forms the entire basis of its action, and its being there, in their venue. Hence, one of the reasons attorneys always create controversy.
No court and no judge can overturn or disregard or abrogate somebody's Affidavit of Truth. The only one who has any capacity or right or responsibility or knowledge to rebut your Affidavit of Truth is the one who is adversely affected by it. It's his job, his right, his responsibility to speak for himself. To issue his own affidavit because no one can speak it for him. No one else can know what your truth is or has the free-will responsibility to state it. This is YOUR job.
[^1]: source: https://understandcontractlawandyouwin.com/ten-essential-maxims-precepts-commercial-law/
originally posted at https://stacker.news/items/717953
-
@ b6dcdddf:dfee5ee7
2024-10-10 19:06:49Hey frens,
At Geyser we are powering Bitcoin creators to change the world through Bitcoin crowdfunding.
We love Stacker News, zapathons, and power Bitcoin and Nostr ideas into existence.
originally posted at https://stacker.news/items/717857
-
@ 8b0a2bea:857d369f
2024-10-10 19:06:08Hey frens,
At Geyser we are powering Bitcoin creators to change the world through Bitcoin crowdfunding.
We love Stacker News, zapathons, and power Bitcoin and Nostr ideas into existance.
originally posted at https://stacker.news/items/717857
-
@ 3ad01248:962d8a07
2024-10-23 18:59:53Well I casted my vote early and I didn't vote for Donald Trump or Kamala Harris. I ended up voting for Chase Oliver, the Libertarian candidate for president. Even though I know he has snowball's chance in hell of winning, I simply couldn't bring myself to vote for the two candidates that are pro-war and pro-genocide.
I needed to be able to sleep at night knowing that I did not lend my consent to the mass killing of people in Gaza and around the world using American military equipment to do it. My vote was in protest to the two parties twisted sense of entitlement and delusions of grandeur. The policies that are put in place by these candidates do have an impact on the rest of the world. As much as we would like it not to be the case, it simply is.
So if you are voting for Donald Trump or Kamala Harris you know full well that they represent and what their policies are in regards to foreign policy. When it comes to foreign policy both parties are indistinguishable from each other.
Democrats and Republicans are strong supporters of Israel and will not do anything to stop the genocide occurring there at the moment. The question you have to ask yourself as you step into that voting booth is are you Ok with being complicit in a genocide. Your vote makes you a supporter of this policy. It may sound mean but that's how strongly I feel about this topic.
As Bitcoiners we should want to make the world a better place anyway that we can even if its voting for a candidate that isn't likely going to win. In the long run yes Bitcoin will make situations like this less prevalent but this is a long term goal that isn't going to be achieved today. We must also focus on what we can accomplish in the short term.
Voting for a presidential candidate that believes in free markets and disentangling us from all of these wars and awkward alliances, is in line with the Bitcoin ethos and a step in the right direction. At the end of the day do you want to be able to rest your head at night knowing that you didn't vote for more wars, more killing and more destruction? Is your Bitcoin bag really worth more than your soul and your humanity?
We are here for more than NGU, right? This wasn't an easy decision for me because I understand that Kamala Harris is probably going to be worse for Bitcoin than Donald Trump but at the end of the day I just didn't feel comfortable voting for Trump knowing that he will keep supplying weapons that enable women and children to be wiped off the map.
I urge every Bitcoiner who reads this to look inside yourself and ask what do I stand for and are you willing to sacrifice material wealth to do the right thing? You can't take your Bitcoin with you when you die. Bitcoin will be here long after we are all dead and gone. Tick Toc next block. Life will go on without you being here.
My goal is to be a positive force for good during the little time we have on Earth. I want to believe that most Bitcoiners feels the same way to and will act according to their values.
Bitcoin #Nostr #Politics
-
@ 18bdb66e:82eb5e5d
2024-10-14 23:48:00Chef's notes
Serve over baked potato, cooked white rice, or drop biscuits.
Details
- ⏲️ Prep time: 15 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 2 - 4 Hotdogs, sliced thin
- 1 TBSP Butter
- 1 Can (10.5 oz) bean & bacon soup
- 1 Can (10.5 oz) condensed pea soup
- 1 Soup can of milk
- 1 Soup can of water
Directions
- Lightly brown hotdogs in butter.
- Mix soups, milk, and water in a bowl.
- Add soup mix to hotdogs, heat through but do not boil.
-
@ 45bda953:bc1e518e
2024-10-10 19:00:21Kaspa Empire - Ceb System - Planet Hithe III
The day was hot and the manor sounded eerily quiet compared to the hustle and commotion of the hours prior. On the estate and in the master bedroom specifically, a married pair had become parents. “He looks so much like you Domitius.” Clessia remarked while stroking the newborn's tiny arms. “He has strong blood.” The father responded smiling fondly sitting on the bedside. A silent nurse was tidying up the apparel and instruments of labour while the couple waited patiently for her exit to have more private discourse. “I am so glad to have born you an heir my love.” Domitius stared intently at his offspring. He had no qualms neglecting obligations to his property and recessed momentarily to celebrate the occasion with his wife. “I will send for the priest, register the child as an Imperial citizen and have him scribed into our family archives, but in the meantime, you must recover. Let a slave girl take our son for a while.” She pouted a playful but exhausted look of non compliance. “You must rest.” He insisted. “How can I let him go when I only just met him? Who are you little man?” She smiled faintly and nodded. “You are right, Domitius, where are you going?” “To the fields, the slaves are behind schedule, our harvest is big and taxes are high. This war is taking it's toll, we must excel to adequately serve the Empire in these pressing times. If the tamed Osteri could only comprehend what is at stake.” Cleolia peered cautiously at the embellishment and carvings on the wooden door knowing that Sethari was standing just beyond. Domitius trailed her gaze. “Don't worry my love, he means well, at least he tries to understand the urgency of my affairs.” He stood up straitening his vest and prepared to leave the room. “Domitius, wait...” He stopped at the door. “What will you tell the priest?” Domitius paused. “I will tell him Albin... Albin Domitius Chevalier.”
He left the room and it was quiet, the slave nurse entered and swaddled the baby rocking him while Cleolia drifted between sleep and conciousness. “Albin.” She repeated to herself as deep slumber enveloped her.
Domitius and his overseer walked briskly out of the manor towards the grain fields squinting as blue Ceb light reflected off the lanscape. “I honour you on the spawn of your son my lord, I hope for a good strong boy, you will be a happy father. I am happy with Seth.” He pounded his chest softly and proudly. “Thank you Sethari, is your son walking yet?” Domitius queried. “No my lord, still crawling on his belly like a beast.” The headman was trying to make his master laugh though Domitius was in a sterner mood having a weight on conscience. “I am in no mood to jest Sethari.” Domitius suddenly clenched his fists. “Get those slaves to work, I cannot have them idling when they should be harvesting.” Sethari made a small bow to his master and started yelling at his Osteri kinsmen, threatening them with a rolled up whip he procured from somewhere inside his tunic, waving it about and cracking it in the air every so often. Domitius picked up a scythe and proceeded to cleave down large swathes of grain. This had a more compelling effect of rallying the straggling workers to action than did the whip. They all toiled together in the pale light of Ceb.
Domitius was sweating, sweating and praying for a victory over the Jeula Federation. Fighting his small part in a increasingly complicated war, loyal to his Empire in his own unique way even though the conflict was far from home. A powerful loyalty that cannot be bought with riches or broken by coercion. A loyalty born through inheritance and blood.
...
The priest was in a more jovial mood than usual. The break of routine was a welcome one. The birth was indeed a momentous occasion. Few things seem of much report in a small planetary expansion program. He did not even seem to mind carrying a keg full of honey mead over the rolling hills of the plantation colony. “Domitius comes to church submissions far to infrequently.” The portly man mumbled to himself while wiping the accumulated sweat from his brow. “I eat too well among all these farmers.” The habit of speaking to himself was ordinary for this man of the cloth who always felt socially disconnected from his flock, caring for their souls, protecting their dignity and general well being like a responsible patron. “I feed their spirits, they feed my body, Hahaha. Tonight I will share my good spirits! Hahahaha.” Impressed by his own sense of humour he turned to witness the majestic blue star set over the skyline. Everything turned a silvery gray hue, and then the stars broke through the atmosphere lighting his way. “Clear skies, the blessed stars guide me.” He continued on the path approaching the Domitian manor and rapped a quick knock on the side of the root cellar doors. It creaked open upwards and a tall muscular Osteri took his baggage and let him in. “Thank you Setharis, my arms are weary, ready to fall off, bless you.” Domitius glimpsed up from his bench seat below a glowing lantern. “Good to see you Father Ecknard.” “Dispense with the formalities and bring the dispenser.” He motioned to Setharis who placed the heavy keg on a table next to an assortment of documents, quill and sealed inkpot. “You pour Setharis and I will write. Name?” Ecknard scratches his chin with the quill contemplating his seat and it’s adequacy for the prolonged exercise of scribble. “Name?” Domitius paused. “Albin Domitius Chevalier.” The priest focused, started with his calligraphic art and fashioned the name and ASN standard block height beautifully onto the family records all the while biting his tongue. “He will inherit the colonial estates, all your assets in Kaspa Prime and the parochial offices at Magar Prime. Correct?” “Yes.” Replied Domitius solemnly. “I'll soon have to amend your will and testament. I'd have to make a registry at the parish and send correspondence to Magar Prime. There would be many from the royal courts who'll send their best regards from afar when this news becomes public.” Domitius did not seem as enthusiastic as Ecknard would have liked. “What ails you Domitius?” The priest could not help but make the pun and restrained a grunted laugh inside himself.
“I wonder if we should wait before registering and announcing him to Empire.” Ecknard’s expression slowly changed to puzzlement sitting up straight, his belly pushing on the heavy table. “In the voids name why?” “I am concerned... about this war...” “It is on the other side of Magar space!” The priest interjected in astonished retort. “I know father, maybe I am just being overly cautious, but with the Magar Dominus fleet occupied at the divide I am worried about the colonies in the isolated regions.” “Surely Kaspa prime will make seven jumps to our defence in the improbable event of an invasion.” “The core keepers will not allow foul play from the Jeul.” “Yes Ecknard, but the fleet is not capable because most of our ships are at the aforementioned objective!” “No, no, no. Suggesting that conflict would happen outside of the divide is practically blasphemy. I cannot imagine insubordination to the Core mandates and the Accords." Domitius remained silently astute and father Ecknard decided to not argue further with the lord. His shoulders sagged. “I will not register the boy in the Imperial records.” “Thank you father.” “What do you know that I fail to see Domitius.” The two men stared at each other from across the table. The hulking bodyguard ever present in body but semi ignorant in mind silently and intriguingly observing the discussion.
“The value of sat. It is not calculated well by the common people, no offence father.” The priest piously lifted his hand and with tilted brow motioned. “None taken.” “My son and our blood line is invested with empiric power, if opportunists become aware of his existence and being outside the Magar prime void, we might have problems here on Hithe III.” Cumbersome thoughts and machinations of the mind darkened the mood of the party. Not at all what Father Ecknard was projecting in his minds eye during his arduous walk to what he was hoping, a celebration and getting drunk with an old friend. “The war does not seem to be ending any time soon, how long shall we stall his registration?” The priest reasoned on. “Think of the rites he will not be allowed to partake in at the church. He will be like Osteri.” Ecknard gestured towards Sethari. “This is a small colony Ecknard. My son will be educated as a member of royalty, all on Hithe III will acknowledge his social standing, I am only concerned that the secret be kept from the outside worlds. He will never be considered Osteri, he will know who he is and what his position is in the greater void. When the war is over we will properly introduce him to the families, currently they would be too occupied with politic as it is, and might not offer him due ceremony as they would under more peaceable circumstances.” The priest capitulated and grabbed a mug. “Your secret is safe with me Domitius, the lack of technology on this forsaken planet is good for your purposes, seeing as the only comms service on the planet is in the church tower. That blinking comms station hounds me daily with requests for your return to Magar Prime. The high counsel want to rebalance and need your signature.” Domitius sighed and looked away as if some spectre loomed in front of him.
I swear silence on the birth my lord, though let me make a final amendment to your proposal. A bit of extra security shall I say.” Domitius filled a cup of mead for Sethari and himself, becoming more relaxed and hospitable. “I am listening.” “If the risks are as great as you assume, let us pretend for the child's sake that he is Kaspian royalty only, and not true Magar. We then continue his education to the full and not put him in a position where he could compromise himself should he be... void forbid, captured by some opportunistic prospector.” Domitius looked ponderously into his cup. “Ecknard, my son is an infant... If we have to keep the boy in the dark about the true nature of his own identity, how long do you predict this war to continue?” Father Ecknard leaned forward... “I sit at the comms desk every night and listen to the chatter. This war... is going to be a long one.”
...
scifi
-
@ 6bae33c8:607272e8
2024-10-23 18:57:42I’ve been on a decent run of late — 8-2 the last two weeks. It’s not enough to salvage the quarter or the year, but I’ve got one more “bye” week, so to speak, then have to put together a good Q3.
Vikings at Rams — I’ll say Vikings -4.5 and probably stay away on the short week.
Ravens at Browns — Alan Seslowsky told me it was nine. I would have made it around 7.5, but not sure that’s enough to take the Browns. Might be a dead cat bounce off the Deshaun Watson injury.
Titans at Lions — I’d have made this 13, but Seslowsky told me it was 11.5. Could be a look-ahead game, but otherwise Lions win by 20-plus.
Colts at Texans — I’ll say this is six. Anthony Richardson drags down Indy, but the Texans can’t pass block, and the offense is sluggish.
Packers at Jaguars — Maybe Packers -4.5. I’ll stay away.
Cardinals at Dolphins — If Tua is back, maybe Cardinals +4.5. Stay away.
Jets at Patriots — Seslowsky told me it was Jets -6.5. I kind of like the Jets here in a get well spot. Drake Maye might be a player though.
Falcons at Buccaneers — The Bucs are missing both star wideouts. The Falcons offense is out of sync. I’ll say Falcons +1.5 and consider taking them.
Eagles at Bengals — I’ll say Eagles +2.5 and probably take Cincy.
Saints at Chargers — If no Derek Carr, then Saints +6.5. The Chargers offense is pretty bad, though.
Bills at Seahawks — I’ll go Bills -2.5 and probably sell the Seahawks off last week’s win over the Falcons.
Bears at Indigenous Peoples — If Jayden Daniels is playing then Bears +2.5. If not, then Bears -2.5. Stay away probably.
Panthers at Broncos — I think Seslowsky said this was nine. I’d hold my nose and take the Panthers, but probably a stay away.
Chiefs at Raiders — I’d say Chiefs -7 and consider the Raiders in a division game.
Cowboys at 49ers — Maybe Cowboys +4.5. I have to think about this one.
Giants at Steelers — Giants +7.5 with the offensive line problems. I’d probably lay the wood, to be honest, but their defense is decent.
-
@ 3ad01248:962d8a07
2024-10-23 18:55:25Well I casted my vote early and I didn't vote for Donald Trump or Kamala Harris. I ended up voting for Chase Oliver, the Libertarian candidate for president. Even though I know he has snowball's chance in hell of winning, I simply couldn't bring myself to vote for the two candidates that are pro-war and pro-genocide.
I needed to be able to sleep at night knowing that I did not lend my consent to the mass killing of people in Gaza and around the world using American military equipment to do it. My vote was in protest to the two parties twisted sense of entitlement and delusions of grandeur. The policies that are put in place by these candidates do have an impact on the rest of the world. As much as we would like it not to be the case, it simply is.
So if you are voting for Donald Trump or Kamala Harris you know full well that they represent and what their policies are in regards to foreign policy. When it comes to foreign policy both parties are indistinguishable from each other.
Democrats and Republicans are strong supporters of Israel and will not do anything to stop the genocide occurring there at the moment. The question you have to ask yourself as you step into that voting booth is are you Ok with being complicit in a genocide. Your vote makes you a supporter of this policy. It may sound mean but that's how strongly I feel about this topic.
As Bitcoiners we should want to make the world a better place anyway that we can even if its voting for a candidate that isn't likely going to win. In the long run yes Bitcoin will make situations like this less prevalent but this is a long term goal that isn't going to be achieved today. We must also focus on what we can accomplish in the short term.
Voting for a presidential candidate that believes in free markets and disentangling us from all of these wars and awkward alliances, is in line with the Bitcoin ethos and a step in the right direction. At the end of the day do you want to be able to rest your head at night knowing that you didn't vote for more wars, more killing and more destruction? Is your Bitcoin bag really worth more than your soul and your humanity?
We are here for more than NGU, right? This wasn't an easy decision for me because I understand that Kamala Harris is probably going to be worse for Bitcoin than Donald Trump but at the end of the day I just didn't feel comfortable voting for Trump knowing that he will keep supplying weapons that enable women and children to be wiped off the map.
I urge every Bitcoiner who reads this to look inside yourself and ask what do I stand for and are you willing to sacrifice material wealth to do the right thing? You can't take your Bitcoin with you when you die. Bitcoin will be here long after we are all dead and gone. Tick Toc next block. Life will go on without you being here.
My goal is to be a positive force for good during the little time we have on Earth. I want to believe that most Bitcoiners feels the same way to and will act according to their values.
Bitcoin #Nostr #Politics
-
@ eac63075:b4988b48
2024-10-10 18:12:38Companies like Meta (formerly Facebook) and Twitter (now X) control platforms that have become the main channels of communication for millions of people worldwide. At the center of this discussion are figures like Mark Zuckerberg and Elon Musk, whose recent actions raise serious questions about freedom of speech, censorship, and political manipulation.
https://fountain.fm/episode/VzJItfySZ8z6417prHyD
Recently, a public letter written by Mark Zuckerberg revealed how the U.S. government, under Joe Biden’s administration, pressured Facebook to censor information during the COVID-19 pandemic. The controversy involves, among other topics, the censorship of content related to Biden’s son, Hunter Biden, during the height of the laptop scandal. This revelation raises questions about the role these platforms play in spreading or withholding information, as well as the direct impact this has on democracy.
Meta and Censorship: Zuckerberg's Letter
In his letter, Zuckerberg admitted that Facebook was pressured by the Biden administration to suppress information about the pandemic and the Hunter Biden case, something he now claims to regret. This has sparked heated debate about how far social media should go in yielding to governmental pressure. Many see this as a threat to freedom of speech, while others argue that this censorship was necessary to control misinformation.
The issue here is not just about government pressure, but the fact that Facebook, as a global platform with billions of users, holds unparalleled power to shape narratives. When a platform decides what is “acceptable” or “truthful,” it directly influences public perception and opinion formation, especially during critical moments like an election.
Zuckerberg, in his letter, seems to be trying to salvage his image, but the damage has already been done. The admission that Facebook collaborated with the government to suppress certain information raises doubts about the platform’s impartiality and its commitment to free speech.
Elon Musk and Free Speech on X
Meanwhile, Elon Musk, now in control of Twitter, renamed X, has promised to transform the platform into a space for free expression. However, the reality seems more complex. Musk claims that X should be a place where all voices can be heard, regardless of political or ideological alignment. Yet, this promise has proven difficult to fulfill in practice.
X continues to ban users and censor content, especially in countries with authoritarian governments like India and Turkey. This creates a dichotomy: on the one hand, Musk advocates for unrestricted free speech, but on the other, he complies with censorship requests from these regimes. This raises questions about Musk’s true intentions and the extent to which he is willing to uphold his principles when the platform faces international pressure.
Moreover, Musk has used X as a political platform, especially in support of former President Donald Trump. The reinstatement of Trump’s account, banned during the Capitol insurrection, has raised further suspicions that Musk is turning X into a tool of political power. For many, this represents a significant risk to the neutrality of digital platforms.
The Cambridge Analytica Scandal and the Risk of Political Manipulation
The discussion of censorship and free speech on social media brings up a case that shocked the world a few years ago: the Cambridge Analytica scandal. In 2015, this British company was accused of using personal data from millions of Facebook users to manipulate elections, including the Brexit referendum and Donald Trump’s 2016 presidential election.
Although Cambridge Analytica was dissolved after the scandal, its legacy remains. Big Tech companies still have access to vast amounts of user data, and the power this grants them is alarming. Companies like Meta and X could, in theory, directly influence election outcomes by manipulating algorithms to promote certain narratives or suppress others.
This scenario raises crucial questions: to what extent can we trust these platforms to act impartially? Are they truly committed to free speech, or are they using their power to shape the political future of the world according to their own interests?
The Pablo Marçal Case and Manipulation in Brazil
In Brazil, a recent example that illustrates the complexity of the relationship between social media and political power is the case of coach Pablo Marçal. Marçal, who built a considerable following, became involved in controversies related to using his influence to manipulate public opinion. Recently, it was revealed that X hired the renowned law firm Pinheiro Neto to defend Marçal’s continued presence on the platform, even after controversies.
This move raises concerns about the selective enforcement of social media’s own rules. Why are some influencers protected while others are summarily banned? Marçal’s influence, particularly among conservative voters in Brazil, is undeniable, and the public defense of his account on X suggests that more is at stake than just free speech.
The Future of Social Media and Democracy
What we are witnessing is the rise of a new era where social media plays a central role in global politics. Control over the flow of information lies in the hands of a few giant companies, and the decisions of their leaders—whether Mark Zuckerberg, Elon Musk, or others—can have a profound impact on elections, governments, and democracies.
This raises legitimate concerns about the future of democracy in a world where private platforms have the power to control public discourse. Big Tech censorship, often disguised as “misinformation control,” can easily become a tool for manipulation.
For citizens, this means being vigilant and critical about the information they receive on social media. Freedom of expression must be defended, but we also need to question who is behind these platforms and what their true motivations are. Trust in social media is at stake, and the future of democracy may depend on how we decide to deal with this unprecedented power.
Conclusion
Recent revelations about Zuckerberg’s involvement in censorship and Musk’s use of X to promote a political agenda highlight the urgent need for transparency in social media platforms. As these companies become increasingly influential in the global political arena, the public must be aware of the risks and actively engage in the debate about the future of free speech and democracy.
-
@ c3f12a9a:06c21301
2024-10-23 17:59:45Destination: Medieval Venice, 1100 AD
How did Venice build its trade empire through collaboration, innovation, and trust in decentralized networks?
Venice: A City of Merchants and Innovators
In medieval times, Venice was a symbol of freedom and prosperity. Unlike the monarchies that dominated Europe, Venice was a republic – a city-state where important decisions were made by the Council of Nobles, and (the Doge, the elected chief magistrate of Venice who served as a ceremonial head of state with limited power), not an absolute ruler. Venice became synonymous with innovative approaches to governance, banking, and trade networks, which led to its rise as one of the most powerful trading centers of its time.
Decentralized Trade Networks
The success of Venice lay in its trust in decentralized trade networks. Every merchant, known as a patrician, could freely develop their trade activities and connect with others. While elsewhere trade was often controlled by kings and local lords, Venetians believed that prosperity would come from a free market and collaboration between people.
Unlike feudal models based on hierarchy and absolute power, Venetian trade networks were open and based on mutual trust. Every merchant could own ships and trade with the Middle East, and this decentralized ownership of trade routes led to unprecedented prosperity.
Story: The Secret Venetian Alliance
A young merchant named Marco, who inherited a shipyard from his father, was trying to make a name for himself in the bustling Venetian spice market. In Venice, there were many competitors, and competition was fierce. Marco, however, learned that an opportunity lay outside the traditional trade networks – among small merchants who were trying to maintain their independence from the larger Venetian patricians.
Marco decided to form an alliance with several other small merchants. Together, they began to share ships, crew costs, and information about trade routes. By creating this informal network, they were able to compete with the larger patricians who controlled the major trade routes. Through collaboration and shared resources, they began to achieve profits they would never have achieved alone.
In the end, Marco and his fellow merchants succeeded, not because they had the most wealth or influence, but because they trusted each other and worked together. They proved that small players could thrive, even in a market dominated by powerful patricians.
Satoshi ends his journey here, enlightened by the lesson that even in a world where big players exist, trust and collaboration can ensure that the market remains free and open for everyone.
Venice and Trust in Decentralized Systems
Venice was a symbol of how decentralization could lead to prosperity. There was no need for kings or powerful rulers, but instead, trust and collaboration among merchants led to the creation of a wealthy city-state.
Venice demonstrated that when people collaborate and share resources, they can achieve greater success than in a hierarchical system with a single central ruler.
A Lesson from Venice for Today's World
Today, as we think about the world of Bitcoin and decentralized finance (DeFi), Venice reminds us that trust among individuals and collaboration are key to maintaining independence and freedom. Just as in Venice, where smaller merchants found strength in collaboration, we can also find ways to keep the crypto world decentralized, open, and fair.
Key
| Term | Explanation | |------|-------------| | Doge | The elected chief magistrate of Venice who served as a ceremonial head of state with limited power. | | Patrician | A member of the noble class in Venice, typically involved in trade and governance. | | Decentralized Finance (DeFi) | A financial system that does not rely on central financial intermediaries, instead using blockchain technology and smart contracts. |
originally posted at https://stacker.news/items/737232
-
@ e968e50b:db2a803a
2024-10-10 17:29:27I'm WAY into Halloween.
Before you're like, "this is in the wrong territory," just check yourself and gimme a minute. Rome wasn't built in a day."
I've been giving out full size candy bars for years, partly to compete with my neighbors insane outdoor decorations, but mostly to make sure I have an audience the year when I actually hire one of my pro keyboard player buddies to sit in my foyer and play some monophonic synth along with this puppy:
Chill out territory nazis, we're getting there.
It's a reed organ, which is already spooky enough by itself. However, the top octave has hammered (like a piano) tines! It's about as creepy as you could ever ask for. It can also be pretty, and I use it for Christmas too, but we're getting ahead of ourselves. I played it last year and I'm ok on keys (main axe is trombone), but I work with some keyboard players that can melt your face. This may be the year to cash in on all those years of giving out full size candy bars.
Bitcoin time. Territory nazis rejoice.
Anyway, Bitcoin is kind of like that kid with a summer birthday, so I want to make sure to celebrate it this Halloween while I've got the neighborhood's attention. So, I would like to present to everyone here snickerbar.me. It's a fork of cash.me that makes cashus en masse for beggar's night!
All of these nuts are waiting to be cracked!
...except the one that I did individually before adding the bulk processing and the one that was actually cut out to pass out to trick or treaters. The rest of them are mostly one sat, but I'm sure you guys can look at the token and figure out which ones aren't like the others.
Thanks @BlokchainB for dropping nuts every day in the saloon. This is what made me curious about cashu in the first place, which I'm just so into right now. I had heard of it, but didn't get the use case until after seeing a few days of those drops.
I might refine this and address some bugs if other folks want to use it at their place. Lemme know. I may also make a non-halloween version if people think they might use this in other settings.
originally posted at https://stacker.news/items/717596
-
@ c0e0c427:a1f63a16
2024-10-14 09:15:50Chef's notes
Some say beat the cream as hard as you can but I find I have much better success when I take my time. So take it easy and be patient and that magic butter moment will arrive.
Details
- 🍳 Cook time: 15 min
- 🍽️ Servings: Approx 250g butter
Ingredients
- Pure fresh cream
- Salt
Directions
- Keep cream in the fridge until ready to start.
- Pour cream into a bowl.
- Beat with hand mixer or kitchen betchtop mixer with the balloon whisk.
- Maintain a medium power level in the mixer throughout. Note that it can get messy with lots of splatter and you might like to have a tea towel over the operation to limit clean up.
- After 5 min the cream will be whipped this is a great sign! Keep going.
- After 10 -15 min you’ll see the cream start to separate into solids and buttermilk.
- Keep whisking until you see the bright yellow butter solids start to clump together in the mixer.
- Pour off the buttermilk and save for later (bonus side product that makes the best pancakes and is actually really great in scrabbled eggs)
- Rinse in butter solid with cold water to remove all the buttermilk. This is an important step and the buttermilk increases the rate of spoil.
- Mix in salt and shape the butter into a block.
- Wrap and store in the fridge.
-
@ c0e0c427:a1f63a16
2024-10-14 09:00:51Chef's notes
I reuse my basic pickle brine at least once. Pickle brine is all about your preference. Make it as sweet as you like with extra sugar, spicy as heck so you are remembering you had them the morning after or a little extra zesty by changing the ratio of water to vinegar to 1:1. Note that the ratio is by weights and I use metric instead of freedom units because that is how I work but imperial will work if for keep the ratio the same by WEIGHT.
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 0 min
Ingredients
- 50mls apple cider vinegar
- 100mls water
- 50grams sugar
- Fresh dill
- Chilli
- 5-10 cucumbers
Directions
- Mix vinegar water together in a pot and bring to a simmer
- Turn off the heat and stir in the sugar until dissolved.
- Add into the brine fresh dill and chilli to your preferred taste.
- Allow brine to cool.
- Chop cucumbers into rounds or julienne and place into a clean and sterilised jar.
- Pour brine into jar so cucumbers are fully covered.
- Can enjoy in 2 days. Keeps up to 2 months.
-
@ 57d1a264:69f1fee1
2024-10-23 16:11:26Welcome back to our weekly
JABBB
, Just Another Bitcoin Bubble Boom, a comics and meme contest crafted for you, creative stackers!If you'd like to learn more, check our welcome post here.
This week sticker:
Bitcoin Students Network
You can download the source file directly from the HereComesBitcoin website in SVG and PNG.
The task
Starting from this sticker, design a comic frame or a meme, add a message that perfectly captures the sentiment of the current most hilarious take on the Bitcoin space. You can contextualize it or not, it's up to you, you chose the message, the context and anything else that will help you submit your comic art masterpiece.
Are you a meme creator? There's space for you too: select the most similar shot from the gifts hosted on the Gif Station section and craft your best meme... Let's Jabbb!
If you enjoy designing and memeing, feel free to check our JABBB archive and create more to spread Bitcoin awareness to the moon.
Submit each proposal on the relative thread, bounties will be distributed next week together with the release of next JABBB contest.
₿ creative and have fun!
originally posted at https://stacker.news/items/736536
-
@ f652bc31:7d2c6308
2024-10-10 17:18:07> มันคือธรรมชาติของมนุษย์รึป่าว? หรือไม่ใช่?
การที่มีมนุษย์อยากมี ความต้องการที่ความมั่งคั่งมากๆ ขึ้นมาอย่างรวดเร็ว ซึ่งการเลือกตัดสินใจทำแบบนั้น ผิดไหม?
> ไม่ผิดเลยที่จะทำแบบนั้น
แต่ส่วนตัวเชื่อว่า การที่จะสร้างความมั่งคั่งขึ้นมาได้รวดเร็วแบบนี้ มันก็จะมาพร้อมกับ ความเสี่ยงที่สูงในการรักษาความมั่งคั่งให้มีความมั่นคงเช่นกัน
ซึ่งถ้าลองมองต่อไปว่า ทำไมเราถึงเริ่มเห็นคนในสังคมเยอะขึ้นเรื่อยๆ เลือกใช้วิธีในการสร้างความมั่นคั่งของตัวเองด้วยวิธีแบบนี้
ซึ่งอาจจะมาจากเหตุผล ที่บริบทของสังคมปัจจุบันที่มีบางสิ่งอย่าง ที่ทำให้คนในสังคมไม่อาจสามารถจะ สร้างความมั่งคั่ง และยกระดับคุณภาพชีวิตของตนเองหรืออาจจะทำได้ยากขึ้น และใช้เวลายาวนานมากกว่าในอดีตจนพวกเขาสามารถมีความมั่นคงในการดำรงชีวิตในสังคม
บางอย่างที่ว่า คือการที่คนในสังคมไม่สามารถเข้าถึง หรือรู้จักเครื่องมือที่ใช้ในการเก็บสะสม สิ่งที่ตนเองสร้างคุณค่า ให้กับสังคม ที่สังคมต้องการ
เพื่อแลกเปลี่ยนมาเป็นสิ่งที่ต้องการ
จะนำมาใช้ดำรงชีวิตในสังคม และสามารถใช้เป็นเครื่องมือในการ เก็บสะสมสิ่งๆนั้น ผ่านกาลเวลาเพื่อยกระดับคุณภาพชีวิตของตนเองให้มีความมั่นคงในการดำรงชีวิตในสังคม
ซึ่งถ้าอธิบายให้เข้าใจง่ายกว่านี้ คือการที่ผู้คนในสังคมยังไม่มีเครื่องมือทางการเงินที่ดีพอ ที่จะสามารถเก็บสะสมความมั่งคั่ง ที่พวกเขาได้สร้างสิ่งที่สังคมต้องการและมีคุณค่า เพื่อให้ได้ผลตอบแทนที่พวกเขาต้องการ ที่จะสามารถนำมาใช้ในการดำรงชีวิตในสังคม และเก็บออมผลตอบแทนที่ได้ ผ่านช่วงเวลาให้พวกเขาสามารถรู้สึกมั่นคงในการดำรงชีวิตในสังคม
10/10/2567 ศิวัช สุรัตนวนิช
-
@ 18bdb66e:82eb5e5d
2024-10-14 02:23:59Chef's notes
Cook pancakes ahead of time and freeze. Move to refrigerator the night before serving.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 4 Slices Bacon
- 1 Can (10.5 ounce) condensed cream of chicken or mushroom soup
- ½ cup milk
- 4 boiled eggs, sliced
- 2 TBSP pimiento, chopped
- Pancakes
Directions
- Cook bacon until crisp; remove and crumble
- Pour off drippings
- Blend soup and milk;
- Add bacon, eggs, and pimiento.
- Heat through stirring frequently.
- Spoon between pancakes, sandwich style.
-
@ 8d34bd24:414be32b
2024-10-23 15:30:53Check out earlier posts in God Makes Himself Known series:
-
God Demonstrates His Power: Part 1 (Egypt)
-
God Defends His Honor: Part 2 (Phillistines)
-
The One True God: Part 3 (Who deserves worship)
-
Jesus is God: Part 4 (Jews & Gentiles)
Throughout history, God has shown His power and glory at different times and different places and to different people, but never shown it to everyone at once. The time is coming when God will show His power, glory, and judgement to all mankind.
But we do not want you to be uninformed, brethren, about those who are asleep, so that you will not grieve as do the rest who have no hope. For if we believe that Jesus died and rose again, even so God will bring with Him those who have fallen asleep in Jesus. For this we say to you by the word of the Lord, that we who are alive and remain until the coming of the Lord, will not precede those who have fallen asleep. For the Lord Himself will descend from heaven with a shout, with the voice of the archangel and with the trumpet of God, and the dead in Christ will rise first. Then we who are alive and remain will be caught up together with them in the clouds to meet the Lord in the air, and so we shall always be with the Lord. (1 Thessalonians 4:13-17) {emphasis mine}
God’s first end times miracle will be the rapture of the church. All true believers (dead & alive) will be taken out of this world, given new, perfect, eternal bodies, and join Jesus in paradise. The world will see these Christians disappear. They will be there one moment and gone the next.
I always thought it strange, that after the Bible’s prophecies of the church being raptured, that most people would not believe God had removed His followers. I think something (maybe fallen angels pretending to be aliens who have rescued mankind) will make people not get panicked about millions of Christians all disappearing in an instant. Maybe it will be solely based on people’s hard hearts and their unwillingness to consider an unpleasant thought (that they were left behind), but life will go on.
The Bible makes it sound like there will be a short time of disarray, but then a man will come who make peace for a time (the Anti-Christ). After 3.5 years, things will get worse than they have ever been in the history of mankind.
The 7 Seals
In the end times, the world will experience unfathomably hard times. At first everything that happens will be things that have happened before, just worse. In Revelation 6, we see each of the 7 seals opened:
-
White Horse = Conquering
-
Red Horse = Takes away peace so men slay one another
-
Black Horse = Famine
-
Pale (Ashen) Horse = A quarter of the earth killed by war, famine, pestilence, and animals.
-
Those who trust in Jesus are martyred.
-
Awesome, terrifying natural disasters:\ — A great earthquake,\ — the sun becomes black,
— the moon becomes like blood,\ — the stars fall to earth,\ — the sky is split like a scroll,\ — every mountain & island moved out of its place,\ — everyone from kings to slaves hide in fear due to the wrath of the Lord.
The 7 Trumpets
The opening of the 7th Seal leads to the 7 trumpets which are more terrifying than the first 6 seals and in faster succession. These miraculous signs of God’s wrath are beyond anything mankind has ever experienced and to a degree never experienced. First there is a half hour of silence and reprieve before the sounding of the trumpets in Revelation 8 & 9:
-
Hail & fire, mixed with blood, fall to earth and “a third of the earth was burned up, and a third of the trees were burned up, and all the green grass was burned up.” This burning will likely destroy crops and kill livestock causing famine.
-
“something like a great mountain burning with fire [asteroid?] was thrown into the sea; and a third of the sea became blood, and a third of the creatures which were in the sea and had life, died; and a third of the ships were destroyed.” A mountain sized asteroid would cause terrible tsunamis. The death of a third of the sea creatures will cause worse famine. The destruction of a third of the ships will cause a disruption in international trade leading to shortages and prices skyrocketing.
-
“a great star [comet?] fell from heaven, burning like a torch, and it fell on a third of the rivers and on the springs of waters.” A third of the waters of earth are poisoned. If you don’t have clean water, you die. People will be dying of thirst and of drinking the poisoned waters out of desperation.
-
“a third of the sun and a third of the moon and a third of the stars were struck, so that a third of them would be darkened.” The world will experience fearful darkness. Sinful man hid their evil deeds under the cover of darkness and will now experience darkness that they don’t want.
-
A “star from heaven” (most likely a fallen angel) falls to earth with the key to the bottomless pit and “smoke went up out of the pit, like the smoke of a great furnace; and the sun and the air were darkened by the smoke of the pit. Then out of the smoke came locusts [fallen angels that procreated with women: see Genesis 6] upon the earth.” These “locusts” will torment those who reject God and are forbidden from harming the remaining plants. The torment will last 5 months and will be so bad that people will desperately want to die.
-
Four angels will “kill a third of mankind.” Death comes through an army of 200 million that kills with “fire and smoke and brimstone” that comes out of their mouths. The fourth seal resulted in the death of a quarter of mankind. The sixth trumpet will then lead to an additional third of mankind dying.
The 2 Witnesses
God’s wrath will be unimaginably bad, but God still cares and he sends two witnesses to witness to the world to make sure that every person on earth has the opportunity to repent and turn to God. Many will, but many more will reject God despite His miraculous judgements upon them.
And I will grant authority to my two witnesses, and they will prophesy for twelve hundred and sixty days, clothed in sackcloth.” These are the two olive trees and the two lampstands that stand before the Lord of the earth. And if anyone wants to harm them, fire flows out of their mouth and devours their enemies; so if anyone wants to harm them, he must be killed in this way. These have the power to shut up the sky, so that rain will not fall during the days of their prophesying; and they have power over the waters to turn them into blood, and to strike the earth with every plague, as often as they desire. (Revelation 11:3-6) {emphasis mine}
God’s two witnesses will:
-
Prophecy
-
Shoot flames out of their mouths to devour those who want to harm them
-
Stop the rain as judgement
-
Turn water into blood
-
Strike the earth with every plague
After 1260 days, God will allow:
-
The beast to kill them
-
Their bodies lie in the streets watched by the world as the world celebrates
But after 3.5 days, the witnesses will be raised from the dead in the view of every person on earth and be raised in the air up to heaven. God’s unmistakable power will be demonstrated in a way that there will not be any excuse for any person to reject Him as God and Creator.
And in that hour there was a great earthquake, and a tenth of the city fell; seven thousand people were killed in the earthquake, and the rest were terrified and gave glory to the God of heaven. (Revelation 11:13)
At this point the unholy trinity (Satan always copies God because he can’t create anything himself) will rule the world and will begin to seriously persecute all those who have believed in Jesus and trusted Him as savior.
Amazingly, after all that God has demonstrated, the majority of people will worship the Anti-Christ rather than their creator who is the one, true God.
Additional Witnesses
As if the two witnesses that are seen by every person on earth is not enough, God sends other witnesses. He makes sure that every person truly knows who He is, what everyone is expected to do, and the consequences of refusing.
First God marks 144,000 Jews, 12,000 from every tribe, to be witnesses throughout the world. Then God sends an angel up in the sky to witness:
And I saw another angel flying in midheaven, having an eternal gospel to preach to those who live on the earth, and to every nation and tribe and tongue and people; and he said with a loud voice, “Fear God, and give Him glory, because the hour of His judgment has come; worship Him who made the heaven and the earth and sea and springs of waters.” (Revelation 14:6-7)
He sends a second angel to warn that Babylon the Great has fallen. He then sends a third angel to give warning to people against following the Beast (Anti-Christ) or receiving his mark.
“If anyone worships the beast and his image, and receives a mark on his forehead or on his hand, he also will drink of the wine of the wrath of God, which is mixed in full strength in the cup of His anger; and he will be tormented with fire and brimstone in the presence of the holy angels and in the presence of the Lamb. And the smoke of their torment goes up forever and ever; they have no rest day and night, those who worship the beast and his image, and whoever receives the mark of his name.” (Revelation 14:9b-11) {emphasis mine}
Most of those who believe and are saved during the seven year tribulation will be martyred, but they are promised “rest from their labors” and that “their deeds follow with them”:
… “Blessed are the dead who die in the Lord from now on!’ ” “Yes,” says the Spirit, “so that they may rest from their labors, for their deeds follow with them.” (Revelation 14:13b)
The 7 Bowls
The final miracles that show the wrath of God against those who refuse to trust in Him come in the 7 bowls (or vials). These are poured out in very rapid succession, probably hours or a few days.
-
“… a loathsome and malignant sore on the people who had the mark of the beast and who worshiped his image.” (Revelation 16:2b)
-
“the sea … became blood like that of a dead man; and every living thing in the sea died.” (Revelation 16:3b) Notice that this blood isn’t like the other instances where it is like fresh blood. This blood is “like that of a dead man.” Every creature in the sea died, and I’m sure caused a rotting, putrid mess that smelled of death.
-
“… rivers and the springs of waters … became blood.” (Revelation 16:4b) God gave those who had murdered the prophets blood as the only thing they could drink, as a just punishment.
-
“… the sun … was given to it to scorch men with fire.” (Revelation 16:8b)
-
“… his *[the beast’s*] kingdom became darkened; and they gnawed their tongues because of pain.” (Revelation 16:10b) [clarification mine]
-
“… the Euphrates … water was dried up, so that the way would be prepared for the kings from the east.” (Revelation 16:12b)
-
“… a loud voice came out of the temple from the throne, saying, “It is done.” (Revelation 16:17b) and “… there was a great earthquake, such as there had not been since man came to be upon the earth …” (Revelation 16:18b) “And every island fled away, and the mountains were not found. And huge hailstones, about one hundred pounds each, came down from heaven upon men. …” (Revelation 16:20-21a)
More than half of the population of earth will be killed during the tribulation. Some will repent and turn to God, but then pay with their lives. Others will willfully disobey and reject God and refuse to submit to Him despite knowing who He is and why He should be worshipped. God will have shared His mercy and then His wrath in order to turn people back to Him, but too many will be hard hearted and reject Him. They will be guilty and every punishment they receive will be well deserved. Justice will ultimately be served.
The 4 Hallelujahs
Right before the end the whole earth will hear the voice of a great multitude in heaven saying:
“Hallelujah! Salvation and glory and power belong to our God; because His judgments are true and righteous; for He has judged the great harlot who was corrupting the earth with her immorality, and He has avenged the blood of His bond-servants on her.” And a second time they said, “Hallelujah! Her smoke rises up forever and ever.” And the twenty-four elders and the four living creatures fell down and worshiped God who sits on the throne saying, “Amen. Hallelujah!” And a voice came from the throne, saying, “Give praise to our God, all you His bond-servants, you who fear Him, the small and the great.” Then I heard something like the voice of a great multitude and like the sound of many waters and like the sound of mighty peals of thunder, saying, “Hallelujah! For the Lord our God, the Almighty, reigns. (Revelation 19:4-6) {emphasis mine}
The 2nd Coming of Jesus
Last of all is the greatest moment in all of history when Jesus returns to earth as Lord and King to claim His own and to judge those who rejected Him and lived evil lives.
And I saw heaven opened, and behold, a white horse, and He who sat on it is called Faithful and True, and in righteousness He judges and wages war. His eyes are a flame of fire, and on His head are many diadems; and He has a name written on Him which no one knows except Himself. He is clothed with a robe dipped in blood, and His name is called The Word of God. (Revelation19:11-13)
The most magnificent man who ever lived, the eternal, creator God comes down from heaven in the sight of all with all of His followers behind Him dressed in white, but all those, both man and angel, who refused to worship Him and submit to Him decide to line up for battle against Him. They somehow think they have a chance against the very one who upholds their life with the power of His mind. All of the men who took the mark of the beast will line up for battle against their creator.
The Millennium
Of course these rebels have no chance. The beast and false prophet are thrown into the lake of fire. The rest are destroyed by the sword in the mouth of Jesus while His followers watch, never having to lift a hand or dirty their white attire. Satan is bound for a thousand years and Jesus reigns over all of the earth for a thousand years on earth fulfilling the promises to Abraham, Isaac, Jacob, Moses, Joshua, David, and everyone else in the Bible. There will be a thousand years without the evil influences of Satan and his fallen angels. What a wonderful time that will be, but sadly, not all will fully submit to the perfect, sinless, creator God and one more moment of glory will be shown before the earth is burned with fire.
Judgement Throne of God
At the end of 1,000 years, there will be one more rebellion when Satan is released.
I used to think it strange that God would allow Satan to be released again to mislead, but I think it is a test to expose those who are not really trusting in Jesus. During the millennial reign, there will not be much outright sin, but not all will follow with all their heart, mind, soul, and strength. Many will be going through the motions. They will be going along to stay out of trouble, but not because their hearts are following Jesus. When temptation comes along, many will turn away from God again into judgment. Satan will gather people from all the nations to surround the saints, but God will send fire down from heaven to devour all of the rebels
And the devil who deceived them was thrown into the lake of fire and brimstone, where the beast and the false prophet are also; and they will be tormented day and night forever and ever. (Revelation 20:10)
Great White Throne Judgement
In the end, everyone that rejected Jesus will have their lives judged at the Great White Throne.
And I saw the dead, the great and the small, standing before the throne, and books were opened; and another book was opened, which is the book of life; and the dead were judged from the things which were written in the books, according to their deeds. (Revelation 20:12)
We are all sinners and do not want to be given what we deserve. We want God’s grace. Those who had trusted Jesus before the tribulation were judged by Jesus to determine their rewards. Those who rejected Jesus will be judged at the Great White Throne Judgement and will experience the just wrath of our holy, creator God. I hope you will be one of those who trust Jesus, otherwise you will receive your just punishment:
And if anyone’s name was not found written in the book of life, he was thrown into the lake of fire. (Revelation 20:15)
By the end every person who has ever lived on earth will know who God is and will understand how much they have failed Him. Every knee will bow — whether in awe or in terror.
God made Himself known through His creation. God made Himself known through His blessings. God made Himself known by coming to earth to die for mankind to take away our sins. God made Himself known through His written word. God made Himself known through His wrath. Nobody can reject Him and claim they did not know.
Trust Jesus.\ \ your sister in Christ,
Christy
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
-
@ a012dc82:6458a70d
2024-10-23 15:23:26Table Of Content
-
The Origins of the Debate
-
The Rise of Bitcoin
-
HODLing: A Strategy to Weather the Storm
-
The Skepticism of Peter Schiff
-
The Bitcoin Community's Response
-
Conclusion
-
FAQ
In the world of finance, few debates have garnered as much attention as the showdown between Peter Schiff and Bitcoin. As an outspoken critic of the cryptocurrency, Peter Schiff, a well-known economist, has long been skeptical of its value and viability. However, as the Bitcoin market experienced unprecedented growth and adoption, the concept of "HODLing" emerged victorious. This article delves into the clash between Schiff and Bitcoin, exploring the reasons behind their differing views and ultimately highlighting how the strategy of HODLing prevailed.
The Origins of the Debate
It all began when Bitcoin, the first decentralized cryptocurrency, was introduced to the world in 2009. While many were intrigued by the concept of digital currency, Schiff expressed skepticism and voiced his concerns regarding its lack of intrinsic value. Schiff, a proponent of traditional investments like gold, believed that Bitcoin's meteoric rise was nothing more than a speculative bubble waiting to burst. This clash of ideologies set the stage for an ongoing battle between Schiff and Bitcoin enthusiasts.
The Rise of Bitcoin
Despite Schiff's reservations, Bitcoin steadily gained traction and captured the imagination of investors worldwide. Its decentralized nature, limited supply, and potential as a store of value attracted a growing number of individuals looking to diversify their portfolios. Bitcoin's disruptive technology and its ability to facilitate fast and secure transactions also played a significant role in its ascent.
HODLing: A Strategy to Weather the Storm
As Bitcoin's price exhibited volatility, a strategy emerged among its proponents: HODLing. This term, originating from a misspelling of "hold" in a Bitcoin forum post, refers to the practice of holding onto Bitcoin for the long term, irrespective of short-term market fluctuations. HODLers believed that Bitcoin's underlying technology and its potential to revolutionize the financial industry made it a worthwhile investment, regardless of temporary setbacks.
The Skepticism of Peter Schiff
While Bitcoin continued to surge in popularity, Peter Schiff remained steadfast in his skepticism. He argued that Bitcoin's lack of intrinsic value made it a speculative asset rather than a legitimate currency or store of wealth. Schiff often compared Bitcoin to gold, highlighting the tangible and historical significance of the precious metal. He warned investors of the potential risks associated with Bitcoin, emphasizing the possibility of a catastrophic collapse.
The Bitcoin Community's Response
Bitcoin enthusiasts fervently defended their chosen asset against Schiff's criticism. They pointed out that while Bitcoin may not possess intrinsic value like gold, its value is derived from its decentralized network, scarcity, and the trust placed in its underlying technology. They highlighted the benefits of Bitcoin's borderless transactions, low fees, and the potential for financial inclusion. The community also stressed that Bitcoin's volatility was merely a temporary characteristic during its early stages of adoption.
Conclusion
In the ultimate showdown between Peter Schiff and Bitcoin, the concept of HODLing emerged victorious. Despite Schiff's skepticism, Bitcoin's decentralized nature, technological innovation, and growing adoption propelled it forward. The strategy of HODLing, fueled by the belief in Bitcoin's long-term potential, allowed investors to weather the storm of market volatility. As the world continues to embrace digital currencies and explore the possibilities they offer, the clash between traditionalists and innovators will persist. The story of Peter Schiff vs Bitcoin serves as a testament to the ever-evolving landscape of finance.
FAQ
Is Bitcoin a reliable investment in the long term? Bitcoin's reliability as an investment depends on one's risk tolerance and long-term perspective. While it has exhibited significant growth, its volatility and regulatory uncertainties make it a speculative asset that carries inherent risks.
Can Bitcoin replace traditional forms of currency? Bitcoin's potential to replace traditional forms of currency is still highly debated. While it offers certain advantages, such as faster and cheaper cross-border transactions, widespread adoption and regulatory clarity would be necessary for it to become a mainstream currency.
How does HODLing differ from traditional investing? HODLing differs from traditional investing as it involves holding onto an asset for the long term, regardless of short-term market fluctuations. Traditional investing often involves active management, buying and selling based on market trends and analysis.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 09fbf8f3:fa3d60f0
2024-10-10 15:44:06Taosync支持全同步模式和仅新增模式,允许用户定时扫描指定目录下的文件差异,确保目标目录与源目录保持一致,或者只同步新增的文件。此外,Taosync还支持定时下载功能,用户可以设置一次性任务,按照cron表达式在指定时间执行下载任务。
以下是Taosync的使用教程:
系统部署
下载镜像:由于国内网络环境因素,建议直接导入Taosync和AList所需的镜像文件。相关的镜像文件可以从网盘获取,例如阿里云盘或夸克网盘 。
创建容器:项目基于AList运行,因此需要创建一个AList容器。可以使用以下docker-compose.yml文件来创建Taosync和AList容器:
version: "3" services: sync: image: dr34m/tao-sync:latest container_name: taosync restart: always ports: - 8023:8023 # 左侧的端口可自定义修改 volumes: - ./taosync/data:/app/data # 如果已经有alist容器,则删除下面的代码 alist: image: xhofe/alist:latest container_name: alist restart: always ports: - 5244:5244 # http端口,左侧的端口可自定义修改 # - 5245:5245 # https端口,左侧的端口可自定义修改 volumes: - ./alist/data:/opt/alist/data
在Docker应用下创建项目,并粘贴上述代码到compose配置中,然后立即部署。
获取默认密码:部署完成后,在项目日志页面获取Taosync和AList的默认密码。
系统使用
配置AList:使用默认账号admin和默认密码登录AList后台,添加网盘驱动,并复制令牌以备后用 。
配置Taosync:使用默认账号admin和默认密码登录Taosync后台,修改密码,并在引擎管理中增加AList的URL地址和令牌。
创建同步作业:在作业管理中新建作业,选择引擎,源目标目录和目标目录,设置同步速度和方法,以及定时同步的方式(间隔或cron) 。
Taosync支持多种存储源,包括但不限于本地存储、阿里云盘、OneDrive、天翼云盘、GoogleDrive、FTP/SFTP等 。通过部署Taosync,可以有效地补充NAS中的同步方法,实现本地存储与网络存储的有效结合 。
-
@ 18bdb66e:82eb5e5d
2024-10-14 02:15:49Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10 ½ ounces) condensed Cheddar, or cream of celery soup.
- ½ cup milk
- 4 boiled eggs, sliced
- 2 TBSP pimiento, chopped
- 4 Slices of toast
Directions
- Add soup and milk in medium pot.
- Mix in egg slices, and pimiento reserving some for garnish.
- Heat through, stirring often.
-
@ 18bdb66e:82eb5e5d
2024-10-14 02:05:51Chef's notes
Try Fiesta Cheese soup for a little flavor kick. Omit lemon juice and pepper.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 15 mins
- 🍽️ Servings: 4
Ingredients
- 8 Strips bacon
- 1 Can Cheddar cheese soup
- ½ Cup milk
- 1TSP Lemon juice
- Cayenne pepper to taste
- 2 Medium tomatoes, sliced
- 4 Slices toast
Directions
- Cook bacon. Set drippings aside.
- Add soup to skillet
- Heat to simmer
- Add milk, lemon juice, and pepper
- Blend till smooth
- Heat slowly so as not to scorch milk.
- Plate toast, and lay tomato and bacon on each slice.
- Ladle soup over toast.
-
@ 4ba8e86d:89d32de4
2024-10-23 15:19:11Para ajudar a contornar a censura da Internet em locais onde o acesso ao Tor é bloqueado. Ele é uma espécie de ponte do Tor que permite que os usuários se conectem à rede Tor por meio de um sistema distribuído de voluntários.
A história do Snowflake começou em 2019, quando o Tor Project percebeu que muitas pessoas em locais com restrições de acesso à Internet estavam recorrendo a soluções de VPN e proxies para contornar a censura. No entanto, muitas dessas soluções eram bloqueadas pelas autoridades governamentais, o que criou a necessidade de encontrar novas maneiras de contornar a censura. Foi aí que surgiu a ideia do Snowflake, que foi lançado como uma solução para ajudar a aumentar a capacidade do Tor de contornar a censura da Internet em todo o mundo.
O Snowflake funciona por meio de um sistema distribuído de voluntários que oferecem seus proxies para ajudar a contornar a censura. Quando um usuário se conecta ao Snowflake, seu tráfego é roteado por meio de um conjunto de proxies voluntários que se oferecem para ajudar a contornar a censura. Esses proxies são distribuídos em todo o mundo, o que ajuda a garantir que haja sempre uma opção disponível para os usuários que desejam acessar a Internet livremente.
O Snowflake resolve o problema de acesso à Internet em locais onde o acesso ao Tor é bloqueado. Ele permite que os usuários contornem a censura e a vigilância da Internet, acessando sites e aplicativos que seriam bloqueados em suas regiões. Com o Snowflake, os usuários podem navegar na Internet com mais privacidade e segurança, evitando serem detectados pelos censores da Internet.
"A privacidade é necessária para uma sociedade aberta na era eletrônica. Privacidade não é sigilo. Uma sociedade livre requer privacidade na comunicação, bem como privacidade na busca e na associação." - Eric Hughes
https://snowflake.torproject.org/
https://youtu.be/ZC6GXRJOWmo
-
@ 18bdb66e:82eb5e5d
2024-10-14 01:57:16Chef's notes
Serving with Texas Toast is a great option.
Details
- ⏲️ Prep time: 15 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 2 TBSP butter, melted
- 1 Can (10.5 ounce) condensed cream of celery soup
- ½ Cup milk
- ¼ Cup chopped onion
- 1 Package (4 ounces) sliced beef
- Toast
Directions
- Melt butter in heavy skillet.
- Brown beef and onion in butter.
- Mix soup and milk.
- Add soup to skillet.
- Heat; stirring often.
- Serve on hot toast.
-
@ df8f0a64:057d87a5
2024-10-10 15:18:39書き散らす動機
残暑続きからの急な気温低下で鼻炎がひどくなる今日この頃、皆様お元気でしょうか
株主への抗議のために退職してから2ヶ月半、流石に暇を持て余してきました 時間がある上に能動的に働く気も起きず、ひたすらボーッとしたりうねうね考え事をする日々です 幸いにして人生も折り返しにさしかかる頃になり、時折「今、人生が終わって構わないのでは?」というようなことも考えたりします (鬱病既往歴ありますが私は元気です)
子どものお迎えを終えて、いつもどおり夕食をとり、またうねうねしているうちに ふと、6年前の年末に急死された、仕事でお世話になったTさんのことを思い出しました
子を寝かしつけてもまだ頭の中をぐるぐるしていたので、ここに吐き出してすっきりしようという魂胆です
Tさんとの出会い
私のキャリアの(ほぼ)スタートはVC(ベンチャーキャピタル)でした 誰のせいでもないとある経緯もあり、周囲からは警戒され避けられ、わずか6年ではありますが、 インナーサークルに入り込めない時期を過ごし、当時の上司と二人、とにかくやれることをやり続ける毎日でした
いつものようにピッチイベントに参加しているとき、近くの席にいたスーツ姿の3人組と目が一瞬合います
「事業会社の人だ」
協調投資やファンド出資のきっかけを掴むべく、その3人に話かけます
「よろしければ弊社投資先のご紹介や御社の...」
ひととおりの挨拶を済ませ、この人たちにも避けられるんだろうと思いながらも要件を切り出します
「是非やりましょう」
いつもとは違う嬉しい返事をくれたのがTさんでした
面倒見の良い他社の先輩
そのときの3人組であるMさん・Iさん・Tさんには、私の仕事人生の中で最もお世話になったと言っても過言ではありません
ファンドの営業を受けていただき、協調投資を行い、VCからの転職後にも協業相手として他部署のキーマンをご紹介いただき...
社会人になったばかりの私の、今思い返せば恥ずかしい(部下がこんな提案したら卒倒する)レベルの提案を、 誰もが知る一流企業の多忙な役職持ちであるにも関わらず、毎回一時間も割いて丁寧に対応してくださる心の広い方でした
当時、VCと接点をもつような事業会社の対スタートアップ部隊は、本業でご活躍されている方が兼任で取り組むパターンが多く、Mさん・Iさん・Tさんももちろんそう
その後も昇進され、最後には本社の取締役に。今年遂に退任され、所謂「あがり」でしょうか、子会社の取締役に異動 長い社会人人生をほぼ走りきり、有終の美を飾ろうとする時期にさしかかっています
でもTさんはそこにはいません
残される側
冒頭触れたとおり、Tさんは6年前のこの時期に急死されました 死因については、Tさんのご友人がFBに投稿していた文章を読んでも、Iさんに聞いてもわからない
悲しいかな、四十年近く生きていると、死因が明かされない理由がわかるようになる機会が一度や二度はあります Tさんもおそらくそうだったのでしょう
直前まで、Iさんと一緒にベイエリアに出張され、楽しそうなコメントと共に写真を投稿されていたのに 晩婚なのか再婚なのか、とにかくご結婚されて一年ちょっと。お子様も生まれたばかりだったのに Tさんは近い人間に心中を隠して、静かにこの世を去りました
あなたの快い返事に、どれほど私が救われたのか 転職後の提案のとき、受付で顔を出してすぐ「元気?」と声をかけてくださったことがどれほど私を安心させてくれたか あなたが声をかけてくれる度、私の社会人としての成果が生まれたことに、私は十分に感謝を伝えられていません
まだしばらく残る理由
振り返って、Tさんのように誰かの人生をenhanceできたのか?と自分に問うと、まだできたとは思えません。残念ですが
今ここで死んでも私は構わないけど、まだもうちょっと頑張るべきかな、老いてから誰かに感謝をしてもらうまで生きてみてもいいかな
そうふと思い直しているうちに日付が変わりました
-
@ 18bdb66e:82eb5e5d
2024-10-14 01:52:01Chef's notes
Garnish with chopped green onions, mushrooms, or serve with a side of carrots for variety.
Details
- ⏲️ Prep time: 10 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 2 cans condensed beef broth
- 2 soup cans of water
- ½ bay leaf
- 1 egg
Directions
- Add soup, water, and bay leaf in pot.
- Bring soup to boil, reduce heat
- Simmer 5 minutes
- Remove bay leaf and discard.
- Beat egg slightly.
- Pour thin stream of egg into soup while stirring.
- Salt and pepper to taste.
- Serve with toast.
-
@ 4ba8e86d:89d32de4
2024-10-23 13:28:09Ele possibilita o compartilhamento seguro de arquivos e mensagens entre dispositivos próximos em uma rede Wi-Fi local, sem a necessidade de uma conexão com a Internet.
O LocalSend é um aplicativo de plataforma cruzada que utiliza uma API REST e criptografia HTTPS para garantir a segurança da comunicação. Diferentemente de outros aplicativos de mensagens que dependem de servidores externos, o LocalSend não requer acesso à Internet ou servidores de terceiros.
Para assegurar a máxima segurança, o LocalSend utiliza um protocolo de comunicação seguro em que todos os dados são enviados por HTTPS, e um certificado TLS/SSL é gerado instantaneamente em cada dispositivo durante a comunicação.
https://f-droid.org/pt_BR/packages/org.localsend.localsend_app/
https://github.com/localsend/localsend
-
@ 18bdb66e:82eb5e5d
2024-10-14 01:15:00Chef's notes
Serve with a breakfast meat, and toast.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 2 TBSP butter, melted
- 1 can (10.5 ounce) condensed Cheddar cheese, cream of celery, chicken, or mushroom soup
- 8 eggs
- Pepper to taste
Directions
- Melt butter in heavy skillet.
- Mix in soup, eggs and pepper in bowl or measuring cup.
- Add soup to skillet.
- Cook over low heat until eggs are set, stirring gently.
-
@ 9e69e420:d12360c2
2024-10-23 13:05:29Former Democratic Representative Tulsi Gabbard has officially joined the Republican Party, announcing her decision at a Donald Trump rally in North Carolina. As one of the few voices of reason within the Democratic Party, Gabbard's departure marks the end of her journey from Democratic presidential candidate to Republican Party member[1]. Her transition began with her exit from the Democratic Party in 2022, when she accurately called it an "elitist cabal of warmongers"[3].
Throughout her congressional career, Gabbard demonstrated a consistent anti-interventionist stance and a strong defense of civil liberties. She was an original member of the bi-partisan 4th Amendment Caucus, fighting against warrantless searches and championing privacy rights in the digital age[4]. Her principled opposition to the surveillance state and bulk data collection set her apart from the establishment of both major parties.
While some may view her political evolution as opportunistic, Gabbard's core positions on foreign policy have remained remarkably consistent. She has maintained her opposition to unnecessary foreign interventions and has been vocal about the risks of nuclear war[2]. Her criticism of the military-industrial complex and her calls for the Democratic party to renounce the influence of military contractors and corporate lobbyists demonstrate a commitment to principles over party loyalty[4]. Though her recent alignment with Trump may raise eyebrows, her consistent advocacy for peace and opposition to the warfare state make her a unique figure in American politics[1].
Sauce: [1] Tulsi Gabbard's Political Evolution | TIME https://time.com/7096376/tulsi-gabbard-democrat-republican-political-evolution-history-trump/ [2] Tulsi Gabbard wants to serve under Trump, but do their policies align? https://www.usatoday.com/story/news/politics/elections/2024/06/19/tulsi-gabbard-trump-vp-secretary-policy/73968445007/ [3] Tulsi Gabbard announces she is leaving Democratic Party https://abcnews.go.com/Politics/tulsi-gabbard-announces-leaving-democratic-party/story?id=91326164%2F [4] Political positions of Tulsi Gabbard - Wikipedia https://en.wikipedia.org/wiki/Political_positions_of_Tulsi_Gabbard [5] Tulsi Gabbard Turning Republican Is 'Surprise' to Donald Trump https://www.newsweek.com/tulsi-gabbard-donald-trump-republican-party-1973340
-
@ 4ba8e86d:89d32de4
2024-10-23 12:46:23Desenvolvido pelo Tor Project, o OnionShare é um projeto de código aberto que visa proteger a privacidade dos usuários durante o compartilhamento de arquivos.
Criado em 2014 por Micah Lee, um desenvolvedor de software e ativista de privacidade, o OnionShare surgiu como uma solução para compartilhamento seguro e anônimo de arquivos pela rede Tor. O OnionShare faz parte do desenvolvimento contínuo do Tor Project, a mesma equipe responsável pelo navegador Tor. Micah Lee reconheceu a necessidade de uma solução que respeitasse os princípios e valores da rede Tor, fornecendo privacidade aos usuários. O OnionShare utiliza serviços ocultos do Tor para criar servidores web temporários com endereços .onion exclusivos, permitindo que os arquivos compartilhados sejam acessados apenas pela rede Tor. Desde o seu lançamento, o OnionShare tem sido aprimorado e atualizado pela comunidade de desenvolvedores do Tor Project, garantindo a compatibilidade contínua com os princípios e protocolos da rede Tor. A ferramenta tornou-se amplamente reconhecida como uma opção confiável para compartilhamento de arquivos com privacidade e segurança, sendo usada por jornalistas, ativistas e pessoas preocupadas com a privacidade em todo o mundo.
Como funciona o OnionShare:
-
Geração do endereço .onion: Ao iniciar o OnionShare, a ferramenta gera um endereço .onion exclusivo para o compartilhamento dos arquivos. Esse endereço é composto por uma sequência de caracteres aleatórios que serve como identificador único para os arquivos compartilhados.
-
Configuração do servidor web temporário: O OnionShare cria um servidor web temporário no dispositivo do usuário, permitindo que os arquivos sejam acessados por meio desse servidor. O servidor web temporário está vinculado ao endereço .onion gerado.
-
Compartilhamento do endereço .onion: O usuário pode compartilhar o endereço .onion gerado com as pessoas que desejam acessar os arquivos compartilhados. Isso pode ser feito por meio de mensagens, e-mails ou qualquer outro canal de comunicação.
-
Acesso aos arquivos compartilhados: As pessoas que receberem o endereço .onion podem usar o navegador Tor para se conectar à rede Tor. Ao inserir o endereço .onion em seu navegador Tor, elas serão direcionadas ao servidor web temporário do OnionShare.
-
Download dos arquivos: Uma vez que a pessoa tenha acesso ao servidor web temporário por meio do endereço .onion, ela poderá visualizar e baixar os arquivos compartilhados. O OnionShare permite que os arquivos sejam transferidos diretamente do dispositivo do remetente para o dispositivo do destinatário, garantindo a privacidade e a segurança dos dados durante a transferência.
-
Encerramento do compartilhamento: O OnionShare permite definir uma duração específica para o compartilhamento dos arquivos. Após o período especificado, o servidor web temporário é desativado e os arquivos não estarão mais disponíveis para download.
É importante destacar que o OnionShare utiliza a rede Tor para criptografar as comunicações e garantir a privacidade dos usuários. Ele fornece uma camada adicional de segurança, permitindo que os arquivos sejam compartilhados diretamente entre os dispositivos dos usuários, sem a necessidade de intermediários ou serviços de armazenamento em nuvem.
O OnionShare resolve diversos problemas relacionados ao compartilhamento de arquivos, fornecendo uma solução segura e anônima.
-
Privacidade: Ao utilizar o OnionShare, os usuários podem compartilhar arquivos de forma privada e segura. A criptografia e a tecnologia da rede Tor garantem que apenas as pessoas com o endereço .onion específico possam acessar os arquivos compartilhados, mantendo a privacidade dos dados.
-
Anonimato: O OnionShare utiliza a rede Tor, que ajuda a ocultar a identidade dos usuários e a proteger sua localização. Isso permite que os usuários compartilhem arquivos anonimamente, sem revelar sua identidade ou localização geográfica aos destinatários.
-
Segurança dos dados: O OnionShare oferece uma forma segura de compartilhar arquivos, evitando a interceptação e a violação dos dados durante a transferência. A criptografia ponto a ponto e a natureza temporária do servidor web garantem que apenas os destinatários pretendidos tenham acesso aos arquivos compartilhados.
-
Contornar a censura e a vigilância: Através do uso da rede Tor, o OnionShare permite contornar a censura e a vigilância online. A criptografia e a rota de tráfego do Tor ajudam a evitar que terceiros, como governos ou provedores de serviços de internet, monitorem ou restrinjam o acesso aos arquivos compartilhados.
-
Eliminação de intermediários: Com o OnionShare, os arquivos são transferidos diretamente entre os dispositivos do remetente e do destinatário, sem a necessidade de intermediários ou serviços de armazenamento em nuvem. Isso reduz o risco de violações de privacidade ou acessos não autorizados aos arquivos compartilhados.
-
Facilidade de uso: O OnionShare foi projetado para ser uma ferramenta fácil de usar, mesmo para usuários não técnicos. Com uma interface simples, os usuários podem gerar endereços .onion e compartilhar os arquivos de forma conveniente, sem a necessidade de conhecimentos avançados de tecnologia.
O OnionShare resolve problemas relacionados à privacidade, anonimato, segurança dos dados e censura, oferecendo uma maneira confiável e acessível de compartilhar arquivos de forma segura e anônima pela rede Tor. É uma solução simples e eficaz para proteger a privacidade dos usuários durante as transferências de arquivos.
https://onionshare.org/
https://github.com/onionshare/onionshare
-
-
@ 6ad3e2a3:c90b7740
2024-10-10 13:49:50As a New Yorker growing up in the 1980s, I didn’t have a high opinion of Christians. I don’t mean my Irish-Italian friends who were nominally Christian, but what we thought of as the “religious right,” those joyless scolds who took it seriously. Who were they to lecture me about the music to which I could listen, or what my teenage girlfriend and I could do in private?
The Christian Right, it seemed, wanted to control you, force their beliefs on you, knew what was best for you and were absolutely certain about what would happen to you if you were not “saved.” I didn’t even like Judaism, my own religion — I was never Bar Mitzvah’d — and contemplating the dull drudgery of synagogues, Sunday schools and chapels filled me with boredom and dread. Religion was for simpletons, and I wanted nothing to do with it.
. . .
Everyone knows the untold evil that has been committed in the name of religion, and Christianity, from the Crusades to the Inquisition to the Salem witch burnings is no exception. But that’s not especially relevant for those of us in the post-enlightenment modern west where practicing one’s religion, especially in adulthood, is increasingly voluntarily. That is, most Christians I encounter have made a conscious choice to place their faith in Jesus and his teachings. No one is forcing them, and they are not forcing anyone else, either.
. . .
Many people in the west have rejected traditional organized religion, but that does not mean they’ve defeated the powerful urge to believe in something larger than themselves, something to root their experience in the world. I have witnessed this religious mindset often, whether people were lecturing me about “trusting” science, never mind that science is based on distrust and verification, or the hilarious “you are not an epidemiologist” during the covid pandemic. Titles, degrees, credentials, blind faith in the technocrats and appeals to authority mirrored to an uncanny degree the behavior of religious subjects terrified to run afoul of clerical edicts in eras past.
If you dissent from such edicts, you are now guilty of misinformation (the modern word for heresy), and you might be deplatformed or lose your livelihood and friends (excommunicated). These super rational non-believers went along with forced injections at the behest of pharmaceutical conglomerates, and when it was obvious the injections didn’t work to stop the spread, they pivoted to nonsense about “occupying ICU beds” in accordance with the new commands of their church.
We were told we could take off our masks while eating in restaurants but had to put them on again while getting up to use the restroom. And we weren’t supposed to gather in large numbers, except for the George Floyd protests because racism was “the real pandemic.” And people swallowed this because, after all, it was Science, not some kind of primitive, superstitious backwards religion.
But the illogic and abuse of sense-making wasn’t just restricted to covid. The two-plus-two-equals five brigade told us a woman could have a penis, men could get pregnant, that biological males belonged in women’s locker rooms and sports competitions if they self-identified as such. I view these deliberate distortions of reality as loyalty tests of sorts — if you can defend the indefensible, you are surely a trusted comrade.
. . .
My experience objecting to this new merger of Science with the whims of the party has been eye opening. Quite often those who were most ruthless in mocking and gaslighting people like me were from my own social circle — college educated liberals, laptop class professionals, those who use words and spread sheets for a living.
And many of those standing up for civil liberties and personal autonomy were not who I would have expected. Wealthy people who didn’t depend on their peers’ good graces to live comfortably, it turns out, were often cowardly beyond belief. Academia, which purports to value truth and open inquiry, were among the most compliant, in many cases enforcers of the party dogmas to the point of abetting the US government in illegally censoring dissent. Even some of those I had most thought of as independent thinkers like Nassim Taleb, Noam Chomsky and “the bad boy of radio” during my formative years, Howard Stern, capitulated abjectly and totally.
So who was willing to resist authoritarianism? Who had the back of the ordinary citizen that simply didn’t want to inject himself with experimental chemicals because someone in a lab coat said so? On my timeline it was disproportionately Christians. People with profiles like “God and family,” “Jesus is No. 1,” and “Follower of Christ.”
Apparently they believe in something bigger than the State and its power, which is why one of the aims of Soviet Russia was to supplant Christianity (and other religions) with state atheism. It’s harder to control people who bow to something other than earthly might. If Jesus went to the cross for them, surely they could endure the wrath of their employers, condemnation by their government, vitriol by all the good people who knew for certain what was best for us.
The roles were now reversed. Instead of the Christian Right being the joyless scolds who knew what was best for me, they became a bulwark against the indoctrinated technocrats doing the same.
What a relief to have such a large swath of the population so resilient to the corrupting forces of the State. That is not to say Christians are perfect people just by virtue of believing or to paint an unrealistic picture of them, only that when the Big Bribe was offered, a large number of them had the wherewithal to turn it down.
As I said, I am not a Christian, but I am sure glad they exist.
-
@ 42342239:1d80db24
2024-10-23 12:28:41TL;DR: The mathematics of trust says that news reporting will fall flat when the population becomes suspicious of the media. Which is now the case for growing subgroups in the U.S. as well as in Sweden.
A recent wedding celebration for Sweden Democrats leader Jimmie Åkesson resulted in controversy, as one of the guests in attendance was reportedly linked to organized crime. Following this “wedding scandal”, a columnist noted that the party’s voters had not been significantly affected. Instead of a decrease in trust - which one might have expected - 10% of them stated that their confidence in the party had actually increased. “Over the years, the Sweden Democrats have surprisingly emerged unscathed from their numerous scandals,” she wrote. But is this really so surprising?
In mathematics, a probability is expressed as the likelihood of something occurring given one or more conditions. For example, one can express a probability as “the likelihood that a certain stock will rise in price, given that the company has presented a positive quarterly report.” In this case, the company’s quarterly report is the basis for the assessment. If we add more information, such as the company’s strong market position and a large order from an important customer, the probability increases further. The more information we have to go on, the more precise we can be in our assessment.
From this perspective, the Sweden Democrats’ “numerous scandals” should lead to a more negative assessment of the party. But this perspective omits something important.
A couple of years ago, the term “gaslighting” was chosen as the word of the year in the US. The term comes from a 1944 film of the same name and refers to a type of psychological manipulation, as applied to the lovely Ingrid Bergman. Today, the term is used in politics, for example, when a large group of people is misled to achieve political goals. The techniques used can be very effective but have a limitation. When the target becomes aware of what is happening, everything changes. Then the target becomes vigilant and views all new information with great suspicion.
The Sweden Democrats’ “numerous scandals” should lead to a more negative assessment of the party. But if SD voters to a greater extent than others believe that the source of the information is unreliable, for example, by omitting information or adding unnecessary information, the conclusion is different. The Swedish SOM survey shows that these voters have lower trust in journalists and also lower confidence in the objectivity of the news. Like a victim of gaslighting, they view negative reporting with suspicion. The arguments can no longer get through. A kind of immunity has developed.
In the US, trust in the media is at an all-time low. So when American media writes that “Trump speaks like Hitler, Stalin, and Mussolini,” that his idea of deporting illegal immigrants would cost hundreds of billions of dollars, or gets worked up over his soda consumption, the consequence is likely to be similar to here at home.
The mathematics of trust says that reporting will fall flat when the population becomes suspicious of the media. Or as the Swedish columnist put it: like water off a duck’s back.
Cover image: Ingrid Bergman 1946. RKO Radio Pictures - eBay, Public Domain, Wikimedia Commons