-
@ a012dc82:6458a70d
2024-10-29 08:28:26Table Of Content
-
The Impending Debt Limit Crisis
-
Why Bitcoin Holds Promise
-
Impact on National Debt
-
Conclusion
-
FAQ
As nations grapple with mounting debt burdens and economic uncertainties, a groundbreaking solution looms on the horizon: Bitcoin. This digital currency, built on decentralized blockchain technology, offers a unique opportunity to address the impending debt limit crisis and reshape the financial landscape. In this article, we will delve into why Bitcoin could be the solution to the looming debt limit crisis, exploring its advantages, impact on national debt, and its potential role in ensuring economic stability.
The Impending Debt Limit Crisis
What is the Debt Limit Crisis?
The debt limit crisis refers to the situation when a country's government reaches the maximum amount of debt it can legally borrow. This ceiling, set by legislation, is often a contentious issue in political debates. Failure to raise the debt limit can result in severe consequences, including a potential government shutdown, default on obligations, and financial market instability.
The Fragile State of National Debts
Nationwide debt levels continue to soar across the globe, with many countries burdened by staggering amounts of indebtedness. The United States, for instance, faces a mounting national debt that surpasses $28 trillion. Similarly, other nations grapple with their own debt crises, making it imperative to explore innovative solutions to tackle this financial burden.
Why Bitcoin Holds Promise
Bitcoin's Decentralized Nature
Bitcoin operates on a decentralized network called the blockchain. This means that no single entity or government controls it. Instead, transactions are verified by a network of computers, ensuring transparency and immutability. This decentralized nature presents a stark contrast to traditional financial systems, making Bitcoin a promising alternative for economic stability.
Protection Against Inflation
Inflation poses a significant threat to economies and their citizens. Bitcoin, with its limited supply of 21 million coins, offers a hedge against inflation. Unlike fiat currencies, which can be printed at will, Bitcoin's scarcity ensures its value is not eroded by excessive money supply. This feature makes Bitcoin an attractive store of value and a potential safeguard against the negative effects of inflation.
Financial Inclusion and Empowerment
Bitcoin has the power to empower individuals and communities who have limited access to traditional financial systems. By utilizing Bitcoin, individuals can transact securely and inexpensively, without the need for intermediaries. This can provide financial inclusion to the unbanked and underbanked populations, fostering economic growth and stability.
Transparency and Auditability
One of the core principles of Bitcoin is transparency. Every transaction is recorded on the blockchain, visible to anyone who wishes to review it. This transparency enhances accountability and enables efficient auditing, reducing the likelihood of fraudulent activities. By leveraging these features, governments can ensure responsible financial practices and mitigate the risk of corruption.
Impact on National Debt
Reducing the Reliance on Fiat Debt
Bitcoin has the potential to reduce a nation's reliance on fiat debt. Governments often resort to borrowing money by issuing bonds and treasury bills, adding to their national debt. By incorporating Bitcoin into their financial systems, governments can diversify their holdings and explore alternative means of financing. This could alleviate the burden of constantly accumulating fiat debt and provide a more balanced approach to fiscal management.
Revenue Generation and Economic Growth
Bitcoin's adoption can contribute to revenue generation and economic growth. As the cryptocurrency ecosystem expands, businesses emerge to support and facilitate Bitcoin transactions. This development creates employment opportunities and stimulates economic activity. Moreover, governments can generate revenue through taxation on Bitcoin-related activities, further bolstering their financial position.
Mitigating Currency Crises
Currency crises can wreak havoc on economies, causing severe fluctuations in exchange rates and devastating consequences for citizens. By integrating Bitcoin into a nation's financial infrastructure, governments can provide an alternative to their national currency during times of currency crises. This flexibility can help stabilize the economy, mitigate the adverse effects of currency devaluation, and foster investor confidence.
Conclusion
As nations confront the looming debt limit crisis, Bitcoin emerges as a beacon of hope, offering a potential solution and transformative possibilities. Its decentralized nature, protection against inflation, financial inclusion, and transparency make it a compelling choice for governments seeking economic stability. While challenges and uncertainties exist, embracing Bitcoin's potential can pave the way for a more resilient and inclusive financial future.
FAQ
Can Bitcoin completely eliminate a country's debt? No, Bitcoin alone cannot eliminate a country's debt. However, its adoption and integration into financial systems can provide alternative means of financing and reduce reliance on accumulating fiat debt.
How can Bitcoin help individuals facing economic hardships? Bitcoin offers financial inclusion and empowerment by providing a secure and inexpensive means of transacting. This can benefit individuals facing economic hardships by enabling them to participate in the global economy without the need for traditional banking services.
Will governments lose control if they adopt Bitcoin? Governments can adopt Bitcoin while retaining control over their financial systems. The decentralized nature of Bitcoin does not imply a loss of control; instead, it offers an opportunity for greater transparency, accountability, and economic stability.
Is Bitcoin a safe investment for governments? As with any investment, Bitcoin carries risks. However, due to its limited supply and decentralized nature, Bitcoin has demonstrated resilience and the potential for long-term value appreciation.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 06639a38:655f8f71
2024-10-29 08:00:36- NIP-42 integration in Nostr-PHP: https://github.com/nostrver-se/nostr-php/pull/67
- Worked out a submission for a Nostr stand at FOSDEM 2025 https://nostrudel.ninja/#/n/nevent1qvzqqqqqqypzqpnrnguxe8qszsshvgkvhn6qjzxy7xsvx03rlrtddr62haj4lrm3qythwumn8ghj7un9d3shjt3s0p3ksct59e3k7mf0qy88wumn8ghj77tpvf6jumt99uqzqrswsdmxjtx9er5mdmt388e7payg85yzvnhf6wspvjdxu7q8gmzsraa37w
- NIP-19 integration in Nostr-PHP work in progress: https://github.com/nostrver-se/nostr-php/pull/68
- Also tinkering around with this relay implemenation written in PHP: https://github.com/nostriphant/transpher
-
@ cb084639:2f16502a
2024-10-29 05:28:32ทำไมถึงกลัว คลอเรสเตอรอลและไขมันอิ่มตัวกันขนาดนั้น !!!
จากภาพจะเห็นได้ว่ามีการวางขายไข่จากพืช!!! ซึ่งอ่านแล้วน่าขัน ในเมื่อเราสามารถ กินไข่จากแม่ไก่ได้!!!
เพื่อความกระจ่างเรามาดูฉลากเจ้าน้ำไข่จากพืชกล่องสีเหลืองกันดีกว่า
อย่างแรกเรามาดูที่ราคากันก่อน ราคาต่อกล่อง 6.98 usd ราคาบาทอยู่ที่ประมาณ 235 บาทต่อกล่อง 16 ออนซ์หรือ 454 กรัม และถ้าเป็นการ นำเงินจำนวนนี้ไปซื้อไข่จริงเบอร์ 2 ราคาแผงละ 119 บาท จะได้ไข่ 58 ฟอง(เกือบ 2 แผงขาดไป 2ฟอง)
เน้นเรื่องปลอด GMO และไม่มี คลอเรสเตอรอล อันนี้เป็นวิธปรุงง่ายๆ ใช่น้ำไข่จากพืช 3 ช้อนโต๊ะ ต่อไข่ไก่จริง 1 ฟอง ทำง่ายสะดวก
ด้านนี้พยายามเปรียบเทียบให้เห็นว่า ไม่มีคลอเรสเตอรอลและไข่มันอิ่มตัว
ปริมาณสารอาหารไข่จากพืช ไม่มีคลอเรสเตอรอล มีไขมันทั้งหมด 4 กรัม คือไขมันไม่อิ่มตัวเชิงซ้อนและไขมันไม่อิ่มตัวเชิงเดี่ยว ต่อหนึ่งหน่วยบริกโภค
ภาพนี้คือข้อมูลขอไข่ไก่ที่ได้จากแม่ไก่จริงๆ
เกือบลืมไปน้ำไข่จากพืชจำเป็นต้องมีส่วนผสมต่างๆ เช่น น้ำ โปรตีนถั่วเขียว น้ำมันคาโนล่าสกัดเย็น สีจากสารสกัดแครอท หัวหอมแห้ง เจลแลนกัม เพื่อรสชาติและเนื้อสัมผัส โพแทสเซียมซิเตรต เกลือ น้ำตาล น้ำเชื่อมมันสำปะหลังของแข็ง เตตระโซเดียมไพโรฟอสเฟต ทรานส์กลูตามิเนส สารสกัดขมิ้น (สี) ไนซิน (สารกันบูด)
สินค้าเน่าเสียง่าย - เก็บในตู้เย็น รับประทานได้ภายใน 7 วันหลังจากเปิด
เราต้องแลกกับการที่ต้องบริโภคสารแปรรูปสารพัดเพื่อที่จะต้องการหนีจากคลอเรสเตอรอลอละไขมันจากธรรมชาติ จะดีกว่ามั้ยถ้าเราเลือกกินไข่ที่ผลิตจากธรรมชาติโดยแม่ไก่?
-
@ c0f9e286:5a223917
2024-10-29 03:51:44ตอนที่แล้วกล่าวถึงการถือหุ้นแบบซ้อนเป็นชั้นๆ ผ่านกลไก Offshore Company ในตอนนี้จะกล่าวถึงอีกหนึ่งเครื่องมือในการปกปิดความเป็นเจ้าของ นั่นคือการตั้ง Trust
หลายคนอาจจะเคยได้ยินคำว่า Trust ผ่านกอง REIT (Real Estate Investment Trust) ซึ่งเป็น Trust เพื่อการลงทุนอสังหาริมทรัพย์ สามารถทำการระดมทุนผ่านตลาดหลักทรัพย์ได้ มีโครงสร้างคล้ายๆกับ Property Fund แต่ Trust ที่ผมจะกล่าวต่อไปนี้ เปรียบเสมือนกองทุนส่วนบุคคลซึ่งผู้จัดการกอง Trust จะเป็นผู้บริหารทรัพย์สินนั้นๆ ส่วนเจ้าของตัวจริงจะไม่มีกรรมสิทธิ์ทางตรงต่อทรัพย์สินนั้นๆ
ก่อนอื่นต้องอธิบายศัพท์ของ Trust ให้เข้าใจก่อน เพราะค่อนข้างมีศัพท์เฉพาะเยอะ โดยศัพท์ที่ควรรู้ก็เช่น
Settlor (ผู้ตั้งกอง): เป็นคนที่นำทรัพย์สินมาใส่ในกอง Trust ซึ่งหลังจากทรัพย์สินถูกโอนเข้าไปในกอง Trust แล้ว ผู้ตั้งกองจะไม่มีสิทธิ์ควบคุมทรัพย์สินนั้นโดยตรงอีกต่อไป
Trustee (ผู้ดูแลกอง): เป็นผู้ที่ได้รับมอบหมายให้จัดการทรัพย์สินในกอง Trust ตามเงื่อนไขที่ผู้ตั้งกองระบุไว้ ผู้ดูแลกองมีหน้าที่ดูแลให้ทรัพย์สินนี้เติบโตและคงอยู่เพื่อผู้รับประโยชน์
Beneficiary (ผู้รับประโยชน์): เป็นคนที่ได้รับผลประโยชน์จากกอง Trust ตามเงื่อนไขที่กำหนด เช่น ได้รับเงินปันผล หรือทรัพย์สินเมื่อครบกำหนด
ข้อสังเกตง่ายๆ เวลาคุณดูหุ้นบริษัทจดทะเบียนในตลาดหลักทรัพย์ มักจะมีชื่อหนึ่งปรากฏขึ้นมาเสมอๆในหุ้นตัวใหญ่ๆ นั่นคือ STATE STREET BANK AND TRUST COMPANY
เวลาเห็นรายชื่อแบบนี้เข้าไปถือหุ้นทุกบริษัท คุณไม่มีทางรู้เลยว่า Trust นี้กำลังถือทรัพย์สินให้รายใหญ่คนเดียว หรือหลายคน บางทีอาจจะเป็นรายใหญ่แค่คนเดียวใช้บริการ Trust เจ้านี้เพื่อให้ไปถือหุ้นแทน หรืออาจจะมีหลายคนว่าจ้าง Trust แห่งนี้ให้ถือหุ้นแทน พอถือรวมกันมากเข้าก็เลยปรากฏเป็นรายชื่อผู้ถือหุ้นใหญ่นั่นเอง
อ่อ ลืมบอกไป ในไทยไม่มีกฎหมายรองรับในการตั้งกอง Trust ดังนั้นถ้าจะตั้งต้องตั้งในต่างประเทศ และไม่ใช่ว่า Trust จะมีแต่ข้อดีอย่างเดียว ซึ่งข้อเสียของมันก็ควรนำมาคิดด้วยเช่นกัน
ซึ่งข้อเสียอย่างแรกคือคุณไม่มีสิทธิความเป็นเจ้าของทรัพย์สินหรือหุ้นนั้นๆอีกต่อไป นั่นเป็นสาเหตุที่ไม่ว่ารัฐบาลไหนก็ไม่สามารถฟ้องร้องเพื่อยึดทรัพย์ใน Trust ได้ Bitcoiner ย่อมทราบดีกับคำว่า “์Not your key, Not your coin” คุณกำลังเอาทรัพย์สินไปฝากให้คนอื่นดูแล เพราะฉะนั้นคุณมีโอกาสโดนกอง Trust อ้างว่าบริหารงานผิดพลาดซึ่งทำให้คุณสูญเสียทรัพย์สิน ดังนั้นก่อนตั้ง Trust ควรเลือก Trustee ที่มีผลงานมานาน ไม่เคยมีประวัติฉ้อฉล และคุณก็ควรกำหนดเงื่อนไขในการบริหารกองทุนให้ชัดเจนตั้งแต่แรก เพื่อป้องกันการโอนย้ายทรัพย์สิน หรือการบริหารงานผิดพลาด
ถัดมาคือค่าใช้จ่ายโดยรวมมักจะสูงกว่าการตั้ง Offshore Company แบบซ้อนประเทศ ตั้งแต่การ Settle ไปจนถึงค่าดูแลกอง Trust รายปี ซึ่งผมไม่เคยเห็นที่ไหนต่ำกว่าหลักแสนต่อปี หรือบางที่ก็หลักล้าน หากมีทรัพย์สินจำนวนมาก ต่างกับการตั้ง Offshore Company โดยสิ้นเชิง (แต่ในบางกรณี Offshore Company ก็มีค่าใช้จ่ายสูงเช่นกัน ขึ้นกับธุรกิจที่ทำ จำนวนเงิน และประเทศที่จดจัดตั้งบริษัท)
ดังนั้น Trust จึงเป็นอีกหนึ่งวิธีของการปกปิดตัวตนของเหล่ามหาเศรษฐี แต่แลกมากับการต้องไว้ใจผู้บริหารกอง Trust ว่าจะไม่ฉ้อฉลกับทรัพย์สินของเรา ซึ่งถ้าถามว่าทำยังไงถึงจะมีอำนาจควบคุมกอง Trust ได้แบบเบ็ดเสร็จ นอกเหนือจากการกำหนดเงื่อนไขที่ละเอียดแล้ว อีกวิธีคือการเป็นเจ้าของบริษัท Trust เอง แล้วคุณคิดว่าตระกูลอย่าง Rothschild มีความสามารถที่จะเป็นเจ้าของบริษัท Trust หรือไม่ แล้วถ้าทำได้คุณคิดว่าเขาจะนำทรัพย์สินไปเก็บไว้ใน Trust เพื่อปกปิดชื่อเยอะขนาดไหน นี่เป็นเรื่องน่าคิด
ยังเหลืออีก 1 วิธี ที่จะสามารถปกปิดตัวตนในการถือครองทรัพย์สินได้ดี โปรดติดตามตอนต่อไป
realeakkrit #bitcoin #siamstr #wef
-
@ b7ccd493:6ba2260f
2024-10-29 01:28:11The emergence of Bitcoin has not only sparked a revolution in the financial world but has also redefined people’s understanding of “gold” as a symbol of wealth. In the past, gold was the preferred reserve asset for investors and nations due to its scarcity and ability to preserve value. Today, in a highly digital era, Bitcoin’s unique characteristics have earned it the title “electronic gold,” making it the potential new golden legend of our time.
-
Scarcity: The Key Similarity Between Bitcoin and Gold Bitcoin’s scarcity is one of its most significant similarities to gold. With a hard cap of 21 million coins, Bitcoin’s limited supply makes it resistant to inflation and ideal as a digital asset. As new Bitcoin production decreases each year, its value is increasingly recognized by the market. Much like gold’s supply and demand dynamics, Bitcoin’s scarcity has positioned it as a distinctive store of value.
-
Decentralization: Freedom from Traditional Financial Control Gold’s value stems from its independence from any government or institution’s credit. Bitcoin’s decentralized nature gives it the same autonomy. Operating on blockchain technology, Bitcoin is not controlled by any central authority, making it immune to national economic policies. For those concerned about currency devaluation or economic instability, Bitcoin offers a safe harbor for storing value.
-
Global and Liquid: Wealth Transfer Anytime, Anywhere Unlike gold, which is challenging to move and transfer across borders, Bitcoin’s digital form enables easy global transactions. Regardless of location, Bitcoin can be transferred quickly as long as there’s internet access. For investors seeking asset flexibility, Bitcoin’s high liquidity is a significant advantage. Furthermore, Bitcoin’s divisibility makes it viable for small transactions, creating an accessible investment option for everyone.
-
Security: Trust in Bitcoin Built on Blockchain Technology Blockchain technology provides an immutable, secure foundation for Bitcoin. Every transaction is recorded transparently on the blockchain, where it cannot be altered. This security positions Bitcoin as a trusted digital asset in the digital wave. As more companies and financial institutions recognize Bitcoin as a legitimate asset, its acceptance and application continue to grow.
-
Future Potential: Investment Potential of Digital Gold Looking to the future, Bitcoin’s demand is only set to increase, especially against a backdrop of global economic uncertainty. Not only does Bitcoin offer individual investors a new asset option, but it also brings substantial potential for institutional investors. As more countries and businesses adopt Bitcoin as a payment method, its status as “digital gold” will only solidify. Bitcoin is emerging not only as an investment tool but as a new symbol of wealth in the digital age.
Conclusion: Bitcoin—Writing a New Legend of Digital Gold Bitcoin has risen in modern society as the “digital gold” and is becoming a new global choice for preserving wealth. It has not only transformed our view of value storage but has also brought innovation and freedom that traditional finance cannot offer. For investors, seizing this early opportunity in “digital gold” may be key to unlocking future wealth.
-
-
@ b7ccd493:6ba2260f
2024-10-29 01:20:20比特币的诞生不仅引发了金融世界的巨大变革,也重新定义了人们对“黄金”这一财富象征的理解。过去,黄金以其稀缺性和保值性成为投资者和国家的财富储备首选。而在这个高度数字化的时代,比特币因其独特的特性,正在成为“电子黄金”的新代名词,甚至被视为数字时代的“新黄金传奇”。
-
稀缺性:比特币与黄金的相似之处 比特币的稀缺性是其最接近黄金的特质之一。比特币的总量被限定为2100万枚,与黄金的稀有性相似。由于不会被任意增发,这种稀缺性使比特币成为一种抗通胀的数字资产。随着每年新产出的比特币逐渐减少,其价值越来越被市场所认可,类似于黄金的供求关系,比特币的稀缺性也让其成为一种独特的价值储存手段。
-
去中心化:摆脱传统金融体系的控制 黄金的价值在于它不依赖于任何政府或机构的信用。而比特币的去中心化属性使其具备同样的独立性。比特币运行在区块链技术之上,没有任何中央机构对其进行调控。这一特性让比特币不受任何国家经济政策的影响,成为一种真正属于个人的资产。对于那些担忧货币贬值或经济不稳定的投资者来说,比特币成为了一个安全的价值避风港。
-
全球性和流动性:随时随地的财富传输 黄金的实物形式让其难以在全球范围内快速流通,而比特币的数字属性则弥补了这一短板。无论身处何地,只要有互联网,比特币便可以实现快速传输。对于希望灵活配置资产的投资者来说,比特币的高流动性无疑是其优势之一。更重要的是,比特币的可分割性使其可以进行小额交易,这让比特币成为了一个适合大多数人投资的选择。
-
安全性:区块链赋予比特币的信任基础 区块链技术为比特币提供了不可篡改的安全保障。每一笔比特币交易都记录在链上,透明公开,且无法更改。这种安全性让比特币在数字化浪潮中脱颖而出,成为一个值得信赖的数字资产。此外,越来越多的企业和金融机构将比特币视作一种合法资产,推动了比特币的广泛应用和接受。
-
未来前景:数字黄金的投资潜力 展望未来,比特币的需求只会增加,尤其是在全球经济不稳定的背景下。比特币不仅为个人投资者提供了一种全新的资产选择,也为机构投资者带来了巨大的潜力。随着越来越多的国家和企业接受比特币作为支付手段,这种“数字黄金”的地位会进一步巩固。比特币不仅是投资工具,更是数字时代下新的财富象征。
结语:比特币—数字黄金的传奇正在书写 比特币在现代社会中以“数字黄金”的形象崛起,并逐渐成为全球财富保值的新选择。它不仅改变了我们对价值存储的看法,更是带来了传统金融世界无法提供的创新性和自由度。对于投资者而言,早期抓住“数字黄金”的机遇或许是一个通向未来财富的关键。
-
-
@ 5d4b6c8d:8a1c1ee3
2024-10-28 21:14:15I'm going to pull the trigger on a home miner this winter. I want a simple setup to start with. I'm happy to get waste heat from the device, but I don't want a lot of noise.
The two options I'm looking at are Heatbit and Bitaxe. Heatbit is much more expensive, but it also functions as an air purifier, which we can also use in the winter.
I'd love to hear what stackers know about these two products, or if there's something else I should be looking at.
originally posted at https://stacker.news/items/744041
-
@ 57d1a264:69f1fee1
2024-10-28 19:39:24How to set up a Bitcoin and Lightning node with Umbrel [Japanese w/ ENG Subtitles]
https://www.youtube.com/watch?v=i41A6IFXK10
by @My Lightning Network Journey
originally posted at https://stacker.news/items/743850
-
@ c11cf5f8:4928464d
2024-10-28 19:09:41Time to brush off the spurs and saddle up for a ride into the exciting ad-ventures ahead! What innovative goods or services are y'all bringin' on the wagon this week?
Take some pics and start posting your items, sell stuff for sats!
[⚖️ SELL] - [🛒 BUY] - [🧑💻 HIRE] - [🖇 OFFER] - [🧑⚖️ AUCTION] - [🤝 SWAP] - [🆓 FREE] - [⭐ REVIEW]
Stay humble, stack sats!
originally posted at https://stacker.news/items/743788
-
@ 57d1a264:69f1fee1
2024-10-28 19:03:07https://www.youtube.com/watch?v=iR7WnUYGST4
originally posted at https://stacker.news/items/743780
-
@ a39d19ec:3d88f61e
2024-10-28 18:44:55What do you even print with it besides decorative objects?
This kind of question still is a common one when talking about 3d printing.
With this series of long-form notes I will show you some of the practical and useful 3d printed things, that I use a lot.
Let me start the series with a nice little print consisting of two parts.
Laptop riser
There are many designs of laptop risers available online. But I like that the parts are small and interlocking, so that the are always together when not in use. The riser fits all laptops in our house. Particularly when working in Fusion360 my laptop needs lots of fresh air. I use the raiser regularly about 3 times a week. Sadly I don't know where I downloaded it from, so I cannot provide a link to it.
-
@ 03b2a4f0:7ff066d4
2024-10-28 18:24:28Have you heard of "ZETEO CITADEL CONSULT IN COLLABORATION WITH THE UN OF IBADAN" we are into training of corps members and executive within Nigeria and outside the world Type of course we offer are Human resources management project management *Web development And Web design
-
@ c73818cc:ccd5c890
2024-10-28 17:15:52📸 Il controverso rapporto della BCE e le critiche alla criptovaluta
👽 La Banca Centrale Europea (BCE) ha recentemente pubblicato un rapporto aspramente critico su Bitcoin, definendolo volatile, improduttivo e concentrato nelle mani di pochi. Gli autori Bindseil e Schaff hanno sostenuto che BTC potrebbe addirittura impoverire i non detentori, causando una redistribuzione della ricchezza a favore degli early adopters. Tuttavia, la comunità cripto ha risposto fermamente, accusando la BCE di fingere di non cogliere la reale essenza del Bitcoin.
📸 Bitcoin: una tecnologia emergente e sottovalutata?
👽 Esperti come Murray Rudd del Satoshi Action Fund hanno denunciato l'approccio riduttivo del rapporto, che ignora i progressi di Bitcoin in termini di scalabilità ed efficienza. La volatilità, spesso citata come difetto, è considerata una caratteristica comune nelle tecnologie emergenti. Allen Farrington, coautore di una controreplica, ha inoltre evidenziato un conflitto di interessi: gli autori del rapporto sono coinvolti nello sviluppo dell'euro digitale, un progetto che potrebbe essere minacciato dal successo di Bitcoin.
📸 Bitcoin e inflazione: una risposta alla svalutazione del denaro fiat?
👽 Un altro punto di scontro è stato il ruolo di Bitcoin nell'inclusione finanziaria e nella lotta contro l'inflazione. La BCE ha attaccato la distribuzione della ricchezza in BTC, ma i sostenitori ribattono che la criptovaluta, con la sua offerta limitata, può proteggere il potere d'acquisto in un mondo dove le valute fiat vengono costantemente erose dall’inflazione. Bitcoin, per molti, rappresenta una risposta alla perdita di valore delle valute tradizionali.
📸 Un attacco ideologico o una reale preoccupazione?
👽 La BCE sostiene di voler regolamentare o addirittura vietare Bitcoin per proteggere il pubblico, ma secondo molti bitcoiner si tratterebbe di una strategia per eliminare un concorrente scomodo all'euro digitale. Le critiche metodologiche e ideologiche sollevate dalla comunità cripto mettono in dubbio la reale obiettività del rapporto, aprendo il dibattito su quali siano le vere intenzioni dietro questo attacco a BTC.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
-20% Bitget: https://bonus.bitget.com/U1JNEK
NO KYC Mexc: https://www.mexc.com/it-IT/register?inviteCode=mexc-12USut
BitcoinReportItalia #BCE #Banca #Tassa #Regolamentazione #Europa #Report #Normativa #Cripto #Bitcoin
-
@ f196850e:79178e07
2024-10-28 16:46:36https://forex-strategy.com/2024/10/28/in-bulgaria-the-parties-bought-voters-for-eur-500-per-vote/ In Bulgaria, the parties bought voters for EUR 500 per vote
vote #election #politics #bulgaria
-
@ d1b118c6:4985b38d
2024-10-28 16:46:21Chef's notes
So easy I promise
Details
- ⏲️ Prep time: 15 minutes
- 🍳 Cook time: 25-35 minutes
- 🍽️ Servings: 1-5 persons
Ingredients
- Squash
- Olive oil
- Salt
- Pepper
- Garlic seasoning
Directions
- Preheat oven to 400°F
- Peel the squash
- Cut the squash in half
- Scrape out all the seeds and guts (can save that stuff for something else or compost or whatever)
- Slice and dice up the remaining shell of a squash into 1inch (or so) sized pieces
- Mix all the pieces of squash with olive oil and various seasonings (suggested seasonings in the ingredients list but do whatever you want. This is what I had on hand along w some parsley actually)
- Lay all the squash out on a baking sheet nice and flat so that there aren’t any pieces overlapping
- Toss it in the preheated oven until it is soft to the fork tines and/or goldeny
- Enjoy. I had it on rice with soy sauce and would also be good with a fried egg on it. Add it to whatever squash would be good with
-
@ 5d4b6c8d:8a1c1ee3
2024-10-28 16:12:11We've hit the part of the season where all hope has been lost. Usually, the Raiders do a better job of stringing us along, but this year they ripped the band-aid off quickly.
Looking ahead to the draft, we're currently slated to pick 7th and have a desperate need at QB.
Mock Draft Results: - 7th Pick: QB Jalen Milroe - 38th Pick: OT Aireontae Ersery - 69th Pick (nice): LB Danny Stutsman - 72nd Pick: WR Evan Stewart - 105th Pick: OG Jared Wilson - 141st Pick: DE Anto Saka - 184th Pick: RB Devin Neal - 212th Pick: CB Cobee Bryant - 214th Pick: S Jaylen Reed - 223rd Pick: DT Rylie Mills
The defense is pretty solid and might be getting Koonce back at DE next year, so I focused heavily on accumulating talent for our next coaching staff to work with.
originally posted at https://stacker.news/items/743584
-
@ 3ffac3a6:2d656657
2024-10-28 16:11:58Manifesto Stancap (Stalinismo Anarco-Capitalista):
Por um Futuro de Controle Absoluto e Liberdade Ilimitada
Saudações, camaradas e consumidores! Hoje, convocamos todos a marchar com orgulho rumo à mais avançada utopia jamais concebida pelo pensamento humano (e nem tão humano assim): o Stancap, a síntese perfeita entre a mão invisível do mercado e o punho de ferro do Estado.
1. Liberdade Total sob o Controle Absoluto
Aqui, a liberdade é garantida. Você é livre para fazer o que quiser, pensar o que quiser, mas lembre-se: nós estaremos observando — por uma taxa de assinatura mensal, é claro. O governo será privatizado e administrado por CEOs visionários que entendem que os lucros mais seguros vêm da ordem e do controle. Sim, camarada, a ordem é o que nos liberta!
2. Empresas Estatais e Governo Privado para o Progresso Econômico
Todas as empresas serão estatizadas. Afinal, queremos um mercado forte e estável, e nada diz "eficiência" como uma gestão estatal unificada sob nosso Grande Conselho Corporativo. E para garantir o controle absoluto e a segurança dos cidadãos, o governo também será privatizado, operando sob princípios empresariais e contratos de eficiência. Nosso governo privado, liderado por CEOs que representam o mais alto nível de comprometimento e lucros, estará alinhado com o progresso e a ordem. Suas preferências de consumo serão registradas, analisadas e programadas para otimizar sua experiência como cidadão-produto. Cada compra será um voto de confiança, e qualquer recusa será gentilmente "corrigida".
3. Liberdade de Expressão Absoluta (com Moderação, Claro)
A liberdade de expressão é sagrada. Fale o que quiser, onde quiser, para quem quiser! Mas cuidado com o que você diz. Para garantir a pureza de nossas ideias e manter a paz, qualquer expressão que se desvie de nosso ideal será gentilmente convidada a uma estadia em um de nossos premiados Gulags Privados™. Neles, você terá a oportunidade de refletir profundamente sobre suas escolhas, com todo o conforto que um regime totalitário pode proporcionar.
4. A Ditadura da Liberdade
Dizemos sem ironia: a única verdadeira liberdade é aquela garantida pela ditadura. Com nossa liderança incontestável, asseguramos que todos terão a liberdade de escolher aquilo que é certo — que por sorte é exatamente o que determinamos como certo. Assim, a felicidade e a paz florescerão sob a luz da obediência.
5. Impostos (ou Dividends, como Preferimos Chamar)
Sob nosso sistema, impostos serão substituídos por "dividends". Você não será mais tributado; você estará "investindo" na sua própria liberdade. Cada centavo vai para reforçar o poder que nos mantém unidos, fortes e livres (de escolher de novo).
6. Propriedade Privada Coletiva
A propriedade é um direito absoluto. Mas para garantir seu direito, coletivizaremos todas as propriedades, deixando cada cidadão como "co-proprietário" sob nosso regime de proteção. Afinal, quem precisa de títulos de posse quando se tem a confiança do Estado?
7. Nosso Lema: "Matou Foi Pouco"
Em nossa sociedade ideal, temos um compromisso firme com a disciplina e a ordem. Se alguém questiona o bem maior que estabelecemos, lembremos todos do lema que norteia nossos valores: matou foi pouco! Aqui, não toleramos meias-medidas. Quando se trata de proteger nosso futuro perfeito, sempre podemos fazer mais — afinal, só o rigor garante que a liberdade seja plena e inquestionável.
Junte-se a Nós!
Levante-se, consumidor revolucionário! Sob a bandeira do Stancap, você será livre para obedecer, livre para consumir e livre para estar do lado certo da história. Nossa liberdade, nossa obediência, e nossa prosperidade são uma só. Porque afinal, nada diz liberdade como um Gulag Privado™!
-
@ a37bda36:6fe8611c
2024-10-28 15:46:43Bitcoin: En Afgørende Beslutning for Nationale Økonomier og Fremtidige Generationer Bitcoin: En Afgørende Beslutning for Nationale Økonomier og Fremtidige Generationer
Efterhånden som Bitcoin bliver en stadig mere fremtrædende kraft i global finans, befinder lande, herunder Danmark, sig ved en kritisk skillevej. Ligesom virksomheder, der overvejer fordelene ved at adoptere Bitcoin, skal nationer nu beslutte, hvordan de vil interagere med denne nye teknologi. Denne beslutning vil forme deres økonomier, påvirke deres position på verdensmarkedet og efterlade varige konsekvenser for fremtidige generationer. Men nylige politiske diskussioner, såsom Danmarks forslag om at beskatte Bitcoin-beholdninger årligt, afslører en grundlæggende misforståelse af Bitcoins potentiale. I stedet for at betragte Bitcoin som en erstatning for det nuværende finansielle system, bør politikere erkende, at det er en komplementær teknologi, der kan sameksistere med traditionel finans. Bitcoin er kommet for at blive, uanset om det bliver omfavnet eller modarbejdet, men konsekvenserne af dette valg vil klinge gennem alle niveauer af samfundet, fra virksomheder og borgere til fremtidige generationer.
Bitcoin som en Strategisk Valg for Nationale Økonomier
Bitcoins adoption som anerkendt betalingsmiddel i El Salvador i 2021, efterfulgt af byen Luganos "Plan B"-initiativ for at integrere Bitcoin i sin økonomi, har udløst en omfattende debat om økonomisk suverænitet, decentralisering og finansiel inklusion. Lande som Bhutan og andre bruger Bitcoin-mining på innovative måder ved at anvende deres rigelige vandkraft eller overskudsenergi til både bæredygtig mining og stabilisering af energinetværk. Disse eksempler fremhæver, hvordan Bitcoin kan bruges som en stærk tilføjelse til eksisterende finansielle systemer, snarere end som en erstatning. Nationer som El Salvador og Bhutan ser Bitcoin som et redskab til at diversificere deres økonomier, reducere afhængigheden af centraliserede finansielle institutioner og øge modstandskraften mod globale økonomiske udsving.
Desuden kan Bitcoin, på trods af bekymringer om energiforbrug, understøtte en overgang til bæredygtige energikilder gennem innovative løsninger som mining med overskuds- eller grøn energi og ved at tilbyde netstabilisering. Misforståelser om Bitcoins energipåvirkning afslører en betydelig kløft i forståelsen af, hvad Bitcoin virkelig repræsenterer, og hvordan det fungerer. Mange kritikere overser, at Bitcoin-mining ofte tilskynder til produktion af ren energi og energieffektivitet. For disse lande repræsenterer Bitcoin et strategisk valg for at modernisere deres finansielle systemer og styrke borgerne uden at afskaffe traditionelle strukturer.
Denne tilgang handler ikke om at erstatte det gamle med det nye, men om at bygge et finansielt system, der giver folk flere muligheder. Bitcoins decentraliserede natur og evne til at operere uafhængigt af etablerede banksystemer gør det til et værdifuldt alternativ, der kan eksistere side om side med eksisterende strukturer. Lande, der omfavner Bitcoin, åbner sig for en verden af muligheder, der kan gavne alle niveauer i samfundet. Fra at øge national økonomisk modstandskraft til at styrke borgerne med nye finansielle værktøjer, tilbyder Bitcoin en vej til et mere inkluderende og fleksibelt finansielt landskab, der kan tilpasse sig globale ændringer.
Lærdom fra Erhvervslivet: MicroStrategy og Microsoft
Strategierne hos virksomheder som MicroStrategy og Microsoft fremhæver konsekvenserne af at omfavne eller ignorere Bitcoin. MicroStrategys tidlige beslutning om at integrere Bitcoin i sin finansielle strategi har positioneret det som en leder, tiltrukket investorinteresse og styrket dets omdømme som en fremsynet virksomhed. Microsoft har derimod taget en forsigtig tilgang og risikerer at blive opfattet som konservativ. Hvis MicroStrategys Bitcoin-strategi fortsætter med at give positive resultater, kan det sætte Microsofts relative inaktivitet i et kritisk lys og rejse spørgsmål om dets innovationspotentiale.
Denne analogi kan også anvendes på nationaløkonomier. Lande, der integrerer Bitcoin, kan positionere sig som økonomiske ledere, høste fordelene ved tidlig adoption uden at afskaffe deres traditionelle finansielle systemer. Omvendt risikerer nationer, der modstår Bitcoin, at blive efterladt, idet de går glip af muligheden for at blande Bitcoins styrker med deres eksisterende økonomiske strukturer. Ligesom virksomheder, der ignorerer disruptive teknologier, hurtigt kan blive irrelevante, risikerer lande, der modstår Bitcoin-adoption, at kvæle økonomisk innovation og undergrave deres globale konkurrenceevne.
Fordelene ved at Omfavne Bitcoin: Fra Borgere til Fremtidige Generationer
At omfavne Bitcoin giver fordele på alle niveauer—fra landet til virksomhederne, fra borgerne til fremtidige generationer. Når en nation integrerer Bitcoin, signalerer den åbenhed over for finansiel innovation og modstandskraft, hvilket tiltrækker virksomheder, investorer og iværksættere, der trives i Bitcoin-venlige miljøer. For virksomheder giver Bitcoin en måde at beskytte sig mod valutadevaluering og inflation, hvilket potentielt styrker deres balancer og gør dem mere konkurrencedygtige på det globale marked.
For borgerne giver Bitcoin finansiel suverænitet og nye muligheder for at bevare velstand, især i økonomier, der er udsatte for inflation eller kapitalbegrænsninger. Måske vigtigst af alt, ved at adoptere Bitcoin som en komplementær finansiel teknologi, kan lande sikre, at fremtidige generationer har adgang til et mangfoldigt og robust økonomisk system, der kan tilpasse sig kravene i en hurtigt forandrende verden. Fordelene ved Bitcoin rækker ud over økonomisk gevinst—de omfatter også øget autonomi, økonomisk empowerment og adgang til et globalt, decentraliseret finansielt netværk.
Omvendt indebærer modstand mod Bitcoin betydelige risici. Nationer, der modstår Bitcoin-adoption, kan uforvarende begrænse deres borgeres finansielle frihed og reducere mulighederne for økonomisk vækst. Virksomheder kan finde det udfordrende at forblive konkurrencedygtige i en Bitcoin-aktiveret global økonomi, mens landet som helhed kan miste sin tiltrækningskraft for investorer og innovatorer. Det mest bekymrende er, at ved at stå i vejen for Bitcoin risikerer disse nationer at nægte fremtidige generationer de finansielle værktøjer og den frihed, der er nødvendig for at trives i en decentraliseret verden.
Reguleringens Kortsynethed og Stagnationens Pris
Meget af den regulatoriske modstand mod Bitcoin synes at være forankret i en stiv overholdelse af traditionelle finansielle paradigmer. Politikere, der ofte er uddannet inden for konventionelle økonomiske rammer, mangler måske det perspektiv, der kræves for at forstå Bitcoins unikke rolle som en komplementær teknologi. Denne mangel på forståelse risikerer at skubbe lande mod økonomisk stagnation ved at skabe strukturelle barrierer for innovation. Ved at afvise Bitcoin kan regulatorer uforvarende hæmme økonomisk dynamik og efterlade deres lande sårbare i en stadig mere decentraliseret global økonomi.
Denne regulatoriske myopi risikerer ikke kun at kvæle økonomiske fremskridt, men også at forstærke eksisterende finansielle uligheder. Mens Bitcoin ikke er en erstatning for traditionelle finansielle institutioner, kan det fungere som et levedygtigt alternativ for underbankede befolkninger og tilbyde et niveau af finansiel tilgængelighed, som mange lande i øjeblikket kæmper med at levere. En stiv holdning mod Bitcoin kunne forhindre millioner i at få adgang til dette globale finansielle netværk, hvilket effektivt tvinger folk til at forblive afhængige af centraliserede institutioner, som for mange fortsat er utilgængelige og uretfærdige—en beslutning, der, hvis den træffes med vilje, kun kan retfærdiggøres af motiver, der er rodfæstet i kontrol fremfor empowerment.
At Betegne Bitcoin og “Krypto” som Synonyme: Et Tegn på Regulatorisk Misforståelse
Et andet tegn på regulatorernes manglende forståelse er deres hyppige sammenblanding af Bitcoin med “krypto,” som om de er én og samme ting. Denne fejlagtige betegnelse understreger, hvordan mange politikere overser Bitcoins unikke teknologiske fundament og særlige egenskaber. I modsætning til andre digitale aktiver er Bitcoin decentraliseret, censurresistent og har en fast forsyning, hvilket gør det fundamentalt anderledes end det bredere kryptomarked. At gruppere Bitcoin med “krypto” i politiske diskussioner viser en overfladisk forståelse af dens rolle som et holdbart, uafhængigt netværk med unikke økonomiske principper. Denne tilgang forvrænger ikke kun den offentlige opfattelse, men forhindrer også klare og effektive politikrammer, der respekterer Bitcoins særlige rolle i moderne finans.
Bitcoin som en Protokol for Innovation: Lærdom fra TCP/IP
Ligesom TCP/IP-protokollen muliggjorde en bølge af transformative innovationer—e-mail, internettet, streaming og utallige applikationer—tjener Bitcoin også som en grundlæggende protokol med stort potentiale. De innovationer, der kan opstå oven på Bitcoin-protokollen, er svære at forudsige, ligesom det ville have været umuligt at forudse hele internettets landskab under TCP/IP’s tilblivelse. At beskatte eller modstå Bitcoin ville være lige så kortsigtet som at beskatte TCP/IP-protokollen selv og lade, som om en person eller en gruppe har indsigt til at kontrollere udviklingen af en teknologi, der er bestemt til global indflydelse. Bitcoin er ikke blot et digitalt aktiv; det er en decentraliseret protokol, der fungerer som fundamentet for en ny æra af finansiel, teknologisk og økonomisk innovation.
Beskatning af Bitcoin: Fåfængt og Undertrykkende
At beskatte Bitcoin er lige så absurd som at beskatte sollys eller forbyde folk at kigge på månen—en handling, der, hvis den blev gennemført, ville stå som et symbol på undertrykkelse. Sådanne handlinger ville blive husket af fremtidige generationer på samme måde, som vi i dag reflekterer over arven fra autoritære regimer: som tiltag født af kontrol, ikke fremskridt. Ydermere ignorerer sådanne tiltag Lindy-effekten, som antyder, at Bitcoin, ligesom alle varige teknologier, kun vil blive stærkere og mere modstandsdygtig over tid. Forsøg på at begrænse det viser sig i sidste ende at være ineffektive, da Bitcoin ikke kan stoppes; skræmmekampagner kan påvirke dem, der ikke er bekendt med dets potentiale, men hvert forsøg vil kun styrke Bitcoin og Bitcoins betydning. I mellemtiden risikerer de nationer, der håndhæver sådanne politikker, at svække deres egen position og falde bagud i en fremtid, hvor Bitcoin uundgåeligt vil spille en central rolle.
Den Globale Mulighed: Omfavne eller Falde Bagud
At ignorere eller modstå Bitcoin er ikke blot en forpasset investeringsmulighed—det er en forpasset chance for at positionere et land i spidsen for global økonomisk innovation. Bitcoins decentraliserede netværk vil fortsætte med at vokse og få legitimitet verden over, med eller uden støtte fra nogen enkelt nation. Lande, der velkommer Bitcoin, vil have fordelen af at forme, hvordan denne teknologi integreres med traditionel finans, mens de, der modstår, kan finde sig selv kæmpe for at indhente en verden, der i stigende grad er åben for decentraliserede løsninger.
Beslutningen om at omfavne eller afvise Bitcoin vil påvirke et lands umiddelbare økonomiske landskab og bestemme dets rolle i den globale økonomi i årtier fremover. Nationer som El Salvador og byen Lugano sætter nye standarder for økonomisk tilpasningsevne og modstandskraft ved at blande Bitcoin med traditionelle systemer for at skabe en hybrid finansiel fremtid. Denne tilgang positionerer dem ikke kun som ledere i den digitale økonomi, men sikrer også en lysere fremtid for deres borgere. Ved at vælge at omfavne Bitcoin lægger disse lande grundlaget for bæredygtig vækst, der vil gavne generationer fremover.
En Kritisk Beslutning for Politikere
Lande står nu ved en afgørende korsvej: Integrere Bitcoin som en komplementær teknologi for at styrke økonomisk modstandskraft eller risikere at stagnere i en stadigt mere decentraliseret verden. De valg, der træffes i dag, vil påvirke, hvordan nationer opfattes globalt og bestemme graden af finansiel frihed og muligheder, der er tilgængelige for deres borgere. At omfavne Bitcoin betyder ikke at opgive det eksisterende finansielle system. I stedet betyder det at anerkende, at Bitcoin kan sameksistere med traditionel finans for at skabe en mere inkluderende, fleksibel og modstandsdygtig økonomi.
Selvom det at ignorere Bitcoin er bedre end aktivt at modarbejde det, vil det at omfavne Bitcoin virkelig gavne landet og dets borgere. Politikere i lande som Danmark bør nøje overveje de bredere implikationer af enten at omfavne eller modstå Bitcoin. Tidlige adoptere af Bitcoin kan blive set som visionære, åbne døre for innovation og vækst, mens de, der afviser det, kan blive betragtet som fastlåste i forældede paradigmer. For lande, der vælger at ignorere eller modstå Bitcoin, vil omkostningerne sandsynligvis måles ikke kun i forpassede muligheder for den nuværende generation, men også i begrænset økonomisk frihed og potentiale for kommende generationer. At omfavne Bitcoin tilbyder en vej til en mere tilpasningsdygtig og styrket fremtid, hvor traditionelle og decentraliserede systemer arbejder sammen for at sikre økonomisk stabilitet og vækst.
Bitcoin er den vigtigste, men mest misforståede og undervurderede gave til menneskeheden, og den ankommer på et afgørende tidspunkt i historien. Alle bør studere Bitcoin. Bitcoin er ligeglad. Bitcoin eksisterer bare.
-
@ a37bda36:6fe8611c
2024-10-28 14:50:18Bitcoin: A Pivotal Decision for National Economies and Future Generations Bitcoin: A Pivotal Decision for National Economies and Future Generations
As Bitcoin becomes an increasingly prominent force in global finance, countries, including Denmark, find themselves at a critical juncture. Much like corporations weighing the advantages of Bitcoin adoption, nations must now decide how to engage with this emerging technology. This decision will shape their economies, influence their standing in the global marketplace, and leave lasting effects for future generations. However, recent policy discussions, such as Denmark’s proposal to tax Bitcoin holdings annually, reveal a fundamental misunderstanding of Bitcoin’s potential. Rather than viewing Bitcoin as a replacement for the current financial system, policymakers should recognize it as a complementary technology capable of coexisting with traditional finance. Bitcoin is here to stay, regardless of whether it is embraced or resisted, but the consequences of that choice will reverberate across all levels of society, from companies and citizens to future generations.
Bitcoin as a Strategic Choice for National Economies
Bitcoin’s adoption by El Salvador as official legal tender in 2021, followed by the city of Lugano’s "Plan B" initiative to integrate Bitcoin into its economy, has sparked widespread debate on economic sovereignty, decentralization, and financial inclusion. Countries like Bhutan and others are leveraging Bitcoin mining in innovative ways, using their abundant hydroelectric power or surplus energy not only for sustainable mining operations but also to stabilize energy grids. These examples highlight how Bitcoin can be leveraged not as a replacement but as a powerful addition to existing financial systems. Nations such as El Salvador and Bhutan see Bitcoin as a tool to diversify their economies, reduce dependency on centralized financial institutions, and increase resilience to global financial fluctuations.
Additionally, despite concerns about energy use, Bitcoin can support a shift toward sustainable energy sources through innovative solutions like mining with surplus or green energy and providing grid stabilization benefits. Misconceptions about Bitcoin’s energy impact reveal a significant gap in understanding what Bitcoin truly represents and how it functions. Many critics overlook the fact that Bitcoin mining often incentivizes clean energy production and energy efficiency. For these countries, Bitcoin represents a strategic choice to modernize their financial systems and empower citizens without dismantling traditional structures.
This approach is not about replacing the old with the new but about building a financial system that offers people multiple options. The decentralized nature of Bitcoin and its ability to operate independently of established banking systems make it a valuable alternative that can coexist alongside existing structures. Countries that embrace Bitcoin open themselves to a world of possibilities that can benefit all levels of society. From boosting national economic resilience to empowering citizens with new financial tools, Bitcoin offers a path to a more inclusive and flexible financial landscape that can adapt to global changes.
Lessons from the Corporate World: MicroStrategy and Microsoft
The strategies of corporations like MicroStrategy and Microsoft highlight the implications of embracing or ignoring Bitcoin. MicroStrategy’s early decision to incorporate Bitcoin into its financial strategy has positioned it as a leader, attracting investor interest and enhancing its reputation as a forward-thinking company. Microsoft, on the other hand, has taken a cautious approach, risking the perception of conservatism. If MicroStrategy’s Bitcoin strategy continues to yield positive returns, it could cast a spotlight on Microsoft’s relative inactivity, raising questions about its innovation potential.
This analogy extends to national economies. Countries that integrate Bitcoin can position themselves as economic leaders, reaping the rewards of early adoption without dismantling their traditional financial systems. Conversely, nations that resist Bitcoin risk falling behind, as they miss the opportunity to blend Bitcoin’s strengths with those of their existing economic structures. Just as companies that ignore disruptive technologies can quickly become irrelevant, countries that resist Bitcoin adoption risk stifling economic innovation and undermining their global competitiveness.
The Benefits of Embracing Bitcoin: From Citizens to Future Generations
Embracing Bitcoin offers benefits at every level—from the country to corporations, from citizens to future generations. When a nation integrates Bitcoin, it signals openness to financial innovation and resilience, attracting companies, investors, and entrepreneurs who thrive in Bitcoin-friendly environments. For companies, Bitcoin offers a way to hedge against currency devaluation and inflation, potentially strengthening their balance sheets and making them more competitive in the global market.
For citizens, Bitcoin provides financial sovereignty and new opportunities for wealth preservation, especially in economies susceptible to inflation or capital controls. Perhaps most importantly, by adopting Bitcoin as a complementary financial technology, countries can ensure that future generations have access to a diverse and resilient economic system that can adapt to the demands of a rapidly changing world. The benefits of Bitcoin extend beyond financial gain—they also include increased autonomy, economic empowerment, and access to a global, decentralized financial network.
Opposing Bitcoin, on the other hand, carries significant risks. Nations that resist Bitcoin adoption may inadvertently limit their citizens' financial freedom and restrict opportunities for economic growth. Companies may find it challenging to remain competitive in a Bitcoin-enabled global economy, while the country as a whole could lose its attractiveness to investors and innovators. Most concerningly, by standing in the way of Bitcoin, these nations risk denying future generations the financial tools and freedom needed to thrive in a decentralized world.
Regulatory Short-Sightedness and the Cost of Stagnation
Much of the regulatory opposition to Bitcoin appears rooted in a rigid adherence to traditional financial paradigms. Policymakers, often trained in conventional economic frameworks, may lack the perspective needed to understand Bitcoin's unique role as a complementary technology. This lack of understanding risks pushing countries toward economic stagnation by creating structural barriers to innovation. By dismissing Bitcoin, regulators may unintentionally curb economic dynamism, leaving their countries vulnerable in an increasingly decentralized global economy.
This regulatory myopia risks not only stifling economic progress but also deepening existing financial inequalities. While Bitcoin is not a replacement for traditional financial institutions, it can serve as a viable alternative for underbanked populations, offering a level of financial accessibility that many countries currently struggle to provide. A rigid stance against Bitcoin could prevent millions from accessing this global financial network, effectively forcing people to remain dependent on centralized institutions that, for many, remain inaccessible and inequitable—a decision that, if made knowingly, could only be justified by motives rooted in control rather than empowerment.
Treating Bitcoin and “Crypto” as Synonymous: Another Symptom of Regulatory Misunderstanding
Another sign of regulators’ lack of understanding is their frequent conflation of Bitcoin with “crypto” as though they are one and the same. This mischaracterization underscores how many policymakers overlook Bitcoin’s distinct technological foundations and unique attributes. Unlike other digital assets, Bitcoin is decentralized, censorship-resistant, and has a fixed supply, making it fundamentally different from the broader cryptocurrency market. Grouping Bitcoin with “crypto” in policy discussions demonstrates a shallow understanding of its role as a durable, independent network with unique economic principles. This approach not only distorts public perception but also hinders clear, effective policy frameworks that respect Bitcoin’s distinct role in modern finance.
Bitcoin as a Protocol for Innovation: Lessons from TCP/IP
Just as the TCP/IP protocol enabled a wave of transformative innovations—email, the web, streaming, and countless applications—Bitcoin, too, serves as a foundational protocol with vast potential. The innovations that may emerge on top of the Bitcoin protocol are challenging to predict, just as it would have been impossible to foresee the entire internet landscape during TCP/IP’s inception. Taxing or resisting Bitcoin would be as short-sighted as taxing the TCP/IP protocol itself, pretending that a person or group of people has the insight to control the development of a technology destined for global impact. Bitcoin is not merely a digital asset; it is a decentralized protocol that serves as a foundation for a new era of financial, technological, and economic innovation.
Taxing Bitcoin: Futile and Oppressive
Taxing Bitcoin is as absurd as taxing sunlight or prohibiting people from looking at the moon—a move that, if implemented, would stand as a symbol of oppression. Such actions would be remembered by future generations much like how we today reflect on the legacies of authoritarian regimes: as measures born of control, not progress. Furthermore, such measures ignore the Lindy Effect, which suggests that Bitcoin, like all enduring technologies, will only grow stronger and more resilient over time. Attempts to restrict it ultimately prove ineffective, as Bitcoin cannot be stopped; scare campaigns may sway those unfamiliar with its potential, but each attempt will only reinforce Bitcoin's longevity and importance. Meanwhile, the nations that enforce such policies risk weakening their own position, falling behind in a future where Bitcoin will inevitably play a central role.
The Global Opportunity: Embrace or Fall Behind
Ignoring or resisting Bitcoin is not merely a missed investment opportunity—it’s a missed chance to position a country at the forefront of global economic innovation. Bitcoin’s decentralized network will continue to grow and gain legitimacy worldwide, with or without the support of any single nation. Countries that welcome Bitcoin will have the advantage of shaping how this technology integrates with traditional finance, while those that resist may find themselves struggling to catch up in a world increasingly open to decentralized solutions.
The decision to embrace or reject Bitcoin will impact a country’s immediate economic landscape and influence its role in the global economy for decades to come. Nations like El Salvador and the city of Lugano are setting new standards for economic adaptability and resilience, blending Bitcoin with traditional systems to build a hybrid financial future. This approach not only positions them as leaders in the digital economy but also secures a brighter future for their citizens. By choosing to embrace Bitcoin, these countries are laying the groundwork for sustainable growth that will benefit generations to come.
A Critical Decision for Policymakers
Countries now stand at a pivotal crossroads: integrate Bitcoin as a complementary technology to strengthen economic resilience, or risk stagnating in an increasingly decentralized world. The choices made today will affect how nations are perceived globally and determine the level of financial freedom and opportunity available to their citizens. Embracing Bitcoin doesn’t mean abandoning the existing financial system. Instead, it means recognizing that Bitcoin can coexist with traditional finance to create a more inclusive, flexible, and resilient economy.
While simply ignoring Bitcoin is better than actively resisting it, embracing Bitcoin is what will truly benefit the country and its citizens. Policymakers in countries like Denmark should carefully consider the broader implications of either embracing or opposing Bitcoin. Early adopters of Bitcoin may be seen as visionaries, opening doors for innovation and growth, while those who reject it may be viewed as clinging to outdated paradigms. For countries that choose to ignore or resist Bitcoin, the cost will likely be measured not only in missed opportunities for the current generation but in constrained economic freedom and potential for generations to come. Embracing Bitcoin offers a pathway to a more adaptable and empowered future, one where traditional and decentralized systems work together to provide economic stability and growth.
Bitcoin is the most important, yet most misunderstood and underappreciated gift for humanity, and it happens to arrive at a pivotal time in history. Everyone should study Bitcoin. Bitcoin doesn't care. Bitcoin just is.
-
@ a31a17d6:34e8856e
2024-10-28 14:16:27Verdens rikeste mann har kjøpt X, tidligere Twitter, for ytringsfrihetens skyld. Nå er han i ferd med å kjøpe demokratiet, også for ytringsfrihetens skyld. Skal Elon Musk få definere hva ytringsfrihet er?
Spoler vi et halvår tilbake finner vi grunnleggeren av Twitter, Jack Dorsey, på scenen i Oslo Konserthus under Oslo Freedom Forum. Dorsey mener at den offentlige samtalen ikke kan eies og kontrolleres av en håndfull selskaper med annonsebaserte forretningsmodeller som prioriterer å fange vår oppmerksomhet og påvirke våre handlinger. Ifølge Dorsey foregår det ikke bare en kamp om ytringsfriheten, men også om vår frie vilje.
Fra scenen i konserthuset introduserte Dorsey en uventet aktør i kampen om ytringsfriheten; “Notes and Other Stuff Transmitted by Relays” (nostr). Nostr er ikke et selskap og har ingen eier. Det er en åpen protokoll som består av et desentralisert nettverk av noder og apper. På overflaten kan appene minne om X, Instagram og Spotify. Ser man under panseret stanser likhetene.
Nostr er unikt ved at du som bruker har total kontroll over din egen identitet, dine ytringer, ditt nettverk og hvilke algoritmer du eventuelt utsettes for. Åpenheten skaper fri konkurranse; på nostr blir følgerne og innholdet ditt blir med deg når du beveger deg mellom apper. Du blir ikke fanget på plattformer som Youtube fordi du har bygget deg opp en følgerbase der. Kombinasjonen av de to åpne protokollene nostr+bitcoin er en global versjon av Vipps; alle land er lansert, alle personer kan delta og gebyrene er marginale.
For innholdsprodusenter kan nostr+bitcoin endre spillereglene. Den amerikanske artisten Ainsley Costello har publisert musikken sin på nostr og på kort tid har hun tjent 20 ganger mer der enn hos tradisjonelle strømmeplattformer. Inntekten kommer fra brukere som tipser henne direkte. Det er ikke lenger algoritmene til Youtube som definerer rekkevidden hennes og nå beholder hun 95% av inntekten hun genererer. I motsetning til 55-70% på Youtube.
Nostr kan komme til å utfordre både grensene for ytringsfrihet og håndhevingene av disse, siden det ikke finnes noen sentral enhet myndigheter kan legge press på for å moderere og sensurere. Håndteringen av uønsket innhold og ondsinnede krefter må løses av nettverket selv. Det er ikke problemfritt, men kanskje er det mer effektivt, og bedre for ytringsfriheten på internett, enn nåværende løsning med sentralisert moderasjon til 100 milliarder kroner?
Hvis du deler Dorseys bekymring om at de store plattformene har for mye makt over ytringsfriheten og vår frie vilje, bør du ønske nostr velkommen. Det kan være nøkkelen til å bevare ytringsfriheten som en umistelig menneskerettighet – som ikke kan kjøpes av mektige interesser. Hvis du er frustrert over hvordan Musk bruker sin makt til å påvirke demokratiet, kan du gjøre en forskjell. Ta en pause fra X og gå til nostr.how for å lære mer.
-
@ 565843b2:4fe37c09
2024-10-28 14:08:19นิทานซินเดอเรลล่า
กาลครั้งหนึ่งนานมาแล้ว มีสาวน้อยคนหนึ่งชื่อว่า “เอลล่า” (Ella) เป็นบุตรสาวของเศรษฐี หลังจากมารดาของเธอเสียชีวิตไปหลายปี บิดาก็แต่งงานใหม่กับมาดามผู้หนึ่ง ซึ่งเป็นหม้ายและมีลูกสาวติดมาสองคน และแม่เลี้ยงของเธอก็ไม่เคยชอบซินเดอเรลล่าเลยสักนิด จากนั้นไม่นาน เศรษฐีก็เสียชีวิตลง แต่แทนที่ทรัพย์สมบัติจะตกเป็นของลูกสาวแท้ ๆ แม่เลี้ยงของเธอกลับครอบครองไว้ทั้งหมด และเลือกสรรแต่สิ่งดี ๆ ให้กับลูกสาวทั้งสองของเธอ ไม่ว่าจะเป็นเสื้อผ้าสวย ๆ อาหารอร่อย ๆ หรือห้องนอนอันอบอุ่น ซ้ำร้ายยังบังคับให้เอลล่าทำงานเป็นสาวใช้ คอยปัดกวาดเช็ดถูทำความสะอาดบ้านตั้งแต่เช้าจรดเย็น มีเพียงช่วงกลางคืนเท่านั้นที่เธอจะได้รับอนุญาตให้นั่งพักผิงไฟคลายหนาว ซึ่งเศษเถ้าถ่านจากเตาผิงก็มักจะติดตามเนื้อตัวและใบหน้าของเธอ ทำให้พี่สาวทั้งสองตั้งชื่อใหม่ให้เธอว่า “ซินเดอเรลล่า” ที่หมายถึงสาวน้อยในเถ้าถ่าน
แต่แม้ซินเดอเรลล่าจะสวมใส่เสื้อผ้าที่เก่าและขาดวิ่น เนื้อตัวมอมแมมด้วยเถ้าถ่าน ทำงานหนักทั้งวัน แต่สิ่งที่เธอมีก็คือความสวยและจิตใจที่งดงาม แม้แต่พี่สาวทั้งสองก็เทียบไม่ได้
อยู่มาวันหนึ่ง พระราชาผู้ปกครองเมืองได้ส่งจดหมายเชิญให้สาวโสดทุกคนไปร่วมงานเต้นรำที่พระราชวัง เนื่องจากพระราชาทรงต้องการให้เจ้าชายผู้เป็นโอรสเพียงองค์เดียวมีโอกาสได้พบปะหญิงสาวในเมืองและเฟ้นหาคู่ครองจากงานเต้นรำครั้งนี้ เมื่อหญิงสาวทั่วทั้งเมืองทราบข่าว ทุกคนก็พากันตื่นเต้นและฝันหวานว่าตัวเองอาจจะมีโอกาสได้แต่งงานกับเจ้าชายรูปงาม
เช่นกันกับซินเดอเรลล่า เพราะเธอใฝ่ฝันมาตลอดเวลาว่าจะได้เต้นรำในฟลอร์ที่งดงามและเป็นอิสระจากงานบ้านอันล้นมือเหล่านี้ แต่เมื่อเด็กสาวขอไป แม่เลี้ยงใจร้ายจึงกลั่นแกล้งต่าง ๆ นานาจนซินเดอเรลล่าไม่มีชุดใส่ไปงานเต้นรำ พร้อมกับออกคำสั่งให้อยู่ทำงานบ้าน ล้างจาน ขัดพื้น และเตรียมเตียงนอนไว้ให้พี่สาวทั้งสอง เพราะเมื่อทุกคนกลับมาบ้านคงจะอ่อนเพลียและง่วงนอนมาก
แม่เลี้ยงใจร้ายและลูกสาวทั้งสองคนพากันแต่งเนื้อแต่งตัวจนเกือบจะสวย จากนั้นรถม้าก็มารับพวกเขาเดินทางไปร่วมงานยังปราสาท เหลือก็เพียงซินเดอเรลล่าเท่านั้นที่ต้องอยู่เฝ้าบ้านและทำงานบ้านต่าง ๆ ตามที่แม่เลี้ยงสั่งเอาไว้ มิหนำซ้ำ แม่เลี้ยงยังกำชับไม่ให้ซินเดอเรลล่าออกจากบ้านโดยเด็ดขาด ครั้นเมื่อเสียงเพลงจากงานเต้นรำแว่วมา ซินเดอเรลล่าผู้น่าสงสารก็ยิ่งรู้สึกน้อยใจและโศกเศร้า เธอเริ่มก้มหน้าและร้องไห้ไม่ยอมหยุด
ในขณะที่ซินเดอเรลล่ากำลังร้องไห้อยู่นั้น จู่ ๆ นางฟ้าแม่ทูนหัวก็ปรากฏกายขึ้น “อย่าร้องไห้ไปเลย ซินเดอเรลล่า ฉันรู้ว่าเธออยากไปงานเต้นรำ และฉันจะเนรมิตความฝันนั้นให้เป็นจริงเอง”
จากนั้น นางฟ้าก็เริ่มร่ายคาถาเสกชุดราตรีสีขาวแสนงดงาม พร้อมกับรองเท้าแก้วให้ซินเดอเรลล่าได้สวมใส่ พร้อมเนรมิตฟักทองกับพวกหนูในบ้านให้กลายเป็นรถม้าและคนขับรถ เพื่อพาซินเดอเรลล่าไปร่วมงานเหมือนกับหญิงสาวคนอื่น ๆ ซินเดอเรลล่าดีใจจนแทบไม่เชื่อสายตา เพราะตอนนี้เธอดูสวยราวกับเจ้าหญิงเลยทีเดียว
แต่ก่อนที่ซินเดอเรลล่าจะเดินทาง นางฟ้าได้เตือนซินเดอเรลล่าว่า “ซินเดอเรลล่า เธอต้องกลับบ้านก่อนเที่ยงคืน เพราะเวทมนตร์ของฉันจะมีฤทธิ์ถึงแค่นั้น ทุกอย่างจะกลับกลายสภาพเป็นเหมือนเดิม เข้าใจไหมจ้ะ” ซินเดอเรลล่าตกปากรับคำ จากนั้นเธอก็ขึ้นรถม้าแล้วเดินทางไปยังงานเลี้ยงของเจ้าชายทันที
เมื่อซินเดอเรลล่าปรากฏตัวในพระราชวัง ทุกสายตาต่างก็หันมามองเธอราวกับโดนสะกด เพราะหญิงสาวคนนี้ทั้งสวยสง่าและโดดเด่นที่สุดในงาน “เธอคือใครกัน?” ผู้คนในงานต่างกระซิบถาม แม้แต่พี่สาวทั้งสองก็สงสัย และรู้สึกคุ้น ๆ หน้า แต่ไม่แน่ใจว่าเคยเห็นที่ไหน
เมื่อเจ้าชายสบตากับซินเดอเรลล่าก็ตกหลุมรักในความงามทันที เขาตรงมาขอเธอเต้นรำด้วย ท่ามกลางความผิดหวังของสาว ๆ ทั่วเมือง เพราะเจ้าชายเต้นรำกับซินเดอเรลล่าเพียงคนเดียวตลอดค่ำคืนนั้น
“เธอชื่ออะไร ท่านหญิง?” เจ้าชายเอ่ยถามซินเดอเรลล่า
“ไม่สำคัญหรอกว่าฉันเป็นใคร เพราะถึงอย่างไร ท่านก็จะไม่มีโอกาสพบฉันอีกแล้ว”
“โอ้ เช่นนั้นหรือ แต่ฉันมั่นใจว่าเราจะได้พบกันอีกแน่นอน” เจ้าชายตอบ
นิทาน
ซินเดอเรลล่าและเจ้าชายต่างก็มีความสุขมาก แต่เวลาผ่านไปรวดเร็วเหลือเกิน ไม่ทันไร นาฬิกาก็บอกเวลาเที่ยงคืน! ซินเดอเรลล่านึกถึงคำเตือนของนางฟ้าทูนหัว เธอแทบจะไม่ได้ร่ำลาเจ้าชาย และหมุนตัวออกจากวงแขน วิ่งลงบันไดพระราชวังอย่างรวดเร็วเท่าที่เธอจะทำได้ เจ้าชายวิ่งตามหญิงสาวปริศนา พลางร้องถามชื่ออีกครั้ง แต่ซินเดอเรลล่าไม่ได้ตอบ ระหว่างนั้นรองเท้าแก้วข้างหนึ่งก็หลุดออก เธอไม่มีเวลาหันไปเก็บแล้ว จึงต้องจำใจทิ้งรองเท้าข้างนั้นไว้ให้เจ้าชายดูต่างหน้า แล้วขึ้นรถฟักทองกลับไปยังบ้านได้ทันเวลา
เจ้าชายเก็บรองเท้าแก้วของเธอไว้ แล้วรับสั่งให้เสนาบดีค้นหาให้ทั่วอาณาจักร เพื่อตามหาหญิงสาวผู้เป็นเจ้าของรองเท้าแก้วข้างนี้ หากใครสวมได้ เจ้าชายจะแต่งงานกับเธอ
เสนาบดีได้นำรองเท้าแก้วไปตามบ้านต่าง ๆ เพื่อให้หญิงสาวทุกคนได้ลอง จนมาถึงบ้านแม่เลี้ยง เมื่อลูกสาวทั้งสองลองครบแล้ว แต่ใส่ไม่ได้ นางก็โกหกว่าไม่มีหญิงสาวในบ้านอีก พร้อมทำลายรองเท้าแก้วจนแตกละเอียด ทุกคนต่างหมดหวังว่าจะไม่สามารถหาหญิงปริศนาของเจ้าชายพบ แต่สุดท้าย ซินเดอเรลล่า ก็หยิบรองเท้าแก้วอีกข้างที่เก็บไว้ขึ้นมา เธอสวมใส่รองเท้าแก้วนั้นได้พอดีเป๊ะ
“มากับเราเถิดท่านสุภาพสตรี เจ้าชายกำลังรออยู่” เสนาบดีพาซินเดอเรลล่าไปยังพระราชวัง เพื่อให้เธอได้พบกับเจ้าชายอีกครั้ง
เมื่อเจ้าชายเห็นซินเดอเรลล่าปรากฏตัวอีกครั้ง ท่านก็ทราบในทันทีว่าเธอคือหญิงสาวที่ทำให้หัวใจของพระองค์สั่นไหวตั้งแต่แรกเห็น และในคืนเดียวกัน เจ้าชายและซินเดอเรลล่าก็ได้แต่งงานกันอย่างสวยงามตามที่ใฝ่ฝันและมีความสุขตลอดไป
สรุป
ความสุขของซินเดอเรลล่าไม่ได้มีเพียงแค่กับเจ้าชาย แต่ยังมีนางฟ้าทูนหัวที่ช่วยเธอเสมอมาในทุกช่วงเวลาที่ท้าทาย เธอได้เรียนรู้ว่าความงามที่แท้จริงไม่ได้มาจากรูปลักษณ์ แต่คือจิตใจที่งดงามและการกระทำที่ดีต่อกัน
-
@ 5d4b6c8d:8a1c1ee3
2024-10-28 13:51:52Here are today's picks using my proprietary betting strategy at Freebitcoin. For details about what Risk Balanced Odds Arbitrage is and why it works see https://stacker.news/items/342765/r/Undisciplined.
For a hypothetical 1k wager on each match, distribute your sats as follows:
| Outcome 1 | Outcome 2 | Outcome 3 | Bet 1 | Bet 2 | Bet 3 | |--------------|-------------|--------------|-------|-------|-------| | Real Sociedad | Barcelona | Draw | 240 | 510 | 250 | | Real Madrid| Osasuna| Draw | 840| 50| 110| | Mallorca| Atletico Madrid| Draw | 250| 450| 300| | Leganes| Sevilla| Draw | 340| 350| 310| | Chelsea| Arsenal| Draw | 350| 390| 360| | Man United| Leicester City| Draw | 730| 110| 160| | Nottingham Forest| Newcastle| Draw | 360| 370| 270| | Tottenham| Ipswich| Draw | 750| 100| 150 | | Liverpool| Aston Villa| Draw | 680| 150 | 170| | Brighton| Man City| Draw | 190| 600| 210 | | VfL Bochum| Leverkusen| Draw | 120| 730| 150| | RB Leipzig| Monchengladbach| Draw | 660| 160| 180| | Mainz| Dortmund| Draw | 300| 450| 250| | FC St. Pauli| FC Bayern| Draw | 80| 770| 150|
As of writing this, I'm up a little over 80 kilosats with RBOA.
originally posted at https://stacker.news/items/743312
-
@ 565843b2:4fe37c09
2024-10-28 13:51:48เรื่อง ลิงกับโลมา
กาลครั้งหนึ่ง มีเรือกรีกลำหนึ่งซึ่งมุ่งหน้าไปยังกรุงเอเธนส์เกิดอับปางลงนอกชายฝั่งใกล้ๆ พิเรอุส ท่าเรือแห่งเอเธนส์ หากไม่ใช่เพราะพวกโลมา ซึ่งในเวลานั้นเป็นมิตรกับมนุษย์ โดยเฉพาะอย่างยิ่งกับชาวเอเธนส์แล้วละก็ ทุกคนคงจะต้องดับสูญอย่างแน่นอน บรรดาโลมาพาเหยื่อเรืออับปางขึ้นบนหลังของมันและว่ายมาส่งที่ชายฝั่ง
ในเวลานั้นหมู่ชาวกรีกมีธรรมเนียมปฏิบัติอยู่ว่า พวกเราจะพาลิงหรือหมาของตัวเองติดตามไปด้วยทุกหนแห่งไม่ว่าจะเดินทางไปไหน ดังนั้นเมื่อโลมาตัวหนึ่งเห็นลิงกำลังตะเกียกตะกายอยู่ในน้ำ มันก็คิดว่านั่นคือมนุษย์ มันจึงให้เจ้าลิงขึ้นขี่หลังและว่ายพาเจ้าลิงตรงเข้าหาฝั่ง
ลิงนั่งบนหลังโลมาด้วยอาการเคร่งขรึมและผึ่งผาย
"ท่านเป็นพลเมืองเอเธนส์อันโด่งดังใช่หรือไม่" โลมาถามขึ้นด้วยน้ำเสียงสุภาพ
"ใช่แล้ว" เจ้าลิงตอบด้วยความภาคภูมิใจ "ตระกูลข้าเป็นตระกูลที่สูงศักดิ์ที่สุดตระกูลหนึ่งในเมืองเชียวละ"
"จริงสิ" โลมากล่าว "เช่นนั้น ท่านก็ต้องมาเยือนพิเรอุสบ่อยๆ เป็นแน่"
"ใช่ ใช่แล้ว" เจ้าลิงตอบ "เป็นเช่นนั้นจริงๆ ข้าอยู่กับเขาเสมอละ พิเรอุสเป็นเพื่อนซี้ที่สุดของข้า"
คำตอบทำให้โลมาแปลกใจจนเหลียวหลัง ถึงได้เห็นว่าตนเองแบกอะไรมา โดยไม่ชักช้ารีรอ มันดำลงไปในน้ำและปล่อยให้เจ้าลิงโง่ดูแลตัวเอง ส่วนมันก็ว่ายจากไปช่วยเหลือมนุษย์รายอื่นต่อ
-
@ 1f79058c:eb86e1cb
2024-10-28 13:31:15This week, it finally happened: I still had a Lightning channel open with a node that hadn't been online for the better part of a year now, so I decided to close the channel unilaterally. But force-closing a channel means you have to broadcast the latest commitment transaction, the pre-set fee of which was only ~1 sat/vB for this one.
With LND, if the channel is created as an anchor channel (by default only since version 0.12), then the commitment transaction contains small extra outputs (currently 330 sats), which let either channel partner spend one of them into a child transaction that can be created with higher fees to pay for the parent transaction (CPFP). LND even has a built-in command for that:
lncli wallet bumpclosefee
However, this channel was created in the old-school way, and was thus stuck with its low fee. In fact, even the local bitcoin node refused to accept the transaction into its own mempool, so the bitcoin p2p network didn't even know it existed. So how do we get out of this pickle?
The solution
Enter the mempool.space Accelerator. It is essentially an automated way to create agreements with various mining pools to mine your low-fee transaction in exchange for an out-of-band payment. Mempool.space coordinates these agreements and out-of-band payments with miners and gets a share from the overall fee for that.
Now, if you're in the same situation as I was, you might search for the ID of your closing transaction and find that mempool.space cannot find it. Remember how the local bitcoin node (with mostly default settings) didn't accept it in the first place?
1. Get the transaction to be broadcast
In your
bitcoin.conf
, add the following line:minrelaytxfee=0
This sets the minimum fee to 0, meaning it will accept and broadcast your transactions, no matter how low the fee is. Restart
bitcoind
and wait a little bit. LND will retry broadcasting the closing transaction every minute or so until it succeeds. At some point you should be able to find it on mempool.space.2. Use the Accelerator to confirm it
Once you can see the transaction on mempool.space, you can just click the "Accelerate" button next to the ETA. This will bring you to a page that shows you the estimated share of miners that will include your transaction in their blocks, as well as some acceleration fee options for various transaction fee levels, which you can pay for via the Lightning Network, of course.
If you haven't looked into this service before (which I had), then the fees might be a bit of a surprise to you. This thing is not cheap! Bumping my fee from 1 sat/vB to ~9 sats/vB cost a whopping 51,500 sats (31 USD that day). Bumping it higher only seemed to add the difference in the transaction fee itself, so the service seems to have cost a flat 50K sats at the time.
Unfortunately, this channel wasn't particularly large, so the acceleration fee amounted to ~9% of my remaining channel balance. But 91% of something is better than 100% of nothing, so I actually felt pretty good about it.
Next, you will see something like this:
Time to lean back and let the miners work for you. In my case, the ETA was eerily precise. It told me that it would take ~56 minutes to confirm the transaction, and almost exactly an hour later it was mined.
3. Wait
Now that our transaction is confirmed, our channel is not closed immediately, of course. The time lock of the HTLC protects our channel partner from us broadcasting an old channel state in which our balance might be higher than in the latest state.
In my case, it was set to 144 blocks, i.e. ~24 hours. So I checked back the next day, et voilá: channel closed and balance restored. 🥳
-
@ 8f2fe968:0fbf4901
2024-10-25 17:34:06 -
@ 5fb7f8f7:d7d76024
2024-10-28 12:32:30Have you been wondering how you can earn from web3.0. Here are some ways to earn in Web3:
-
Crypto currency trading: Buy and sell cryptocurrencies on exchanges or decentralized platforms.
-
Staking: Participate in proof-of-stake (PoS) networks, validating transactions and earning rewards.
-
Decentralized Finance (DeFi): Lend, borrow, or provide liquidity in DeFi protocols, earning interest or fees.
-
Non-Fungible Token (NFT) creation: Design, mint, and sell unique digital assets on NFT marketplaces.
-
Play-to-Earn (P2E) gaming: Participate in blockchain-based games, earning tokens or NFTs.
-
Content creation: Monetize content through tokenized platforms or decentralized social media.
-
Web3 development: Build and deploy decentralized applications (dApps), earning fees or tokens.
-
Mining: Participate in proof-of-work (PoW) networks, validating transactions and earning block rewards.
-
Yield farming: Provide liquidity in DeFi protocols, earning rewards in the form of tokens.
-
Participate in DAOs: Join decentralized autonomous organizations (DAOs), contributing to governance and earning tokens.
-
Create and sell digital art: Utilize blockchain technology to create and sell unique digital art pieces.
-
Web3 writing and journalism: Monetize content related to Web3 and blockchain technology.
-
Consulting and advisory services: Offer expertise in Web3 and blockchain technology to clients.
-
Participate in Web3 events: Attend conferences, meetups, and workshops, earning tokens or rewards.
-
Learn and earn: Participate in Web3 educational programs, earning tokens or rewards.
Keep in mind that these opportunities may require skills, knowledge, and sometimes initial investments. Additionally, the Web3 space is constantly evolving, so new opportunities may emerge as the ecosystem grows.
-
-
@ 5e5fc143:393d5a2c
2024-10-11 22:26:08Just revisiting some quick tips for #newbies #pow #public #blockchain users only.
if you just getting started with bitcoin or any pow crypto coins or been using or storing them for a while, you not must forget the roots and fundamentals.
Hot Wallet — It gets connected to live internet at some point in time essentially to sign / send a tx i.e. spending transaction — exposes the private key of the address from in the process
Cold Wallet — It never ever gets connected or online and can always keep receiving inbound amounts Paper wallets are best n cheapest form of cold wallet that can used once n thrown away.
Cold wallets need to either “import”ed or “sweep”ed in order to used or spend — https://coinsutra.com/private-key-import-vs-sweep-difference/
Any thin #wallet is always dependent on connectivity to live up2date node server where-as self-sufficient qt / cli wallet takes a while to sync up to latest block height in order to be usable.
Beginners should always resist the attraction of quick and fast — thin n 3rd party wallets and always start a long learning journey of core wallets of any coin — either “qt” GUI wallet or command line “coin-cli” wallet
Almost all #proofofwork #blockchains i.e. #POW has #node #wallet - everyone who use support he #public #blockchain secures own you coin value
You can run fullnode either on clearnet or over onion 🧅 #BTC has >55% of nodes running in onion out of total 15000+ live fullnodes and 50000+ bitcoincore wallets around blockheight 777000 . Other notable pow chains are #LTC #RVN and rest are babychains for now !
Always delete hot wallet to test practice restoration before sending any large refunds to it to be safe.
Large funds are always best to keep in self custody node wallets rare n occasional use
Final word — Cannot see private key 🔑 or seed 🌱 in any wallet means not your coin. 😲
Use wallet which u learn or understand best only
That’s all for now n Thank you 🙏 ! ⚡️ https://getalby.com/p/captjack ⚡️
Some Cold wallet nostr posts nostr:note1p6ke5wqshgxtfzj5de3u04hejl2c5ygj8xk8ex6fqdsg29jmt33qnx57y2 nostr:note1rse0l220quur6vfx0htje94ezecjj03y6j7lguwl09fmvmpt6g3q0cg7yw nostr:note1q5w8dyjuqc7sz7ygl97y0ztv6sal2hm4yrf5nmur2tkz9lq2wx9qcjw90q
some nostr specific lightning ⚡️ Layer2 wallets with blockchain mainnet option nostr:naddr1qqsky6t5vdhkjm3qd35kw6r5de5kueeqf38zqampd3kx2apqdehhxarjqyv8wue69uhkummnw3e8qun00puju6t08genxven9uqkvamnwvaz7tmxd9k8getj9ehx7um5wgh8w6twv5hkuur4vgchgefsw4a8xdnkdgerjatddfshsmr3w93hgwpjdgu8zdnswpuk2enj0pcnqdnydpersepkwpm8wenpw3nkkut2d44xwams8a38ymmpv33kzum58468yat9qyt8wumn8ghj7un9d3shjtngv9kkuet59e5k7tczyqvq5m2zcltylrpetrvazrw45sgha24va288lxq8s8562vfkeatfxqcyqqq823ckqlhc8 related blog post nostr:naddr1qqxnzd3cxyenjv3c8qmr2v34qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qydhwumn8ghj7mn0wd68ytn4wdjkcetnwdeks6t59e3k7tczyp6x5fz66g2wd9ffu4zwlzjzwek9t7mqk7w0qzksvsys2qm63k9ngqcyqqq823cpdfq87
-
@ 0861144c:e68a1caf
2024-10-28 12:18:44Check previous Popes:
The Popes will now pay a very high price: the emperors will seek to influence religious decisions in one way or another through interventions in the elections as well as in the day-to-day religious and political decisions. Heresies are fought, and they also seek political support against papal condemnations, but without any success.
-
Symmachus [498-514] Political interference from this election is very strong. Emperor Anastasius of Byzantium intervenes, presenting his candidate, Laurentius (antipope), and attempts to place him in power. With financial support from Theodoric, King of the Ostrogoths, a synod is convened to establish election procedures. Two key points emerge: the Pope cannot choose his future successor, and no human court can judge a Pope, as he can only (and will only) be judged by God. Theologically, he establishes Sundays as the day for Mass.
-
Hormisdas [514-523] He commissioned Dionysius Exiguus to reform the existing calendar to have exact numbers of the Christian era. His most prominent role was ending the Acacian schism during Easter of 519[^2]. In the formula for the oath of bishops, the phrase You are Peter is introduced as proof of the Roman ecclesiastical hierarchy.
-
John I [523-526] A friar who traveled to Constantinople, being the first to do so, to negotiate the cessation of persecutions against the Arians. He was sent by Theodoric, and upon failing his mission, Theodoric accused the Pope of being weak and imprisoned him. He died as a martyr.
-
Felix IV [526-530] A Pope imposed by King Theodoric. He founded the Monastery of St. Benedict, which would later produce 24 future Popes. He condemned semipelagianism[^1].
-
Boniface II [530-532] He was chosen by the previous Pope through an edict. The parties decided to respect this. He became the first German Pope thanks to the support of Athalaric, King of the Goths.
-
John II [533-535] His birth name was Mercury, but he changed it to John II, becoming the first Pope to do so, which later turned into a tradition. He assumed office on December 31, 532. During a two-month period of electing the Pope, simony (the buying and selling of spiritual goods with worldly means) was rampant. It caused such a scandal that they had to condemn simony by decree. He was pressured to close the gap between the Arians.
-
Agapetus I [535-536] He was part of the nobility of the gens Anicia. Another faction chose Dioscorus (antipope), but he did not last in office. Agapetus I dedicated himself to combating heresies, focusing on Arianism and the Acoemetae[^3].
-
Silverius [536-537] Son of Pope Hormisdas [52], he was elected with the support of Theodahad, King of the Ostrogoths, but clashed with Theodora, wife of Emperor Justinian I, who favored their candidate, Vigilius, a Monophysite. He was arrested, stripped of his papal garments, and exiled. He was also forced to abdicate. He died of starvation.
-
Vigilius [537-555] He was a counselor to Agapetus I [57] and close to Theodora. Once in power, he frequently contradicted himself regarding the position on Monophysitism. He was rejected by the Curia, Theodahad, King of the Ostrogoths, and Theodora, losing credibility. Justinian issued the "Pragmatica Sanctio," granting powers to the Pope under the emperor’s command.
-
Pelagius I [556-561] He served as Papal nuncio for Agapetus I [57] in Constantinople. He led a schism to condemn Nestorianism and Monophysitism, which earned him disfavor with the Byzantine court. He commissioned the building of many churches. He had to swear by the Holy Cross that he had nothing to do with the death of his predecessor.
-
John III [561-574] Of noble family, he supported the construction of monasteries. Not much data exists due to the Lombard invasion, which eventually shattered Italy's unity. He condemned Priscillianism.
-
Benedict I [575-579] Elected after 11 months due to communication delays caused by the Lombard invasion, which made the whole scenario quite negative. He endured famine alongside his people.
-
Pelagius II [579-590] His election did not receive imperial authorization due to the Lombard siege. As his first action, he sent Gregory [64] as an envoy to try to break Rome's isolation. In an attempt to weaken the Lombards, he negotiated with the Franks, through their king Childebert II, aiming to have them abandon the Lombards, but this was unsuccessful. He resumed relations with the African Church to attempt to resolve doctrinal differences. He died from a bubonic plague.
[^1]: A doctrine stemming from Pelagianism, which holds that the growth of faith is the work of God while the beginning of faith is an act of free will. As man embraces faith through free will, the growth of faith requires a collaboration between man and God and is not automatic. It was condemned as heresy at the Council of Orange (529).
[^2]: Due to the condemnation of Acacius, Patriarch of Constantinople, the Church split into a schism from 484 until it ended with Justin I. Acacius advocated for the solely divine nature of Jesus, ignoring his human nature.
[^3]: The Acoemetae, meaning literally "the sleepless ones," were Byzantine monks who demanded that while one part of the community sings, the other rests. It was not their practices but their proximity to the Nestorians that led to their condemnation.
originally posted at https://stacker.news/items/743142
-
-
@ 472f440f:5669301e
2024-10-11 14:20:54As we sprint toward the 2024 US Presidential election the case for using bitcoin as an asset to store value for the long term has never been stronger. The insanity of the incumbent power structure is being laid bare and it is becoming impossible to ignore the headwinds that the Borg faces moving forward.
Yesterday morning and earlier today it became clear that inflation is rearing its head again. Not ideal for the soft landing Jerome Powell and Yellen are signaling to the markets after the first Fed Funds rate cut in years.
It seems like the yield curve predicted this earlier this week when it inverted after a temporary normalizing period after the Fed's rate cut. Futhermore, it is becoming glaringly obvious that running historically high fiscal deficits while interest rates were at multi-decade highs was a pretty bad idea. As James Lavish points out, the data from the CBO earlier this week shows that the US federal government is running a deficit that is 13% higher than it was last year. This is at a time when real wages are still depressed, inflation is still suffocating American consumers and the private sector job market for American citizens is cratering.
Speaking of the job market, the numbers that came in yesterday were worse than expected: The effect of Hurricane Helene should certainly be taken into consideration when looking at this jobs miss. However, even with the miss we know that these numbers have been under reported for years to make the economy seem healthier than it actually is. Even with Helene's effect taken into consideration this print will likely be revised higher 3-6 months from now.
All of this points to a breaking point. A breaking point for the economy and, more importantly, a breaking point for overall confidence in the US government and its ability to operate with any semblance of fiscal responsibility. The chart that Pierre Rochard shares in the tweet at the top of this letter is the only chart that matters for anyone attempting to gauge where we find ourselves on the path to bitcoin realizing its full potential.
There is $133 TRILLION worth of value sitting in global bond markets. Bitcoin is a far superior asset to store one's wealth in. Bond markets are beholden to the whims of the actors who issue those bonds. In the case of the US Treasury market, the largest bond market in the world, the US government. And as we have pointed out above, the US government is recklessly irresponsible when it comes to issuing debt with a complete inability to pay it back on the long-term. Inflation is up, the jobs market is cratering for the native born Americans who actually pay taxes, and the push toward a multi-polar geopolitical landscape is becoming more pronounced by the day. All of this points to a long-term weakening in demand for US treasuries.
The only way out of this mess is to overtly default on this debt or inflate it away. The latter will most certainly be the route that is taken, which positions bitcoin extremely well as people seek the confines of an asset that cannot be debased because it cannot be controlled by a central authority. The levels of sovereign debt in the world are staggering. Do not let the bitcoin price consolidation of the last six months lull you into a state of complacency. Even the results of the Presidential election won't have a material effect on these dynamics. Though, a Donald Trump presidency would certainly be preferable if you prefer to see relatively sane policy enacted that would provide you with time to find safety in bitcoin. But, in regards to this sovereign debt crisis, that is the only benefit you can hope for; more time to prepare. I'll leave you with some thoughts from Porter Stansberry:
"We are about to see the final destruction of the American experiment. Every economist knows this (see below) is correct; but nobody is going to tell you about it. I’ll summarize in plan English: We are fucked.
-
Debt is growing much faster than GD and interest expense is growing much faster than debt; and the real growth in entitlement spending hasn’t even begun yet.
-
Progressive taxation means nobody will ever vote for less spending + the combined size of government employees and dependents, there’s no way for America’s actual taxpayers (about 20m people) to ever win an election, so the spending won’t stop growing and, ironically, inflation will make demands for more spending to grow.
-
Inflation undermines both economic growth and social cohesion. The purple hair man-women weirdos are only the beginning; what comes next is scapegoating jews, blacks, immigrants and a huge increase in violence/domestic terror.
Get ready America. This election has nothing to do with what’s coming. And neither Trump nor Kamala can stop it.
Our experiment in freedom and self-government died in 1971 (when all restraint on government spending was abandoned with the gold standard.) You can only live at the expense of your neighbor until he runs out of money.
And that day is here."
Final thought... I hope my tux still fits for this wedding. Enjoy your weekend, freaks.Use the code "TFTC" for 15% off
-
-
@ f584a915:9da6d625
2024-10-28 12:03:14The value of SATS in Naira fluctuates constantly. It is best to check a real-time conversion tool or a cryptocurrency exchange platform for the most accurate and up-to-date information. Here are some resources you can use to check the current value: * Coinbase: https://www.coinbase.com/converter/sats/ngn * CoinMarketCap: [invalid URL removed] * CoinGecko: https://www.coingecko.com/en/coins/saturna/ngn These platforms will provide you with the current exchange rate and allow you to convert specific amounts of SATS to Naira.
-
@ 460c25e6:ef85065c
2024-10-10 13:22:06In the early days of Nostr, developers often competed to see who could implement the most NIPs. Although all were optional (except NIP-01), it became a point of pride and vital for the ecosystem's growth. Back then, there were only a few dozen relatively simple NIPs to implement. Fast forward to today, with nearly 100 NIPs, maintaining and implementing everything has become nearly impossible. Yet, the drive among developers to "code all things Nostr" remains as strong as ever.
nostr:nprofile1qqsrhuxx8l9ex335q7he0f09aej04zpazpl0ne2cgukyawd24mayt8gprfmhxue69uhhq7tjv9kkjepwve5kzar2v9nzucm0d5hszxmhwden5te0wfjkccte9emk2um5v4exucn5vvhxxmmd9uq3xamnwvaz7tmhda6zuat50phjummwv5hsx7c9z9 raised the point that everyone, even I, agrees:
nostr:nevent1qqsqqqp2zrs7836tyjlsfe7aj9c4d97zrxxqyayagkdwlcur96t4laspzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7q3q80cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsxpqqqqqqzgcrrrp
But how big is too big? How can we better understand the range of options available for devs out there?
I went out for a hunt in my own brain to figure out how to clarify the situation. I came up with the following 4 categories for Nostr Clients: - Super Clients: These apps merge vastly different domains into a single application, offering basic support for reading, writing, configuration, and data management for each use case within each domains. An example would be an app that combines a Marketplace and Live Streams under one roof.
-
Clients: These apps provide comprehensive support for a single domain, handling all its use cases in a single home. They manage the complete set of reading, writing, configuration, and long-term data management within that domain. An example is a marketplace app that helps users manage product catalogs, process orders, collect payments, and handle fulfillment and reports.
-
Mini Clients: These apps focus on read and write functionality for a single use case, including configuration management and any actions related to that specific task. For example, a fulfillment app that helps users view orders placed from another client to then pack and ship them.
-
Micro Clients: These apps have a single interface and perform one specific action. Viewing and creating a record is handled by separate micro apps. An example is an app that simply scans an order's QR code and marks it as shipped.
Based on my made-up categories described at the end, this is how I would split our most known apps.
Super Clients - amethyst - nostrudel - coracle
Clients - damus - twitter - primal - twitter - snort - twitter - gossip - twitter - lume - twitter - ditto - twitter - rabbit - twitter - freefrom - twitter - nos - twitter - flycat - twitter - straylight - twitter - nostter - twitter - iris - twitter - nostur - twitter - nostrmo - twitter - yana - twitter - openvibe - twitter - freerse - twitter - 0xchat - chats - cornychat - chats - coop - chats - nostrchat - chats - blowater - chats - habla - blogs - yakihonne - blogs - highlighter - blogs - blogstack - blogs - stemstr - music - wavlake - music - fountain - podcasts - zap.stream - live streaming - shopstr - marketplace - plebeian.market - marketplace - flotilla - communities - satellite - communities - zapddit - communities - nostr.kiwi - communities - hivetalk - video calls - flare - long-form videos - nostrnests - audio spaces - wherostr - location - yondar - location - stacker.news - news - flockstr - events - nostrocket - issue tracker - docstr - docs - satshoot - freelance - wikifreedia - wiki - formstr - forms - chesstr - chess - memestr - meme feed - npub.cash - wallet - npub.pro - websites - gitworkshop - dev tools - onosendai - metaverse - degmods - games - turdsoup - prompts
Mini Clients - amber - signer - alby - signer - nos2x - signer - nsec.app - signer - keys.band - signer - nostrame - signer - nokakoi - anon - zap.cooking - recipes - anonostr - anon - getwired - anon - lowent - anon - creatr - exclusive content - lightning.video - exclusive content - zaplinks - slides - listr - lists - zap.store - app store - badges.page - badges - oddbean - news - dtan - torrents - nosta - user pages - pinstr - pinterest - pollerama - polls - swarmstr - trending - nostrapp - apps manager - noogle - search - ostrich.work - job postings - emojito - emoji manager - nostree - links - citrine - local relay - joinstr - coinjoins - heya - crowdfunding - zapplepay - zaps - nosbin - clipboard - shipyard - scheduler - tunestr - live streams - filestr - files - nostrcheck.me - media hosting - sheetstr - spreadsheets - crafters - curriculum vitae
Micro Clients - w3 - url shortener - nosdrive - backups - zaplife - zaps dashboard - zapper.fun - payments - nostrends - trends - zephyr - trends - wavman - music player - nostrrr - relay info - nosdump - relay info - notestack - blogs - nostr.build - media hosting - nostr.watch - relay info - nostr hours - use reports - lazereyes - vision prescriptions - snakestr - games - deletestr - deletion requests - 2048str - games - nostrqr - qr generator - notanostrclient - anon
Super apps will try to do everything, but can't really do most things super well. Regular-sized Clients will try to manage most of a given domain but are likely to centralize users on themselves, an unwanted effect inside of Nostr. If we want Nostr to grow in a decentralized fashion, we have to start betting on and using more Mini and Micro clients.
-
-
@ 6bae33c8:607272e8
2024-10-28 11:42:11I don’t feel like writing about football, but I’m going out of town for four days with Sasha (giving her mom a break during Sasha’s school break), and won’t be doing my podcast on Wednesday (we’ll see if I can squeeze in a Guessing the Lines or Monday Night Observations). Basically I want to get Sasha off the internet for a few days, and she won’t go for it if I’m on my laptop, so it’ll have to be in the morning while she’s sleeping in. In other words, I should write something while I’m still here and have the chance even though my chief emotion after watching those games is detached revulsion.
I say “detached” because out of self defense lately if something goes south on me, I just choose not to agonize over it. More like, “that sucked” and think about something else. It’s a skill I’ve cultivated just recently and with only partial success.
I have (had) three great NFFC teams, but last week was a total disaster, and I lost Chris Godwin for the year. This week, I had Jordan Mason in three leagues and Stefon Diggs in all five. Imagine losing your third/fourth round pick who is doing well in one league — you’d be bummed. Now multiply that by five.
I know, I know, I could have diversified more, and I almost did a couple times. I considered Brandon Aiyuk for example in one, but narrowly went Diggs yet again. It really goes to show fantasy football is all fun and games when other people get devastating injuries, but when it happens to you it’s the proverbial “losing an eye.”
I also went 3-2 ATS in the Circa Millions, running this quarter to 13-7 and getting back to .500. I’m drawing dead in the overall, but hopefully I can parlay some of that momentum into Q3, And Seslowsky and I had the Lions in Survivor which was easy. There are still a couple hundred people left in a $70K pool, so it’s not noteworthy yet.
-
Watching Isaac Guerendo rip off 20-yard runs and get a short TD on the 40-minute edited version was torture. Was Mason seriously hurt, was he coming back in? No way to know except by slowly having it dawn on you that it wasn’t happening. Tough backs like Mason can be a problem because they should just sit out, but they play through things ineffectively and then aggravate the injury. Just admit you’re hurt so I can sit you!
-
Brock Purdy is an underrated scrambler. He’s a top-five NFL QB in real life.
-
I fucking hate “national tight ends day” and the enthusiasm with which Scott Hanson talks about it. It’s stupid and annoying, and I don’t have George Kittle.
-
At least I had CeeDee Lamb going in the Steak League.
-
I use the Bengals often in the Circa Millions, and I’m starting to think maybe they just suck.
-
Saquon Barkley’s having a great year, but imagine if Jalen Hurts weren’t stealing so many TDs. The Eagles have a very narrow tree now — just two WR, Barkley, Hurts and the TE. That’s it.
-
It was nice to see the Browns knock some people out of Survivor. I took the Browns in Circa too as it was kind of obvious the Watson injury would be liberating to the entire team. Everyone’s talking about Cedric Tillman and the two TDs including the game-winner, but Elijah Moore quietly had 12 targets and eight catches too. Even Jerry Jeudy showed a pulse with Jameis Winston.
-
Derrick Henry got a late TD, but saw only 11 carries. He’s always been heavily game-flow dependent, and that’s a normally a good thing on the Ravens, just not this week.
-
I took the Lions -11.5, and after an early fight, it was easy peasy. The Lions scored 52 with Jared Goff passing for only 85 yards.
-
The Titans are pointless, but Calvin Ridley must have had the over on his yardage.
-
Tua Tagovailoa looked sharp enough in his return. I saw a post saying “zero medical experts recommended” Tua retire. Given the track record of “medical experts” the last few years, he’ll probably get decapitated in a couple weeks. But enjoy the fantasy production until then!
-
Marvin Harrison made some great catches including a TD while sliding toward the sideline. He’ll be up and down, but more ups than downs the rest of the way and finish more or less with the numbers for which you paid, health permitting.
-
Kyler Murray finally played a good game. The Cardinals are still very much alive in the NFC West. Everyone is.
-
I love Aaron Rodgers, but he is not going to rescue the Jets, and I’d expect him to be done after this year. They should trade Davante Adams before the deadline.
-
Of course I had Rhamondre Stevenson on my bench. When you draft a player, it’s not just what he does, but what he does while startable.
-
Cade Otton is a top-five TE now. Maybe Kyle Pitts too!
-
Bijan Robinson going back to the timeshare is not something I expected, but I’m here for it. He did have six targets and a receiving TD though.
-
Annoyed I started Kirk Cousins over Joe Burrow last week but did the reverse this week.
-
Jordan Love is hurt again, but Malik Willis is now 3-0.
-
The Packers are spreading the ball around so much, it’s hard to start anyone except Josh Jacobs.
-
C.J. Stroud is a tough watch this year. He’s lost his best and probably second best receivers, his offensive line is horrendous and his coach is way too conservative. He’s playing well, all things considered, but it’s brutal having him in fantasy and hoping he does something.
-
Joe Mixon, like every other old running back, is good as gold every week.
-
Anthony Richardson was 10 of 32. I saw some of the throws, he was close a few times, but he’s not an NFL QB right now. Either they overhaul the offense to suit his skills, or they switch to Joe Flacco.
-
Ladd McConkey is a player. He’s fast, quick and changes direction on a dime in the open field. The Chargers need to turn Justin Herbert loose more.
-
JK Dobbins is holding up, but I don’t see much burst.
-
Chris Olave woke up when Jake Haener took over. He should see a ton of volume the rest of the way with Rashid Shaheed out and Derek Carr coming back.
-
Amari Cooper barely did anything in his second week with the Bills, but they didn’t need him. Keon Coleman is emerging too.
-
Unlike Barkley, James Cook is getting some work near the goal line despite having a great goal-line-running QB.
-
The Seahawks are so sloppy. On a fourth-down play near the goal line, the center stepped on Geno Smith’s foot, he fell on his ass, and that was that.
-
I started JSN with DK Metcalf out, and he caught a bunch of short passes as usual.
-
I didn’t watch Denver-Carolina, but maybe Bo Nix is emerging with Sean Payton as his coach. Courtland Sutton had a nice game on everyone’s bench. At least do it during a week where there are byes, so you’re forced into a few lineups!
-
The Panthers are pointless now. Bring in Jonathon Brooks.
-
Kareem Hunt (21 carries for 59 yards) is the perfect encapsulation of the Chiefs. And Travis Kelce (12 targets, 90 yards).
-
The Raiders are hilarious. Forcing-running Alexander Mattison at the goal line, followed by Gardnew Minshew’s laughably bad fourth-down scramble where he got sacked immediately on a play that had zero chance. At least they backdoored the cover.
-
I had the Bears in my picking pool, so I was not thrilled with the Hail Mary, but it was an amazing scramble and throw, batted perfectly into Noah Brown’s hands. It rarely works, and when it does, it’s rarely that clean and easy.
-
-
@ 188302bb:9052db11
2024-10-28 11:23:11I havent' smoked weed since college, I'm about to turn 50. I started smoking it through a pipe recently, i ordered it from weedmaps, but what I'm wondering is the nug only gives me like 2-3 good hits, and then its dust -- is that normal? I havent' smoked since the 90s.
Back when I did smoke in highschool we used to pass the whole thing around a few times. Why am I only getting a few hits?
originally posted at https://stacker.news/items/743074
-
@ f4c59e4c:82f66850
2024-10-28 09:45:36Introduction
In the recent round of proposals, Dora Factory has actively participated governance various blockchain ecosystems. Below is a summary of the proposals voted on and their implications for the respective ecosystems.
Proposals
2024-10-16 Cosmos #970 Yes Dora Factory voted YES on Proposal #970, which seeks to update the consensus.block.max_gas and feemarket.params.max_block_utilization parameters to 75 million. This adjustment is aimed to optimize transactions.
2024-10-23 DYDX #171 Yes Dora Factory voted YES on Proposal #171 to disable the AGIX, FET, and MATIC markets in the x/marketmap, improving validator operations by removing non-tradeable markets and enhancing network performance.
2024-10-14 Osmosis #852 Yes Dora Factory voted YES on Proposal #852, which removes rate limits for CUDOS due to its migration to the Artificial Superintelligence Alliance (ASI). This adjustment facilitates the transition by allowing for a more streamlined withdrawal of liquidity from Osmosis.
2024-10-16 Osmosis #853 Yes Dora Factory voted YES on Proposal #853, which implements a new IBC Rate Limit contract with Role-Based Access Control (RBAC). This upgrade allows designated addresses to manage IBC Rate Limits while ensuring governance oversight, enhancing asset management security and efficiency on Osmosis.
2024-10-24 Osmosis #854 Yes Dora Factory voted YES on Proposal #854, which aims to add multiple USDT variants from Ethereum Layer 2s via Axelar to Alloyed USDT. This proposal establishes static limits of 20% for each new asset and increases liquidity access from Arbitrum, Polygon, and Optimism, enhancing overall market efficiency on Osmosis.
2024-10-24 Osmosis #855 Yes Dora Factory voted YES on Proposal #855, which delegates IBC Rate Limits management to a subDAO. This upgrade implements Role-Based Access Control for improved efficiency and security in asset transfers on Osmosis, enhancing responsiveness to market changes while maintaining governance oversight.
2024-10-16 Injective #449 Yes Dora Factory voted YES on Proposal #449, which reduces the Peggy module slashing percentage from 0.1% to 0.01%. This adjustment aims to enhance the overall stability and fairness of the network.
2024-10-18 Kaia #5 Yes Dora Factory voted YES on Proposal #5, which seeks Governance Council approval to utilize funds for short-term payments supporting service development and infrastructure enhancements. This proposal allocates $350,000 in KAIA to BISONAI PTE.LTD. for the development and maintenance of the Orakl Network and the integration of Fireblocks, focusing on data accessibility and support for over 100 token price feeds, with payments tied to milestone achievements.
2024-10-18 Kaia #6 Yes Dora Factory voted YES on Proposal #6, which seeks approval to use Governance funds for short-term payments to enhance infrastructure. It allocates $100,000 in KAIA to Ankr PBC for 24 months of ANKR RPC support on the Kaia Blockchain, along with funding for Fireblocks integration and Orakl Network developments, with transparent expenditure disclosure via Square websites.
2024-10-18 Kaia #7 Yes Dora Factory voted YES on Proposal #7, approving 7,000,000 KAIA for Bespin Global / CloudMile to cover AWS/GCP costs for Kaia Blockchain operations and development over the next six months. The proposal also supports Fireblocks integration and further developments of Orakl, with expenditures transparently disclosed via Square websites.
2024-10-18 Kaia #8 Yes Dora Factory voted YES on Proposal #8, approving $100,000 in KAIA for Ankr PBC to cover costs for continued ANKR RPC support on the Kaia Blockchain for the next 24 months. This funding also supports Fireblocks integration and further developments of Orakl, with expenditures transparently disclosed via Square websites.
Conclusion
In conclusion, Dora Factory's recent votes reflect a commitment to improving infrastructure, enhancing market operations, and supporting essential developments across multiple blockchain ecosystems.
-
@ 9dd283b1:cf9b6beb
2024-10-28 09:28:57This is not a longform post, this is a test post cause I cannot make it post to relay yet, get a timeout error. but if you see it means it's working.
-
@ b3e02844:0b28deb2
2024-10-28 09:05:44Can decentralized, block chain secured public forums be an antidote for messenger mass shooters/violent actors?
E.g. those who commit their violent acts as a means to draw attention to a message they feel needs to be heard but without extreme action will never be allowed to be heard by those who need to hear it.
Public forums where absolutely anything can be said aloud and discussed publicly and anonymously without the possibility of deletion or censorship may render the utility of a shooters manifesto obsolete or closer to obsolete.
Thoughts?
-
@ b7ccd493:6ba2260f
2024-10-28 08:01:43The 2024 US election is undoubtedly a focal point of global attention, and its outcome will have a profound impact on the global financial market, including Bitcoin. While the election is still some time away, we can conduct a multi-faceted analysis to make some predictions about the future trend of Bitcoin.
Potential Factors Affecting Bitcoin Trends Regulatory Policies:
Cryptocurrency Regulatory Framework: Different candidates have varying attitudes towards cryptocurrency regulation. If the elected official takes a positive stance on cryptocurrencies and formulates policies that are conducive to industry development, Bitcoin may experience a surge. Conversely, if regulations become stricter, it may have an inhibitory effect on the market. Macroeconomic Policies: The candidate's economic policies, such as monetary policy and fiscal policy, will have an indirect impact on Bitcoin. For example, if the new government adopts an expansionary fiscal policy, it may lead to inflation, which in turn may drive the demand for Bitcoin as a hedge against inflation. Market Sentiment:
Risk Appetite: During the election, market sentiment is often influenced by political uncertainty. If investors feel optimistic about the future economic outlook and risk appetite increases, risk assets such as Bitcoin may be favored. Safe-Haven Demand: If geopolitical risks rise or the economic situation deteriorates, investors may turn to safe-haven assets such as Bitcoin, thereby pushing up prices. Technological Development:
Blockchain Technology Innovation: The continuous development of blockchain technology and the emergence of new application scenarios will bring new growth momentum to Bitcoin. Institutional Investor Participation: More and more institutional investors are starting to get involved in the cryptocurrency market, which will bring more funds into Bitcoin. Possible Trend Predictions Considering the above factors, Bitcoin may exhibit the following trends after the 2024 election:
Increased Short-Term Volatility: Immediately after the election results are announced, the market may experience severe short-term fluctuations. Investors may engage in frequent trading under uncertainty, leading to significant price fluctuations. Long-Term Bullish: If the new government takes a positive stance on cryptocurrencies and introduces policies that are conducive to industry development, Bitcoin may experience a long-term upward trend. Long-Term Consolidation: If the new government's regulatory policies for cryptocurrencies are unclear, or if macroeconomic uncertainty is high, Bitcoin may remain in a consolidation phase for a long time. Short-Term Decline: If the election results trigger market panic, or if the new government adopts a tight monetary policy, Bitcoin may experience a short-term decline. Other Factors Affecting Bitcoin Trends In addition to the election results, the following factors may also affect Bitcoin:
Global Economic Situation: The growth rate of the global economy, inflation rate, and other factors will all have an impact on Bitcoin prices. Development of Competitive Currencies: The development of other cryptocurrencies will also have an impact on Bitcoin's market share. Changes in Regulatory Policies: Changes in government regulations on cryptocurrencies will also have an impact on Bitcoin prices. Conclusion
As an emerging asset, Bitcoin's price is influenced by numerous factors, and predicting its future trend is highly uncertain. Investors should consider various factors comprehensively and maintain a cautious attitude when making investment decisions.
Suggestions for Investors:
Strengthen your understanding of the cryptocurrency market: Deepen your understanding of Bitcoin's working principles, technical characteristics, and market development trends. Diversify investments: Do not put all your funds into Bitcoin, but diversify your investments appropriately. Hold for the long term: If you are optimistic about Bitcoin's long-term development prospects, you can consider holding it for the long term. Be aware of risks: The cryptocurrency market is highly volatile, and investors should manage risks accordingly. Disclaimer: This article is for reference only and does not constitute any investment advice. Investors should bear their own investment risks.
Please note: Due to the rapidly changing nature of the cryptocurrency market, the above analysis may differ from the actual situation. It is recommended that you consult with a professional before making any investment decisions.
-
@ b7ccd493:6ba2260f
2024-10-28 07:59:562024年美国大选无疑是全球瞩目的焦点事件之一,其结果对包括比特币在内的全球金融市场都会产生深远影响。 虽然目前距离大选结束还有一些时间,但我们可以从多个角度进行分析,以期对未来比特币的走势做出一些预测。
影响比特币走势的潜在因素 政策监管:
加密货币监管框架: 不同候选人对加密货币的监管态度存在差异。如果当选者对加密货币持积极态度,制定有利于行业发展的政策,那么比特币可能会迎来一波上涨。反之,如果监管趋严,则可能对市场产生抑制作用。 宏观经济政策: 候选人的经济政策,如货币政策、财政政策等,都会对比特币产生间接影响。例如,如果新政府采取扩张性的财政政策,可能会导致通货膨胀,进而推动比特币作为避险资产的需求。 市场情绪:
风险偏好: 大选期间,市场情绪往往会受到政治不确定性的影响。如果投资者对未来经济前景感到乐观,风险偏好增加,比特币等风险资产可能会受到青睐。 避险需求: 如果地缘政治风险上升或经济形势恶化,投资者可能会转向比特币等避险资产,从而推高价格。 技术发展:
区块链技术创新: 区块链技术不断发展,新的应用场景不断涌现,这将为比特币带来新的增长动力。 机构投资者入场: 越来越多的机构投资者开始涉足加密货币市场,这将为比特币带来更多的资金流入。 可能的走势预测 考虑到上述因素,2024年大选后,比特币可能出现以下几种走势:
短期波动加剧: 大选结果公布后,市场可能出现短期内的剧烈波动。投资者在不确定性下可能会进行频繁的交易,导致价格大幅震荡。 长期看涨: 如果新政府对加密货币持积极态度,并出台有利于行业发展的政策,比特币可能会迎来长期上涨趋势。 长期震荡: 如果新政府对加密货币的监管政策不明朗,或者宏观经济形势不确定性较高,比特币可能会长期处于震荡状态。 短期下跌: 如果大选结果引发市场恐慌,或者新政府采取紧缩的货币政策,比特币可能会出现短期下跌。 影响比特币走势的其他因素 除了大选结果,以下因素也可能对比特币产生影响:
全球经济形势: 全球经济的增长速度、通货膨胀率等因素都会对比特币的价格产生影响。 竞争币的发展: 其他加密货币的发展也会对比特币的市场份额产生影响。 监管政策的变化: 各国政府对加密货币的监管政策不断变化,也会对比特币的价格产生影响。 结论
比特币作为一种新兴资产,其价格走势受到众多因素的影响,预测其未来走势存在很大的不确定性。 投资者在进行投资决策时,应综合考虑各种因素,并保持谨慎的态度。
建议投资者:
加强对加密货币市场的学习: 深入了解比特币的工作原理、技术特点以及市场发展趋势。 分散投资: 不要将所有资金都投入到比特币中,应进行适当的分散投资。 长期持有: 如果看好比特币的长期发展前景,可以考虑长期持有。 关注风险: 加密货币市场波动较大,投资者应做好风险管理。 免责声明: 本文仅供参考,不构成任何投资建议。投资者应自行承担投资风险。
请注意: 由于加密货币市场瞬息万变,上述分析可能与实际情况存在差异。建议您在做出投资决策前,务必咨询专业人士的意见。
-
@ 09565902:0700e0d5
2024-10-28 07:23:39Technology has woven itself into the fabric of our daily lives, influencing every aspect of our existence. From the moment we wake up to the time we retire, technology is there, guiding our actions, facilitating our interactions, and shaping our world.
One of the most profound impacts of technology is on communication. Social media platforms have revolutionized the way we connect with others, transcending geographical boundaries. Instant messaging, video calls, and email have made communication efficient and effortless. Moreover, technology has democratized information, making it accessible to billions of people around the globe.
In the realm of education, technology has transformed traditional classrooms into dynamic learning environments. Online courses, educational apps, and virtual reality experiences have made learning more engaging and personalized. Students can access knowledge from anywhere, at any time, and at their own pace.
The healthcare industry has also benefited immensely from technological advancements. Telemedicine has made it possible for patients to consult with doctors remotely, reducing the burden on healthcare facilities. Wearable devices monitor vital health parameters, enabling early detection of potential health issues. Artificial intelligence is being used to develop innovative treatments and personalized medicine.
The business world has undergone a digital revolution. E-commerce has disrupted traditional retail models, offering consumers a wider range of products and services. Automation and artificial intelligence have streamlined operations, increasing efficiency and productivity. Cloud computing has enabled businesses to store and access data from anywhere, fostering collaboration and innovation.
However, the rapid advancement of technology has also raised concerns about privacy, security, and job displacement. It is crucial to use technology responsibly and ethically. Governments, businesses, and individuals must work together to address these challenges and ensure that technology benefits society as a whole.
In conclusion, technology has become an indispensable part of modern society. It has transformed the way we communicate, learn, work, and live. As technology continues to evolve, it is essential to embrace its potential while mitigating its risks. By harnessing the power of technology, we can create a better future for generations to come.
-
@ b7ccd493:6ba2260f
2024-10-28 07:23:14Over the past decade, Bitcoin has transformed from a niche digital currency into a widely recognized asset globally, becoming synonymous with "electronic gold." This shift is not only a result of technological advancements but also a significant change in people's understanding of value storage and wealth appreciation. As more individuals invest in Bitcoin, the rise of electronic gold is poised to lead the future wealth wave and influence the landscape of global financial markets.
-
Bitcoin: A Store of Value Beyond Traditional Gold Bitcoin is dubbed "electronic gold" not just because of its scarcity and value retention characteristics, but also due to its unique advantages in the digital economy. The total supply of Bitcoin is capped at 21 million coins, with no possibility of inflation, making it an effective hedge against inflation. Compared to traditional gold, Bitcoin boasts higher liquidity and convenience for transactions, allowing for rapid transfers worldwide. For investors, Bitcoin is not only an investment tool but also a future means of storing value.
-
Global Economic Uncertainty Fuels Demand for Electronic Gold In recent years, the global economy has faced various uncertainties, such as inflation, geopolitical risks, and market volatility, prompting investors to seek safe assets for hedging. In this context, Bitcoin's allure is growing. While traditional safe-haven assets like gold remain popular, Bitcoin, with its digital and decentralized characteristics, has emerged as a new refuge in the digital age.
The decentralized nature of Bitcoin means it is not subject to control by any government or institution, significantly reducing political risk. This trait allows Bitcoin to maintain a relatively stable value during economic turbulence, further solidifying its status as "electronic gold."
- Technological Advances Drive the Popularity of Electronic Gold The rise of Bitcoin is supported by blockchain technology. As a decentralized distributed ledger technology, blockchain ensures the transparency and security of transactions while significantly increasing transaction efficiency. The maturity of this technology has made Bitcoin trading more accessible, attracting a large number of participants.
Moreover, with the development of financial technology, an increasing number of financial products are being integrated with Bitcoin, such as Bitcoin ETFs and cryptocurrency derivatives. This trend is further promoting the acceptance and recognition of Bitcoin, gradually bringing it into mainstream financial markets.
- Future Outlook: Bitcoin Leading a New Wealth Frontier Looking ahead, as people's understanding of Bitcoin deepens, its position as "electronic gold" will be further solidified. More institutional investors are beginning to include Bitcoin in their asset allocations, driving up the demand for Bitcoin. In this context, the price of Bitcoin is likely to continue climbing, making it a wealth target for many.
At the same time, as the global economy becomes increasingly digitized, more businesses and merchants are starting to accept Bitcoin as a payment method. This trend not only enhances Bitcoin's practicality but also contributes to its value appreciation.
Conclusion: Seize the Opportunity of Electronic Gold's Rise The rise of Bitcoin is not only a revolution in the digital currency market but also a redefinition of future wealth concepts. As an emerging asset class, Bitcoin is uniquely positioned to lead the arrival of the future wealth wave with its distinctive value attributes. For investors, now is the best time to position themselves in Bitcoin and seize this historic opportunity, potentially securing a place in the forthcoming wealth tide.
-
-
@ 123711f7:c0a0c17e
2024-10-28 07:14:22Trump Media auditor raises doubts about Truth Social's future in new filing
A new regulatory filing from Donald Trump’s social media company shows an auditor has raised concerns about the company’s future.
Trump Media, the company behind the social media platform Truth Social, went public last week after merging with shell company Digital World Acquisition. The stock’s price has been volatile since then, shooting up as high as $79.38 on its first day of trading Tuesday before closing below $50 Monday.
-
@ 09565902:0700e0d5
2024-10-28 05:56:56Environmental pollution, a pressing global issue, has far-reaching consequences for both human health and the natural world. It arises from the introduction of harmful substances or energy into the environment, leading to adverse changes. This article delves into the various types of pollution, their causes, and the devastating impacts they have on our planet.
Types of Pollution
Air Pollution: Air pollution occurs when harmful gases, particulate matter, and other pollutants are released into the atmosphere. Major sources include industrial emissions, vehicle exhaust, and burning fossil fuels. The consequences of air pollution are severe, ranging from respiratory diseases to climate change.
Water Pollution: Water pollution results from the contamination of water bodies with pollutants such as industrial waste, agricultural runoff, and sewage. This can lead to waterborne diseases, harm aquatic ecosystems, and disrupt water supplies.
Land Pollution: Land pollution arises from the accumulation of solid waste on land. Improper waste disposal, deforestation, and industrial activities contribute to land degradation and soil contamination.
Noise Pollution: Excessive noise levels can cause hearing loss, stress, and sleep disturbances. Sources of noise pollution include transportation, construction, and industrial activities.
Light Pollution: Excessive artificial light at night can disrupt natural rhythms, affect wildlife, and contribute to energy waste.
Causes of Pollution
Industrial Activities: Industries release pollutants into the air, water, and land during production processes. Transportation: Vehicle emissions contribute significantly to air pollution. Agriculture: The use of pesticides and fertilizers can contaminate water bodies and soil. Deforestation: Clearing forests reduces carbon sinks and leads to soil erosion. Waste Disposal: Improper waste management practices result in pollution of land and water. Impacts of Pollution
Health Risks: Pollution can cause respiratory diseases, cancer, and other health problems. Environmental Degradation: Pollution damages ecosystems, reduces biodiversity, and disrupts natural processes. Climate Change: Greenhouse gas emissions contribute to global warming and climate change. Economic Loss: Pollution can harm industries, reduce agricultural productivity, and increase healthcare costs. Mitigating Pollution
Addressing environmental pollution requires a multifaceted approach:
Sustainable Practices: Adopting sustainable practices in industries and agriculture can reduce pollution. Renewable Energy: Transitioning to renewable energy sources can reduce greenhouse gas emissions. Waste Reduction and Recycling: Minimizing waste and recycling materials can reduce land pollution. Public Awareness: Educating the public about the dangers of pollution and promoting environmentally friendly behaviors is crucial. Policy and Regulations: Strong environmental regulations and enforcement are essential to control pollution. Environmental pollution is a complex issue with far-reaching consequences. By understanding its causes and impacts, we can take collective action to protect our planet and ensure a sustainable future for generations to come.
-
@ dbc828cc:ed78a663
2024-10-28 04:51:51Chef's notes
Useful to know
- The oven for this recipe has a diameter of 1.50 meters, —with a 0.75 m. vault radius—; and it can hold at a time up to four trays (~50 cm. d. each) aside the fire;
- the kind of timber used to heat the oven also adds to the flavor; in this occasion the fuel is made out of timber of Taxodium mucronatum, locally known as "sabino tree";
- another local common is the amulet made out of lemons cut in half along nail-cloves nailed to the lemon, then distributed along the work area so the flies and critters bother less;
- the carbon result of the fire could be useful for heating cobbee and incense, being copal the traditional aroma used at these festivities;
- a mop, —made of natural fibers—, along a water bucket helps cool the oven in case of over heating; also, a common practice to get to know if the oven is ready is to look after a white color at the ceiling and the sides of the oven;
- ask advice to your local traditional pizza maker, look ahead their usual tools; be well hydrated and be prepared for sweating; you could be using a work table no less than 1.50 by 3.00 square meters; and another one half the same size for cooling the breads. Friendship, teamwork, music & dancing are usually commons around the making of this recipe too.
Final shout-outs
Chivo & Celia marriage is ought to receive praise for sharing the recipe with us and be that gentle to show us some not-so-known tricks. Comments, tips and zaps are going to be forwarded to them. Also a big shout-out to our honor guest, SF; and so as well a loud one to the nostriches, meshtadelians and noderunners.
Details
- ⏲️ Prep time: 1 day
- 🍳 Cook time: 12 hours
- 🍽️ Servings: 20 plus
Ingredients
- Wheat flour; 10 kilograms
- Milk; 1 liter
- Chicken eggs; 60 units (20 yolks-only and 40 regular)
- Yeast; 1 kilogram
- Guava fruit; 1 kilogram
- Butter; 2 kilogram
- Salt; two spoons
- Shredded nuts; 1 kilogram
- Sesame seeds; 1 kilogram
Directions
- Set a wooden pyre within the oven a day before the baking; so early in the morning ignites and burns at ease. This is the pre heating, from here you would like to be adding small pieces of fuel to keep it warm until the baking starts.
- Remove the white out of 20 eggs and leave only the yolks; save the white for glazing after shaping the dough. The rest of the 40 (out of a total of 60 eggs) should be going to the mix at their normal. You could hold those eggs together in a recipe for the moment.
-
- Blend the guava fruit, —or your sweetener fruit of choice—, along half a liter of milk (ambient temperature). Strain the mix in order to separate seeds and residues apart. Hold it in a recipient.
- Blend slowly and manually together half a liter of milk, along 750 grams of yeast at slow to medium heat; you can put the mix near the entrance of the oven so the heat gets to dissolute the mix. Hold it in a recipe and cover it with a vegetal fabric to hold it warm.
- Build a volcano shape with about 9 kilograms of wheat flour; save 1 kilogram to be adding to your hands and dough whilst kneading.
- Pour a spoon of salt all around the perimeter of the volcano's top edge; and one more at the crater, —in Mexico, a common folk costume is to draw a cross of salt within the center of the crater—.
- Start building the dough by adding firstly the eggs and shredded nuts to the volcano crater. Start crushing with your hands by top-around of the edge towards the center of the crater. The both types of milks, —yeast and sweet—, along the liquid-heated butter are going to be added little by little as the mix demands. The whole knead might not take less than half an hour of force work; could be automatized with motor.
- Put the dough within a concave tray, deep enough to hold the fluffiness and cover it with natural fiber fabrics; it will take about half an hour before the dough fluffs enough to start shaping the bread.
- Adjust the temperature of the oven. Set at one side of the oven the wooden fuel. Add timber to heat; or wet the mop and mop the floor of the oven to cool it down. Ideal temperature should be around 180 ·C
- Grease the metal trays with fat or oil and start shaping the breads on them; if the trays are about 50 centimeters wide, up to 6 breads could be put in each without them blending together, try leave some empty space between them.
- The traditional bread shape consists of a round dough, —as a mini pizza—, and two crossed "bones" at the top. The bones can be shaped by rolling the dough with the fingers a little separate each other.
- Take some of the egg whites from earlier and add a couple extra more regular eggs and flap to make the glazing. Glaze using a little brush and add the sesame.
- The suggested technique for baking is to be rotating the trays either counter or clockwise. Each batch until the dough is done should take between 10 and 20 minutes.
- The glaze is indicative of the toast of the bread, ideally a golden brown-ish tone, with some dark spots are good looks of the OK finish. If by doing a cross cut to one of the breads you can notice a distinction of tones, that is, if the color is not uniform, then the bread was a little short of baking time.
- After cooling down the breads, you can store them within a cardboard box with a cover of natural fibers fabrics on the inside, so the breads remain wrapped.
- That must be it! by now those breads stored in the boxes could last for several weeks, —to months— without passing out... probably the why of the name bread of the dead.
- The traditional way to serving it is along with liquid chocolate, ideally the watery bitter one. As the bread is by itself sweet, to add sweet beverages could if something be a over sweet combination. If the bread already bricked, it could be crushed instead of your typical cereal plate. Dogs love them, haven't complained. If batch is too much for yourselves, don't forget these are ought to be put at the Día de los Fieles Difuntos offerings to honor our beloved deceased.
-
@ a012dc82:6458a70d
2024-10-28 02:51:08Table Of Content
The Purpose Behind the Move
Boosting Market Liquidity
Implications for the Cryptocurrency Market
Conclusion
FAQ
In the ever-evolving landscape of cryptocurrencies, Tether, one of the leading stablecoin issuers, has recently made a bold move by announcing their decision to purchase more Bitcoin. This strategic step aims to bolster Tether's stablecoin reserves and potentially reshape the dynamics of the cryptocurrency market. With Tether's Big Move: Buying More Bitcoin to Boost Stablecoin Reserves, investors and enthusiasts are eager to comprehend the implications of this decision. This article delves into the details, benefits, concerns, and possible outcomes of Tether's bold maneuver.
The Purpose Behind the Move
Tether's decision to acquire additional Bitcoin primarily serves two purposes. Firstly, it aims to increase the overall reserves of Tether's stablecoin. By purchasing more Bitcoin, Tether ensures that its stablecoin is backed by a higher value, which enhances market confidence. This move can also help Tether solidify its position as the most widely adopted stablecoin, attracting more users and creating a positive feedback loop.
Boosting Market Liquidity
Secondly, Tether's move can have a significant impact on market liquidity. Bitcoin, being the largest and most recognized cryptocurrency, is highly liquid and serves as the backbone of the entire market. By purchasing more Bitcoin, Tether effectively injects additional liquidity into the cryptocurrency ecosystem, potentially fostering a more robust and vibrant market.
Implications for the Cryptocurrency Market
Tether's decision to buy more Bitcoin has far-reaching implications for the broader cryptocurrency market. Let's explore the various ways this move can reshape the industry.
1. Increased Stability
By bolstering its reserves through Bitcoin, Tether aims to reinforce stability within the crypto space. A stable and reliable stablecoin is crucial for traders and investors, as it provides a reliable bridge between fiat and digital currencies. This move could instill confidence in market participants and mitigate some of the volatility associated with cryptocurrencies.
2. Enhanced Market Dominance
Tether is already the dominant stablecoin in the market, and its decision to purchase more Bitcoin could further solidify its position. With an increased reserve, Tether can maintain the 1:1 peg with the U.S. dollar, attracting more users and cementing its status as the go-to stablecoin for traders and exchanges.
3. Bitcoin Price Impact
As Tether buys more Bitcoin, it has the potential to influence the price of the leading cryptocurrency. Increased demand from Tether can drive up the price of Bitcoin, benefitting existing holders and potentially attracting more investors to the market. However, it's important to note that the overall impact on Bitcoin's price will depend on various factors, including market sentiment and overall trading volume.
4. Regulatory Scrutiny
Given the significance of Tether in the cryptocurrency ecosystem, its actions are likely to attract regulatory attention. The purchase of more Bitcoin to boost stablecoin reserves may raise concerns about market manipulation or the concentration of power. Regulatory bodies may closely monitor Tether's operations to ensure compliance with existing regulations and the overall stability of the market.
5. Market Volatility
While Tether's move aims to enhance stability, it may inadvertently contribute to short-term volatility. The injection of additional liquidity into the market can lead to price fluctuations, especially in the short term. Traders and investors should brace themselves for potential market movements resulting from Tether's decision.
6. Potential Rival Responses
Tether's big move could spur other stablecoin issuers to explore similar strategies. Competitors might also consider increasing their Bitcoin reserves to maintain a competitive edge and attract users. This could lead to a broader trend in the stablecoin market, influencing the overall dynamics of cryptocurrencies.
Conclusion
Tether's Big Move: Buying More Bitcoin to Boost Stablecoin Reserves has the potential to reshape the cryptocurrency landscape. By increasing its Bitcoin holdings, Tether aims to enhance stability, boost market liquidity, and solidify its position as a leading stablecoin issuer. While the implications of this decision are yet to fully unfold, market participants and regulators will closely monitor the outcomes. As the cryptocurrency market continues to evolve, Tether's bold move signifies the ongoing innovation and strategic shifts within the industry.
FAQ
How will Tether's purchase of more Bitcoin impact the stability of the USDT stablecoin? Tether's move is intended to enhance stability by increasing the overall reserves of the USDT stablecoin. With a higher value of Bitcoin backing each USDT, market participants can have increased confidence in the stability of the stablecoin.
Will Tether's purchase of Bitcoin drive up the price of the cryptocurrency? Tether's buying activity can potentially influence Bitcoin's price due to increased demand. However, the overall impact on the price will depend on various factors, including market sentiment and trading volume.
How might regulatory bodies respond to Tether's decision? Tether's actions are likely to attract regulatory scrutiny, given its significance in the cryptocurrency ecosystem. Regulators may monitor Tether's operations to ensure compliance with existing regulations and maintain market stability.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
@ 09565902:0700e0d5
2024-10-28 01:59:12Trump ends big hometown rally published at 01:38 01:38 Trump has just wrapped up his speech in New York, which he says is the "town where I was born and raised" and "taught me that we can do anything".
He tells his supporters that "we bleed the same blood, share the same home, salute the same great American flag".
Trump then repeats the lines he usually ends his rallies with, promising to make America healthy, wealthy and great again.
A singer is now on stage singing New York, New York while Trump waves to his supporters.
We'll bring you some recaps and analysis of the speech shortly. Stay tuned.
-
@ 0440f5d2:76b637dd
2024-10-28 00:13:56Hello World
-
@ 46390caa:7e7f65d9
2024-10-27 23:22:14TikTok, with over a billion active users, has emerged as a vital platform for businesses to reach their target audience. TikTok ads offer a unique opportunity to tap into this vast user base, increase brand awareness, and drive sales. In this article, we'll analyze the effectiveness of TikTok ads as a marketing strategy and provide actionable tips for businesses.
Why TikTok Ads?
- Huge User Base: TikTok's massive user base presents an unparalleled opportunity to reach potential customers.
- Engaging Format: TikTok's short-form, visually-driven content resonates with users, making ads more effective.
- Targeting Capabilities: TikTok's algorithm allows for precise targeting based on demographics, interests, and behaviors.
- Cost-Effectiveness: TikTok ads are often more affordable than traditional social media platforms.
Effectiveness of TikTok Ads
Studies have shown:
- High Engagement Rates: TikTok ads achieve an average engagement rate of 5.5%, outperforming Facebook (4.3%) and Instagram (3.8%) [1].
- Increased Brand Awareness: 67% of users report increased brand awareness after seeing TikTok ads [2].
- Sales and Conversions: TikTok ads drive significant sales and conversions, with 55% of users reporting purchases influenced by the platform [3].
Tips for Businesses
-
Define Your Target Audience
-
Identify your ideal customer demographics, interests, and behaviors.
-
Use TikTok's targeting options to reach your audience.
-
Create Engaging Ad Content
-
Short, visually-appealing videos (15-60 seconds).
- Use music, effects, and captions to enhance engagement.
-
Ensure brand consistency and messaging.
-
Leverage Hashtag Challenges
-
Participate in relevant hashtag challenges to increase visibility.
-
Create branded challenges to encourage user-generated content.
-
Utilize Influencer Marketing
-
Partner with popular TikTok creators to reach niche audiences.
-
Choose influencers aligning with your brand values and target audience.
-
Monitor and Optimize
-
Track ad performance using TikTok's analytics tool.
-
Adjust targeting, ad creative, and budget allocation for optimal results.
-
Run Contests and Giveaways
-
Host contests or giveaways to drive engagement and encourage sharing.
-
Offer incentives for users to participate.
-
Integrate with E-commerce
-
Use TikTok's shopping feature to tag products directly.
- Enable seamless checkout experiences.
Conclusion
TikTok ads offer a powerful marketing strategy for businesses seeking to reach a vast, engaged audience. By understanding the platform's effectiveness, targeting capabilities, and best practices, businesses can unlock the full potential of TikTok ads.
References
[1] AdEspresso, "TikTok Ads Benchmark Report" [2] GlobalWebIndex, "TikTok Marketing Report" [3] Influencer Marketing Hub, "TikTok Influencer Marketing Report"
You can also explore these resources:
- TikTok for Business: (link unavailable)
- TikTok Ads Manager: (link unavailable)
- TikTok Creator Marketplace: (link unavailable)
-
@ 8d34bd24:414be32b
2024-10-27 22:30:18NOTE: This article has some details that are specific to America, but the overall principles are applicable to all, and I believe it will be useful for all Christians.
When it comes to things like voting, Christians tend to err to one of two extremes and seem to find difficulty finding the right balance as defined by God. Some Christians refuse to vote or get involved with politics at all. They don’t want to dirty themselves with politics. They know that their true home is heaven, so they don’t seem to care much for the nations they live in. On the other hand, some Christians are so focused on politics fixing everything and creating heaven on earth that they can become idolatrous lifting up politicians as a kind of savior.
In this article, I’m going to address both extremes, using the Bible, and hopefully help you find a Biblical balance.
Seek the Welfare of the City Where I Have Sent You
As Christians we are just passing through our time on earth. Our true, eternal home, our true citizenship, is in heaven. That doesn’t mean that we shouldn’t care what happens on earth. We shouldn’t be like the old saying, “some Christians are so heavenly minded that they aren’t any earthly good.” I think Christians should organize our time here on earth kind of like the Israelites were commanded to live during their 70 year exile in Babylon and Persia.
Now these are the words of the letter which Jeremiah the prophet sent from Jerusalem to the rest of the elders of the exile, the priests, the prophets and all the people whom Nebuchadnezzar had taken into exile from Jerusalem to Babylon. (Jeremiah 29:1)
What did God say to the Israelites about how they should live their life in Babylon?
“Thus says the Lord of hosts, the God of Israel, to all the exiles whom I have sent into exile from Jerusalem to Babylon, ‘Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. Seek the welfare of the city where I have sent you into exile, and pray to the Lord on its behalf; for in its welfare you will have welfare.’ (Jeremiah 29:4-7) {emphasis mine}
Could we likewise say the same to Christians during their time on earth? “Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. Seek the welfare of the city, state, or nation where I have sent you to live for a short while, and pray to the Lord on its behalf; for in its welfare you will have welfare.”
God expects us to live fruitful lives, to marry, to have many children (multiply), and to raise them up to do the same. He also wants us to seek the welfare of the city, state, and nation where God has put us. In a city, state, or nation with democratic elections, the best way to seek its welfare is to vote for honest candidates who support godly principles. We rightly understand that in our ungodly world there are no perfect candidates. It can even be hard to find mostly honest and mostly godly candidates, but we should seek to elect the best that is available. Why are we told to do this? We are told that “for in its welfare you will have welfare.” When we fail to vote, to teach our kids or support good schools, to live productive lives, and to generally live Godly lives, we WILL see the decline of our cities, states, and nations. We will pay the price.
We are seeing exactly that decline because Christians have pulled out (and were pushed out) of the positions that influence the culture. We don’t have enough godly teachers, journalists, professors, advisors, economists, and politicians. We have given up the culture to those who oppose God, His people, and His commands.
We are paying the price for withdrawing into the safety of our churches and leaving the world to the wolves.
Political Religion
Of course we also have an opposite extreme. We have some Christians that are too focused on politics and power. They spend all of their time and energy on political endeavors and very little, to none, on sharing the Gospel and being a godly example. Many act like they think a political candidate is going to save them from the culture, the media, the bureaucracy, or the government. They forget that there is only one Savior — the Lord Jesus Christ. They forget that God said things will get worse before they get better. They make idols out of politicians and religions out of political parties.
No servant can serve two masters; for either he will hate the one and love the other, or else he will be devoted to one and despise the other. You cannot serve God and wealth.” (Luke 16:13)
Although this verse is specifically talking about being obsessed with wealth, it is applicable to anything that takes our focus, attention, and especially our worship away from God.
When a person spends all of their time serving one candidate or party and little to no time serving God, they have chosen to serve another god and are guilty, even if inadvertently and unintentionally.
You shall have no other gods before Me.
You shall not make for yourself an idol, or any likeness of what is in heaven above or on the earth beneath or in the water under the earth. You shall not worship them or serve them; for I, the Lord your God, am a jealous God, visiting the iniquity of the fathers on the children, on the third and the fourth generations of those who hate Me, but showing lovingkindness to thousands, to those who love Me and keep My commandments. (Exodus 20:3-6)
When we look to a politician to save us from anything, we are making him/her a god before us. When we give our all to a political party, we are taking our heart away from God and giving it to an alternate religion.
We may not think that we make idols in our modern world. It is true that we don’t usually carve them out of wood or mold them out of gold, but we have just as many idols as the Israelites did. They just look different.
I hope you will seriously consider this next point because it may be very unpopular with many of my readers. There are lots of Christians that will throw as big, if not a bigger, fit at the desecration of the American flag than over the Bible. Nobody seems to fight to retain the pledge of allegiance more than a majority of Christians. I’d argue that the American flag has become a modern day idol and the “Pledge of Allegiance” has become a religious mantra repeated to the god of government. Look at the words of the pledge:
I pledge allegiance to the Flag of the United States of America,\ and to the Republic for which it stands,\ one Nation under God,\ indivisible, with liberty and justice for all.
I think the inclusion of the phrase “one Nation under God” makes Christians feel OK about this pledge originally invented by a socialist whose brother sold American flags. The important part, which is why I can’t say the pledge anymore, are the words, “I pledge allegiance to the Flag of the United States of America, and to the Republic for which it stands.” I really appreciate the principles America was founded upon, but as a Christian, I can only pledge allegiance to God. My allegiance isn’t to a flag (an idol) or the government (a god). I refuse to go through a religious ritual that includes particular stances, reciting special words, and showing undue respect. We cannot “serve two masters.” As Christians our master should be Christ alone. Anything that becomes more important than, or even equal to, the importance of God in our lives is idolatry. We need to get our priorities right.
In the World, but Not of the World
As we live our lives here on earth, we need to remember our God ordained purpose and our true allegiance to God. We need to remember our citizenship1 and family are in heaven, not here on earth.
We want to have a positive influence on our culture, including working in influential positions and voting, but we should be most focused on personal evangelism and sharing the truth of the Bible. The best way to make a difference in our culture is to change hearts and minds through the Gospel of Jesus Christ.
But now I come to You; and these things I speak in the world so that they may have My joy made full in themselves. I have given them Your word; and the world has hated them, because they are not of the world, even as I am not of the world. I do not ask You to take them out of the world, but to keep them from the evil one. They are not of the world, even as I am not of the world. Sanctify them in the truth; Your word is truth. (John 17:13-17) {emphasis mine}
Although we want to be a light in the world, we have been warned that doing so will make us not fit in. It will cause many non-Christians (and maybe a few Christians whose priorities are not right) to hate us. No matter the consequences, we need to stand on the truth of the Word of God.
Too often, because we are living with those who are of this world, we start to look and act a lot like those of the world instead of looking and acting like our Savior.
Do not love the world nor the things in the world. If anyone loves the world, the love of the Father is not in him. For all that is in the world, the lust of the flesh and the lust of the eyes and the boastful pride of life, is not from the Father, but is from the world. The world is passing away, and also its lusts; but the one who does the will of God lives forever. (1 John 2:15-17) {emphasis mine}
The fact that we should not love the things of the world or take on the character of things of the world is true in every part of our lives, but since we are talking here about politics, let us discuss the way many Christians talk politics.
Many Christians talk about politics in the same manner as non-Christians — cursing, name calling, insulting, and doing whatever it takes to win, no matter whether it is moral or not. I know the “other side” cheats, lies, name-calls, etc., but we should not stoop to their level. Nobody ever won another to their point of view by cursing or name calling. There are ways to point our their errors, and even how horrific some of the things pushed are, without going so low. Jesus didn’t hold back from speaking the truth. He didn’t hesitate to point out error, but was never crude about it. We should be the same. We should shine a light in such a way that those around us see such a difference that they say something similar to what was said about the apostles:
Now as they observed the confidence of Peter and John and understood that they were uneducated and untrained men, they were amazed, and began to recognize them as having been with Jesus. (Acts 4:13)
There should be something about our words, actions, and demeanor that amazes our opponents causing them to recognize us “as having been with Jesus.”
I hope this post has been helpful, truthful, and not too offensive. In so many areas it is hard to find that perfect balance and to not allow ourselves to be pulled to either extreme to the detriment of our witness and our relationship to God.
Give no offense either to Jews or to Greeks or to the church of God; just as I also please all men in all things, not seeking my own profit but the profit of the many, so that they may be saved. (1 Corinthians 10:32-33) {emphasis mine}
Trust Jesus.\ \ your sister in Christ,
Christy
-
@ 5fb7f8f7:d7d76024
2024-10-27 21:20:28**A short introduction to Web3:
What is Web3?**
Web3, also known as Web 3.0, is the next generation of the internet, where users are in control of their own data, identity, and interactions. It's a decentralized web, built on blockchain technology, where applications and services are designed to be trustless, permissionless, and open.
Key features:
- Decentralization: Web3 applications run on blockchain networks, ensuring that data is stored and managed in a decentralized manner.
- Token-based economics: Web3 introduces token-based economies, enabling new business models and incentivization mechanisms.
- Artificial intelligence: Web3 integrates AI to enhance user experiences and automate processes.
- Internet of Things (IoT) integration: Web3 connects physical devices to the digital world, creating a seamless interaction between the physical and virtual.
Benefits:
- User sovereignty: Users have full control over their data and identity.
- Security: Decentralized and encrypted data storage ensures enhanced security.
- Censorship resistance: Web3 applications are resistant to censorship and downtime.
- New business models: Token-based economies enable innovative revenue streams.
Challenges:
- Scalability: Web3 applications face scalability issues due to blockchain limitations.
- Regulation: Evolving regulatory frameworks pose challenges for Web3 adoption.
- User adoption: Mainstream adoption requires user-friendly interfaces and education.
Conclusion:
Web3 represents a significant shift in the internet's evolution, prioritizing user control, decentralization, and innovation. As the ecosystem grows, we can expect new applications, business models, and opportunities to emerge, shaping the future of the web.Here's a short introduction to Web3.
-
@ 7579076d:1bbfcb19
2024-10-27 18:48:03Amber 2.0.8
- Fix signing private zaps
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v2.0.8.txt
andmanifest-v2.0.8.txt.sig
are in the current directory) with:bash gpg --verify manifest-v2.0.8.txt.sig manifest-v2.0.8.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v2.0.6.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ df478568:2a951e67
2024-10-27 18:31:30Chef's notes
This is a delicious, quick and easy meal you can do on the weeknights. Serve with mash potatoes.
Details
- ⏲️ Prep time: 10 minutes
- 🍳 Cook time: 1 hour 10 minutes
- 🍽️ Servings: 4
Ingredients
- 4 lamb shanks
- 28 oz. Can of whole San Marzano tomatoes
- 2 table spoons of garlic powder
- 1/3 bottle of dry white wine(cheap stuff is fine)
- 2 table spoons of extra virgin olive oil
- 1 tsp salt
- 1 tsp pepper
- 1 bag of frozen carrots
Directions
- Place carrots in the Instant pot to rest the meat on.
- add the 4 lamb shakes on top of carrots
- pour tomato can into instant pot.
- sprinkle garlic powder into Instant Pot.
- drizzle 2 tablespoons of olive oil.
- add enought white wine to cover about a third of the meat.
- add salt and pepper.
- cook in instant pot for 1 hour.
- slow release 10 minutes
-
@ a03b38f8:2c7ce1f0
2024-10-27 12:17:03(Member only content that has been unencrypted for use with
) Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in
especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks. Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
- Best to use a store out of town but not mandatory.
- Do not take any electronics with you, especially another phone.
- Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
- Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
- Use cash only to buy.
- Leave, do not shop or buy anything else.
Setting up Burner Phone:
- Go somewhere with free public WIFI (Starbucks, Library, whatever)
- Do not take any electronics with you, especially another phone.
- Open package and follow directions to activate using the public WIFI access.
- Choose a random area code during setup.
- Create a new random gmail account. (Do not reuse accounts or names)
- Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
- Change phone settings (see list)
- Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
- Destroy packaging that came with the phone.
Phone Settings: 1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic. 2. Turn off bluetooth and WIFI. 3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts. 4. Turn off all sounds and vibrations. 5. Turn off Find my Device. Setup screen lock with password. (No bio) 6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc 7. Set Use Location to off. 8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
- Never sign into any account associated with your real identity.
- Never use it to contact anyone associated with your real identity.
- Time and distance between burner phone and any other cell phone you own. i.e. A hour has passed and several miles from when you use and had on the other device.
- When not in use the battery is removed or in a Faraday Bag.
- Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
- Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
- Do not save anything (files, pictures, history) on the phone, especially if incriminating.
- Do not take it with you or use unless necessary.
- When in doubt, burn it and get another one.
- Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
- Factory reset the device.
- Remove and destroy the SIM card.
- Remove the battery because lithium batteries can explode. (may have to take it apart)
- Smash internals.
- Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
@ a03b38f8:2c7ce1f0
2024-10-27 12:11:24Update to k3tan's Starting a new digital identity Update to k3tan's Starting a new digital identity
Ktan wrote a nice article on digital identities (https://k3tan.com/starting-a-new-digital-identity) but sadly being from 2021 is out of date. This is my humble update and expansion on their ideas.
NEW Identity: Starting up a new digital identity. Notice the "new" part. For a history lesson most hackers, black and white hats, get caught from reusing nyms or user names. Maybe it is laziness or human ego wanting to show street cred but never never never reuse user names. Maybe you used a name just for fun with friends but much later used it again for mission critical operations. You are super careful and it is super clean now, not so much back then. It only takes one misstep in the past to connect that to another nym you have used or even your real identity.
I will repeat it again, never never never reuse user names. Every email account, social media, online forum, whatever use a different name and never reference another account either in posts or in registration. i.e. New email accounts in that new name or burner accounts. Use a online username generator or name generator to avoid personal bias to give any sort of hint to the new name. Don't let your love of pokemon characters be your downfall.
Devices: The author k3tan is correct, cash is king. Get cash and use cash to buy a laptop, a usb flash drive, and a lanyard. Use free Wifi access to download a linux distro and use the flash drive to install to the laptop. The original article suggests POP OS for some reason but in my opinion that can be a little resource intensive especially for a lower end laptop. The GOAT is Qubes but can be a bit intimidating for new users and again need a good amount of RAM so it is best for desktops. Honestly any linux distro is fine but some lightweight security inclined ones to look at are: Subgraph OS, Alpine, or PureOS.
Once that is installed to the laptop, use that to download Tails OS and install it on the flash drive you used to install your laptop OS. The laptop is going to be your daily driver for minor tasks and the tails flash drive is going to be your mission critical device when you need higher privacy and anonymity. Put the tails flash drive on the lanyard you bought. It will keep you from losing it and when it is plugged in and in use wrap the lanyard around your wrist. In a emergency just snatch it out of the computer. Your session will be wiped.
Phone: A phone is never going to be private. (see
Your phone is not your friend) There is only degrees of how terrible it can be. For personal use with the understanding that it will be linked to your identity, but with better privacy from corporate spying a pixel device running Graphene os is the answer. For mission critical communications that require a phone then refer to my burner phone guide . (I will publish a unencrypted version for this reference guide) Get Bitcoin and Monero: P2P through local meetup is fantastic if you have access to something like that. If you live in a smaller population center then that might not be a option. Use robosats to purchase bitcoin and Haveno-retro to purchase monero. Samurai is unfortunately gone and ashigaru is too new to recommend. Cake wallet with Tor is the go to for mobile and electrum and feather wallet on desktop.
Accounts: Use the monero or the non-KYC bitcoin to purchase Mullvad VPN. Setup a encrypted email account with either Proton or Posteo. Encrypt your files with veracrypt or picocrypt.
For more details and going further down the rabbit hole see:
Operation Security and Your Digital Life Nyms, Personas, and Digital Identity -
@ 57d1a264:69f1fee1
2024-10-27 10:54:50The new cashu.space website is live, proposing a new agnostic and clean design.
How you compare it with the old one?
originally posted at https://stacker.news/items/741872
-
@ a39d19ec:3d88f61e
2024-10-27 10:26:03October's daily driver is the ana-digi Casio ABX-53 Twincept with module 1326. It features are world time, stopwatch, alarm and a databank for contacts.
Design
I have the gold/silver colored variant with a metal band. The watch has an analog clock and a floating display with the features listed above. Best thing is the "slider" mode that switches digital functions permanently.
Storytime
My log tells me that i bought the watch 6 years ago on a local flea market for close to nothing. It was in a bad condition and needed a new battery and some love. Sure enough it works fine since then. Most badass feature is that the analog hands are moved electronically not mechanically. Fun fact is that even my wife likes the floating display. First time she saw it I heard her say "Das ist echt cool", meaning "thats really cool".
-
@ 45bda953:bc1e518e
2024-10-27 09:04:05Core Divide - Sol System - Gate 7
Tremors from warp turbulence rumbled a bit excessively to the Stripper's liking. Emilien was occupied in the lavatory, inspecting and pulling at his face, staring intently at it in the vanity mirror. Macy's establishment was a popular place and he had concerns about who he might run into, contemplating whether he should stick some silicone cosmetic pads onto his face, just enough to obfuscate his current identity. Maybe he shouldn't bother because he might die soon anyway. He has grown fond of his current persona and wouldn't mind retaining it a cycle longer at least. Being artificially immortal somehow did not take away the terror of confronting death. He recalled the various deaths he had experienced and could not decide what method of passing through he preferred, imagining the many shells of himself in different states of necrosis all over the greater void. He considered the possibility that he might not even be himself anymore. He felt like he knows himself well enough to be sure but that small fragment of doubt always gnawed at the back of his mind. He stood back from the mirror. "Am I him?" The ship shook again breaking his stare, he looked at the dental lever lying in the basin and committed to the more necessary procedure, placing the edges of his palms on his chin pushing abruptly up and back dislocated his lower jaw leaving it to hang loose on his face. Taking the root lever from the basin and leaning into the mirror he expertly wedged the tool in behind his rearmost left molar and twisted it slightly, dislodging it. Catching the small object with his left hand he pressed it into a recess on a black ring which he tightly twisted onto his right hands index finger. He narrowed his eyes at the skeletal horror on the other side of the frame inspecting the freshly opened hole. He opened the vanity and took a cartridge which was labelled "AdrenoChem" he removed the object within the container and wiggled it into the vacant molar cavity. Drool dripping into the sink in spite of his reflexive swallowing, he gripped his jaw tight and in gentle circular downward motions found the spot and clicked the joints back into relocation. Chattering his teeth together while stretching his neck he decided to procrastinate on the disguise idea. Emilien went back to the cockpit. Sitting down at the helm he pulled up notices and reports on the divide's situation with regards to the cease fire between the two warring factions. "Tch, tch, tch. This blockade is not making things easy." His eyes were scrolling over bullet points of news headlines when his ship dropped out of warp at the designated coordinates. He switched the display on the primary screen to clearview. The scene of a dead planet, cracked open like an enormous fruit with scattered asteroid clusters and rocky debris appeared onscreen. A giant still wreck of a superstructure resembling parts of an anchor and drift gate joined to each other like Siamese twins, sharp flashes emitting from it silently, like a muted storm in the far distance. He slowly tilted his head to it's limit. Nothing looked familiar to him. He took the console, rolled and yawed simultaneously until his point of view made sense. "There we are. You're not there till you know it." Macy's space motel pitched into view like a tiny reflective insect. On a secondary screen he zoomed the display to fit. It was attached to a large tubular docking link reaching away distantly and back to itself like Ourobouros. There were four spacecraft docked around it's circumference, less than he had expected. He only recognised the largest ship, Warren's vessel. It looked like a mess of odd protrusions, parabolic dishes and bent antennae. Very unsightly, especially compared to the Lux Void Yacht docked across from it. Tourists from everywhere frequented this remote region of the great divide for obvious reasons. Primary motivations were curiosity, pilgrimage, seclusion and scientific research in that order. Macy was smart to settle her establishment at this specific site. Emilien checked web connectivity to make sure he was still well outside the data scrambling anomaly. According to legend, after the Viper gate had been released from the Core and travelled the required distance to it's anchor coordinates, it was supposed to propel it's drift gate into the greater void, but something went wrong. It malfunctioned on it's attempt to release and veered off course being pulled into the orbit of the Sol system. No one knows exactly how it happened but it was clear to see that the energy released was spectacular. The root planet and most of humanity perished in a second, those who survived on the dark side of the collision died from starvation and gradual planetary destabilisation. Emilien morbidly recognised the historicity of the treacherous looking voidscape. Pulsing his ship softly forward caused a cut to core connectivity activating a repetitive red warning light which he promptly covered with one of the intact disposable cups that were rolling around his feet. There is no way to turn the annoying emitter off and he usually ignored it with closed eyes or looking away when void jumping. He is never vulnerable to core connection loss unless he comes to this region or when he is purposely trying to disappear. Researchers have concluded that the interference was broadcast from the gates enormous husk's residual power and intermittent energy discharge. He reverse pulsed back out of the disturbance, the dimmed light under the paper cup died. "Astrid?" "Yes?" He carefully uncoiled the cable and leaned forward connecting himself to the command interface and resting his head on his arms. "Save me." A quick upload took place. "You are welcome commander." Emilien did not respond. Just grateful that if something went askew he would at least wake up knowing that the last thing he saw was the monumental vestige of humanities ancient resting place. And all the ship types docked at Macy's. He smiled at the floor.
...
scifi
-
@ 57d1a264:69f1fee1
2024-10-27 08:40:06originally posted at https://stacker.news/items/741773
-
@ c11cf5f8:4928464d
2024-10-27 08:00:14Let's hear some of your latest Bitcoin purchases, feel free to include links to the shops or merchants you bought from too.
If you missed our last thread, here are some of the items stackers recently spent their sats on.
originally posted at https://stacker.news/items/741746
-
@ 41fa852b:af7b7706
2024-10-27 07:39:11"On Halloween night, October 31, 2008, while the world was grappling with a global financial crisis, a mysterious figure named Satoshi Nakamoto released a nine-page whitepaper that would change the course of history".
It's a Happy 16th Birthday to Bitcoin on Thursday.
From Edinburgh to Brighton, there are nine events this week, offering plenty of opportunities to celebrate with some fellow bitcoiners. The place to be, of course, is the White Paper Party at the Dockside Vaults in London on the 31st (details below).
The Whitepaper Party is part of the Bitcoin Culture Festival, a decentralised event happening in various locations around the country, that starts this week and runs until the 2nd of November.
If you've enjoyed the newsletter and find it valuable to you and the UK Bitcoin community, please consider donating some sats here.
Thanks for reading The Meetup Breakdown! Subscribe for free to receive new posts and support my work.
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Leamington Spa: Meetups on the last Tuesday of each month at 19:00. You'll find them this month at the White Horse, CV32 5PZ on the 29th. 🍻
-
Bitcoin Culture Festival - Meetup with Bitcoin Merchants at Tooting Market: Celebrate the opening day of the festival in a space where Bitcoin payments are not just accepted, but embraced! Enjoy a laid-back atmosphere with fresh food, drinks, and great company. This is your chance to connect with the community, spark new friendships, and hear insightful talks, all while supporting vendors who are leading the way in the Bitcoin economy. Whether you're here to showcase, learn, or just relax, the festival vibe is all about building community and celebrating what brings us together. 30th October 17:00 - 23:00. 🛍️🛒☕️
-
Brighton Bitcoin: Building a bitcoin community in the Brighton & Hove area. A regular informal meetup happens every last Wednesday of the month. This month, on the 30th at 19:30 in the Caxton Arms. 🍻
-
Manchester Bitcoin: On the 31st it's the Manchester meetup. Join them at The Smithfield Market Tavern, 19:00. 🍻
-
Bitcoin Culture Festival - Bitcoin Whitepaper ₿ Day + Halloween Party
🕕 18:00 - 19:00, 31st October. Kick off the night with hands-on workshops on crowdfunding and fundraising using Bitcoin, featuring Geyser.fund and Angor.io. Plus, don't miss the ChockRock Chocolate Making workshop with Roger 9000 and dive into the ultimate gaming experience with Chain Duel.
🕢 7:30PM - Midnight, Get ready for a Halloween party like no other! A live performance by Roger 9000, followed by an electrifying lineup of DJs including Denay Samosa, Zazawowow, itsTOMEK, and MadMunky. Costumes, beats, and Bitcoin--what more could you ask for? 🎃🥳🪩
-
Northern Bitcoin Collective: The Stoke meetup is back! They'll be at Mellards Bar, ST5 1AA on Friday 1st November at 19:00. Head along for some cheap beer and top Bitcoin banter. 🍻
-
Bitcoin Culture Festival - NostrLDN: From 10:00 to 17:00 on Friday 1st of November where Nostr maximalists will showcase the tools of freedom. Expect insightful talks, cutting-edge projects, and interactive discussions centered on open-source innovation, privacy, and activism. Explore how Value4Value models are being built on NOSTR, and discover the intersection of technical creativity and social change. It's a unique chance to connect with like-minded individuals shaping the future of decentralised tech! 👨🏻💻📱
-
Bitcoin Culture Festival - The Culture of Code at Cyphermunk House:
🗓️ Runs from 29th October to 2nd of November with a panel discussion on the 2nd (details below).
🕙 10:00 - 17:00 - 2nd November, Kick off the day with an Art & Culture Panel, featuring discussions that dive deep into the intersection of creative expression and technology.
🕔 17:00 - 22:00 - 2nd November Explore the Culture of Code Art Gallery, followed by more engaging panels, live discussions, music, and literature. The evening wraps up with a Cocktail Party and the closing of the Art Exhibition--an opportunity to celebrate the creative community in a laid-back, interactive setting. 🖼️ 🎙️
- Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12:00 to chat about all things Bitcoin and keep fit. 🚶🏻♀️🚶🚶♂️
New businesses Accepting Bitcoin
This week we have…
Bristol Art Club Market: An 'Indiepartment' store and event space with a cafe, barbers, clothes and plant store. Now enthusiastically accepting bitcoin payments.
Upcoming Special Events
This event isn't happening next week, but it's important to add to your calendar now as tickets are selling fast.
- BWest 2024 - Grassroots Finance Unconference: An exciting new mini-conference in Bristol on Saturday, November 16th. A day of discussions and workshops centred around Bitcoin and the freedom movement. Featuring a lineup of speakers, including Carlos Massiah on using open-source Bitcoin tools, Nathan Day exploring BTCmap.org communities, and Ben Arc on the Maker Renaissance through free Nostr webstores. Other thought-provoking talks include Daniel Prince on the ethics of money creation, Susie Violet Ward's "BBC vs. Bitcoin," and more. Enjoy market stalls, a DJ set, food and drink, and an afterparty to close the day. The day kicks off at 10 AM till 5 PM at Hamilton House, Stokes Croft, Bristol. Early bird tickets are just £20.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ 832b6aa8:2e4f082a
2024-10-28 18:38:54Chef's notes
This Herb-Braised Beef Cheek recipe delivers tender, melt-in-your-mouth beef simmered slowly in a rich herb broth—without any wine! Sear the beef cheeks for a caramelized crust, then braise them with onions, garlic, carrots, and fresh herbs until perfectly tender. The dish is finished with a touch of lemon zest for brightness and pairs beautifully with creamy mashed potatoes or polenta, making it an ideal meal for cozy nights or special occasions. Perfect for anyone looking to enjoy a deeply flavorful, wine-free braised beef dish.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 4 hrs
- 🍽️ Servings: 3-4
Ingredients
- 2 lbs beef cheeks, trimmed of excess fat
- Salt and pepper, to taste
- 2 tbsp olive oil
- 1 large onion, chopped
- 3 cloves garlic, minced
- 2 carrots, chopped
- 2 celery stalks, chopped
- 1 tsp tomato paste
- 4 cups beef broth (or chicken broth for a lighter flavor)
- 1 cup water
- 1 tbsp Worcestershire sauce
- 2 bay leaves
- 2 sprigs fresh rosemary
- 4 sprigs fresh thyme
- 1 tsp smoked paprika (optional)
- 1 tsp ground cumin
- Zest of 1 lemon (optional, for a fresh finish)
Directions
- Pat the beef cheeks dry with a paper towel, then season generously with salt and pepper. Sear the Beef Cheeks: In a heavy-bottomed pot or Dutch oven, heat the olive oil over medium-high heat. Sear the beef cheeks for 4–5 minutes on each side, until browned. Remove and set aside. Cook the Vegetables: Add the chopped onion, garlic, carrots, and celery to the pot. Sauté for about 5–7 minutes until softened and slightly caramelized. Add Tomato Paste: Stir in the tomato paste and cook for an additional 1 minute. Deglaze and Add Broth: Pour in 1 cup of water, scraping any browned bits from the bottom of the pot. Add the beef broth, Worcestershire sauce, bay leaves, rosemary, thyme, paprika, and cumin. Stir well. Add the Beef Cheeks Back In: Return the beef cheeks to the pot, ensuring they’re mostly submerged in the liquid. Simmer: Cover the pot and reduce the heat to low. Let the beef cheeks braise for 3–4 hours until they’re tender and easy to pull apart with a fork. Finishing Touch: Before serving, sprinkle with lemon zest for brightness. Taste and adjust seasoning with additional salt and pepper if needed. Serve: Serve over mashed potatoes, polenta, or creamy risotto, with the braising liquid as a sauce.
-
@ b7ccd493:6ba2260f
2024-10-27 04:42:55比特币被誉为“电子黄金”,在数字世界中的稀缺性与传统黄金在现实世界的价值存储属性有着相似的地位和作用。如今,越来越多的投资者相信,比特币终有一天能达到百万美元一枚的高度,而“1 Satoshi时代”也将随之而来,就像历史上黄金在价值储存方面被广泛认可的演变过程一样。
- 稀缺性:比特币的“电子金本位” 比特币总量仅有2100万枚,永不增发,其通缩属性就如同黄金的天然稀缺性。正如黄金矿藏总量有限且日益减少,比特币通过“挖矿”逐渐产生,供应上限的存在赋予了其独特的价值存储属性。在通货膨胀日益严重的今天,固定供应量让比特币成了避险投资者眼中的“电子金本位”。
- 全球需求:数字黄金的普及 黄金的全球需求在于它的价值稳定、抗通胀能力强。类似地,越来越多国家、金融机构和投资者选择比特币作为“数字黄金”,用于对抗法币贬值,尤其在通胀严重的国家更是如此。比特币的普及有望像黄金那样,被全球范围内的人们接受并信赖,成为主流财富储存方式。
- 机构投资认可:数字黄金的地位巩固 随着大型机构的认可与投入,比特币正如黄金一般获得了市场主流的青睐。多家知名金融机构和上市公司将比特币纳入资产配置,类似于过去全球金融体系中黄金作为储备资产的定位。机构的介入不仅增加了比特币的流动性,还进一步巩固了其“电子黄金”的价值,这一过程与黄金在金融体系中的确立极为相似。
- 技术创新:数字黄金的支付演变 闪电网络等扩展性技术,使得比特币不仅能作为储值手段,还能够用于日常支付应用,降低了交易成本,提升了交易速度。这些技术的推进为比特币注入了更多功能,使它更具备黄金所没有的支付实用性。未来,比特币或能像黄金一样,在支付和价值存储中发挥多重作用。
- 抗通胀价值:电子黄金的稳定 黄金的价值在于它在动荡市场中的保值能力,比特币亦然。在全球经济波动中,法币的贬值风险不断增加,而比特币凭借固定的供应量和去中心化的特性,成为对抗通胀的首选“电子黄金”。投资者购买比特币,正如他们储备黄金一样,期待其在不确定的金融环境中保值增值。
- “1 Satoshi时代”:电子黄金的微支付普及 如果比特币达到百万美元一枚,1 Satoshi将约等于1美分,若再进一步,1 Satoshi达到1美元,这意味着“电子黄金”的微支付时代已然到来。比特币在现实中的广泛应用将推动“1 Satoshi”成为微支付单位,这一前景如同黄金成为国际金融储备后不断衍生的价值一样,为比特币注入了全球流通的潜力。
- 全球货币系统的演变:电子黄金的地位提升 黄金在全球经济动荡时历经数个世纪稳居价值储存地位,而比特币作为“电子黄金”,未来有望成为全球财富共识。在一个金融系统变革的时代,比特币的去中心化和共识机制满足了公众对可信赖的财富储存工具的需求。如果比特币被更广泛认可,并在全球货币体系中占据一席之地,那么其百万美元的价格甚至“1 Satoshi时代”的到来也不足为奇。 结论 比特币作为“电子黄金”,拥有黄金的价值储存属性,同时具备数字货币的便捷支付功能。百万美元的价格目标并非遥不可及,而“1 Satoshi”时代的到来,将标志着比特币成为全球金融系统中的“电子黄金”标杆,就像黄金在实体世界的稀有与恒久价值一样,比特币将在数字时代延续这一财富的传奇。
-
@ b7ccd493:6ba2260f
2024-10-27 04:26:56比特币和闪电网络有潜力在未来的金融生态中占据重要地位,但是否会主导全球金融方向,尚存在多个不确定因素。不过,它们的独特优势和迅速发展的技术能力,使其在许多领域都具备变革性的潜力:
- 去中心化的全球支付系统 比特币的有限供应和去中心化让其作为价值存储工具得到越来越多投资者的认可。许多人认为比特币的“数字黄金”特性使其成为对抗通货膨胀和经济动荡的理想资产。 闪电网络的扩展性解决了比特币在小额支付中的交易速度和成本问题。通过闪电网络,比特币可以实现几乎即时的交易,且交易费用较低。这让比特币在支付领域成为一种高效的替代方案,特别是在跨境支付和微支付场景中。
- 去信任、透明的金融体系 比特币和闪电网络的去中心化本质意味着用户无需依赖传统金融机构或中介方就可以完成交易。无须依赖银行等中介,用户在全球范围内可以享受更高的交易自由度和隐私保护。 不可篡改的账本增强了金融交易的透明度,解决了传统金融体系中常见的腐败、数据篡改等问题。这种透明性可能会成为全球金融信任的新标准。
- 推动金融包容 闪电网络的高效低成本交易使得比特币支付可以用于全球无银行账户的地区。对生活在金融基础设施欠发达地区的人们来说,比特币和闪电网络提供了一个不需要银行的经济参与渠道。 此外,随着比特币应用的普及,微支付和零工经济等新兴金融模式也会获得更大发展,帮助更多人获得收入和提升生活质量。
- 跨境支付和全球化金融交易 比特币在跨境支付中具有巨大的优势,尤其是在汇款市场。它可以让用户以更低成本和更快速度完成跨境转账,而闪电网络进一步提升了这种能力,几乎可以实现即时到账。 对于跨国企业和个人来说,比特币网络可以大大降低汇款和跨境交易的中介成本,为全球金融市场的流通性带来积极影响。
- 对抗法币不稳定性的避险工具 作为一种去中心化资产,比特币不依赖任何国家的货币政策,在许多经历货币危机的国家,比特币已经成为了避险资产。未来比特币可能会被更多高通胀国家的公民采用,以抵御法币贬值和经济波动。
- 技术挑战和法规的考验 闪电网络还面临一些技术和用户体验上的改进需求,且比特币的高波动性限制了它在日常消费中的使用。另外,全球各国的加密货币政策也尚未统一,对其影响存在不确定性。 如果比特币和闪电网络能够适应各国的监管要求,同时用户体验进一步提升,它们的应用将更加广泛,推动全球金融体系向去中心化转型。 总结 比特币和闪电网络可能不会完全取代传统金融系统,但它们有望在特定场景和市场中发挥重要作用。尤其是在对全球支付效率、金融包容性和抗通胀需求日益增长的背景下,比特币和闪电网络在金融生态中的地位将越来越重要。这些技术的不断进步和普及可能使它们成为未来全球金融基础设施的一部分,并对现有金融系统产生深远的影响。
-
@ b7ccd493:6ba2260f
2024-10-27 04:23:30比特币的未来充满了可能性,受到技术、金融市场、法规和全球经济动态的多重影响。以下是对比特币未来发展的几大潜在方向:
- 数字黄金与储备资产 避险资产的地位增强:比特币因其去中心化、不可篡改、供应有限的特性被称为“数字黄金”,已逐步被全球投资者和机构视为一种对抗通胀的价值储存手段。随着经济不确定性加剧,各国央行可能将比特币纳入储备资产组合中,甚至在某些国家成为主流的价值储备方式。 机构投资者的持续增长:大型企业、对冲基金和机构投资者的持仓持续增加,比如灰度基金和MicroStrategy等在近年已大量持仓,显示出比特币作为储备资产的吸引力。
- 法定货币化 更多国家将采用:继萨尔瓦多之后,其他面临经济困境的国家可能跟进,将比特币作为法定货币或储备资产,以利用其便捷的跨境交易和抵御本国货币贬值的功能。 发展中国家的金融包容性:在通货膨胀高企和银行系统不完善的地区,比特币提供了一种更方便、可访问的金融服务,帮助更多人进入全球经济体系。这也将极大地推动比特币的普及。
- 技术创新与扩展协议 闪电网络和扩容方案:比特币在原生设计上处理交易速度有限,闪电网络(Lightning Network)提供了较高的扩展性和低成本支付方案,使比特币适用于小额交易、支付和更广泛的零售用途。 智能合约和DeFi的集成:比特币网络通过技术升级(如Taproot)逐步增强智能合约功能,为比特币在去中心化金融(DeFi)中的应用铺平道路。未来可能会出现更多基于比特币的金融应用,比如去中心化借贷和跨链资产转移。
- 监管与合规发展 全球法规的日趋成熟:越来越多的国家和地区正在制定明确的加密货币法规,确保其在金融体系中的合法地位。这将推动比特币在全球范围的合法应用并带动其进一步的主流化。 央行数字货币(CBDC)和比特币的共存:各国央行在研发央行数字货币的同时,也可能制定针对比特币的配套政策。两者的功能虽然不同,但比特币可能作为“去中心化货币”的典范而继续存在,与央行数字货币共存。
- 去中心化金融(DeFi)生态的支柱 比特币的“DeFi化”:比特币通过跨链桥和闪电网络等技术与以太坊等公链互通,使其能够作为DeFi协议中的资产。未来,比特币可能成为DeFi生态的主流储备资产,为去中心化金融提供更广泛的资金流通支持。 比特币的分散式支付网络:随着商家和用户的接受度增加,比特币将成为更为常见的支付方式,从而推动一个全球化的无边界支付网络的发展。
- 全球经济和社会层面的影响 推动金融普惠:在没有稳定货币和银行系统的地区,比特币提供了可替代的金融渠道。它不仅推动了金融包容性,也帮助全球用户直接参与到数字经济中,可能改变金融基础设施不健全地区的经济面貌。 价值观的转变:比特币代表了对中心化金融系统的挑战。它的去中心化、透明性等特性将引领更多人追求自主和去信任的金融模式,为全球财富管理和经济平等带来积极影响。
- 主流支付和应用生态 更多商家接受比特币:随着支付处理技术的进步,越来越多的商家、平台和应用将接受比特币支付,如支付巨头PayPal、Visa等已在部分市场支持比特币。 NFT和Web3应用:未来比特币可能被集成到更多的Web3应用和NFT生态中,扩展其在数字资产和内容创作方面的应用潜力。
- 比特币作为生活中的价值标尺 微支付和零工经济:比特币的细分单位“satoshi”适用于微支付,这让比特币在内容付费、游戏经济和零工市场中具备了实用性,也逐渐成为价值计算的新标尺。 金融教育和普及:比特币引发了对经济、货币和金融体系的广泛讨论,促进了公众对金融知识的兴趣,尤其是在年轻人和未来的投资者中。 比特币未来的发展将继续受全球经济动态、技术进步和社会认知的驱动,作为一项“去中心化”的金融创新,它的潜力仍未完全释放。比特币的影响力不仅限于投资,而是可能深刻影响全球金融架构和个人财富管理的未来。
-
@ 361d3e1e:50bc10a8
2024-10-28 16:45:55https://forex-strategy.com/2024/10/28/in-bulgaria-the-parties-bought-voters-for-eur-500-per-vote/ In Bulgaria, the parties bought voters for EUR 500 per vote
vote #election #politics #bulgaria
-
@ b7ccd493:6ba2260f
2024-10-27 04:20:51比特币的历史是一个充满创新、争议和金融革命的过程,始于2008年:
- 诞生背景(2008年) 白皮书发布:2008年10月31日,一个化名为中本聪(Satoshi Nakamoto)的人或团队发布了论文《比特币:一种点对点的电子现金系统》,提出了一种无需中心化机构即可完成电子支付的系统。 经济危机:比特币的发布正值全球金融危机,传统金融系统的信任受到冲击,比特币的去中心化和有限供应特点因而备受关注。
- 创世区块(2009年) 区块链启动:2009年1月3日,中本聪挖出了比特币的第一个区块,即“创世区块”(Genesis Block),并在其中留下了一条信息:“The Times 03/Jan/2009 Chancellor on brink of second bailout for banks”,这句话也被视为比特币诞生的“宣言”。 早期发展:创世区块奖励了50枚比特币,2009年5月,首个比特币软件发布,早期参与者可以使用普通电脑挖矿,获得比特币奖励。
- 比特币首次交易(2010年) 首笔购买:2010年5月22日,程序员Laszlo Hanyecz用1万枚比特币购买了两块披萨,这是比特币的第一次实际商品交易。这一天被纪念为“比特币披萨日”。 价格波动:2010年比特币逐渐开始在网络上交易,价格约为1美分左右,之后在用户需求的带动下逐渐上升。
- 比特币市场与平台(2011年-2013年) 交易所崛起:2011年,第一个比特币交易所Mt.Gox成立,用户可以通过该平台进行比特币买卖,随后,其他交易平台和钱包应用逐渐兴起。 价格飞涨:2013年比特币价格首次达到1000美元,引发了全球对比特币的极大关注,同时也伴随着极大的价格波动。 技术扩展:随着比特币网络的扩大和用户的增加,比特币区块链的可扩展性和交易处理速度成为关注点。
- 争议与监管(2014年-2016年) Mt.Gox倒闭:2014年,Mt.Gox因遭受黑客攻击导致85万枚比特币被盗(价值约4.5亿美元),最终宣告破产。此次事件促使全球加强对加密货币的监管。 法规探索:各国开始针对比特币出台政策,其中有些国家选择接受(如日本),有些国家选择限制或禁止(如中国早期限制),从而引发争议。 闪电网络诞生:为解决交易速度和高昂费用的问题,闪电网络作为比特币的二层解决方案诞生,使小额快速支付成为可能。
- 扩容争议与分叉(2017年) 比特币现金(BCH)分叉:2017年比特币社区围绕交易处理速度和区块大小发生争议。8月1日,比特币链上出现了比特币现金(BCH)的分叉,比特币现金支持较大的区块以提高交易速度。 牛市与机构进入:2017年比特币价格飙升至2万美元,吸引了全球机构投资者的关注,加密货币市场也达到了空前的高点。
- 机构参与和成熟期(2018年-2020年) 波动与回调:2018年比特币价格回落,进入“加密冬天”,市场波动剧烈。然而,这一时期机构投资者如灰度基金(Grayscale)、MicroStrategy等对比特币表现出浓厚兴趣。 疫情推动关注:2020年,新冠疫情引发的经济危机使得各国推出大规模货币宽松政策,比特币作为“数字黄金”的避险资产地位逐渐巩固。
- 比特币作为储备资产与主流接受(2021年) 新高与机构持仓:2021年4月,比特币价格突破6万美元,成为越来越多机构投资组合的一部分。Tesla、Square等知名公司宣布持有比特币,助推其作为储备资产。 萨尔瓦多法定货币:2021年9月,萨尔瓦多成为首个将比特币作为法定货币的国家,支持其在本国进行交易支付和纳税。
- 比特币的未来与新发展(2024年至今) 数字主权和Web3概念:比特币被认为是Web3的基石之一,去中心化的价值存储形式成为数字主权和个人财富掌控的象征。 扩展协议和创新:比特币的底层技术持续发展,比如Taproot升级提升了隐私性和智能合约功能,同时“比特币符文”(Bitcoin Rune)等协议进一步推动比特币的可编程性,可能成为未来DApps发展的基础。 宏观影响与持续采用:各国对比特币的监管政策逐渐成熟,多个新兴经济体考虑接受比特币作为储备资产,全球用户对比特币的需求在扩展,且其“数字黄金”的地位日益稳固。 比特币从诞生到今天,已走过了15年,逐步形成了一个独特的生态系统,它的影响力也从极客圈扩展到了全球金融市场。未来,随着技术的发展和应用的创新,比特币可能在数字金融和Web3时代扮演更为重要的角色。
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 623ed218:fa549249
2024-10-26 18:59:23Peritas: A Vision for Accessible Multi-sig
Introducing: Peritas
Let me preface this with the following disclaimer:\ I am not a dev, I can't code and I've never written a white paper...
With that out of the way, let's talk multi-sig.\ By day, I'm a maintenance tech. That is to say, I earn fiat by unclogging toilets, fixing broken dishwashers and refrigerators, and troubleshooting boiler systems and air conditioning units. I was scrolling through my nostr feed today having just fixed a leaking toilet and on my way to look at a stuck zone valve on a boiler line when I came across a note from Guy Swann:
So, I thought about it... kept thinking about it... and kept thinking about it until I felt compelled to reply. A few back-and-forths later, and I found myself responding to Guy with:
"A non-dev", yes, that's how I identify. And in that moment I realized the flaw in how I look at the world.
Nothing in life brings me greater joy than finding a creative solution to a problem, yet, perhaps as a coping mechanism, I tend to avoid considering solutions to problems I deem outside my skill-sets.tside my skill-sets. All my life I have limited myself to the scope of my own ability, neglecting to consider that I can play a part in solving more complex problems by leveraging the abilities and talent of those around me who see the same problems in the world that I do.
I'm resolving to change this. The release of the Peritas White Paper represents my first step towards this.
As I stated in the beginning: "I am not dev, I can't code.". But after nearly four years of obsessive involvement in the Bitcoin space, I have a vision of the solutions I want to see made available. I will do what I can to bring these visions into reality.
This is a work in progress. The scope and details of this project will necessary evolve as needed to adapt to reality and community/user input.
With that said, I present Peritas for your review.
Peritas: An Accessible Multi-Signature Wallet Proposal for Enhanced Self-Custody (Updated 867475)
Abstract
Peritas aims to provide or inspire simple, open-source, multi-platform applications designed to simplify the setup and management of multi-signature (multi-sig) wallets. It specifically targets new Bitcoin users, enhancing the security of their holdings without requiring additional hardware. By creating an accessible, intuitive interface and aligning with Web of Trust (WOT) principles, Peritas hopes to address a significant gap in the Bitcoin ecosystem, promoting higher security with minimal user friction.
1. Introduction
Bitcoin wallets typically take one of two forms: single-signature (single-sig) and multi-signature (multi-sig). Single-sig wallets are the default, and they are most commonly used by those new to self-custody as they are simple to set up and manage. However, single-sig wallets present a security risk as only one key is needed to access and move funds, leaving them vulnerable to theft or compromise.
Multi-sig wallets require multiple keys to authorize transactions, significantly enhancing security by distributing custody across multiple signatories. Multi-sig should be the standard for all Bitcoin self-custody setups, particularly for key recovery and backup processes, as an improvement over traditional paper seed backups.
This white paper introduces Peritas: an open-source, multi-platform application proposal that simplifies multi-sig wallet creation and operation, making enhanced security accessible to all Bitcoin users without the need for dedicated hardware.
2. System Overview
2.1 Wallet Creation Process
Peritas provides users with a simple, guided process for creating a secure multi-sig wallet:
-
Initial Keypair Generation: Upon initial app startup, Peritas automatically generates a base Bitcoin keypair (Base Key) for the user. This Base Key will be foundational for creating recovery and multi-sig configurations.
-
Vault Founders (Founders) begin by opting to create a new "vault" (multi-signature wallet). The default configuration is a 2/3 multi-sig setup, although Founders can access advanced settings to adjust the number of signatories and the threshold required for authorizing transactions.
-
The application will derive a new private key (Vault Key) from the Base Key for use in the new multi-sig vault. Vault Keys may be derived from the Base Key using BIP-85 child seeds, alternate accounts or derivation paths, or the use of passphrases (exact method TBD). All data required for regeneration of Vault Keys is securely stored in encrypted app data.
-
It is important to tailor multi-sig setups to the Founder's situation, skill level, and the size of their holdings. For smaller amounts (e.g., 100,000 sats), a 2/3 service-based multi-sig involving keys held on the Founder's phone, a spouse's or trusted contact's device, a participating exchange where the Founder purchases Bitcoin, or a vetted third-party key holder may be appropriate, providing a balance of convenience and security. For larger holdings, Founders may opt for a more secure configuration with a higher number of signatories and a higher threshold for transaction authorization to enhance fault-tolerance and mitigate risks.
2.2 Integration with Trusted Contacts (Keyholders)
-
Founders are prompted to select a Keyholder, a trusted contact who will generate a Social Recovery Key.
-
Following initial app startup, Keyholders will select an option to "Become a Keyholder". This selection prompts Peritas to generate a Social Recovery Key using a process identical to the creation of Vault Keys (outlined in 2.1).
-
The public key from this newly generated Social Recovery Key, (created through a simple option on the app's welcome page), is shared back to the Vault Founder for use in the configuration of their multi-sig vault.
-
An "affiliate + key assistance" system could also be used, where a Social Recovery Key could be managed by the person who onboarded the user (e.g., a mentor), who, assuming a trusted relationship between parties, could assist the Founder through the vault creation and management process as needed.
2.3 Third-Party Collaborative Custody
-
Third-Party Integration and Support: Peritas envisions integration of its vault creation process with vetted exchanges or respected Bitcoin support and mentorship services. These Third-Party Keyholders can offer higher levels of technical support and guidance to Founders, though such support may come at the expense of privacy.
-
Flexibility: Peritas provides a flexible setup for multi-sig vaults. Founders may choose to forgo this institutional third-party key involvement entirely, opting instead to include additional trusted contact Keyholders, as referenced in 2.2, for a more private configuration.
2.4 Vault Creation and Management
-
With the Founder's, Keyholder's, and any Third-Party Keyholder's public keys in place, Peritas creates a multi-signature vault and shares descriptor files securely with all participating parties.
-
The app houses configuration files for each multi-sig vault and enforces security by rejecting any attempt to add additional keys from the same vault, ensuring that a quorum of keys cannot be consolidated on a single device.
2.5 Encrypted Cloud Backup
- To enhance redundancy, Peritas offers users the option to encrypt and store their keys and vault configuration files with their preferred cloud service (e.g., iCloud, Google Drive). This approach leverages familiar systems providing a seamless way for users to store recovery keys, minimizing the risk of loss of key material in the event of device loss or app data deletion.
3. Technical Implementation
3.1 Security Architecture
-
Encryption: All communication between the app, users, trusted contacts, and exchanges is encrypted using AES-256 and other state-of-the-art encryption protocols to ensure privacy and prevent interception or tampering.
-
Cross-Platform Support: Peritas is designed to function across multiple platforms (iOS, Android, Windows, Linux) to ensure broad accessibility.
-
Data Transmission: Secure communication protocols such as Fedi, Matrix, Nostr Gift-Wrapped Messages, or Pears integration may be used to transmit public keys, descriptor files, and signatures, safeguarding user information.
3.2 User Experience Design
-
Onboarding and Education: A setup wizard guides users through vault creation, using simple language and visual aids to explain multi-sig benefits, vault concepts, and the roles of different types of Keyholders.
-
Pathfinder Mode: Users can access an advanced "Pathfinder Mode" to configure vaults with a higher number of signatories than the default 2-of-3 vault, unlocking options for custom thresholds, personalized wallet configurations, and unique security protocols. Future expansions under Pathfinder Mode may include enhanced signing automation, integration with additional security services, and greater control over key storage and recovery preferences, enabling users to tailor their vault setup to their evolving security needs.
3.3 Node Connectivity
To maintain decentralization and minimize the risk associated with a single point of failure, Peritas will not rely on a central node for its operations. Instead, offering multiple options for users:
-
Custom Node Connections: Users can connect Peritas to their own Bitcoin nodes, providing maximum control and security. This approach aligns with the Bitcoin ethos of self-sovereignty and reduces reliance on third-party infrastructure.
-
Public Node Selection: For users without their own nodes, the application will provide a selection of vetted, community-operated public nodes to connect with. This offers convenience while distributing trust across multiple independent entities, minimizing the risk of centralization.
-
Tor Integration: To enhance privacy, Peritas will support Tor integration, enabling users to connect to nodes anonymously and reducing the risk of tracking and monitoring.
-
Automatic Node Load Balancing: The app may implement a feature that automatically rotates between multiple trusted public nodes, ensuring that no single node becomes a point of dependency.
-
You can view additional connectivity ideas we're thinking through in our file Decentralized Checkpointing.md.
4. Security and Privacy Considerations
Peritas prioritizes security and privacy:
-
Multi-Factor Authentication (MFA): To protect app access, users may set up MFA as an additional security layer.
-
Local and Cloud Encryption Standards: The app uses AES-256 for local storage of keys and end-to-end encryption for cloud backups and transmission of public keys and descriptors.
-
Key Recovery and Redundancy: Cloud services are employed for encrypted backups, providing redundancy while ensuring that users retain control over their key material.
5. Integration and Collaboration Opportunities
5.1 Wallet Providers
- Peritas could partner with existing and up-coming open-source wallet providers, to integrate its vault functionality proposals and expand their security offerings.
5.2 Exchange Collaboration
- By collaborating with exchanges, Peritas can provide seamless integration for obtaining Exchange Public Keys, building trust and simplifying the user experience for those securing their funds.
6. Future Development and Monetization
6.1 Feature Expansion
-
Hardware Wallet Integration: Future updates will include compatibility with hardware wallets, providing additional security options for advanced users who wish to incorporate dedicated signing devices into their multi-sig setup.
-
Automatic Backup Options: Users will have more automated and secure options for backing up their encrypted keys, including automated cloud backups and integration with secure storage solutions.
-
Transaction Monitoring: The app will incorporate transaction monitoring services, enabling users to receive alerts and detailed information about incoming and outgoing transactions.
-
Guided Key Rotation/Replacement: To maintain long-term security and minimize risks from potential key compromises, Peritas will offer a guided process for rotating or replacing keys within a multi-sig setup. The feature will provide users with step-by-step instructions on how to update their vault's keys, ensuring a secure and seamless transition without risking access to funds.
-
Timelocks: Pathfinder Mode allows users to set custom timelocks for certain transactions, offering additional control over when funds can be moved, which is particularly useful in setting up delayed recovery mechanisms or ensuring funds are secure for specific timeframes.
-
Miniscript Support: Integrate Miniscript functionality for a more expressive and programmable approach to transaction conditions, empowering users to set complex logic for transaction approvals and build custom spending policies tailored to their needs.
-
Future-Proofing with CTV: In the event of future consensus around CheckTemplateVerify (CTV) (BIP-119), Pathfinder Mode will likely be updated to support CTV-specific outputs, offering options for conditional spending paths and more efficient use of UTXOs. This will enable enhanced, adaptable control over transaction flows, making Peritas wallets more resilient and versatile as Bitcoin development progresses.
6.2 Premium Services
- Potential premium services include advanced support for users configuring complex vaults. These services may be facilitated through strategic partnerships with community-vetted organizations such as Bitcoin Mentor or The Bitcoin Way, ensuring trusted and expert guidance for users.
7. Market Considerations and Demand
While specialized hardware signing devices will continue to cater to those with heightened security demands (i.e., "paranoid crypto anarchists"), Peritas fills a gap for new entrants to the space who may not yet be ready or willing to purchase dedicated hardware. Providing robust, easy-to-use software solutions ensures that the demand for secure self-custody is met for all levels of users.
8. Conclusion
Peritas is a critical step forward in improving Bitcoin self-custody security. By proposing an open-source framework for user-friendly vault creation and management applications, Peritas is working to empower users to protect their holdings without the need for additional hardware. Every self-custody setup should incorporate multi-sig, and Peritas provides an adoptable framework for secure solutions that meet this need, ensuring that new users will have access to robust security models that align with the ethos of Bitcoin's financial sovereignty. By paving a path to accessible and secure Bitcoin self-custody for the coming waves of new Bitcoin participants, Peritas aims to uphold and strengthen the principles of financial freedom and autonomy in the Bitcoin ecosystem.
9. Contributors and Acknowledgements
Peritas was developed with insights and support from many contributors in the Bitcoin community:
-
Guy Swann, founder of Bitcoin Audible, provided valuable perspectives on multi-signature setups and emphasized the importance of using multi-sig as the standard for Bitcoin self-custody and recovery processes.
-
We also acknowledge the efforts of the many builders and developers who have worked tirelessly to bring Bitcoin self-custody to its present stage, creating the tools and upholding the principles that Peritas hopes to further.
-
Additional input and feedback were provided by members of the Bitcoin community who share a commitment to enhancing security and accessibility for Bitcoin newcomers.
10. Additional Resources
See a breakdown of some of the terms used above in Glossary of Terms.md.
Thanks For Reading!
[For the most up-to-date version of the Peritas White Paper, please visit my Github Repository!]
Block 867476 - MSK 1490
Digging Deeper:
Hey there, I hope you enjoyed this read! If you did, and would like to read more of my barks, follow the links below!
-
Curious how I found Bitcoin? Read "Paw Prints to the Timechain"
-
Bitcoin meets psychology? I touch on this in "Maslow's Apex"
-
Want to understand the basics of Bitcoin? Read "Bitcoin Best Practice"
-
If you like seeing bad media takes unpacked, check out "Pup's Double-Takes"
External Resources:
- Want to earn rewards on your mortgage? Use my referral to earn 20,000 free sats at sign up!
- Do you like sharing Bitcoin content and earning sats for doing so? Join me at Stacker.news!
...Woof!
originally posted at https://stacker.news/items/741352
-
-
@ 4ba8e86d:89d32de4
2024-10-04 13:10:45M5Stick-NEMO: Firmware para Pegadinhas de Alta Tecnologia em Dispositivos M5Stack ESP32 , Este projeto oferece uma solução eficaz sem comprometer a qualidade, ideal para quem busca uma experiência educativa e divertida no universo do hacking.
https://nostrcheck.me/media/public/nostrcheck.me_2674216785970862911706546228.webp
Desenvolvido por Noah Axon-n0xa, o M5Stick-NEMO é um projeto pessoal que surgiu da vontade de aprender mais sobre o desenvolvimento do ESP32 com o Arduino IDE. Inspirado por desafios populares na comunidade de tecnologia, NEMO replica pegadinhas comuns, proporcionando uma experiência educativa e divertida.
Características Principais:
- Portal NEMO WiFi: um captive portal login que tenta criar credenciais de e-mail de engenharia social - salva nomes de usuário e senhas no cartão SD (se inserido em um leitor compatível)
- Porta TV B-Gone para desligar dispositivos controlados por infravermelho.
- Spam de emparelhamento de dispositivo AppleJuice iOS Bluetooth.
- Spam de notificação de dispositivo Bluetooth para SwiftPair (Windows) e Android.
- Spam de WiFi com SSIDs engraçados, WiFi Rickrolling e modo aleatório.
- Scanner SSID WiFi: exibe e clona SSIDs próximos.
- Relógio digital ajustável pelo usuário com suporte do M5 Stick RTC.
- Configurações apoiadas por EEPROM para rotação, brilho, escurecimento automático e SSID do Portal NEMO.
- Nível da bateria e créditos no menu de configurações.
Interface de Usuário:
- Três controles principais: Home, Próximo e Selecionar.
Portal NEMO:
No modo NEMO Portal, o NEMO ativa um Hotspot WiFi aberto chamado "Nemo Free WiFi" (configurável em portal.h) com servidores DNS, DHCP e Web ativados.
-
O Portal NEMO exibe uma página de login falsa que afirma fornecer acesso à Internet se você fizer login.
-
Este é um ataque de engenharia social e registrará o nome de usuário e as senhas inseridas na página.
-
Nos detalhes do Wifi Scan, você pode clonar um SSID existente na lista de verificação. Sair do Portal NEMO limpará o SSID Evil Twin
-
Você pode visualizar as credenciais capturadas conectando-se ao portal a partir do seu próprio dispositivo e navegando até http://172.0.0.1/creds
-
Você pode definir um SSID personalizado conectando-se ao portal a partir do seu próprio dispositivo e navegando até http://172.0.0.1/ssid
-
Se o seu dispositivo suportar EEPROM para configurações, o SSID personalizado inserido será salvo como padrão, mesmo se estiver desligado.
-
Se o seu dispositivo tiver um leitor de cartão SD com um cartão formatado em sistema de arquivos FAT inserido, os nomes de usuário e senhas serão registrados em nemo-portal-creds.txt no cartão SD para você ler mais tarde.
-
O suporte a cartão SD só está habilitado por padrão na plataforma M5Stack Cardputer. Ele pode ser habilitado em dispositivos M5Stick, mas um leitor de cartão SD deve ser construído e conectado ao pino do painel frontal.
-
O Portal NEMO deve ser usado apenas em compromissos profissionais com um escopo válido de trabalho, fins educacionais ou de demonstração.
O armazenamento, venda ou uso de informações pessoais sem consentimento é contra a lei.🤓
Instalação:
-
Visite o site oficial: M5Stack Docs https://docs.m5stack.com/en/download
-
Baixe o programa oficial M5Burner.
-
Procure pelo projeto "NEMO For M5Stick C Plus".
-
Conecte o M5 à porta USB do seu PC.
-
Abra o M5Burner, selecione o projeto e clique em "Burn".
Experimente algumas funções do FlipperZero no seu M5. Para recursos adicionais e a liberdade de personalização, compile e baixe diretamente o programa "NEMO-M5Stick C Plus" no GitHub do projeto. Isso não só permite explorar, mas também modificar e aprimorar o projeto de acordo com suas preferências.
Repositório oficial no GitHub
https://github.com/n0xa/m5stick-nemo
Assista a um tutorial sobre a implementação do M5Stick-NEMO.
https://youtu.be/uFzQTzZo-6E?si=BJJzNmiN0Jzw42Eu
https://youtu.be/uTeCbR_hWjc?si=l88w_Hl3EXuKa6gv
Além disso, você pode aprimorar seu M5 com o MURAUDER, um conjunto abrangente de ferramentas ofensivas e defensivas WiFi/Bluetooth para o ESP32.
Encontre-o no GitHub: ESP32Marauder
https://github.com/justcallmekoko/ESP32Marauder
Assista a um tutorial sobre a implementação do MURAUDER:
https://youtu.be/GQPzgYksdkg?si=dWN-GwEP5r6hk9IC
-
@ 76c3384a:9279a6e5
2024-10-26 18:04:04While teaching my eldest to read and write using, “Look mommy, I can read and write” my second born also asked me for “school” work. She was barely 4 years old, I designed this workbook, “Look mommy, I am growing up” with the intent to introduce her to the alphabet, numbers and shapes keeping it simple and fun.
The workbook contains wide variety of exercises. There are various exercises including similarities, differences, basic alphabet letters, numbers, and more.
-
-
As a homeschool mom, I believe "schooling" should always be fun especially at the foundation phase age. This helps build a love for learning and that it is something to look forward to. Because my daughter was eager to learn and excited to start I wanted to embrace this phase without breaking her enthusiasm.
This workbook served as a "keep busy" book allowing her to feel involved while her older sister was doing her exercises.
Using the skills I learned while digitizing the first workbook, I started out with Inkscape and Libre Office. Publishing first in Afrikaans and then in English.
Since 2024 my digital books are available for free (no strings attached) for anyone to use, they have also been updated and revamped to be Bitcoin-friendly. All I ask is that you refer to my website or Nostr account when sharing.
I hope you find this helpful. Enjoy, and follow me on Nostr @ SemcoMama. If you’d like to support my work zap me some sats.
About this foundation phase workbook:
An educational exercise book helping children identify differences, similarities and pattern recognition during the foundation phase. “Look mommy, I am growing up” is great for preschoolers.
Children can be creative using different coloured crayons or pencils.
Development of the following:
- Letter- and sound recognition
- Number recognition
- Colours and shapes
- Number 0-10
- Identify
- Colouring
- and more!
-
-
This book is ideal for parents who want to play an active role in this phase of their child’s development and education. It will also give satisfaction to the parent that wants to teach his/her own child the foundation of reading and writing by working together in the book.
(The character style and writing symbols may differ depending on the country you live in.)
DOWNLOAD PDF HERE!
First publication 2017 Second publication 2024 (free to use) Written, designed and cover by SemcoMama
semcomama.co.za / semcomama.npub.pro
© All rights reserved. Feel free to share with all mommies out there and you can also follow me on Nostr @semcomama. If you appreciate my work and found value in it zap me some sats. (through my website or my Nostr. account).
-
education
-
@ e83b66a8:b0526c2b
2024-09-26 19:29:43If you’re thinking of buying a Bitaxe, here is some information about pools vs solo mining.
Firstly, although the terms are clear “pool mining”, “solo mining” there is nuance in these definitions, so I want to explain these terms fully.
Solo mining pools exist, such as: https://solo.ckpool.org/
It is called a pool, because you are using their credentials to mine, but you keep all the rewards if you win a block. Despite the name, this is not a pool.
You then have a pool such as https://ocean.xyz/ who are a pool, you use their credentials to mine, and you earn a share of their income relative to your contribution in hash power.
There has been some publicity about a solo miner winning a pool recently, there were about 12 blocks won in 2023 by solo miners. However a winning solo miner is likely to be a server farm with hundreds or even thousands of S19’s or S21’s sharing the same payout wallet address. The image of a home miner with a Bitaxe winning a block is extremely unlikely.
A solo miner is defined as a group of miners that share a payout wallet address, so for example you could have 10 Bitaxe’s at home all configured with the same BTC wallet address, this is considered a single solo miner. And so it is with mid tier mining farms, often privately owned, who have a number of machines set to the same payout address. Most of the time, they share earnings for a more reliable income, but the owner may decide to gamble on winning a block and so choose to solo (lottery) mine.
So far, my Bitaxe, which has been running for 4 days now and is part of the Ocean pool. It is earning about 50 Sats a day. If I were to wait for an on-chain payout, it would take around 60 years to receive one. I can, however, setup a BOLT12 lightning payout address and earn this tiny income through Lightning.
So here’s my recommendation.
Currently, there are two pools that control more than 50% of mining, Foundry USA and AntPool. This is a dangerous position and in fact Bitmain, who provide around 90% of all mining hardware actually invest and have stakes in these and several other pools. This is centralising mining and could potentially allow a 51% attack, which could compromise Bitcoin.
Jack Dorsey is currently developing competing mining hardware chipset, through his company Block and Ocean are attempting to decentralise the pools by building a truly independent option for miners to join.
If you buy a Bitaxe, the best way you can help alleviate the dominance of Bitmain is to join a true pool like Ocean to slowly move control away from the dominant pools.
Bear in mind that many of the other smaller pools are still controlled by Bitmain.
If you're still interested in lottery mining, here are your chances of winning a block:
Represented as Hash rates of different miners:
Nerdminer: 20 KH/s = 20,000 H/s
Bitaxe: 750 GH/s = 750,000,000,000 H/s
Bitmain Antminer S9: 13.5 TH/s = 13,500,000,000,000 H/s
Bitmain Antminer S19: 110TH/s = 110,000,000,000,000 H/s
Bitmain Antminer S21: 200TH/s = 200,000,000,000,000 H/s
Current Global Hash rate 628EH/s (Sept 2024) = 628,000,000,000,000,000,000
If you're running a Bitaxe, your percentage chance of winning a block is: 0.000000119426751592357%
Over a year, your chances increase to: 0.00627707006369428%
Your chances of winning the UK national lottery (assuming 20M tickets sold and you buy one):
0.000005%
Over a year, your chances increase to: 0.00026%
Like in all things in Bitcoin, I don’t ask you to trust me. If you want to verify, here are the references I used in making my conclusions:
https://protos.com/chart-when-solo-miners-found-a-bitcoin-block/
https://investors.block.xyz/investor-news/news-details/2024/Blocks-New-Bitcoin-Mining-Chip-to-Be-Part-of-an-Ongoing-Project-With-Core-Scientific-to-Decentralize-Mining-Hardware/default.aspx
https://www.youtube.com/watch?v=Wo91DWvZRs8
https://i.nostr.build/9rQ9Plv6XQYtt6xd.jpg
-
@ df478568:2a951e67
2024-10-26 17:06:30Declaring myself a nerd on my resume has not yielded many interviews. Therefore, I a studying for an A + certification because most jobs require it. Although I geek-out on obscure Internet protocols, that’s not what businesses want yet. They want people to prove they know what SSH and FTP are. They want port memorization and you must know that an Ethernet cable is called an RJ45 cable. I use these things all the time. I already knew SSH uses port 22, but I didn’t know it was over TCP the Transmission Communications Protocol. Luckily I read the book The 4 Hour Chef by Tim Ferris.
I know what you’re thinking. What the F does a cookbook have to do with IT? Well, this book was really about rapid learning. The idea is to learn any new skill by studying 4 hours per week. The book teaches you how to learn how to cook within 12 weeks by studying 4 hours per week. The beginning of the book is not about cooking at all. One chapter teaches you how to memorize a deck of cards or the first 100 digits of pi. You do this buy converting numbers into sounds and sounds into images. It’s almost as if you use cenesthesia as a memory tool. I used this card deck memorization technique](https://tim.blog/2013/02/07/how-to-memorize-a-shuffled-deck-of-cards-in-less-than-60-seconds/) to memorize common ports and protocols.
How I Use Mnemonics To Remeber Ports
Here is an example of how I used this mnemonic to memorize SSH is commonly found on tcp/22
I used cartoon characters to represent Internet Protocols like tcp or udp. - For tcp, I imagine a character I call taco pollo because it’s the first thing that came to mind when I tried to think of something using the letters t, c, and p. That’s not a real cartoon, so I used AI to dream up a picture of some taco wielding chicken. It’s a strange bird. I know, and so am I, but it works. I also considered using the cartoon chickens from Breaking Bad, but it didn’t quite fit.
- Chicken’s with tacos represent tcp. I thought of this because the word taco has a t and c in it and chicken in Spanish is pollo. This combination is ridiculous, but the more ridiculous the better when it comes to memorization. The goal is to make it unforgettable like Nat King Cole.
- For udp, I use Captain Underpants. Udp made me think of Captain Underpants for similar reasons.
I used actions for the names of ports I memorizing. For example, SSH is the verb shelling.
I use an object for the port number and try to think of an object that fits within the rules of the major number system.
Instead of memorizing that SSH is tcp/22, I create an image in my mind’s eye.
Taco Pollo shelling The Nanny. I embellished this phrase a little using a prompt generator and ran it through Stable AI Core. Here is the prompt I used.
Chicken donning a taco hat, firing artillery shells, towards Fran Drescher as The Nanny; surreal, pop-art style, vibrant colors, high-definition, references to Roy Lichtensteins comic-strip art.
- The chicken and taco represent tcp.
- The artillery shell represents Secure Shell, a.k.a. SSH
- The nanny represents the number 22 because the n sound represents the number 2 in the major number system. Therefore, Nanny = 22. This is my mnemonic for memorizing the Internet protocol, and port number of SSH.
I happen to have already know many of the port numbers already just from working with servers. I used to use Yunohost and it required me to open up many of the ports that I am learning about. A couple years ago, I ran my own email server. It wouldn’t work at first. My research lead me down a rabbit hole that taught me I needed to open port 25 to send emails. This is because SMTP(Simple Mail Transfer Protocol) needs port 25 open. A good mnemonic for this would be “a chicken taco” smurfs a nail. What does smurf mean? I don’t know, but the Smurfs used it as a verb all the time. It also helps me remember SMTP because s and m are the first two letters in the word Smurf. I didn’t know DNS used port 53 until I created the mnemonic, “Captain Underpants dines with Lemmy.” Is it gibberish? Yes. Is it effective? Hell yes!
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0 867,467
Originally published on: https://marc26z.com/memorizing-protocols-and-port-numbers-with-mnemonics/
-
@ e83b66a8:b0526c2b
2024-09-21 16:29:23Here are some of the more interesting projects that I like:
Messaging:
https://www.0xchat.com/#/ - Private messaging - think WhatsApp
Xitter Like Clients:
https://damus.io/ - iPhone client
https://nostrapps.com/amethyst - Android client
https://primal.net/downloads - Android, iPhone & Desktop
https://shipyard.pub/posts - Schedule future posts
Interesting sites:
https://zap.stream/ - Video streaming
https://fountain.fm/ - Podcasting
https://wavlake.com/ - Music streaming
https://shopstr.store/ - Online shop
https://zap.cooking/recent - Cooking recipes
https://ostrich.work/ - NOSTR jobs board
NOSTR tools
https://nostr.band/ - Powerful search tool
https://nostr.wine/ - Powerful, but centralised paid relay
https://npub.pro/ - Website creation tool
https://nostr.build/ - Media and file storage
https://relay.tools/ - Build and curate your own relay
https://creatr.nostr.wine/subscriptions/new-user - Creator tools
List of NOSTR apps:
https://nostrapps.com/
-
@ 6ad3e2a3:c90b7740
2024-09-11 15:16:53I’ve occasionally been called cynical because some of the sentiments I express strike people as negative. But cynical, to me, does not strictly mean negative. It means something more along the lines of “faithless” — as in lacking the basic faith humans thrive when believing what they take to be true, rather than expedient, and doing what they think is right rather than narrowly advantageous.
In other words, my primary negative sentiment — that the cynical utilitarian ethos among our educated classes has caused and is likely to cause catastrophic outcomes — stems from a sort of disappointed idealism, not cynicism.
On human nature itself I am anything but cynical. I am convinced the strongest, long-term incentives are always to believe what is true, no matter the cost, and to do what is right. And by “right,” I don’t mean do-gooding bullshit, but things like taking care of one’s health, immediate family and personal responsibilities while pursuing the things one finds most compelling and important.
That aside, I want to touch on two real-world examples of what I take to be actual cynicism. The first is the tendency to invoke principles only when they suit one’s agenda or desired outcome, but not to apply them when they do not. This kind of hypocrisy implies principles are just tools you invoke to gain emotional support for your side and that anyone actually applying them evenhandedly is a naive simpleton who doesn’t know how the game is played.
Twitter threads don’t show up on substack anymore, but I’d encourage you to read this one with respect to objecting to election outcomes. I could have used many others, but this one (probably not even most egregious) illustrates how empty words like “democracy” or “election integrity” are when thrown around by devoted partisans. They don’t actually believe in democracy, only in using the word to evoke the desired emotional response. People who wanted to coerce people to take a Pfizer shot don’t believe in “bodily autonomy.” It’s similarly just a phrase that’s invoked to achieve an end.
The other flavor of cynicism I’ve noticed is less about hypocrisy and more about nihilism:
I’d encourage people to read the entire thread, but if you’re not on Twitter, it’s essentially about whether money (and apparently anything else) has essential qualities, or whether it is whatever peoples’ narratives tell them it is.
In other words, is money whatever your grocer takes for the groceries, or do particular forms of money have qualities wherein they are more likely to be accepted over the long haul? The argument is yes, gold, for example had qualities that made it a better money (scarcity, durability, e.g.) than say seashells which are reasonably durable but not scarce. You could sell the story of seashells as a money (and some societies not close to the sea used them as such), but ultimately such a society would be vulnerable to massive inflation should one of its inhabitants ever stroll along a shore.
The thread morphed into whether everything is just narrative, or there is an underlying reality to which a narrative must correspond in order for it to be useful and true.
The notion that anything could be money if attached to the right story, or any music is good if it’s marketed properly is deeply cynical. I am not arguing people can’t be convinced to buy bad records — clearly they can — but that no matter how much you market it, it will not stand the test of time unless it is in fact good.
In order to sell something that does not add value, meaning or utility to someone’s life, something you suspect they are likely to regret buying in short order, it’s awfully useful to convince yourself that nothing has inherent meaning or value, that “storytelling is all that matters.”
I am not against marketing per se, and effective storytelling might in fact point someone in the right direction — a good story can help someone discover a truth. But that storytelling is everything, and by implication the extent to which a story has correlates in reality nothing, is the ethos of scammers, the refuge of nihilists who left someone else holding the bag and prefer not to think about it.
-
@ 5d4b6c8d:8a1c1ee3
2024-10-26 14:38:35Only three of the new matches on freebitcoin had external odds available, so those will be todays RBOA picks.
The table will be based on hypothetical 10 kilosat bets on each match. Scale up or down accordingly.
| Outcome 1 | Outcome 2 | Outcome 3 | Bet 1 | Bet 2 | Bet 3| |--------------|---------------|------------|-------|-------|------| | Leverkusen | VfB Stuttgart | Draw | 6300 | 1800 | 1900 | | FC Bayern| Union Berlin| Draw | 8100 | 700 | 1200 | | Dortmund| RB Leipzig| Draw | 4500 | 3100 | 2400 |
I'm currently up about 80 ksats using this strategy,
originally posted at https://stacker.news/items/741081
-
@ 3bf0c63f:aefa459d
2024-10-26 14:18:23kind:1
maximalism and the future of other stuff and Nostr decentralizationThese two problems exist on Nostr today, and they look unrelated at first:
- People adding more stuff to
kind:1
notes, such as making them editable, or adding special corky syntax thas has to be parsed and rendered in complicated UIs; - The discovery of "other stuff" content (i.e. long-form articles, podcasts, calendar events, livestreams etc) is hard due to the fact that most people only use microblogging clients and they often don't appear there for them.
Point 2 above has 3 different solutions:
- a. Just publish everything as
kind:1
notes; - b. Publish different things as different kinds, but make microblogging clients fetch all the event kinds from people you follow, then render them natively or use NIP-31, or NIP-89 to point users to other clients that would render them better;
- c. Publish different things as different kinds, and reference them in
kind:1
notes that would act as announcements to these other events, also relying on NIP-31 and NIP-89 for displaying references and recommending other clients.
Solution a is obviously very bad, so I won't address it.
For a while I have believed solution b was the correct one, and many others seem to tacitly agree with it, given that some clients have been fetching more and more event kinds and going out of their way to render them in the same feed where only
kind:1
notes were originally expected to be.I don't think clients doing that is necessarily bad, but I do think this have some centralizing effects on the protocol, as it pushes clients to become bigger and bigger, raising the barrier to entry into the
kind:1
realm. And also in the past I have talked about the fact that I disliked that some clients would display my long-form articles as if they were normalkind:1
notes and just dump them into the feeds of whoever was following me: nostr:nevent1qqsdk90k9k30vtzwpj6grxys9mvsegu5kkwd4jmpyhlmtjnxet2rvggprpmhxue69uhhyetvv9ujumn0wdmksetjv5hxxmmdqy8hwumn8ghj7mn0wd68ytnddaksygpm7rrrljungc6q0tuh5hj7ue863q73qlheu4vywtzwhx42a7j9n5hae35cThese and other reasons have made me switch my preference to solution c, as it gives the most flexibility to the publisher: whoever wants to announce stuff so it can be discovered can, whoever doesn't don't have to. And it allows microblogging clients the freedom to render just render tweets and having a straightforward barrier between what they can render and what is just a link to an external app or webapp (of course they can always opt to render the referenced content in-app if they want).
It also makes the case for microapps more evident. If all microblogging clients become superapps that can render recipe events perfectly why would anyone want to use a dedicated recipes app? I guess there are still reasons, but blurring the line between content kinds in superapps would definitely remove some of the reasons and eventually kill all the microapps.
That brings us back to point 1 above (the overcomplication of
kind:1
events): if solution c is what we're going to, that makeskind:1
events very special in Nostr, and not just another kind among others. Microblogging clients become the central plaza of Nostr, thus protecting their neutrality and decentralization much more important. Having a lot of clients with different userbases, doing things in slightly different ways, is essential for that decentralization.It's ok if Nostr ends up having just 2 recipe-sharing clients, but it must have dozens of microblogging clients -- and maybe not even full-blown microblogging clients, but other apps that somehow deal with
kind:1
events in multiple ways. It's ok if implementing a client for public audio-rooms is very hard and complicated, but at the same time it should be very simple to write a client that can render akind:1
note referencing an audio-room and linking to that dedicated client.I hope you got my point and agreed because this article is ended.
- People adding more stuff to
-
@ ee11a5df:b76c4e49
2024-09-11 08:16:37Bye-Bye Reply Guy
There is a camp of nostr developers that believe spam filtering needs to be done by relays. Or at the very least by DVMs. I concur. In this way, once you configure what you want to see, it applies to all nostr clients.
But we are not there yet.
In the mean time we have ReplyGuy, and gossip needed some changes to deal with it.
Strategies in Short
- WEB OF TRUST: Only accept events from people you follow, or people they follow - this avoids new people entirely until somebody else that you follow friends them first, which is too restrictive for some people.
- TRUSTED RELAYS: Allow every post from relays that you trust to do good spam filtering.
- REJECT FRESH PUBKEYS: Only accept events from people you have seen before - this allows you to find new people, but you will miss their very first post (their second post must count as someone you have seen before, even if you discarded the first post)
- PATTERN MATCHING: Scan for known spam phrases and words and block those events, either on content or metadata or both or more.
- TIE-IN TO EXTERNAL SYSTEMS: Require a valid NIP-05, or other nostr event binding their identity to some external identity
- PROOF OF WORK: Require a minimum proof-of-work
All of these strategies are useful, but they have to be combined properly.
filter.rhai
Gossip loads a file called "filter.rhai" in your gossip directory if it exists. It must be a Rhai language script that meets certain requirements (see the example in the gossip source code directory). Then it applies it to filter spam.
This spam filtering code is being updated currently. It is not even on unstable yet, but it will be there probably tomorrow sometime. Then to master. Eventually to a release.
Here is an example using all of the techniques listed above:
```rhai // This is a sample spam filtering script for the gossip nostr // client. The language is called Rhai, details are at: // https://rhai.rs/book/ // // For gossip to find your spam filtering script, put it in // your gossip profile directory. See // https://docs.rs/dirs/latest/dirs/fn.data_dir.html // to find the base directory. A subdirectory "gossip" is your // gossip data directory which for most people is their profile // directory too. (Note: if you use a GOSSIP_PROFILE, you'll // need to put it one directory deeper into that profile // directory). // // This filter is used to filter out and refuse to process // incoming events as they flow in from relays, and also to // filter which events get/ displayed in certain circumstances. // It is only run on feed-displayable event kinds, and only by // authors you are not following. In case of error, nothing is // filtered. // // You must define a function called 'filter' which returns one // of these constant values: // DENY (the event is filtered out) // ALLOW (the event is allowed through) // MUTE (the event is filtered out, and the author is // automatically muted) // // Your script will be provided the following global variables: // 'caller' - a string that is one of "Process", // "Thread", "Inbox" or "Global" indicating // which part of the code is running your // script // 'content' - the event content as a string // 'id' - the event ID, as a hex string // 'kind' - the event kind as an integer // 'muted' - if the author is in your mute list // 'name' - if we have it, the name of the author // (or your petname), else an empty string // 'nip05valid' - whether nip05 is valid for the author, // as a boolean // 'pow' - the Proof of Work on the event // 'pubkey' - the event author public key, as a hex // string // 'seconds_known' - the number of seconds that the author // of the event has been known to gossip // 'spamsafe' - true only if the event came in from a // relay marked as SpamSafe during Process // (even if the global setting for SpamSafe // is off)
fn filter() {
// Show spam on global // (global events are ephemeral; these won't grow the // database) if caller=="Global" { return ALLOW; } // Block ReplyGuy if name.contains("ReplyGuy") || name.contains("ReplyGal") { return DENY; } // Block known DM spam // (giftwraps are unwrapped before the content is passed to // this script) if content.to_lower().contains( "Mr. Gift and Mrs. Wrap under the tree, KISSING!" ) { return DENY; } // Reject events from new pubkeys, unless they have a high // PoW or we somehow already have a nip05valid for them // // If this turns out to be a legit person, we will start // hearing their events 2 seconds from now, so we will // only miss their very first event. if seconds_known <= 2 && pow < 25 && !nip05valid { return DENY; } // Mute offensive people if content.to_lower().contains(" kike") || content.to_lower().contains("kike ") || content.to_lower().contains(" nigger") || content.to_lower().contains("nigger ") { return MUTE; } // Reject events from muted people // // Gossip already does this internally, and since we are // not Process, this is rather redundant. But this works // as an example. if muted { return DENY; } // Accept if the PoW is large enough if pow >= 25 { return ALLOW; } // Accept if their NIP-05 is valid if nip05valid { return ALLOW; } // Accept if the event came through a spamsafe relay if spamsafe { return ALLOW; } // Reject the rest DENY
} ```
-
@ 4ba8e86d:89d32de4
2024-10-26 14:14:01I2P é uma rede anônima, oferecendo uma camada simples que aplicativos sensíveis à identidade podem usar para se comunicar com segurança. Todos os dados são agrupados com várias camadas de criptografia e a rede é distribuída e dinâmica, sem partes confiáveis.
O Invisible Internet Project começou em 2002. A visão do projeto, conforme descrito em uma entrevista com Lance James, era que a rede I2P "oferecesse total anonimato, privacidade e segurança no mais alto nível possível. Internet descentralizada e ponto a ponto significa não se preocupe mais com seu ISP controlando seu tráfego. Isso permitirá que (as pessoas) realizem atividades contínuas e mudem a maneira como vemos a segurança e até a Internet, utilizando criptografia de chave pública, esteganografia de IP e autenticação de mensagens. A Internet que deveria ter sido, será em breve." Desde então, o I2P evoluiu para especificar e implementar um conjunto completo de protocolos de rede capazes de fornecer um alto nível de privacidade, segurança e autenticação para uma variedade de aplicativos.
A rede I2P. A rede I2P é uma rede de sobreposição ponto a ponto totalmente criptografada. Um observador não pode ver o conteúdo, origem ou destino de uma mensagem. Ninguém pode ver de onde vem o tráfego, para onde está indo ou qual é o conteúdo. Além disso, os transportes I2P oferecem resistência ao reconhecimento e bloqueio por parte dos censores. Como a rede depende de pares para rotear o tráfego, o bloqueio baseado em localização é um desafio que cresce com a rede. Cada roteador na rede participa de tornar a rede anônima. Exceto nos casos em que seria inseguro, todos participam do envio e recebimento do tráfego de rede.
Como funciona o I2P?
O I2P usa criptografia para obter uma variedade de propriedades para os túneis que constrói e as comunicações que transporta. Os túneis I2P usam transportes, NTCP2 e SSU2, para ocultar o tráfego que está sendo transportado por eles. As conexões são criptografadas de roteador para roteador e de cliente para cliente (ponta a ponta). Forward-secrecy é fornecido para todas as conexões. Como o I2P é endereçado criptograficamente, os endereços de rede I2P são auto-autenticados e pertencem apenas ao usuário que os gerou.
A rede é composta por pares ("roteadores") e túneis virtuais unidirecionais de entrada e saída. Os roteadores se comunicam entre si usando protocolos construídos em mecanismos de transporte existentes (TCP, UDP), passando mensagens. As aplicações cliente possuem seu próprio identificador criptográfico ("Destino") que permite enviar e receber mensagens. Esses clientes podem se conectar a qualquer roteador e autorizar a alocação temporária ("lease") de alguns túneis que serão utilizados para envio e recebimento de mensagens pela rede. O I2P possui seu próprio banco de dados de rede interna (usando uma modificação do Kademlia DHT) para distribuir roteamento e informações de contato com segurança.
Sobre a Descentralização e a Rede I2P A rede I2P é quase totalmente descentralizada, com exceção dos chamados Reseed Servers. Isso é para lidar com o problema de bootstrap DHT (Distributed Hash Table). Basicamente, não há uma maneira boa e confiável de deixar de executar pelo menos um nó de inicialização permanente que os participantes que não são da rede possam encontrar para começar. Uma vez conectado à rede, um roteador só descobre pares construindo túneis "exploratórios", mas para fazer a conexão inicial, um host reseed é necessário para criar conexões e integrar um novo roteador à rede. Os servidores reseed podem observar quando um novo roteador baixou um reseed deles, mas nada mais sobre o tráfego na rede I2P.
Recursos do I2P
O I2P oferece uma série de recursos para proteger a privacidade do usuário. Alguns desses recursos incluem:
Ocultação do endereço IP: O I2P oculta o endereço IP do usuário, tornando impossível que alguém rastreie a atividade do usuário na rede.
Comunicação segura: Todas as comunicações dentro da rede I2P são criptografadas de ponta a ponta, garantindo a privacidade do usuário.
Anonimato: O I2P permite que os usuários se comuniquem de forma anônima, o que significa que sua identidade não é exposta durante a comunicação.
Sites ocultos: O I2P permite que os usuários criem e acessem sites ocultos, que só podem ser acessados dentro da rede I2P.
Vantagens do uso do I2P
O I2P oferece várias vantagens para os usuários que desejam proteger sua privacidade online. Algumas dessas vantagens incluem:
Proteção contra vigilância governamental: O I2P ajuda a proteger os usuários contra a vigilância governamental, tornando impossível rastrear o endereço IP do usuário.
Anonimato em redes públicas: O I2P ajuda a proteger os usuários contra ataques de hackers em redes Wi-Fi públicas.
Acesso a sites censurados: O I2P permite que os usuários acessem sites que estão bloqueados em sua região ou país.
O I2P é uma rede anônima de comunicação que oferece recursos de privacidade avançados para proteger a privacidade do usuário. Ele permite que os usuários se comuniquem de forma anônima e segura e cria uma solução eficaz para usuários que valorizam a privacidade e a segurança online. Se você está preocupado com sua privacidade online, o I2P pode ser uma ótima escolha.
https://github.com/i2p
-
@ f196850e:79178e07
2024-10-26 14:12:48https://forex-strategy.com/2024/10/26/the-government-is-giving-10-million-to-prove-that-gender-reassignment-does-not-harm-children/ The government is giving $10 million to prove that gender reassignment does not harm children
usa #study #children #politics #pubertyblockers
-
@ 592295cf:413a0db9
2024-10-26 13:39:00[Week 21-10] I thinks that Saylor is on right, don't trust verify, is bullshit Bitcoin is a financial tool! I think it's good for me to get away from social media once a week. I could do things outside, like walking. Take pictures of the landscape. The weirdest thing is when the alarm calls you up in an hour.
Fiatjaf wants a cache client. I feel like I can do it, I have the set to do it, but nostrudel is no longer working, so it's a little murky. Next nostrudel does not accept changes to settings (It works now!), so maybe i can think something. I want to make a corny chat, test, read this article. Nostr doesn't work with a vpn because relays don't know who you are. jokes aside, some clients have difficulties.
I couldn't take pictures of the landscape if I didn't take the wind blades. Small local controversy.
Missing the point of content creator. Simply for final user, Simply for the creator, new feature, no missing nothing. I'm trying to limit everything to writing for a week. I almost did. Maybe another week can do well.
Meanwhile I updated apps like Amber and Voyager, coracle, nostrmo.
The experiment continues with open vibe following the trending of Nostr. I'm following almost 120 npub. He'll stop, I don't know, possible he's already reached the limit. You still can't block words on the Nostr side of Open, strange thing. The app doesn't count the follow well, still some problem cleaning the cache seems that it doesn't need. After a while open and close and seems updated. I wanted to try open librarian, but I was busy sending fake zap on Nostr. This morning i try and It keeps giving me error 500 when I try to connect to a relay.
I hate when a profile follows everyone indistinctly, why does everyone follow? and in voyage, I read with WoT setting, I probably have to do unfollow. There must be an indication in which not include the followers of this person in the web of trust, I would do it by default if you follow more than 600 people.
WoT on Nostr Visualized post on stackernews
-
@ bf95e1a4:ebdcc848
2024-09-11 06:31:05This is the lightly-edited AI generated transcript of Bitcoin Infinity Show #125. The transcription isn't perfect, but it's usually pretty good!
If you'd like to support us, send us a zap or check out the Bitcoin Infinity Store for our books and other merchandise! https://bitcoininfinitystore.com/
Intro
Luke: Paolo, Mathias, welcome to the Bitcoin Infinity Show. Thank you for joining us.
Paolo: Thank you for having us.
Knut: Yeah, good to have you here, guys. We're going to talk a bit about Keet and Holepunch and a little bit about Tether today, aren't we?
Luke: Sounds like that's the plan. So thank you again, both for joining us.
Introducing Paolo and Mathias
Luke: would you both mind giving a quick introduction on yourselves just so our listeners have the background on you
Paolo: Sure, I'm Paolo Arduino, I'm the CEO at Tether. I started my career as a developer, I pivoted towards more, strategy and execution for, Tether and Bitfinex. And, co founded with Matthias, Holepunch, that is, building very, crazy and awesome technology, that is gonna be disrupting the way people communicate.
Luke: And, Mathias, over to you.
Mathias: Yeah, thank you. Yeah, I've been, so I come from a peer-to-peer background. I've been working with peer-to-peer technology. The last, I always say five, but it's probably more like 10 years. I did a lot of work on BitTorrent and I did a lot of work on JavaScript. and a little bit later to, Bitcoin and I saw a lot of potential on how we can use Bitcoin with pureology and like how we can use.
P2P technology to bring the same mission that Bitcoin has, but to all kinds of data, setting all data free and, making everything private per default and self sovereignty and that kind of thing. I'm very into that. and I've been lucky to work with, like I said, with Paolo for, many years now and, Get a lot of, valuable, feedback and, idea sharing out of that.
And we're on a mission to, build some, really cool things. In addition to all the things we've already been building. So it's super exciting and glad to be here.
Luke: Oh, fantastic.
Introduction to Holepunch
Luke: Matthias, that was a perfect segue into basically, an introduction to, can you tell us about, Holepunch.
What is Holepunch and what are you doing?
Mathias: Yeah, sure. like I said, we co founded the company a couple of years ago. Now, we've been building up a team of really talented peer to peer engineers. we're always hiring also. So if anybody's listening and want to join our mission, please, apply. we have some really smart people working with us.
but we teamed up to basically. like I said in my introduction, I've been working on peer to peer technology for many years now and thinking ahead how we can, stop using all that technology when I started it was only used for basically piracy. I'm from the Nordics, and I think Knut is from the Nordics also, so he knows all about, the Nordics know about piracy.
It wasn't back in the day. A lot of very interesting technologies came out of that. But basically, how can we use those ideas that were proven by piracy back then to be really unstoppable, because a lot of people wanted to stop it, but apply that same kind of mindset to the general data, so we can build actual applications that has that kind of quality, that can withstand the wrath of God.
that can work without any centralization. Actually, nobody can shut down, not even the authorities if they wanted to. Basically unkillable and make that general enough that it can basically run any kind of application, solve a lot of really hot problems. it works on your own computers, your own networks.
Mobile phones, and tie that up. I'm a developer by heart, into a software stack that people can just build on. So not everybody has to go in and tackle all these problems individually, but just give them some software to solve all this so they can, as much as possible, just worry about making really cool applications that we use,
Yeah, like I said, we've been working really intensely on this, for a long time and in Holepunch, we made this our co mission to scale this up and, deliver a software stack on that. it's been really exciting and it's been really fun and it's been very, challenging, but if it's not challenging, then why, do it?
and, especially, with the backing of, Tether, through Paolo and also just expertise from there, we have a good hand built to deliver this to the world. And, the first thing we did was, like, think about what's, a good first application that we can build that can showcase this, but also something we really want to use ourself and see scale have also have on the world.
And obviously that was a communications app, keyed, which we was our first project. And, we're still in beta and we're still lots of work to do. And we're still iterating that really heavily, but I like to show that you can build these kind of apps without any kind of. central points. and we released that also, like the first thing we released when we launched the company.
And like I said, we're still, building and still iterating it. A lot of fun. and then take the software stack from that, which we call the pair runtime and then split that out. So anybody else can build similar apps on top. With that same technology stack, and, yeah, that's, we launched that earlier this year also, and, it's been really exciting so far, and it's, I love going to work every day and solve, even though, you can see on my hair that it's not really good for, the head scratching, but, but, it's really fun, and it's really challenging, and it's interesting thing. goal as a company, basically to have that if we go out of business tomorrow, our technology continues to exist because we're not in the loop of anything. It's also sometimes really hard to explain that we don't have any, chip coins involved or any kind of limitations on the stack because we're basically engineering it not to be part of it, because that's the only way you can actually engineer these things that they can understand.
anything, super exciting and, encourage everybody to try to check it out.
Luke: we've both used Keet and I've certainly enjoyed the experience. I, think, the, basics of this, as I understand it, is that it's, entirely on both sides. The communicators end, or a group of communicators, it's all on their end, and the communication is entirely peer to peer, what is Keet really, what is the basics of Keet as, say, a product?
What is the easiest way that you would explain what it is?
The Vision Behind Keet
Mathias: But We're basically trying to just build a world class communications app that works to a large degree, like normal communication apps that you know, like Signal, Telegram, WhatsApp. Just with all the centralization tucked away, with all the costs of running it tucked away, and then adding all the features that also we can, because we're peer to peer
People don't care about technology. We loved it, but don't have that surface off too much to the user.
Just have the user use it as any other app, but then just have it be 100 percent private per default, 100 percent like no strings attached. It just works. if we get caught off by a. From the internet tomorrow, it will still work, that kind of thing, but deliver that in a way, and this is always our mission where users don't really need to worry about it.
It just works. And, it works the same way to a large degree as their other apps work, except obviously, there's no phone numbers and things like that. Very cryptographically sound and, but trying always not to bubble it up. And I think that's, so it's actually a really simple mission, but it's obviously really hard.
And that requires a lot of smart people, but luckily our users in a good way, don't need to be very smart about that.
Keet vs Nostr
Knut: Yeah, a quick one there. No strings attached starts with the letters Nostr, so is, Keet and Nostr, do they go mix well together or, is there an integration there between the two? I see a lot of similarities here.
Paolo: I tried to explain the differences between Kit and Nostr. I think Nostr is a very interesting protocol, but also is very, simple. the way I like to describe it is that, if you are familiar with the history of filesharing, Starting from the first one, super centralized, and then eventually every single step, you get to a decentralized platform.
And the last one, the most decentralized one, that is BitTorrent. the history of file sharing proved that every time you try to centralize something, it ends up badly, right? if you have any special node in the system that does a little bit more than others and requires more resources than others to run, that will end up badly.
You might end up in a small room with a lamp in your room. Point it to your face, and then everyone suddenly will stop running an indexer. That reminds me about Nostr structure. if you are building a peer to peer system, or if you are building a very resilient communication system, if you think about Nostr, you would imagine that if you have, 10 million or 100 million users, the number of relays would be probably less than the square root of the number of users.
So that surface, although a hundred million users is very, they're not attackable, right? But the surface of, the relays is much more attackable. look at what is happening with, the coin joinin platforms, right? very similar. the beauty of KIT versus Nostr is that in KIT you have number of relays is actually equal to the number of users because the users are their own relays.
and they can act as relays for others to, further their connectivity. That is how we think a technology that, has to be ready for the apocalypse and resilient to the wrath of God should, work. if you have, a log number of users or square root of number of users as relates, I don't think it's cool technology.
It will work better than centralized, Technologies like WhatsApp and so on, or Twitter, but eventually will not work when you will need it the most. Because the point is that we will not know what will happen when we will need this technology the most. Today, not for everyone, but the world is still almost at peace.
Things might unfold, in the future, maybe sooner rather than later. But when things unfold, you will need the best technology, the one that is truly independent, the one that is truly peer to peer. it's not really peer to peer if you have specialized relays, but where you have super peers randomly.
Luke: Yeah, the difference here, between the Realize and not having any other centralized infrastructure in the picture is certainly an interesting distinction. I hadn't heard anything about that you can act as a next connector or something like that.
Pear Runtime
Luke: So there's a couple of related things. I know there was an announcement about the, pair runtime, is that right? can you talk a little bit about that or any other, ways that this is growing in your whole, platform,
Mathias: Yeah, sure. so basically when we talk about ideas, internally, also from our software background, We want to solve a small problem that then can solve it for everybody. So
We want to build technology that can just send data around efficiently, so you can build any kind of app on top. We're all about modularity and taking these things to the extreme so we can repurpose it into any kind of application and other people can, get value out of it.
And, that's been our mission from the get go. So basically, like Paolo said, when we built Keed. We took all of these primitives we have, it's all open source on our GitHub, that can do various things, relay encrypted data in a way that's completely private, nobody can read it, and in a generalizable way, so it can run on any applications.
We have databases that can interpret, work with this data on device, but still in a way where nobody else knows what's going on, fully private, and we spent many years perfecting this, and it's still ongoing. And we, similar to like connectivity, it might seem really easy if you don't know what's going on that, connecting this computer to another computer and another place, but it's really hard because ISPs and, your internet providers, et cetera, they don't really want you to do that.
So there's a lot of firewalls involved that you have to work around to get around This is all really, hard problems that took a long time to solve.
But luckily, all of these are like generalizable problems where you just solve them once to a large degree, and then it's solved for everybody. If you put them in a modular framework where anybody can put the Legos together on top. And that's what we've been heavily invested in. And then as we were building Keed, we realized that Keete is just like 95 percent of these Lego blocks that are applicable for anything.
So why not take all this stuff, pack it up for free, we don't make any money on it. and an open source runtime that we're just giving away so other people can contribute to it, but also build their own apps. the more peer to peer apps the world has, the better from my point of view.
and document it and make it really easy to install. And I think actually Paolo said something interesting because as soon as you have, one point of centralization, you can always unravel it. coming from the Bitcoin days, I remember how quickly things can unravel. people went to jail for linking to things because authorities, when they crack down, really hard.
so if you have one weak spot, it will be taken advantage of at some point by somebody. And so even things like distributing updates to your software can be really hard because this often requires a central point, like you go to a website and you don't download it. And so all apps built on our runtime, for example.
It's distributed through the runtime, which is a little bit mind bending. So all apps are peer to peer data applications themselves, and the network doesn't care, which means that we can continue to distribute updates even, if everything gets shut down, you only need like a bootstrap for the first install when you get the app.
So we're thinking that in. At every level, because it's really, important to us to, basically learn from everything that happened in the past and then actually build things that are resilient. And we take this to a degree where I'm sure we could move 10 times faster if we just let go a little bit of that idea, because it is easier to just put all the data in one place or put all the updates in one place.
But then it's then we're just building the same old thing that's going to die eventually anyway. So we're very, uncompromising in that mission of actually decentralizing everything from updates to data, and then also always solving in a way where everybody can take advantage of that.
And then the final thing I'll say about that is that, every time we update. That runtime, those building blocks of that runtime, every time we fix a bug, every time we make it faster, every app becomes faster. That's also very exciting. It's because you're building the whole infrastructure into this layer that runs on your phone.
And it's all somewhat generalizable. Every time we fix something, it's just better for the entire ecosystem. And that's obviously really, exciting. And like I said, actually, no strings attached.
Yeah, so I think you were referring to the trial of the Pirate Bay people there In Sweden, right? lucky enough to meet a couple of them in Denmark and it's been very fun to hear about their journey and, yeah, like
Knut: and there, there's, there was a great documentary made about it called TPBAFK. So the Pirate Bay Away From Keyboard, about that whole trial and how, corrupt the system was even back then. And, throwing people in jail for providing links. they didn't do any more wrong than Google did, from a certain perspective.
And, I remember even, before BitTorrents, there was a program called. DC or Direct Connect Do you remember that?
Mathias: I used to, it was one of my first introductions to decentralization. it as you just shared your, like a Google Drive for everyone or something. Like you just shared parts of your file tree to everyone who wanted to peek into it, Yeah, anyway. Oh, that's good that you didn't know you were going with that. it interesting what you said, because I think it's interesting to think that I think to a large degree, the whole decentralization movement that was happening with BitTorrent back in the day got shut down because At some point, authorities figured out that they could just block DNS requests to shut it down for normal people, and as soon as they did that, it was actually effective.
And to Paolo's point, no matter how weak it is, they're done. and they tried to kill the technology elsewhere, but that's actually what killed them. Then, obviously, alternatives came that people could pay for, and it also shows that people actually want, to stay on the right side of things.
I think, now it's going very much in the wrong direction again, because now we're back at abusing that centralization again. the cycle will repeat. But, yeah, like any point of weakness will be attacked at any point.
Decentralization vs. Centralization
Luke: So what are the drawbacks to decentralization? I think we and our audience certainly understand the benefit of decentralization, what you gain by decentralizing, but what do you naturally give up in terms of the user experience and the convenience factor?
Mathias: yeah, I'm sure Paola has stuff to say here, but I'm just, I love talking about this stuff, so I'll go first. Mattias.
I think it's a really interesting question, first of all, because it's one of those questions where You know, obviously I want to say there's no drawbacks, but like anything, it's a balance, right?
Because it's not that there's drawbacks and advantages, there obviously is, but it's also just a different paradigm. first of all, with sensitization, I think one of the biggest thing I noticed also with developers is that we all come out of systems, education systems. That teaches how to think centralized, which makes us biased towards centralized solutions.
and that's, I remember my whole curriculum was about servers and clients and stuff like that. it's actually really hard to think about decentralization as a developer. And I think that's actually part of why a lot of people think it's hard. It's complex because it is complex, but also because we're just like, we've been trained massively in the other direction, and it's really hard to go back because decentralization can be as simple as what Knut said about DC Connect, DC where it's just, oh, I'm just browsing other people's computers.
That's amazing. That's a really, simple experience, and it's like something you can never do But like in today's world, people, the first thing I always get asked is like, how do I get a username? And I'm like, usernames have an inherent centralization and there's trade offs there.
And we need to think that through and stuff. and most applications don't necessarily require usernames. I'm not saying that's a bad feature, but it's that's where you need to think more about the trade offs because there's governance involved to some degree. But for the core experience, and I think that's what we've shown in Keith so far.
Then, there's obviously tons of upsides also, it's much easier to do big data transfers. Money is less of a concern, which actually changes the thinking, how you think about features.
And that, again, is something we've been trained in a lot as developers, because we think centralized. When we talk about features at Holepunch, hey, we should add podcast recording to Keed. Normally somebody would say, that's going to cost a lot of money to host that data. And we just always we don't even have that discussion because it doesn't matter because it's just between the users.
And then it's more about like the UX. But then other simple, like I said, other simple discussions, let's add a username index. That's where we're like, okay, let's think that through because there's like various things to think about there because there's no centric governance, and we don't want to introduce that because again, one point is.
It's bad. so it's, more like you really need to think differently and it's really hard to wire your brain to think differently. but once you get past that point, I think it's, super interesting. And I, think actually developers care way more than normal people because, developers care a lot about how links look and links and structure and that.
And normal people are just used to just clicking buttons and apps and going with the flow on that. And that's also what we're seeing, I think, with, a lot of key
Paolo: I think the hiring has proven a little bit more challenging, as Matthias was saying, when you are told that the cloud is your friend, hosting, on, Google Cloud or AWS is the right thing to do. And, of course, it got cheaper and cheaper, so now everyone can host their websites.
But the reality is that 70 percent of, the entire internet knowledge is hosted in the data centers of three companies. developers should think about that, should think about the fact that internet was born to be point to point and peer to peer. And, we are very far away from that initial concept.
over the years, especially with the boom in, in the year 2000 for the internet boom, and bubble, then, realized that, holding people's data is the way to go, with social media and social network. That is even worse. And so you have these friendly advertisements that are telling you, That, with a smiley face that, you know, yeah, you should, upload all your data on, Apple cloud or Google cloud.
And in general, cloud backups are great, right? You want to have some sort of redundancy in your life, but the reality is that you should be able to upload those. In an encrypted way, and yet most of this data sits unencrypted because, the big tech companies have to decrypt it and use it for, to milk the information to pay for, for, another month of their new data centers.
the, issue is, we have so much power in our hands through our phones. the phones that we have today are much more powerful than the phones that we, or even the computers that we have 10 years ago or 5 years ago. And so We should, we are at a stage where we can use this hardware, not only for communicating, but also for in the future for AI processing and inference and so on.
is, we need to, understand that the word cannot be connected to Google. I mean we cannot be a function of Google. We cannot be a function of AWS. And so I think that, there is, escalating pace of, towards centralization and it's almost a black hole.
And eventually, the, we'll attract all the lights and if we are too close to it, no lights will come out anymore. And, that's why we want to really to double down on this technology, because it's not going to be easy, right? It's going to be very challenging, and most of the people don't care, as Maite has said before.
Most of the people will think, everything works with WhatsApp and, Signal, but Signal announced that their 2023 costs for data centers and data center costs are around 50 million, and they, apart from the mobile coin that was not The best thing that they could do, there is, it's not easy for them to monetize.
And the problem is that if you are, you're basically almost the only way to monetize it is to sell your customer's data. So if you don't want to sell your customer data, eventually your service will not be sustainable. So the only way to make it sustainable is actually going back to peer, where you can leverage people, infrastructure, people, connectivity, people, phones, people, processing power, Deliver very high quality communication system.
And when they will care, it will be probably usually too late if nothing exists yet. when people will care is because shit is hitting the fan. And, you really want to have a solution that is not, that will survive if, the countries around you or around the country where you live are not going to be nice to your own country.
So that's the view to peer-to-peer. The peer-to-peer wheel system will keep working if your neighbor countries are not going to be nice towards you. That's independence, that's resiliency, those are terms that, we need to take very seriously, especially seeing where the, world is going to.
Knut: Yeah, I think we're all primed for, centralized solutions, from a very young age. this is the state, this is what it is like, state funded schooling. state funders or state subsidized media. We are, like brainwashed into, trusting, institutions all our lives.
So I think that is somewhat connected to why people are so reluctant to be vigilant about this on the internet. I think the two go hand in hand that we, take the comfortable way, or most people take the comfortable route of, not taking responsibility for their own stuff. not only on the internet, but outsourcing responsibility to the government is basically the, another side of the same coin, right?
Mathias: I also find it very interesting, especially being from a small country like Denmark that doesn't have a lot of homegrown infrastructure. And I'm just seeing how much communication with some of the public entities is happening through centralized platforms like Facebook and things like that, where even though we centralize it, we also centralize it in companies that we don't even have any control over in different countries where we probably have, no rights at all.
So it's like hyper centralization, especially from the weakest point of view. And I think that's super problematic. And I'm always. Thinking it's, weird that we're not talking about that more especially when you look at the things that they're trying to do in the EU, they're almost trying to just push more in that direction, which I find even more interesting.
yeah, definitely. it's, a huge problem and it's only getting bigger. And that's, why
Challenges and Future of Decentralization
Luke: So to what level can decentralization actually get there? What is the limit to decentralization? And I'll calibrate this with an example. The internet itself, you said it was built to essentially originally be decentralized, but we don't have it. For physical links, like individual physical links between each other, the fiber or whatever the wire is goes together into another group of wires, which eventually go into some backbone, which is operated by a company.
And then that goes into the global Internet. And so somewhere it centralizes into telecom companies and other services. It might be decentralized on one level, but there is a layer of centralized services that make the internet work that isn't necessarily the so called cloud providers and that sort of thing.
So is there a limitation to how far this can go?
Paolo: I think the, in general, sure, there are the ISPs and, their physical infrastructure is in part centralized, but also you start having redundancy, right? So for example, the backbones are redundant. There are multiple companies running, cross connects across different areas of the world.
Now you have Starlink if you want. that is a great way to start decentralizing connectivity because Starlink will not be the only one that will run satellites, so there will be multiple companies that will allow you to connect through satellites, plus you have normal cabling.
So you will have, it will become a huge mesh network, it's already in part, but it will become more and more a huge mesh network. in general, you will always find a way, even with a pigeon, to start sending bits out of your house.
I think the most important part is, you have to be in control of your own data, and then, you need to send this data with the shortest path to the people that you want to talk to. Right now, I usually make this example, because I think it's When we do this presentation, we try to make people think about how much waste also centralized systems have created.
imagine you live in Rome, you live in Rome and you have your family. Most people live nearby their families. That is a classic thing among humans. 90 percent of the people live nearby their families. Maybe nearby, like 10km, 50km nearby. If you talk to your family, every single message, every single photo that you will send to your family, that message will travel, instead of going 50 kilometers in a nearby town where your mother lives or your father lives, it will travel every single message, every single bit of every single video call or every single bit of every photo will travel 5, 000 miles to Frankfurt just to go back 50 kilometers from you.
Imagine how much government spent in order to create these internet lines and to empower them to make it bigger, more, with more capacity Peer to peer allows with a lower latency, allows to save on bandwidth, allows to save on cost of global infrastructure.
So that's how, actually, We can create better mesh networks, more resilient mesh networks, just because data will always find the shortest path from one point to another.
And still all roads lead to Rome. I'm Italian, so I need to use Rome as an example.
Knut: Yeah.
Mathias: I think the discussion here is really interesting compared to Bitcoin, because it's actually the scaling longer term. Sovereignty, like how, Bitcoin kind of told us very direct terms that if you have a key pair, you have your money.
And it doesn't matter where you are in the world. If you have that key pair, you have a way to get to that money. the means of transportation, it's actually very uninteresting in that sense, because you have it with you. The Internet today, the centralized Internet is designed in a way where, what does it mean to go to Facebook?
it's really hard to explain because it's like some certificate that issued by somebody, and there's. Some, cabal of companies that manages them, there's some regulations around it, but we don't really actually understand it that well as normal people. Technically, we can understand it, but it's very, centralized and it's very, opaque and it's built into the infrastructure in that way, in a bad way.
And, with Pure Technology, we're taking the same approach as Bitcoin here and saying, You're just a key pair, and the other person is just a key pair, and there's a bunch of protocols around that, but the transportation is actually not that interesting. Right now, we use the internet to do it.
We'll probably do that for a long time, but there's no reason why we can take the same technology we have right now and in 50 years run it on, laser beams or something else, because we're taking the software and feedback.
Bitcoin and Holepunch: Drawing Parallels
Mathias: I think, that's the main thing to think about in that. Discussion.
Luke: when, Paolo, when you were talking about that people don't care, when you were saying that people don't care because WhatsApp just works, I was at the same time thinking that's the parallel of people saying that, I don't care because Visa just works, right? And so the parallel between Bitcoin and what you're doing at Holepunch, Keet, everything else here, really seems to be tracking along the same line.
And I guess there's the connection that, I won't say all, but a lot of the people involved are already in the Bitcoin ecosystem. But can you comment on is there a little more of a connection there between Holepunch and Keet and Bitcoin?
Paolo: Yeah, Bitcoin definitely is working and servicing, I think, in a good way, many, people in communities. The users of Bitcoin today are, unfortunately, and also that relates to Tether, mostly, in the Western world, in the richer countries, as a way to save wealth and, as a store of value, more than a means of exchange.
For different reasons, right? We'd like a network that would improve, of course, over time, and there will be different approaches, but, still, the world is not yet using Bitcoin, but the world will use Bitcoin when shit will hit the fan. but the beauty of Bitcoin is that an option is already there, is available, and when something bad will happen, people immediately, with a snap of a finger, will turn to Bitcoin, and will have it and can use it. don't have that in communications. What is our communica our parallel with communications, if we don't have it? I don't know, because if, if suddenly centralized communications will, be blocked, then, or privacy in communications will be blocked, and you cannot, you cannot use Whatsapp, or Whatsapp has to start giving all the information to every single government.
and the government will become more evil than what they are today, also western governments then. don't, we wanted to build the exact parallel as we said it, we just tried to describe it, that with Bitcoin, for communications. We need to have something that, since there are so many alternatives that are working as with your, you can make the parallel with Visa, right?
Visa is working today, so people are still using a lot of Visa, but if something will happen, they will use Bitcoin from one day to another. Whatsapp is working, and Zoom is working, and Google Meet is working, so people don't feel the urge, but there will be a trigger point when people will feel the urge at some point in their lives, because something happened around them, and we need to make sure that kit will be available to them.
and will be an option, will be stable, will be well designed so that when they will need it the most that option will be available to them.
Luke: Yeah, fantastic.
The Future of Decentralized Communication
Luke: And so I think the follow up I have, and just to get back to the earlier discussion a little bit with Nostr, the communication in terms of messaging, I absolutely see that and directly in what Keet is, I already absolutely see that. Is there a goal to get somewhere towards more like Social media, social networking, things like that in a, in certainly a decentralized way, but right now there isn't something like that as I understand it, coming from, Keet.
So is, that a goal? Is that on the roadmap?
Paolo: Yeah, it is on the roadmap, it's something that, so we had to start with the thing that we thought was more urgent and also the thing that could have been, would have been a game changer. social media is very important, especially In difficult situation, you want to get news, and you want to get unbiased news, so you want to use, social networks to see what's happening in the world.
But we, think that the most sacrosanct thing that you need in your life is to be able to talk to your family and friends in any situation with the highest privacy possible. that's the first thing that we tackled, and also was a way to battle test the technology with, KIT you can do high quality video calls as well, so if we are able to tackle in the best way possible privacy and extreme scalability of peer to peer communications, then on top of that foundation we can build also social media and every single other application that we have in mind.
Mathias: But first, we wanted to tackle the hardest problem. No, I think it makes a lot of sense. And I also just want to say, as a, probably like one of the most prolific KEET users, I use KEET right now also as a very, like a social media, we have big public rooms where we talk about KEET and talk about technology. I get a lot of the value I would get otherwise on Twitter X from that because I, it's like a public platform for me to, get ideas out there, but also interact with users directly.
And I think, there's many ways to take them as a young app. And we're talking about this a lot, obviously it has to be simple, has to be parent approved. My parents can figure it out, but I think, to a large degree, all really healthy social networks that are actually, to some degree, a communication app.
And it's also just a really good way to get local news and to get this locality that Peter is good at. That doesn't mean that we might not also make other things, but I think it's a hard line to set the difference between a social network and a communications app when it's structured correctly,
Interoperability and User Experience
Luke: Yeah, and this, another thing that came to mind just as, you were talking about these parallels, as, I understand it, the account system with Keet is, essentially still just a, Key pair. Correct me if I'm, wrong,
Mathias: Very, true.
Luke: you backups with the same 1224 words.
Is, that fully interoperable as well? Is that, could be your Bitcoin key. That could be
Mathias: We use the, same, I can't remember the date, the BIP, but there's a BIP for like during key generation. So we can use it also in the future for other things. and you have those words, you have your account, and that's, we never store that. And that's like your sovereignty and, no, I was just going to say that lets you use it seamlessly on different devices also. It's one of those things that I love because I know what's going on when you use keyed Insanely hard problem, but it's solved by the runtime, and it just works seamlessly and I think that's, the beauty of it.
Paolo: I think there's some UX stuff to figure out about onboarding that stuff a little bit easier for normal people. That's probably to a large degree the same for Bitcoin. The other part that I would do with Bitcoin is that, with Bitcoin, with your 12, 24 words, you can access your private wealth. the beauty of Bitcoin is that you can remember 12 24 words, you cross borders, and you carry with you your wealth. You can do the same thing with your digital private life.
You remember 12 24 words, they could be the same by the way. whatever happens, you can spawn back your digital private life fully encrypted from, one of your other devices that you connected that is somewhere else in the world. So when you start seeing and understanding the unlock in terms of also human resilience that this creates is very, insane and can create a very powerful, that can be used for, to create a very, powerful applications, not just communications, but you can build.
Really any sort of interaction, even mapping. Imagine peer to peer mapping, where basically data is not stored in one single location. You can access, tiles of the maps, from, local people that curate them in a better way. So the, level of applications that you can build, All unlocked by the same technology that is being used by Bitcoin is very, incredible.
Luke: Yes, absolutely it is. And what do you think of the idea that all of this stuff is just interoperable now based on essentially you have your private key and there you go. It doesn't matter the technology stack. Is that sort of an agnostic thing where you can take your data to any one of these systems?
What you're building with Keith being one, Nostr being another, Bitcoin being a third, what do you think of that?
Paolo: Yeah, the fact that, data is yours, right? So you should do whatever you want with your data. That is, I think, an axiom that we should assume. And, it shouldn't even, we shouldn't even discuss about this, right? We are discussing about it because people are trying to take away this axiom from us.
The, you are a key pair, and you're basically, unique, and uniqueness is expressed by the cryptography around those 24 words, and that's, that also is a way to prove your identity, it's a mathematical way to prove your identity.
No one can steal that from you, of course, but no one can track it as no one can impersonate, should not be able to impersonate you. So it's truly powerful.
Mathias: also think it's like worth remembering here also in this discussion that a lot of very high valuable data for yourself is actually not that big, but centralized platforms take it hostage anyway. if you take all my chat history and, I have pictures, but like a couple of the pictures would probably be bigger than all my chat history ever.
but a lot of that, those messages have a lot of value for me, especially personally and also being able to search through it and have infinite history, it's very valuable for me personally. But it's very scary for me if that's on some other platform where it gets leaked at some point, et cetera, et cetera.
But we already have the devices, just normal consumer devices that we buy, that we all have, phones, computers, whatever, that have more than enough capacity to store multiple copies of this. In terms of like per user, data production, it's a manageable problem.
And I think it's interesting how, providers force us to think in terms of giving that data away, even though we could easily store it.
Paolo: And this is even more important when we think about potential, AI applications, right? So imagine your best assistant. Paolo's assistant should go through all my emails, my kids chats, my old social stuff, and be able to be my best assistant. But in order to do that, I have two options.
Either, I imagine that OpenAI would come with an assistant. They would upload, All the information on their servers, crunch that information, and then, use it to serve, me, but also service their own needs. And that can become very scary, also because they wear a hat. It's public, right?
you don't want your most intimate codes that your best personal assistant could know, to be on somewhere else, rather than your devices. And so people were, people never uploaded, at least most of the people would never upload medical, information on Facebook, right? But they are uploading it on ChatGPT to get a second opinion.
so things can be, get even scarier than what we described today because, we, discussed about social media, that is basically, the fun part where we upload photos, But, things can become scarier when it comes to privacy and data control with ai.
So I want to see a future where I have a local AI that can read all key messages that I have from my local phone on my local device, and can become the best powers assistant possible without renouncing to my privacy, and also still governed by the same 24 words. the fine tuning that is applied on that LLM should stay local to my own device, and it should be in control of that.
And still, the current power of the devices that we have makes it possible. We should not fall for the same lie. We don't need, of course, big data centers with GPUs are important for training a huge LLM, but that is a generic LLM. You can take that one and then fine tune it with your own data and run it by yourself.
And for most of it, unless you want to do crazy things, that is more than enough and can run on modern GPUs or local GPUs or your phones. We should start thinking that we can build local experiences without having an API all the time connected to someone else's data center.
Knut: Yeah.
The Role of Tether in the Crypto Ecosystem
Knut: It's super interesting. you briefly just briefly mentioned tether before and I think we need to get into this. what is it and how much of a maxi are you, Paolo?
And, what, made this thing happen? Can you give us the story here about Tether?
Tether's Origin and Evolution
Paolo: Tether started in 2014. I consider myself a maxi, but running Tether, you could say that, I'm a shit coiner. I don't mind, right? I like what I do, and I think I'm net positive, so it's okay. Tera was born in 2014 with a very simple idea. there were a few crypto exchanges in, 2014.
it was Bitfinex, Coinbase, Kraken, Bitstamp. OKCoin, there was BTCChina, and just a few others, right? Around 10 that were meaningful. The problem back then was to do, trading arbitrage, you sell Bitcoin on the exchange where the price is higher, you take the dollars. From that sale, you move the dollars on the exchange where the price is lower and rinse and repeat.
That is called arbitrage. It is a property of every single efficient financial system. And that also helps to keep the price of Bitcoin in line across different exchanges. But, that was very, hard in 2014. If you remember in 2013 was the first year that Bitcoin broke the 1, 000.
But on some exchanges the price was 1. 2, on others was 900. in order to arbitrage that price difference, you have to move dollars from one exchange to another and Bitcoin from one exchange to another. You can move Bitcoin from one exchange to another. 10 minutes, but dollars would take days, right?
International wires. And so of course the opportunity arbitrage was, fully gone by, the, time the wire was hitting the, receiving exchange. the reason why we created that was, USDT was simply to put the dollar on a blockchain so that we could have the same user experience that we had with bitcoin.
For the first two years, almost no exchange apart Bitfinex understood USDT. Then Poloniex in 2016 started to add the USDT across for against every single trading pair. There was the start of the ICO boom. 2017 was the peak of the ICO boom and, USDT reached 1 billion in market cap. Fast forward in 2020, we had around 10 billion in market cap, and then the bull run started, but also another important thing started, that was the pandemic.
USDT's Impact on Emerging Markets
Paolo: So the pandemic had a huge effect on many economies around the world, in all the economies around the world, but especially in emerging markets, developing countries.
Basically pandemic also killed entire economies. And so as a Bitcoin you would think, oh, all these people that are in countries like Argentina and Venezuela and Turkey and so on, they should use Bitcoin and they should, they should, only use Bitcoin because everything else is cheap.
So that is pretty much, the approach that we have as Bitcoiners that, I believe in. But the problem is that. Not everyone is ready, so not everyone has our time to understand Bitcoin. Not everyone has yet the full skill set to understand Bitcoin at this stage, at this moment in time.
we as Bitcoiners didn't build the best user experience in the world, right? So one of the best wallets for Bitcoin is still Electrum. That, is not necessarily nice and well done for and simple to be used for, a 70 year old lady. so we need to do a better job as Bitcoiners to build better user experiences we want Bitcoin to be more used around the world.
At the same time, 99 percent of the population knows, especially the ones that are living in high inflation areas, knows that there is the dollar that is usually Much better currency than what they hold in their hands. the US dollar is not, definitely not perfect. It's not the perfect fiat currency. but it's like the tale of the two friends running away from the lion, right?
you have, one friend tells to the other, Oh, the lion is gonna kill us. We have to run really fast. And one of the two friends says to the other, I just have to run faster than you, right? So the US dollar is the friend that is running faster, in a sense that is the one that is likely better than the others.
And so being better than the others is creating a sort of safety feeling among 5 billion people in the world that live in high inflation countries. And for those people that, they don't have yet the time, they didn't have the luck also, maybe, to understand Bitcoin, they are, in fact, using USDT.
If you live in Argentina, peso lost 98% against the US dollar in the last five years. The Turkish L lost 80% against the US dollar in, the last five years. So of course, Bitcoin would be better than the US dollar, but even already, if you hold the dollar, you are the king of the hill there, right?
So because it's, you are able to preserve your wealth much, better than almost anyone else in the region. I think, USDT is offering a temporary solution and is providing a service, a very good service to people that don't have alternatives and good alternatives and they are very, familiar with the U.
S. dollar already. so eventually, the hyperbitcoinization, I think it will happen. there is no way it won't happen. It's hard to pinpoint on a time when, that will happen. But it's all about the turning point. What the economy will look like in the next, 10, 20 years and what trigger point there will be for fiat currencies to blow up and become irrelevant.
Bitcoin as a Savings Account
Paolo: the way I see it is that it's likely that the U. S. dollar will stay around for a while, and people might still want to use, the U. S. dollar as a checking account, but they, should start to use, Bitcoin as their savings account, in the checking account, you, are happy to not make interest, It's something that you use for payments, it's something that you are okay to detach from because it's the money that you are ready to spend.
The savings account is the thing that we should fight for. This thing is the thing that matter the most, and, it's the thing that will is protecting people wealth. And so in the long term. And in the medium term, we should push for this savings account to be Bitcoin. also with Tether, we are heavily investing in companies, in Bitcoin companies.
we support the Blockstream. We supported so many in the space that are, we, are supporting RGB. That is a protocol that is building, assets on top of, like network, style channels. Thank you for listening. and we buy Bitcoin ourselves. We do a lot of Bitcoin mining.
We develop, I think, the best and most sophisticated Bitcoin mining software, by the way, based on hole punch technology. It's like IoT for Bitcoiners and Bitcoin mining. It's very cool. we are relying on the dollar and, you could say that USDT is helping the dollar, expansion, but the same way I don't think Dollar and Bitcoin aren't necessarily opposed to one or the other.
I think that Bitcoin has its own path. And no matter what happens, there is no way to slow it down. I think, it's going to be inevitable success. It's going to be inevitable that it will become global internet money and global words money. No country will trust to each other with, with each other currencies for, for a longer time, and so the only viable solution is a currency that is governed by math.
That is the only objective way, objective thing that we have in the universe. that's my train of thoughts on, Tether and Bitcoin.
Knut: Oh, thank you. Thank you for that explanation. It explains a lot of things. To me, it sounds a bit like you're a lubrication company, like selling lubrication for the transition between the rape of the dollar to the love fest of the hyperbitcoinized world, to make the transition a little smoother.
Paolo: we are more than, at Tether we have also this educational arm and, believe it or not, the majority of the creation we do is actually on Bitcoin, right? So we are supporting the Plan B network led by the great Giacomo Zucco. The unfortunate thing is that USDT, didn't have a marketing team up to, 2022 with Tether.
So basically, I wish I could say that success of Tether is because we were super intelligent and great. but actually the success of Tether, unfortunately is a symptom of the success of, of, national economies. And it's sad if you think about it, right? So the success of your main product U as it is, They're actually proportional to the FACAP of many central banks. And, but it is what it is, right? So we need to do what we do at, really, at DataRace, creating all these educational contents to try to explain that, sure, we are providing a tool for today, but, For tomorrow you probably need, you need to understand that you have other options, you need to understand Bitcoin, because as we said for, Keith, right?
So the moment when you will need the most Bitcoin, it has to be available, you need to understand it, so that is a true option for you. The way we, see bitcoin education.
Knut: No, and, something like Tether would have, emerged, either way, and it's very comforting to know that it's run by Bitcoiners and not by a central bank itself or something. yeah, and the Plan B Network, I was a guest lecturer there in Logano and it was fantastic.
I love what you're doing there with the educational hub. And we even got Giacomo to write the foreword to our new book here that you can see here behind Luke.
Luke: Always say the title, Knut. Always say the title.
Knut: Bitcoin, the inverse of Clown World. It's, you, if, you're good at maths and emojis, you might be able to figure out the title from the cover, but it's one divided by Clown World anyway, which is on the opposite side of the everything divided by 21 million equation, So anyway, looking forward to seeing you in Lugano and giving you both a copy of the book, of course.
Paolo: Oh, with pleasure, with great pleasure, with a nice, education.
Luke: Absolutely. Yep.
Plan B Forum and Future Events
Luke: 100%. And we have to wind things down, but I'll just say as well, yeah, absolutely looking forward to Lugano Plan B Forum. Always a highlight of the year. It was my first time last year. I absolutely loved it. can't wait to attend this year.
so it's the 25th, 2020 6th of October, 2024. this year, it's a Bitcoin event that is not made to make money. So the problem with events is that. You have to find sponsors, and usually, sponsor might not be well aligned with the message you want to give, right? I think Tether is lucky enough, to not have to make money on the event.
Paolo: I want to have, good, guests. I want to have great speakers. I want to have the messaging. That is not only about Bitcoin, it's about, freedom of speech as well. We had the family of Assange for the last few years, and I think that they will come also this year.
I'm going to be probably killed by the By our marketing team, I'm not sure if they announced it, but we are going to have another Plan B event also in El Salvador next year, so we're trying to create this network of cities and countries that have things in common and, invite people that want to share knowledge around the world.
And, yeah, and of course we, are very proud of the good food that we, serve in Lugano. So that is another thing that, not all the bands can say the same thing.
Knut: No, it's fantastic. And we happened to bump into the Assange family at the cocktail bar in a fancy hotel and, had a very interesting conversation with them there. So if you're listening. Anyone from the Assange family is welcome on the show any time. So yeah, no looking forward to that event for sure, we had a great time.
And I think we're even playing this year, aren't we, Luke?
Paolo: You're
Luke: yeah, the Satoshi Rakamoto is in the event there, we, played, back in Prague, it was my first, time, but Knut is a regular at the Rakamotos.
Yeah, we played at Lugano last year Oh, anything and everything, what did we do in Prague?
Knut: paranoid and,
Paolo: Can I commission a
Knut: What song would you like to hear?
Paolo: I have two that I would suggest. One is Nothing Else Matters.
Knut: Alright.
Paolo: So I think that, is very inspiring, right?
Knut: Bitcoin, for sure.
Nothing Else Matters. it's perfectly aligned with Bitcoin. And, the other one is Sad But True. Oh, that would be fun. We'll squeeze in some Metallica there, won't we, Luke?
Mathias: we'll 100% have those songs ready to go. We also have, a big peer to peer track at the conference,
Knut: Yeah.
Mathias: not so much music, but yeah, that's peer to
Knut: Nothing else matters.
Luke: looking forward to that.
Knut: Sorry, brain fart. Sad but true is about the dollar still being around,
Paolo: Yeah, you can say that.
Luke: Okay.
Final Thoughts and Closing Remarks
Luke: Hey, we have to wind things down here because, we're, almost, out of time. So I'll just hand this, back to you both. Is there anything else you'd like to, mention about, your plans in the upcoming couple of years, in, key, toll, punch, anything like that?
Mathias: only that we're, like I said, we're integrating really hard right now, and it's a really fun time to, join the company because, we're small and efficient We get to work with Tether, which has a lot of benefits and it's getting really fast, so definitely check that out. And it's also a really fun time to join Keith in our public rooms.
There's a lot of very personal, in a good way, intense chats where you get to be part of the loop. I love to be part of those early communities and I would suggest everybody to check that out and go to the website and try it out.
Paolo: we will certainly do that. Yeah, I couldn't agree more. So go check out Keith and Holepunch and the Plan B forum in Lugano, You could visit tether. io, that is, the website where we are trying to explain what we have in our minds between, finance, bitcoin mining, energy production, AI, communications, brain chips and stuff, right? I think it's more exciting.
Mathias: Just those things, that's all.
Paolo: Yeah, we can piss off more than this. Thanks.
Mathias: a
Luke: No, It's just perfect. and is on that note, is there anywhere else specific you'd like to direct our listeners?
Paolo: just follow the social channels and give us feedback on kit all the time because these technologies, needs everyone's help to be nailed them.
Mathias: We love technical feedback. We love UX feedback. We're trying to make something that works for the masses, so anything is good.
Luke: So that's, all at Keet. Is that correct? For Keet?
Mathias: Key. io and pairs. com for our runtime. It's all peer to peer.
Knut: Alright,
Mathias: Wonderful. And you're also still on the legacy social media platforms, right? Yeah.
Knut: we'll make sure to include links to your handles so people can find you there if they would like. forward to seeing you in Lugano.
Paolo: Likewise, I
Knut: But yeah, worth saying again.
Paolo: Thank you for having an invitation.
Luke: Yes, we'll wrap things up here. This has been the Bitcoin Infinity Show.
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ b6424601:a11e4ff4
2024-10-26 12:12:56In 2007, my 10-year-old business had just signed a 5-year lease on Atlanta's Peachtree Road with enough space for my partner and our wives' separate companies to continue growing. We thought we were an overnight success 10 years in the making. 14K a month split between 3 companies, all in the housing and office design industry; what could go wrong?
As I look back on those early days, I realize that our business was fueled by the fiat jet fueled housing run-up. Two couples, three businesses, and all personally guaranteed. We thought we were an overnight success, but little did we know that the housing market was about to take a drastic turn.
In 2008, I joined a Vistage CEO group, where I was tasked with presenting to the group on my approach to designing buildings for individuals. I saw an opportunity to analyze the patterns that produced good projects for happy clients, and I teamed up with a contractor buddy to work on a joint presentation. Our efforts yielded ten principles that produced the highest ROI beyond providing a primary place to live.
These principles were the foundation of our approach to architecture, and they were based on our experiences working with individuals on their custom house projects. We focused on listening to our clients, designing buildings that stood out while fitting in, creating lifetime homes, and making projects sustainable and viable.
As I reflect on our journey, I realize that the principles we developed were an interesting reflection of what was happening to our clients in the housing market of that time and how we as architects help our clients get through the process. Over time, we had to adapt and evolve to respond to changing conditions.
In 2010, we made changes to respond to a client environment where projects happened without banks. Clients spent paper on their projects, and construction loans were not available. What the subsequent buyers wanted when the house was sold was off the table. Remember being thankful our clients had cash to spend on projects in our survival predicament.
In hindsight, our clients are probably grateful as well for being able to convert paper into a hard asset. The principles evolved slowly until the COVID came in 2020. I was ready to hunker down and go to business survival mode like back in the crash, converting staff to contractors again and only paying for billable work.
But "your" government made PPP rain from the sky on our small business with employees. In addition, clients working from home who needed change or from their vacation property added gasoline to the fire. By 2022, inflation raged, described as transitory, to change the build cost from 1.2 million to a new price of 2.2 million for the new Intown infill homes. That is 83% inflation over 2 years, no matter what the CPI said.
The principles pivoted to respond: going fast to respond to inflation, managing the stuff to deal with supply chain problems, providing a viability budget before starting work to help clients understand the cost, and guiding our clients through the choppy waters of inflation.
We added a new principle about stewardship, which has become a cornerstone of our approach. We want to become architects for life for our completed projects and owners. We want to maintain relationships, observe results, and be trusted advisors as our projects age and clients' needs evolve.
Today, we are proud to say that our principles have evolved into 10 guiding principles that organize our approach to producing architecture asset architecture for the individual. We leverage the team of clients, contractors, vendors, and our time through our principle based process to produce architecture worthy of being an asset for our clients and families.
These 10 principles are:
- Listen: Analyze and understand our client's goals, constraints, and opportunities to communicate our vision of what is possible.
- Establish Viability: Before starting our project process, we will engage our client in a pre-project viability phase to diagnose and prescribe our solutions with a timeline and budget for client approval.
- Be a Design Sherpa: Our process is the most important value we provide. Following our process milestones will lead new and experienced clients through the 1000’s of design decisions to evolve in the correct order at the proper time.
- Design in Context: We believe context is the caldron of good architecture fits into its location both from the outside and inside out. Designing in context allows a building to stand out while fitting into the adjacent network of spaces around it.
- Architecture is a team sport: We believe in custom teams for custom projects, collaborating with partners who care about our clients and believe in our process as much as we do.
- Design for the individual: We do our most fulfilling work with clients who will live in or operate architecture explicitly created for their needs.
- Investment iteration: We break down the design process into decision milestones, providing increasingly detailed pricing for initial ideas, building shell, and interior selections to empower clients to make informed decisions about the value they're willing to exchange for their desired architecture.
- Create Asset Architecture: Design and execute projects that hold long-term value and provide a return on investment beyond the currency used build the project.
- Be present: Designing and building stuff is an atypical and infrequent activity for our client. Help our clients enjoy the journey and results that could be life-changing (in a good way).
- Stewardship—We want to Become architects for life for our completed projects and owners. We want to maintain relationships, observe results, and be trusted advisors as our projects age and clients' needs evolve.
We're an architect tribe that has refined our principles to design buildings that truly matter for the people that use them. Aspire to create hard asset architecture worth exchanging for the hardest money there is.
HODL on.
-
@ 8cb60e21:5f2deaea
2024-09-10 21:14:08 -
@ 599f67f7:21fb3ea9
2024-10-26 11:54:10Zer da Cashu?
Cashu Bitcoinentzako Ecash protokolo irekia da, transakzio azkarrak eta doakoak eskaintzen dituena. Protokolo honen ezaugarri nabarmenetako bat pribatutasun ia perfektua eskaintzea da. Nostr nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg erabiltzaileak sortu zuen.
Hona hemen Cashu eta on-chain Bitcoin alderatzen dituen taula, Bangkok 2023ko Bitcoin Konferentzian nostr:npub1cj6ndx5akfazux7f0vjl4fyx9k0ulf682p437fe03a9ndwqjm0tqj886t6-k aurkeztutako Nuts and Bolts hitzaldian oinarrituta:
| Cashu | Bitcoin (on-chain) | |-----------------------|----------------------------| | Libururik gabe | Liburu banatua | | Titulartasun tokena | UTXO (Ustiaketa Ezberdinen Irteera) | | Transakzio itsutuak | Transakzio publikoak | | Zentralizatua | Deszentralizatua | | Konfiantzazkoa | Konfiantzarik gabe | | Aldi baterako transakzioak | Betiko transakzioak |
Ikusten dugunez, Cashuk pribatutasuna hobetzeko konfiantza gabeko izaera eta deszentralizazioa sakrifikatzen ditu. Konpentsazio hauek zentzuzkoak dira zaintza-zerbitzuetan, erabiltzailea dagoeneko zerbitzu zentralizatu eta fidagarri bat erabiltzen ari baita. Zaintza tradizionaleko irtenbideek pribatutasun eskasa dute, zaintzaileak erabiltzailearen funtsak zenbat diren eta norekin ari den transakzioak egiten jakin dezakeelako. Horrek esan nahi du norbanakoak erraz helburu eta zentsura daitezkeela. Gainera, datu-erregistroek "honeypot" bihurtzeko arriskua dute, hau da, erasotzaileentzat erakargarri.
Alderantziz, Cashu-ren mint-ek zaintzaile gisa jardun dezakete, baina erabiltzaileen nortasuna, duten funtsen kopurua edo norekin ari diren transakzioak egiten ezagutzeko aukerarik gabe. Mint-ek duten datu-erregistro bakarra gastatutako sekretuen zerrenda da, berriro erabili ezin direnak, baina erabiltzaileekin lotzeko modurik gabe. Horrela, Cashu-k pribatutasuna bermatzen du, zaintzaileak ez duelako inolako informaziorik erabiltzaileen jarduerei buruz, ohiko zaintza-soluzioekin gertatzen denaren kontrara.
Cashu-ren erabilera kasu batzuk
Cashu-ren erabilera kasu batzuk honako hauek dira: bonuak, dagoeneko zentralizatuak eta zaintza-zerbitzuak dituztenak; baliabide bakoitzeko ordainketa (pay-per-resource) APIak, nostr bideratzaileak eta mixnet-ak bezalako zerbitzuetarako; sistema integratuak, kontu eta saldo eredu tradizionala ordezkatzen dutenak; eta truke/mixinge zerbitzuak, gordailuak eta ateratzeak deslotzeko, pribatutasuna hobetzeko.
Historia
Ecash David Chaum-ek 1982an asmatu zuen, sinadura itsuak erabiliz balio elektronikoaren transmisiorako protokolo gisa. Cashu Ecash-en inplementazio bat da, David Wagner-en 1996ko Chaum-en itsutze-aldaketan oinarrituta dagoena, eta nostr sortu zuen.
Terminologia
Cashu nola funtzionatzen duen ulertzen laguntzeko, lehenik eta behin funtsezko terminologia batzuk azalduko ditugu.
Mint
Cashu-ren mint-a erabiltzaileen funtsen zaintzailea da. Bere zeregina tokenak jaulkitzea eta erretzea da, baita bikoiztutako gastuak saihestea ere. Cashu-ren mint-a Lightning nodo baten gainean dago, beraz, Lightning ordainketak bidali eta jaso ditzake, beste mint batzuekin trukeak barne. Hala ere, Lightning nodoa lineaz kanpo badago ere, ecash tokenekin transakzioak egin daitezke. Lightning-ekin ez bezala, jasotzailea linean egon beharrik ez du tokenak jasotzeko.
Mint-ak ez daki nor den erabiltzailea, zenbat funts dituzten edo norekin ari diren transakzioak egiten. Hala ere, mint-a erabiltzaileen funtsen zaintzailea denez, fidagarria den mint bat aukeratu behar duzu, eta eragilea nor den jakin. Erabil ezazu funts txikiekin edo tokenak berehala trukatu.
Token
Cashu token-a mint-ak sinatutako datu-puska bat da, eta erabiltzaileak token horiek bere zorroan gordetzen ditu. Ecash tokenak testu-kate hutsak direnez, edozein testu bidezko protokoloaren bidez bidal daitezke, adibidez, nostr, posta elektronikoa, SMS, etab. Cashu-k txanpon-sistema bat erabiltzen du, zenbateko finkatuak dituena. Analogia bat eginez, hau moneta fiduziarioen billeteen zenbatekoei dagokie. Adibidez, eurotan 5, 10, 20, 50, 100 euroko billeteak daude. Cashu-n, tokenak 2ren indarren arabera sailkatzen dira. Adibidez, 1, 2, 4, 8, 16, 32, 64, 128 satoshi, eta horrela aurrera.
Zenbatekoak erabiltzea erabiltzaileen artean anonimotasuna areagotzeko egiten da, eta mint-ek transakzioak erabiltzaileen nortasunekin lotzea zailagoa bihurtzeko.
Nola funtzionatzen duen, 5 urteko bati bezala azaldua
Erabiltzaile Alice-k Cashu token berriak sortu nahi ditu. Horregatik, Bob mint-aren arduradunarengana joaten da eta esaten dio: "Kaixo! Cashu token berriak sortu nahi ditut."
Bob-ek erantzuten dio: "Ados, ordaindu iezadazu eta bidali iezadazu sekretu itsu bat." Sekretu itsua esan nahi du Alice-k sekretua ezagutzen duela, baina Bob-ek ezin duela sekretu hori ikusi.
Alice-k sekretu bat sortzen du, eta ondoren itsutzen du, horrela Bob-ek ez dezan jakin zein den sekretu hori.
Alice-k Bob-i ordainketa egiten dio eta ordainketaren egiaztagiria eta sekretu itsua bidaltzen dizkio. Bob ordainketa jaso duela ziur dagoenean, Alice-ren sekretu itsua sinatzen du eta sinatutako sekretu itsua itzultzen dio. Bob-ek sinatu duelako, etorkizunean ziur egon daiteke tokena baliozkoa dela.
Alice-k Carol-i ordaindu nahi dio. Horretarako, sekretua eta sinatutako sekretu itsua desitsutzeko gakoa bidaltzen dizkio Carol-i.
Carol-ek bere tokena trukatu nahi du. Beraz, Bob-engana (mint-aren arduradunera) joaten da eta Alice-k eman dion sekretua eta desitsututako gakoa erakusten dizkio.
Nola jakiten du mint-ak Carol-i zenbat satoshi eman behar dizkion?
Lehenago aipatu genuen bezala, Cashu tokenak 2ren indarren araberako zenbatekoetan banatuta daude (1, 2, 4, 8, 16, 32...), paperezko diru billeteen antzera. Bob mint-ak zenbateko bakoitza sinatzeko gako pribatu berezi bat du. Adibidez, 1 satoshi zenbatekoaren tokenak sinatzeko gako pribatu bat du, 2 satoshi zenbatekoaren beste bat, 8 satoshi zenbatekoaren beste bat, eta abar. Horrela, Carol tokenak trukatzera datorrenean, Bob-ek badaki zein gako pribaturekin sinatu zuen token hori, eta horren arabera, tokenak zein zenbatekotakoak diren ezagutzen du. Horrela, Bob-ek Carol-i dagokion satoshi kopurua itzuli diezaioke, sinatutako tokenaren zenbatekoa kontuan hartuta.
Zer gertatzen da itzulkinekin?
Cashu-n ez dago itzulkinik diru fisikoan bezala. Horren ordez, mint-ari (Bob-i) eskatu behar diozu token zaharrak suntsitzeko eta berriak sortzeko, zenbateko berarekin. Adibide batekin azalduz: Demagun Alice-k bi token dituela, guztira 10 satoshi balio dutenak. Bata 8 satoshi da eta bestea 2 satoshi. Alice-k 9 satoshi bidali nahi dizkio Carol-i. Horretarako, mint-ari (Bob-i) eskatzen dio bere 2 satoshi tokena bi 1 satoshi token bihurtzeko. Horrela, Alice-k 9 satoshi bidal diezazkioke Carol-i: 8 satoshi token bat eta 1 satoshi token bat erabiliz. Gainera, beste 1 satoshi tokena berarentzat gordetzen du.
Lightning sarearen papera konektatzeko elementu gisa
Zer gertatzen da Alice-k David-i ordaindu nahi dionean, baina David-ek Bob-en mint-a ez du fidatzen, eta, aldiz, Erin ezagutzen du eta bere mint-a erabiltzen du? Alice-k bere tokenak Bob-en mint-ean trukatzen ditu, eta Bob-i eskatzen dio token horiek "urtzeko" edo Lightning satoshietara bihurtzeko. Ondoren, Bob-en mint-ak Lightning transakzio bat bidaltzen dio Erin-en mint-ari. Erin-en mint-ak transakzio hori jasotzen du, eta David-entzat token berriak sortzen ditu Lightning sarearen bidez Bob-en mint-etik jasotako satoshiekin. Horrela, Lightning sareak mint ezberdinak konektatzen ditu, erabiltzaileak (Alice eta David) mint ezberdinak fidatu arren, transakzioak segurtasunez egiteko.
Zer dator hurrengoa Cashu-rentzat?
Programagarri den ecash
Cashu-ri gastatzeko baldintzak gehitu ahal izango zaizkio, mint-ak baldintza horiek betearaziko dituelarik. Horrek ahalbidetu dezake kontratu adimendun sendoak sortzea, oinarrizko katean (Bitcoin blockchain) edo Lightning sarean sartu gabe. Horrela, ordainketa publikoak, lineaz kanpokoak eta maiztasun handikoak posible izango dira.
Zorren froga eskema (Proof of Liabilities Scheme)
Zorren Froga (PoL) Eskema Cashu-rentzat zaintzailea den mint-ak erabiltzaileak iruzurrez erabiltzea zailtzen du, epoka kontzeptua aurkeztuz. Eskema honetan, zaintzaile den mint-ak epoka bakoitzean gako pribatuak aldian-aldian biratzen ditu, eta azken epokan jaulkitako eta erretako tokenen zerrenda publikoak argitaratzen ditu. Hau Erreserben Froga (Proof of Reserves) eskemarekin uztartzen da, non erreserbak katean bertan multisig batean gordetzen diren. Horrela, mint-ak ezingo du bere erantzukizunak murriztu, erabiltzaileek iruzurra detektatzeko arriskua handitu gabe. Xehetasun gehiagorako, eskema honen azalpen osoa kontsultatu dezakezu.
Saiatu Cashu
Cashu probatzeko, [Nutstash] eta [eNuts] gidak erabil ditzakezu. Horretarako Lightning zorro bat eta telefono edo ordenagailu bat besterik ez duzu behar.
-
@ 599f67f7:21fb3ea9
2024-10-26 11:22:06Zer da Cashu?
Cashu Bitcoin-erako ecash protokolo ireki bat da, transakzio azkarrak eta komisio gabekoak eskaintzen dituena, pribatutasun ia perfektuarekin. Xehetasun gehiago nahi izanez gero, gure azalpena ikus dezakezu.
eNuts
eNuts Cashu-rako mugikorretarako zorro bikaina da, Android eta iOS (TestFlight) plataformetan eskuragarri dagoena. Mint anitzekin lan egitea ahalbidetzen du eta nostr bidez bidalketak egiteko aukera ere eskaintzen du.
⚠️ eNuts eta Cashu oraindik beta fasean daude. Funtsak galtzeko arriskua dago. Aplikazioa instalatzerakoan arriskuen inguruan irakurri. Galera ekonomikoei aurre egiteko gai zaren zenbateko txikiekin saiatu.
Probatu
Prozesu honetan zehar mint-ekin elkarreragin, ecash-a jaso eta bidali, segurtasun-kopiak egin, Lightning-era ateratzeak eta mint-en artean trukaketak egingo ditugu. Azkenik, nostr kontaktu funtzionalitatea probatuko dugu.
Instalatu
Sartu eNuts webgunera eta instalatu aplikazioa zure sistema eragilerako.
Mint bat gehitzea
Ecash-arekin elkarreragiteko, lehenik mint bat behar duzu. Mint honetan zure ecash token-ak sortzen eta itzultzen dira. Mint-a da zure Bitcoin-en zaindaria, baina ez daki nor zaren, norekin egiten duzun transakzioa, ezta zenbat diru duzun ere. Probetarako Txoko mint erabili dezakezu.
- Joan Txoko Mint-era. Kopiatu mint URL-a.
- eNuts-en, joan Aukerak > Mint kudeaketa eta sakatu + botoia. Itsatsi lehen urratsean kopiatu duzun mint URL-a.
💡 Mint gehigarriak ere gehitu ditzakezu. Mint publiko batzuk MintIndex-en aurki daitezke. Kontuan izan mint batzuek zenbateko jakin bat gordetzen dutela bideratze-gastuak ordaintzeko, eta, beraz, ezin dituzula zure sats guztiak atera.
Tokenak sortzea
Mint bat gehitu duzunean, eNuts-ek automatikoki galdetuko dizu mint horretatik Cashu token berriak sortu nahi dituzun.
- Erantzun Bai.
- Sortu faktura bat mintu nahi duzun zenbatekoarentzat. Zenbateko txiki batekin saiatu, adibidez, 100 sats.
- Ordaindu faktura Lightning zorro batetik. Faktura ordaindutakoan, ecash token-ak izango dituzu.
Prozesu honek aukera ematen dizu ecash token-ak sortzeko, eta horiek zure transakzioetarako erabiltzeko prest izango dituzu.
Ecash-ekin transakzioak egitea
Ecash-ekin transakzioak egitea, funtsean, datu multzoak bidaltzea eta jasotzea da. Funtzionalitate hauek zuk zeuk probatzeko, bidali eta jaso dezakezu zure buruari.
- Ecash bidaltzeko, sakatu Bidali > Ecash bidali.
- Mint bat baino gehiago erabiltzen baduzu, aukeratu bidali nahi duzun mint-a. Ondoren, aukeratu Kopiatu eta partekatu.
- Aukeratu zenbatekoa.
- Nahi izanez gero, gehitu ohar bat, eta sakatu Jarraitu.
- Berretsi ordainketa xehetasunak eta sortu token-a. Une honetan, coin selection funtzioa erabil dezakezu zein token erabili nahi dituzun hautatzeko.
Ohartu token-ak 1 sat, 2 sats, 4 sats, 8 sats, 16 sats eta antzeko zenbatekotan sailkatuta daudela. Horiek 10 euroko, 20 euroko edo 50 euroko billeteak bezala irudika ditzakezu. - Kopiatu token-a.
Une honetan, token-a beste norbaiti bidal diezaiokezu edo zure zorroan berreskuratu. Saiakera moduan, bigarren aukera hau egingo dugu.
- Ecash jasotzeko, sakatu Jaso > Itsatsi eta berreskuratu Ecash. eNuts-ek automatikoki irakurriko du zure arbeletik eta token-a berreskuratuko du.
💡 Zure transakzioen historian ecash token-a zain dagoen egiaztatu dezakezu, eta hartzaileak ez badu berreskuratu, itzuli dezakezu. Horretarako, sakatu zure historiako irteerako transakzioan eta aukeratu Egiaztatu token-a gastatu den. Token-a zain badago, Itzuli token-a sakatu dezakezu eta berriro zure zorroan izango duzu.
Multimint trukeak
Mint desberdinen artean bidalketak eta jasotzeak posibleak diren galdetu baduzu, erantzuna bai da, neurri batean. Hala ere, Cashu token-ak zuzenean mint batetik bestera bidaltzea ez da zuzenean egiten; horren ordez, transakzioak Lightning-era bideratzen dira, mint bat Lightning nodo bat ere badelako. Cashu token-ak ez dira bateragarriak nodo desberdinen artean.
Hau probatzeko, beste mint bat gehitu dezakezu oraindik egin ez baduzu, adibidez, cashme LNbits mint edo eNuts mint lehenetsia.
💡 Kontuan izan mint batzuek sats kopuru bat gordetzen dutela bideratze-gastuak ordaintzeko. Arazo hau konpontzeko, zure mint propioa sor dezakezu Bitcoin Txoko LNbits zorroarekin, Cashu luzapena aktibatuz.- Joan Aukerak > Mint kudeaketa atalera, eta aukeratu trukatu nahi duzun mint-a. Ondoren, joan Multimint trukeak atalean.
- Aukeratu trukatu nahi duzun mint-a.
- Aukeratu zenbatekoa eta sakatu Kuotak aurreikusi Lightning gastuen kalkulua egiteko.
- Sakatu Jarraitu.
- Egiaztatu xehetasunak, eta nahi izanez gero, coin selection funtzioa erabili. Ondoren, sakatu Orain trukatu.
Prozesu honetan, bidaltzen ari den mint-ak Lightning faktura bat ordaintzen du jasotzen ari den mint-aren bidez. Faktura osatu bezain laster, trukatuta dagoen token-a zure zorroaren saldoan agertu beharko litzateke jasotzen ari den mint-ean.
Ateratzea
Zure Cashu sats-ak berriro Lightning sats bihurtu nahi dituzunean, ateratzeko aukera duzu. Prozesua hauxe da:
- Sakatu Bidali > Lightning faktura ordaindu.
- Mint bat baino gehiago erabiltzen baduzu, aukeratu bidaliko duzun mint-a.
- LN faktura edo LNURL atalean, sartu faktura bat, LNURL edo Lightning helbide bat; edo, besterik gabe, QR kode bat eskaneatu.
- Aukeratu zenbatekoa eta sakatu Kuotak aurreikusi.
- Egiaztatu xehetasunak, eta dena zuzen dagoela ikusi ondoren, sakatu Ateratzea.
Prozesu hau amaitutakoan, mint-ak Cashu token-ak trukatzen ditu eta Lightning faktura ordaintzen du.
Segurtasun kopiak
Cashu token-ak babesteko prozesua, agian, ezberdina izango da Bitcoin eta Lightning zorroak babesteko ohiko prozesuekin alderatuta. Diru-funtsak datu blokeekin irudikatzen direnez, Cashu token-ak babesten dituzunean datu bloke horiek bakarrik babesten ari zara. Honek esan nahi du segurtasun-kopiak baliogabetzen direla transakzio berri bat egiten duzun bakoitzean.
eNuts aplikazioak Cashu token bat sortzen du zure funts guztiekin, eta token horiek zein mint-ekoak diren jasotzen du.
- Segurtasun-kopia bat sortzeko, joan Aukerak > Segurtasuna > Sortu babeskopia token. Kopiatu token-a eta gorde toki seguru batean.
Bestela, mint bakoitza banaka babestu dezakezu: - Horretarako, joan Aukerak > Mint kudeaketa atalera eta aukeratu babestu nahi duzun mint-a. Ondoren, sakatu Funtseak babestu, kopiatu token-a eta gorde toki seguru batean.
Berreskuratzea
Berreskuratzeko, kopiatu babeskopia token-a eta ireki eNuts aplikazioa. Aplikazioak automatikoki irakurriko du zure arbelean dagoena eta galdetuko dizu token-a berreskuratu nahi duzun.
Nostr
eNuts aplikazioak Nostr integrazioa eskaintzen du, horrela zure kontaktu zerrendara ecash bidali ahal izateko. Funtzio hau erabiltzeko, honako pauso hauek jarraitu behar dituzu:
- Joan Kontaktuak atalera eta itsatsi zure Nostr gako publikoa.
- eNuts-ek zure kontaktu zerrenda eskuratuko du relays-etatik. Tamalez, bilaketa funtzioa oraindik ez dago eskuragarri, eta horrek kontaktu zuzena aurkitzea zaildu dezake, kontaktu asko izanez gero.
Hartzaileak Nostr motako 4 mezu zuzena jasoko du, Cashu token-arekin. Hartzaileak mezu hau bere zorroan berreskuratu eta token-a erabili ahal izango du.
Ondorioa
Gida hau lagungarria iruditu zaizu? Saiatu Cashu token batzuk bidaltzen Nostr bidez!
-
@ 5d4b6c8d:8a1c1ee3
2024-09-10 19:03:05It was great having football back. The 49ers and Chiefs continue to dominate, the Raiders, Jets, and Donkeys continue to disappoint.
I only made two picks last week. The Raiders money line was a dud, but my parlay of the Steelers money line with the under was a big hit. Unfortunately, freebitcoin hasn't put any NFL games up, yet. Hopefully they get around to it at some point.
I really like this type of parlay. The house treats outcomes as though they're independent, but I don't think that makes sense. In the event of a Steelers' win, the under was far more likely than the over, because their offense stinks and the game was likely a defensive slog.
In line with that thinking, I made two parlays this week: 1. Raiders money line with the under (7:1): yes, I'm going back to the Raiders. They're probably going to lose, but if they win, it will be because of awesome defense. 2. Bengals money line with the over (4.5:1): Maybe Joe Burrow stinks this season, but maybe the Bengals had been looking ahead to KC. The Chiefs offense is phenomenal again, so the Bengals are only likely to win if this turns into a shootout.
Are there any odds you're excited about (doesn't have to be football)?
originally posted at https://stacker.news/items/679894
-
@ 09fbf8f3:fa3d60f0
2024-09-10 13:21:23由于gmail在中国被防火墙拦截了,无法打开,不想错过邮件通知。
通过自建ntfy接受gmail邮件通知。 怎么自建ntfy,后面再写。
2024年08月13日更新:
修改不通过添加邮件标签来标记已经发送的通知,通过Google Sheets来记录已经发送的通知。
为了不让Google Sheets文档的内容很多,导致文件变大,用脚本自动清理一个星期以前的数据。
准备工具
- Ntfy服务
- Google Script
- Google Sheets
操作步骤
- 在Ntfy后台账号,设置访问令牌。
- 添加订阅主题。
- 进入Google Sheets创建一个表格.记住id,如下图:
- 进入Google Script创建项目。填入以下代码(注意填入之前的ntfy地址和令牌):
```javascript function checkEmail() { var sheetId = "你的Google Sheets id"; // 替换为你的 Google Sheets ID var sheet = SpreadsheetApp.openById(sheetId).getActiveSheet();
// 清理一星期以前的数据 cleanOldData(sheet, 7 * 24 * 60); // 保留7天(即一周)内的数据
var sentEmails = getSentEmails(sheet);
var threads = GmailApp.search('is:unread'); Logger.log("Found threads: " + threads.length);
if (threads.length === 0) return;
threads.forEach(function(thread) { var threadId = thread.getId();
if (!sentEmails.includes(threadId)) { thread.getMessages().forEach(sendNtfyNotification); recordSentEmail(sheet, threadId); }
}); }
function sendNtfyNotification(email) { if (!email) { Logger.log("Email object is undefined or null."); return; }
var message = `发件人: ${email.getFrom() || "未知发件人"} 主题: ${email.getSubject() || "无主题"}
内容: ${email.getPlainBody() || "无内容"}`;
var url = "https://你的ntfy地址/Gmail"; var options = { method: "post", payload: message, headers: { Authorization: "Bearer Ntfy的令牌" }, muteHttpExceptions: true };
try { var response = UrlFetchApp.fetch(url, options); Logger.log("Response: " + response.getContentText()); } catch (e) { Logger.log("Error: " + e.message); } }
function getSentEmails(sheet) { var data = sheet.getDataRange().getValues(); return data.map(row => row[0]); // Assuming email IDs are stored in the first column }
function recordSentEmail(sheet, threadId) { sheet.appendRow([threadId, new Date()]); }
function cleanOldData(sheet, minutes) { var now = new Date(); var thresholdDate = new Date(now.getTime() - minutes * 60 * 1000); // 获取X分钟前的时间
var data = sheet.getDataRange().getValues(); var rowsToDelete = [];
data.forEach(function(row, index) { var date = new Date(row[1]); // 假设日期保存在第二列 if (date < thresholdDate) { rowsToDelete.push(index + 1); // 存储要删除的行号 } });
// 逆序删除(从最后一行开始删除,以避免行号改变) rowsToDelete.reverse().forEach(function(row) { sheet.deleteRow(row); }); }
```
5.Google Script是有限制的不能频繁调用,可以设置五分钟调用一次。如图:
结尾
本人不会代码,以上代码都是通过chatgpt生成的。经过多次修改,刚开始会一直发送通知,后面修改后将已发送的通知放到一个“通知”的标签里。后续不会再次发送通知。
如需要发送通知后自动标记已读,可以把代码复制到chatgpt给你写。
-
@ 655a7cf1:d0510794
2024-09-10 13:16:15Currently have kyc BTC, huge fan of lightning Network. Because I am a constant user of lightning. Plan on doing my business with lightning as well , peer-to-peer I'm not sure if I'm so worried about kyc I might be misguided in this situation.
originally posted at https://stacker.news/items/679520
-
@ 599f67f7:21fb3ea9
2024-10-26 11:20:48Zer da lightning address bat?
Lightning address bat irakurgarria den helbide elektroniko baten antza duen helbidea da, adibidez username@domein.com, baina bitcoinetan ordainketak berehala eta merke jasotzeko aukera ematen du. Ez duzu zure gailuan nodo bat linean izatea behar, eta ez duzu eskuz faktura bat sortu behar norbaitek ordainketa egin nahi dizunean.
Oso interesgarria, ezta?Nola funtzionatzen du, orduan?
Lightning Address-ek LNURL pay protokoloa erabiltzen du, Lightning Network-aren gainean dagoen geruza bat da.
Prozesua hurrengo urratsetan laburbil daiteke:
- Erabiltzaile batek zure Lightning Address erabiliz ordainketa egin nahi duenean, haien zorroak helbide hori LNURL payRequest batean bihurtzen du.
- LNURL payRequest arrakastatsu baten bidez, zorroak BOLT11 faktura bat eskuratzen du, eta faktura hori ordainketa burutzeko erabiltzen da.
Hau da, prozesuaren oinarrizko pausoak hurrengoak dira:
💡 Lightning Address > LNURLp > BOLT11 faktura.
Lightning Network-ekin integratuta dagoen sistema honi esker, ordainketak erraz, azkar eta modu automatizatuan burutu daitezke.Oso ondo dirudi, baina zein da tranpa?
Lightning Address-en inplementazio askok kustodia dute (nahiz eta ez den beti horrela), izan ere, domeinu bat eta beti linean dagoen nodo bat behar dira Lightning Address-ak funtzionatzeko. Kustodia sistema bat denez, zure fondoak kudeatzen dituenak edozein momentutan kontrolatu edo kendu ahal dizkizu eta zure transakzioak monitorizatu ditzake.
Domeinuaren jabearengan fidatu behar duzu, zure Lightning Address-aren erregistroa aldatu ez dezan. Eta, gainera, LNURL zerbitzaria linean ez badago, sistema ez da funtzionatzen.
Bitcoin Txoko-k LNbits-en oinarritutako Lightning Address irtenbide sinplea eskaintzen du. Hau ere kustodia sistemakoa da, beraz, gomendagarria da Bitcoin Txoko zorroan kopuru txiki bat bakarrik gordetzea eta gero auto-kustodia zorro batera ateratzea, satoshi gehiago jasotzen dituzun heinean.Hasteko prest bazaude, hona hemen behar duzuna:
-
Zure zorroa sortzea
Lehenik eta behin, ez baduzu oraindik egin, joan bitcointxoko.com webgunera eta zorro bat sortu. Zorroari nahi duzun izena jar diezaiokezu. -
Luzapenak aktibatzea
Lightning Address-ak funtzionatzeko Pay Links luzapena behar da. Horretarako: -
Joan tresna-barrako Extensions (Luzapenak) atalera eta Pay Links luzapena aktibatu.
-
Ordainketa esteka bat sortzea
- Ireki Pay Links luzapena eta egin klik New Pay Link (Ordainketa Esteka Berria) aukeran.
- Aukeratu sortu duzun zorroa.
- "Item Description" atalean, nahi duzun testua sar dezakezu.
- Aukeratu zure Lightning Address-erako erabiltzaile izena. Zure Lightning Address hau bezalakoa izango da: erabiltzailea@bitcointxoko.com.
-
Fixed Amount aukera desmarkatu eta jarri gutxieneko balioa 1 eta gehienekoa 500000.
⚠️ Gehienezko balioa handiagoa jar dezakezu, baina ordainketa handiek huts egiteko probabilitate handiagoa dute, Bitcoin Txoko Lightning nodoaren kanalaren sarrera-gaitasun mugatua dela eta. Gomendagarria da 500000 satoshitan mantentzea. - Orain, ireki Advanced Options (Aukera Aurreratuak) eta aldatu Comment maximum characters (Komentarioaren gehieneko karaktere kopurua) 799-ra. Ez da beharrezkoa, baina aurrerantzean funtzionalitate gehiago emango dizu. - Azkenik, markatu Enable nostr zaps aukera behealdean, Lightning Address bidez zaps jasotzeko aukera izateko.
Aukera aurreratuak beste parametro batzuk konfiguratzea ahalbidetzen dute, baina nahi baduzu hutsik utz ditzakezu.
Azkenik, dena zuzen dagoela egiaztatu ondoren, egin klik Create Pay Link (Sortu Ordainketa Esteka) botoian.Horrela, zure Lightning Address sortuta izango duzu eta ordainketak jaso ahal izango dituzu!
Proba egitea
Zure Lightning Address ondo funtzionatzen duen probatu nahi baduzu, beste zorro batera joan, Bidali (Send) aukera hautatu eta helmuga gisa zure Lightning Address idatzi. Ondoren, bidali zeure buruari satoshi batzuk.
Ondoren, itzuli Bitcoin Txoko zorrora eta egiaztatu ordainketa jaso duzun. Litekeena da orria freskatu behar izatea ordainketa agertzeko.
Dena ondo atera bada, zorionak! 🥳
Bestela, jakinarazi iezaguzu. Beti prest gaude laguntzeko.Hurrengo urratsak
Nostr zaps
Zure Bitcoin Txoko Lightning Address nostr profilean gehitu dezakezu eta horrela zaps jasotzeko erabil dezakezu. Normalean, hau hurrengo pausuekin egiten da: - Joan Profile (Profila) atalera. - Hautatu Edit (Editatu) eta Lightning Address aldatu.
LNDhub
Zure LNbits zorroa telefonoan inporta dezakezu LNDhub bezala, Zeus edo BlueWallet bezalako aplikazioak erabiliz. Horrela, ez duzu nabigatzailean zorroa ireki beharko aldian-aldian saldoa egiaztatu edo ordainketak egiteko.
Nola egin jakiteko, ikus ezazu nostr:naddr1qqxnzdej8y6ryvejxc6nvwpnqyg8wumn8ghj7mn0wd68ytnhd9hx2q3qtx0k0a7lw62vvqax6p3ku90tccgdka7ul4radews2wrdsg0m865sxpqqqp65w4hhl8s.QR kodea
Zure LNURLp QR kodea parteka edo inprima dezakezu, jendeak mugikorrarekin eskaneatu dezan. Oso erabilgarria da zure denda lokaleko jabeak Lightning ordainketak jasotzeko sistema ezartzea nahi baduzu! - Parteka ezazu Sharable Page (Parteka daitekeen Orrialdea) esteka. - Edo, QR kodea PDF formatuan inprima dezakezu: joan View Link (Esteka Ikusi) atalera eta hautatu Print (Inprimatu).
Horrela, zure Lightning Address erabilera praktikoa handitu eta errazago kudeatu dezakezu! Hasi zaitez !
-
@ 6ad3e2a3:c90b7740
2024-09-10 08:21:48I’ll write a separate Week 1 Observations later, but I wanted to dedicate this space solely to mourning my Circa Survivor entry.
Circa Survivor costs $1000 to enter and has a $10M prize for the winner, usually split by several as things get down to the wire. Three years ago, when the prize was $6M Dalton Del Don and I — the first time we ever entered — made it to the final 23 in Week 12. The value of our share was something like $260K at that point, but we got bounced by the Lions who beat the 12-point favored Cardinals and took home nothing.
When you enter a large survivor pool, the overwhelming likelihood is you’ll meet this fate at some point, whether in Week 1 or 12. So it’s not really the loss that’s painful, so much as not getting to live and die each week with a chosen team. You lose your status as “the man in the arena whose face is marred by dust and sweat and blood” and become just an observer watching and commentating on the games without the overarching purpose of surviving each week.
This year was also different due to the lengths to which I went to sign up. It’s not just the $1000 fee, it’s getting to Vegas in person, the $400 in proxy fees (you need locals to input your picks for you if you don’t live there), the $60 credit card fee, the $200 crappy hotel I booked at the last minute, the flights (one of which was cancelled due to heat), the rental car that necessitated, the gas, getting lost in the desert, the entire odyssey while sick and still jet-lagged in 122-degree heat.
But it’s not about the money, and it’s not even about the herculean effort per se, but the feeling and narrative I crafted around it. I was the guy who got this done. I flew from Portugal to San Francisco for 12 hours, two days later from SF to Palm Springs to help my 87-YO uncle with his affairs, improvised to get from Palm Springs to Vegas, which took six hours due to road closures, signed up for the contests, made the flight back to San Francisco, flew to Denver at 7 am the next day, took my daughter the Rockies game in the afternoon and then on to Boulder the following day. Maybe that’s not so impressive to some of you, but for me, an idle ideas person, a thinker, observer, someone who likes to express himself via a keyboard, it was like Alexander the Great conquering Persia.
And it’s not only about that smaller mission, or the narrative I crafted around it, but a larger one which was to bring sports content to nostr which I vowed to do before the summer which is why I felt I had to make the effort to get to Vegas to sign up for the contests, to have sufficient skin in the game, to have something real about which to write.
And I got the idea to do this seriously because Heather wrote a guide to Lisbon which I posted on nostr, and a few prominent developers there were surprisingly excited about getting that kind of quality content on the protocol. And I thought — if they’re this excited about a (very in-depth) guide to one particular city in Europe, how much more value could I create posting about a hobby shared by 50-odd million Americans? And that thought (and the fact I had to go to Palm Springs anyway) is what set me off on the mission in the first place and got me thinking this would be Team of Destiny, Part 2, only to discover, disappointingly, it’s real destiny was not to make it out of the first week.
. . .
While my overwhelming emotion is one of disappointment, there’s a small element of relief. Survivor is a form of self-inflicted torture that probably subtracts years from one’s life. Every time Rhamondre Stevenson broke the initial tackle yesterday was like someone tightening a vice around my internal organs. There was nothing I could do but watch, and I even thought about turning it off. At one point, I was so enraged, I had to calm down consciously and refuse to get further embittered by events going against me. Mike Gesicki had a TD catch overturned because he didn’t hold the ball to the ground, The next play Tanner Hudson fumbled while running unimpeded to the end zone. I kept posting, “Don’t tilt” after every negative play.
There’s a perverse enjoyment to getting enraged about what’s going on, out of your control, on a TV screen, but when you examine the experience, it really isn’t good or wholesome. I become like a spoiled child, ungrateful for everything, miserable and indignant at myriad injustices and wrongs I’m powerless to prevent.
At one point Sasha came in to tell me she had downloaded some random game from the app store on her Raspberry Pi computer. I had no interest in this as I was living and dying with every play, but I had forced myself to calm down so much already, I actually went into her room to check it out, not a trace of annoyance in my voice or demeanor.
I don’t think she cared about the game, or about showing it to me, but had stayed with her friends most of the weekend and was just using it as an excuse to spend a moment together with her dad. I scratched her back for a couple seconds while standing behind her desk chair. The game was still going on, and even though I was probably going to lose, and I was still sick about it, I was glad to have diverted a moment’s attention from it to Sasha.
. . .
In last week’s Survivor post, I wrote:
What method do I propose to see into the future? Only my imagination. I’m going to spend a lot of time imagining what might happen, turn my brain into a quantum device, break space-time and come to the right answers. Easier said than done, but I’m committed.
It’s possible I did this, but simply retrieved my information from the wrong branch of the multiverse. It happens.
. . .
I picked the Bengals knowing full well the Bills were the correct “pot odds” play which is my usual method. Maybe when the pot-odds are close, I might go with my gut, but they were not especially close this week, and yet I still stuck with Cincinnati because they were the team I trusted more.
And despite it being a bad pick — there are no excuses in Survivor, no matter what happens in the game, if you win it’s good, and lose it’s bad — I don’t feel that badly about it.
I regret it only because I wish I were still alive, but it was my error. I went with what I believed, and it was wrong. That I can live with 100 times better than swapping out my belief for someone else’s and losing. Had I done that I’d be inconsolable.
. . .
I won’t let the Survivor debacle undermine my real mission to bring sports to nostr. Team of Destiny 2 would have been a compelling story, but it was never essential. After all, my flight was cancelled and I had to improvise, so now my Survivor entry is cancelled, and I’ll have to improvise again. The branch of the multiverse where the Bengals won didn’t give me the information I wanted, but maybe it was what I really needed to know. That I am the man in the arena yet, the battle was ever against myself, and for a brief moment, while my team was losing, I prevailed.
-
@ 00e8cdc1:e8e10d96
2024-10-28 00:57:12Opinion about Cake Wallet (android)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
I work on Haveno, which is closely linked with the people who created Cake Wallet. I will attempted to make a reproducible build and will share my findings both here and on the bounties pages raised by one of your staff, I will also blog my findings on https://kewbit.org/ in detail which a source reproducible if possible.
Hopefully this will help the community have better visibility. -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEE1wObvs5L5RfU4Q96azzMiJ9/IkkFAmce4TwACgkQazzMiJ9/ IkmT6g//XjoJP5T2vCsO0YxvJfuPyiGvSfHxxvIVRahNh5VKhGE625kDQfbzNGx6 UTjvLoygXTMcaHwFgYQz2VI/8ZkY0vur+6DlN7nwn21fBARtB3NviddCONuVxStp dVsgcTfDsBMMsBZPU+d6Z5XYhw72RKOt1zQ6o6X89MmP1zezd/AZRhkoib/bBMHR I1l8BKxlJ27JuRsQLHL/Zj+RRhLTFIdV2b0LQlFV5RZhPZPacdJUK1riNhxORTKN Rbn1etoFHQYp2xaeFUvXX9JcUPjn6hQpFSNvq0Dt9BbuuiYmotMK+5E4Ed3SRxLJ VKLcODOzUpYbnUftyGkouistNT7s9iMbV+syNkb7S55ifXxNq+vFJJ7Cz9IzVN99 EZm9Wpc2s2j0AxW66v60aRREBeo67uemx2EwAjiSF6+2UHuYBQUqY8vP6CHdCE+X u8TCP/JB3o7LyU0+icMjEGaI3Voy3Yaw0BI3ulD//yS/P9kzJUYmNLNsYWMZBlDZ /1HrhbeWKcEMKrnuYIKRcEH08jzOD51T2cIihjrPrSl+8/fk0q7Q2rTbBpNWcUD4 xqrKyHDZuUhEZWfnAZiUDPAm8x0Vq/Uwhb1K+LK6OAvZSo06sEKERj+cBw+gE9Jx lxHSz9HO3554jhjR1JIwA8Plrq65yI7wKo86OwefkebvtG6dfeY= =lCV6 -----END PGP SIGNATURE-----
WalletScrutiny #nostrOpinion
-
@ 6bae33c8:607272e8
2024-09-10 07:50:12I went 1-3 in my NFFC leagues for two reasons: (1) Christian McCaffrey failed to score 17 points (because he was inactive), and I failed to bid enough on Jordan Mason because at the time of the FAAB last week, the Niners were flat-out lying about his likelihood of playing and like an idiot I believed them; and (2) I sat Mason in another league at the last minute for Jaleel McLaughlin because Fantasy Pros (that scourge of a site I swear off every year) had Mason not just lower, but absolutely buried in its RB rankings. I would have ignored a close call between the two, but I thought if he’s this low, the market must place a high likelihood on McCaffrey playing, and I don’t want to take a zero. This is the problem with being lazy and outsourcing your research to a bunch of midwits with misaligned incentives. I really should have delved deeply into all the McCaffrey reports and made my own assessment.
The problem with sites like Fantasy Pros is the grading system is different than the fantasy game itself. I imagine you’d get dinged hard for ranking Mason high if McCaffrey plays, and so it’s safer to rank him low. Moreover, one thing the fantasy industry is really bad at is pricing in that kind of risk. If everyone’s playing the market is pretty good at evaluating opportunity, per-play production and hence output, but if someone is 50/50 to get opportunities at all, they can’t handle it very well. Obviously Mason was a good bet to go for 20 points if McCaffrey were scratched, and so he should have been projected for 14 if it were 50/50 (he’d get some points even if McCaffrey played), but that we was projected for less than five (IIRC) made me think it was like 80/20.
But I knew it was a very bad sign Monday morning (after it was too late to pivot) when McCaffrey was still not deemed definite — it’s not like he got hurt last week, but he’s had a full month to heal. (Actually maybe the Achilles was last week, but because injury reporting sucks and teams lie, it’s impossible to know the real reason he missed the game. If it’s still the calf, all bets are off because if he’s not back in a month, five weeks won’t magically heal him.)
In any event, I’m glad I have Mason in two NFFC leagues, and I went all-in to get him (and I used him) in my RotoWire Dynasty one at least. But I should have been 3-1 if I had used my brain, and am instead 1-3, the win thankfully in the Primetime.
-
The 40-minute edited version of the game for God knows what reason flashed the final score (32-19) briefly after I hit play. So it spoiled the game for me, and the whole time I was just trying to figure out how they got to that number, realizing probably Jake Moody went bananas for some people, and he did.
-
I love that Allen Lazard got the TDs and not Garrett Wilson. Sometimes schadenfreude is all you got. I don’t think Lazard is a priority pickup, but the Jets tree is pretty thin, and Rodgers knows and apparently still trusts him.
-
Aaron Rodgers looked good to me, like his old self. He threw accurate passes, had a few drops, and the pick was bad luck. No idea why Mike Williams was ignored though.
-
Breece Hall got all the work until garbage time. No surprise, but he still looks like a top-five pick despite the fumble and poor per-play output.
-
Jordan Mason ran hard, looked a bit like Isiah Pacheco out there. If McCaffrey is out, that’s how I’d value him.
-
Deebo Samuel benefits a little (eight carries) with McCaffrey out. Just has a slightly bigger role in the ground game.
-
Brock Purdy played well, but didn’t have to do much.
-
You have to love that Juaun Jennings led the 49ers in receiving yards and Kyle Juszczyk was third when you have no part of the 49ers passing game. George Kittle and Brandon Aiyuk will get theirs eventually, but you just can’t count on volume for either one.
-
-
@ e97aaffa:2ebd765d
2024-10-26 10:10:21Não é possível determinar o número exato de quantos bitcoins terá o Satoshi, já foram efectuados diversos estudos, apesar de discrepâncias nos resultados, estima-se entre os 900 mil a 1.1 milhões de moedas.
A Arkham identificou apenas 3 endereços (P2PKH) pertencentes ao Satoshi, não esquecendo que no início não existiam endereços, os bitcoins eram enviados diretamente para a pubkey (chave pública, P2PK).
Este gráfico apenas contabiliza os bitcoins em endereços. Mesmo após o desaparecimento de Satoshi, a comunidade continua a enviar moedas para os seus endereços.
O endereço principal recebe regularmente moedas, têm mais de 38 mil transações, entre elas, destaca-se as seguintes:
Este ano, um anônimo doou quase 27btc, incrível.
O problema
A muito longo prazo, com o desenvolvimento tecnológico, os computadores vão ficar cada vez mais poderosos. Conforme os computadores vão evoluindo, o desenvolvimento da computação quântica, o bitcoin vai acompanhar essa evolução tecnológica, para se manter seguro. Os utilizadores terão que migrar de endereços mais antigos para endereços mais resilientes. É uma evolução natural.
O problema está nas moedas que estão em tecnologias/endereços mais antigos, sobretudo nos que têm a pubkey exposta, estes serão os primeiros alvos. Vai demorar muitos anos, mas um dia será possível ter acesso a esses UTXOs. O pagamento para P2PK foi utilizado entre 2009 e 2010, hoje em dia é quase inexistente.
Não é necessário entrar em pânico, os endereços SegWit são muito mais seguros e resilientes, porque oculta a pubkey. A pubkey só é revelada no momento em que efetua a primeira transação(enviar), assim para garantir uma melhor segurança é essencial não reutilizar endereços.
Só que existem 45370 UTXOs que não realizaram a migração para tecnologias mais seguras, isto representa mais de 1.7 milhões de Bitcoins, ou seja, 8.73% do supply.
Apenas uma minoria dessas moedas pertence a bitcoiners no “ativos”, a grande maioria pertence ao Satoshi e as pessoas que perderam as chaves. Apesar de tudo, esporadicamente algumas dessas moedas são movidas, este ano já foram 172 UTXOs, equivalente a 7707 BTC.
Além dos P2PK ainda existem os endereços que foram reutilizados, que tem a chave pública exposta, assim o número aumenta para 4 milhões de moedas, apesar de ser um número elevado, não é preocupante, porque parte destas moedas ainda tem donos ativos, quando for necessário, vão se mover para endereços mais seguros.
O dilema
«Moedas perdidas apenas fazem com que as moedas de todos os outros valham um pouco mais. Pense nisso como uma doação para todos.» – Satoshi
O problema é que essas moedas não estão perdidas para sempre, talvez daqui a 5 ou 20 anos, não sei, mas uma coisa é certa, um dia vão ser recuperadas e não serão pelos legítimos donos.
Assim, nos próximos anos a comunidade de bitcoiners terá um dilema para resolver, o que fazer com os Bitcoins do Satoshi/P2PK?
Existem duas possibilidades: não fazer nada e essas moedas voltam a circular ou então, mudar o código para bloquear as moedas para sempre.
Qualquer uma das soluções será algo extremamente polémica, certamente vai dividir a comunidade, vai ser uma discussão acirrada, dificilmente haverá um consenso, por isso é mais provável ficar tudo como está.
Vendo bem, o bitcoin vai passar por uma situação similar ao ouro, periodicamente são descobertas moedas de ouro, que foram escondidas durante décadas ou séculos pelos nossos antepassados. O ouro que estava “perdido”, volta à circulação.
Será uma nova corrida ao “ouro”, o resgate das moedas do Satoshi. Se esse resgate for lento e gradual, não terá grande impacto, mas se for num curto espaço de tempo será um enorme problema, são mais de 8% de supply que entram no mercado.
O preço poderá ser um problema, mas a meu ver, o grande problema é a busca em si, porque será mais lucrativo gastar energia na procura das moedas do Satoshi do que minerar novos bitcoins.
Será que a hashrate não cairá drasticamente? Colocando em causa a segurança da rede.
Esta é a minha principal dúvida e receio.
A minha opinião
Hoje eu penso que deveríamos optar por algo intermédio, nem com a proibição total, nem sem restrições. Apenas nos blocos com o número múltiplo de 144, ou seja, um bloco por dia, seria possível incluir transações P2PK. Além disso, o número de transações por bloco seria limitado: 1 UTXO maior que 10 btc ou vários UTXOs com uma soma inferior a 10 btcs.
Este limite de “espaço” é suficiente para os legítimos donos das moedas efetuarem as transações no período pré quântica. No período pós quântica, se a quebra da criptografia for muito rápida, o limite de bloco vai criar uma gargalo, vai obrigar o aumento drástico do fee, reduzindo o lucro do “ladrão”, além de financiar os mineradores.
Conclusão
A minha ideia é muito complexa, mas o bitcoin é um protocolo simples, a comunidade é muito conservadora, dificilmente aceitaria algo assim tão complexo. Por isso eu digo, só existem dois caminhos plausíveis, ou não fazer nada ou a proibição total dos P2PK.
Mas vamos ter muitos anos para pensar sobre o assunto.
-
@ 129f5189:3a441803
2024-09-09 23:28:41Project 2025, outlined in the Heritage Foundation's "Mandate for Leadership" document, serves as a fundamental guide for the next Republican administration. Despite Trump's extensive denial, in today's material, we will explore the deepening and continuation of many policies already employed during his first term. The idea is that this material will serve as a reference document to consult and verify what was actually implemented and/or followed. https://image.nostr.build/e3b89d71ff929258e5d9cb0b5ca8709a381598f43d8be4b17df3c69c0bc74d4a.jpg This document presents proposals for the foreign policy and the State Department of the United States of America, as well as the strategy with its political partners and adversaries. We will also address the U.S. government's communication strategy abroad. https://image.nostr.build/a4250b786f611b478aaf0be559427ad7d4296fbcacb2acc692c7f0d7eb06b0dd.jpg Reorienting U.S. Foreign Policy: Proposals for a Conservative Future In the chapter "The Department of State" from the "Mandate for Leadership," also known as "Project 2025," Kiron K. Skinner presents a comprehensive plan to reform U.S. foreign policy under a conservative administration. Skinner, a renowned foreign policy expert and former Director of Policy Planning at the U.S. State Department, outlines global threats and offers specific recommendations to strengthen the U.S. position on the international stage. Below, we present a detailed analysis of the proposals, emphasizing direct quotes and explanations of the key points discussed. https://image.nostr.build/278dcd7ef0439813ea35d0598319ee347f7a8cd7dfecac93be24ffdd0f6ecd04.jpg History and Structure of the State Department Since its founding in 1789, the State Department has been the primary diplomatic channel of the U.S. With nearly 80,000 employees and 275 posts around the world, it faces significant structural challenges. Skinner highlights that "the biggest problem of the State Department is not a lack of resources," but the belief that it is "an independent institution that knows what is best for the U.S." (Skinner). The scholar and former Director of Policy Planning at the U.S. State Department during the Trump administration emphasizes these points, considering the difficulty in accepting a conservative international approach by State Department employees (the equivalent of the Ministry of Foreign Affairs in other countries). https://image.nostr.build/049939926793e86000b300b9a962dc0ae7e271d9a607ae36d8cb08642adf4174.jpg Political Leadership and Bureaucratic Support To align the State Department with presidential priorities, Kiron suggests appointing political leaders who are committed to the president's vision. "Leadership should include political appointees in positions that do not require Senate confirmation, including senior advisors and deputy secretaries" (Skinner). Furthermore, she emphasizes the importance of training and supporting these appointees to ensure effective coordination between agencies. https://image.nostr.build/6ed704cc9612aa6489e048b143f1e489c1f8807fdf2ab011b4ba88e4a1e3619a.jpg Global Threats to the U.S. The document identifies five countries that pose significant threats to the security and prosperity of the U.S.: China, Iran, Venezuela, Russia, and North Korea. 🇨🇳 China: Skinner argues that China represents an existential threat. "The U.S. needs a strategic cost-imposing response to make Beijing's aggression economically unviable" (Skinner). Additionally, she emphasizes that the issue is not with the Chinese people, but with the communist dictatorship that oppresses them: "As with all global struggles against communist and other tyrannical regimes, the issue should never be with the Chinese people, but with the communist dictatorship that oppresses them" (Skinner). https://image.nostr.build/e707273f1d08bdc4187123a312bd116695b5f603066e11ad30fcef4466730b6b.jpg 🇮🇷 Iran: The Obama administration, through the 2015 nuclear deal, provided the Iranian regime with a "crucial cash bailout" (Skinner). Kiron criticizes this approach, asserting that the U.S. should support the Iranian people in their demands for a democratic government. "The correct policy for Iran is one that recognizes that it is in the U.S. national security interests and the human rights of Iranians that they have the democratic government they demand" (Skinner). https://image.nostr.build/cda7d29a62981f59ad8d77362b3867b552f190c8d7e0e8d9233cb7c1d1d0309e.jpg 🇻🇪 Venezuela: Under the regimes of Hugo Chávez and Nicolás Maduro, Venezuela has transitioned from a prosperous country to one of the poorest in South America. Skinner suggests that the U.S. should work to contain Venezuelan communism and support its people. "The next administration should take steps to put Venezuela's communist abusers on notice and make progress in helping the Venezuelan people" (Skinner). https://image.nostr.build/f53e12564cae74d4b50c24b0f3752dd2c53b70bd1c00a16df20736fb8588417d.jpg 🇷🇺 Russia: The war between Russia and Ukraine divides opinions among conservatives, and the document considers three lines of action. Some advocate continuing support for Ukraine, while others believe that such support does not serve U.S. security interests. "The conservative approach rejects both isolationism and interventionism, first asking: What is in the interest of the American people?" https://image.nostr.build/8fedaf77129f4801f4edb8b169b2ac93a3e518b8bf3642b3abc62575b5435fa3.jpg One conservative school of thought believes that "Moscow's illegal war of aggression against Ukraine represents major challenges to U.S. interests, as well as to peace, stability, and the post-Cold War security order in Europe" (Skinner). This view advocates for continued U.S. involvement, including military and economic aid, to defeat Russian President Vladimir Putin and return to pre-invasion border lines. Another conservative school of thought argues that U.S. support for Ukraine is not in the interest of U.S. national security. According to this view, "Ukraine is not a member of the NATO alliance and is one of the most corrupt countries in the region" (Skinner). It is argued that the European nations directly affected by the conflict should help defend Ukraine, but the U.S. should seek a swift end to the conflict through a negotiated settlement. https://image.nostr.build/22db3d0e79340c1d62344a2b8a3bfddbe4d5bd923cf77d70cfbf5ebf73e4db3e.jpg A third conservative viewpoint avoids both isolationism and interventionism, proposing that "each foreign policy decision should first ask: What is in the interest of the American people?" (Skinner). From this perspective, continued U.S. involvement should be fully funded, limited to military aid while European allies address Ukraine's economic needs, and must have a clear national security strategy that does not endanger American lives. https://image.nostr.build/939fea0bb5c69f171a3da1073e197edcff23a600430b3bc455f6d41bc8a0319f.jpg Although not stated explicitly, I believe this third viewpoint is the one Kiron Skinner desires, as she considers American intervention important but advocates for balancing the costs of the war with its partners in the European Union and NATO. https://image.nostr.build/d1d0c7fb27bfc5dd14b8dde459b98ed6b7ca2706473b2580e0fbf5383f5a9c10.jpg 🇰🇵 North Korea: North Korea must be deterred from any military conflict and cannot be allowed to remain a de facto nuclear power. "The U.S. cannot allow North Korea to remain a de facto nuclear power with the capability to threaten the U.S. or its allies" (Skinner). https://image.nostr.build/95febb04f6d2e0575974a5e645fc7b5ec3b826b8828237ccc1f49b11d11d6bce.jpg Detailed Policy Proposals Refugee Admissions: The Biden administration has caused a collapse in border security and internal immigration enforcement, according to Skinner. She argues that the U.S. Refugee Admissions Program (USRAP) should be resized. "The federal government should redirect screening and verification resources to the border crisis, indefinitely reducing the number of USRAP refugee admissions until the crisis can be contained" (Skinner). https://image.nostr.build/a5740b33842e47b9a1ab58c7b72bd6514f9b6ffbb18706deed1445c59236bc0d.jpg Corporate Collaboration with China: Skinner criticizes the collaboration of companies like BlackRock and Disney with the Chinese regime, noting that "many are invested in an unwavering faith in the international system and global norms," refusing to acknowledge Beijing's malign activities. She emphasizes that the real issue is the communist dictatorship that oppresses the Chinese people, not the Chinese citizens themselves (Skinner). https://image.nostr.build/05a3c787f144c4519c2ee8a4b22e64b8729842819ace4b439c849ef70ecd60b4.jpg Fentanyl and Mexico: The trafficking of fentanyl, facilitated by Mexican cartels in collaboration with Chinese precursor chemical manufacturers, is a critical problem. "Mexican cartels, working closely with Chinese manufacturers of fentanyl precursor chemicals, are sending this drug to the U.S., causing an unprecedented lethal impact" (Skinner). The next administration should adopt a firm stance to halt this public health crisis. https://image.nostr.build/59e32aeef5dabab3344a94a3e415d57fed91fece8bc3c5f068e9f6f7d71f99bd.jpg Re-hemispherization of Manufacturing: Kiron proposes that the U.S. promote the relocation of manufacturing to partner countries such as Mexico and Canada. "The U.S. should do everything possible to shift global manufacturing to Central and South American countries, especially to move it away from China" (Skinner). This would improve the supply chain and represent a significant economic boost for the region. https://image.nostr.build/5d5d7d792f1c94eb6e2bd7a4b86c43236765719e183be8ba8e00ed7dd07eca66.jpg Abraham Accords and a New “Quad”: Skinner suggests that the next administration should expand the Abraham Accords to include countries like Saudi Arabia and form a new security pact in the Middle East that includes Israel, Egypt, Gulf states, and possibly India. "Protecting the freedom of navigation in the Gulf and the Red Sea/Suez Canal is vital for the global economy and, therefore, for U.S. prosperity" (Skinner). https://image.nostr.build/c87cd99cb3ea2bef40e9d1f1fea48b0c9f9f031f3077fff658f15f850e7b8589.jpg Policy for Africa: The U.S. strategy for Africa should shift focus from humanitarian assistance to economic growth and countering China’s malign activities. "Development assistance should focus on fostering free market systems and involving the U.S. private sector" (Skinner). She also highlights that African nations are opposed to the imposition of policies such as abortion and LGBT lobbying. https://image.nostr.build/44df42f32e61c14786ac46c231d368b14df4dc18124a0da458e8506f917302f2.jpg Relations with Europe and Asia Europe: The U.S. should demand that NATO countries increase their contributions to defense. "The U.S. cannot be expected to provide a defense umbrella for countries that do not contribute adequately" (Skinner). Additionally, urgent trade agreements should be pursued with the post-Brexit United Kingdom. https://image.nostr.build/6c013bacfa9e6505ad717104d9a6065f27664a321dd2c3d41fd7635258042d2f.jpg Asia: The withdrawal of U.S. troops from Afghanistan was humiliating and created new challenges. Skinner emphasizes the importance of India as a critical partner to counterbalance the Chinese threat and promote a free and open Indo-Pacific. Cooperation within the Quad, which includes the U.S., India, Japan, and Australia, is essential to this strategy. "The priority is to advance U.S.-India cooperation as a pillar of the Quad" (Skinner). https://image.nostr.build/1cc988b2f70d855c9676d7e38ffdb23564d04ad6333a8d256698f416a1c6704e.jpg International Organizations Skinner criticizes the corruption and failure of the World Health Organization (WHO) during the Covid-19 pandemic. "The next administration should end blind support for international organizations and direct the Secretary of State to initiate a cost-benefit analysis of U.S. participation in all international organizations" (Skinner). She also supports the “Geneva Consensus Declaration on Women’s Health and Protection of the Family,” which is against abortion, and believes that the U.S. government should not fund international organizations that promote abortion (Skinner). https://image.nostr.build/0b583511fef16d68736804fae2f15850eb5c803af01f006a3fe10cdbc583f48c.jpg Conclusion Skinner’s document provides a detailed vision for reorienting U.S. foreign policy under a conservative administration, with an emphasis on ensuring that the State Department serves the national interests defined by the president. With these guidelines, the next administration has the opportunity to redefine the U.S. position on the global stage, promoting security, prosperity, and freedom. https://image.nostr.build/697522745c5947cd4384cdd302b531ee98ce5d59a5d72de0b4f3a52c9abd4821.jpg
-
@ 07e188a1:24d232f3
2024-10-26 09:16:44Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
A sub heading goes a long way
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
-
@ d625c21c:dfa2ef0f
2024-10-26 08:26:23Join the best SSC coaching for top-notch faculty, comprehensive materials, and proven success. Start your journey today! Securing a position in the Staff Selection Commission (SSC) exams requires dedicated preparation, strategic guidance, and comprehensive resources. Our coaching center offers the best SSC coaching with high-quality, free study materials to streamline your journey towards success.
SSC Coaching Overview SSC exams cover multiple levels, including CGL (Combined Graduate Level), CHSL (Combined Higher Secondary Level), CPO (Central Police Organization), and JE (Junior Engineer). Each level tests different skills, but all require strong analytical abilities, time management, and a grasp of essential concepts. Scholars Academy SSC coaching program focuses on: Conceptual Clarity: Breaking down complex topics for an in-depth understanding. Practice-Centric Approach: Emphasis on solving a variety of questions to tackle different exam scenarios. Customized Plans: Adaptive study plans tailored to your strengths and weaknesses.
Why Choose SSC Coaching? Expert Guidance: Learning from experienced professionals with years of SSC coaching expertise helps streamline preparation. Time Efficiency: Structured coaching saves time, allowing candidates to cover the syllabus thoroughly and systematically. Updated Content: Our free study materials are regularly updated, following the latest SSC exam patterns and question trends. Motivational Environment: Being part of a focused, competitive setting helps maintain discipline and motivation.
The benefits of Scholars Academy SSC Coaching with free study material are as follows: Cost Efficiency: Free study material reduces the financial burden, providing students with access to top resources without additional costs. Comprehensive Coverage: From previous year question papers and e-books to mock tests, our free material includes everything essential for SSC preparation. Flexibility and Accessibility: Materials are provided in digital formats, allowing students to study anytime, anywhere. Focused Practice: Our free materials include topic-wise exercises and full-length tests to reinforce concepts and improve time management. Performance Analytics: With self-evaluation features, students can track their progress, identify areas for improvement, and receive targeted feedback.
Success Stories and Testimonials Over the years, many of our students have achieved top ranks in SSC exams, showcasing the effectiveness of our coaching methodology and materials. Here’s what some of them have to say: Anita Sharma (SSC CGL Topper): “The structured coaching, combined with regular tests and free materials, helped me focus on key areas and strengthen my weaknesses. The faculty’s insights were invaluable in my journey.” Rohit Mehta (SSC CHSL Qualifier): “The study materials were comprehensive, with questions modeled on actual exams. The coaching team’s support made a big difference in boosting my confidence.” Megha Verma (SSC JE Selection): “Getting quality materials for free and continuous guidance from experienced mentors was instrumental in my success.”
Our Coaching Methodology Personalized Learning Plans: We create individualized study schedules, focusing on each student’s specific needs and exam goals. Intensive Practice Sessions: Our program includes regular mock tests, speed drills, and concept quizzes to build both speed and accuracy. Doubt Clearing Sessions: Dedicated sessions with mentors allow students to resolve doubts, clarify complex topics, and strengthen their conceptual understanding. Real-Time Feedback: Each student receives actionable feedback on their performance, focusing on areas for improvement and boosting overall confidence. Motivational Support: We foster a positive, motivating environment to keep students engaged and confident throughout their preparation journey.
Enroll Today By joining our SSC coaching program, you’re not only investing in expert guidance but also gaining access to a wealth of resources, including free study materials, that bring you closer to your SSC aspirations. Free Study Material for SSC Exams Our SSC coaching center offers a range of free study materials designed to equip students with essential tools for effective preparation. From foundational concepts to advanced practice, we cover everything needed to excel in SSC exams.
Comprehensive Study Material for SSC Exams We provide detailed, well-organized study materials covering all SSC exam sections, including Quantitative Aptitude, Reasoning Ability, English Language, and General Awareness. Each module is crafted to ensure in-depth learning and thorough practice: Concept Notes: Detailed explanations of fundamental concepts and problem-solving techniques. Topic-Wise Exercises: Practice questions for each topic, allowing students to focus on individual sections. Revision Guides: Concise notes summarizing key concepts and formulas for quick revisions.
Free SSC Study Material Download Students can access and download our SSC study materials at no cost. These downloadable resources include: PDF Notes: Covers all topics comprehensively with examples and practice questions. Formula Sheets: Essential for quick reference, especially useful in Quantitative Aptitude. E-Books: Covering General Awareness and English, these books provide an extensive base of knowledge. How to Download: Visit our website, sign up for a free account, and access the downloadable materials instantly.
Practice Tests and Mock Exams Our practice tests and mock exams are designed to simulate real SSC exams, providing students with essential test-taking experience: Topic-Based Tests: Focus on specific areas, ideal for targeted practice. Full-Length Mock Exams: Simulate the actual SSC exam experience, helping students gauge their readiness and time management skills. Instant Feedback: After each test, students receive a detailed performance analysis with actionable insights.
Previous Year Question Papers Accessing and practicing with previous years' question papers is crucial for SSC preparation. We offer a collection of past papers, enabling students to understand the question patterns and difficulty levels: Detailed Solutions: Each question is accompanied by a step-by-step solution. Topic Distribution Analysis: Learn which topics frequently appear, allowing for focused study. Time-Based Practice: Helps students build speed and accuracy under exam conditions.
Study Material FAQs 1. What materials are included in the free downloads? We provide PDF notes, topic-specific exercises, formula sheets, mock tests, and previous year question papers. 2. Are the materials updated to match the latest SSC exam pattern? Yes, all materials are regularly updated to reflect the latest SSC exam trends and patterns. 3. Can I access the study material offline? Once downloaded, all materials can be accessed offline, allowing you to study anytime. 4. Do I need to pay for additional study resources? Our free materials cover all major topics required for SSC exams. However, for advanced guidance, premium resources are available. 5. Are there solutions provided for practice questions and mock tests? Yes, all practice questions and mock tests come with detailed solutions for effective learning. SSC Exam Preparation Guide Preparing for SSC exams demands dedication, structured study plans, and access to quality resources. Here’s a comprehensive guide to our offerings for SSC CGL, CHSL, and MTS exams, covering everything from coaching and study materials to syllabus details and preparation tips.
SSC CGL (Combined Graduate Level) Coaching Our SSC CGL coaching is designed to help students excel in one of the most competitive government exams. We offer: In-Depth Coverage of All Topics: From Quantitative Aptitude to General Awareness, every topic is thoroughly covered. Experienced Faculty: Trainers with a proven track record in SSC exams provide guidance and mentorship. Doubt Clearing Sessions: Personalized sessions to address individual queries and doubts.
SSC CGL Syllabus and Exam Pattern The SSC CGL exam consists of multiple tiers, each with a specific syllabus: Tier I: General Intelligence & Reasoning, General Awareness, Quantitative Aptitude, English Comprehension. Tier II: Quantitative Abilities, English Language & Comprehension, Statistics, and General Studies (Finance and Economics). Tier III: Descriptive Paper (Essay/Letter Writing). Tier IV: Computer Proficiency Test/Skill Test. Exam Pattern: Each section has multiple-choice questions with negative marking in Tiers I and II.
SSC CGL Free Study Material To aid students in preparation, we offer free downloadable materials: Notes and eBooks: Covers each section with explanations and examples. Formula Sheets and Tips: Key formulas and shortcuts for Quantitative Aptitude. Previous Year Papers: Solved papers for familiarity with exam patterns.
SSC CGL Preparation Tips Understand the Exam Pattern: Familiarize yourself with the tier system and focus on scoring sections. Time Management: Allocate specific hours daily for each subject to ensure balanced preparation. Daily Practice: Attempt questions regularly to build speed and accuracy. Revision: Revisit important concepts and formulas frequently.
SSC CGL Practice Tests Our mock tests include: Full-Length Mock Tests: Real exam simulation to assess your preparedness. Sectional Tests: Focus on specific sections for targeted practice. Performance Analysis: Get detailed feedback on your performance.
SSC CHSL (Combined Higher Secondary Level) Coaching Our SSC CHSL coaching program is structured to help students aiming for higher secondary level positions: Special Focus on Core Areas: Reasoning, Quantitative Aptitude, English, and General Awareness. Conceptual Learning: Breaking down complex concepts for easy understanding. Regular Mock Tests: To help students practice under timed conditions.
SSC CHSL Syllabus and Exam Pattern Tier I: General Intelligence, Quantitative Aptitude, English Language, General Awareness. Tier II: Descriptive Paper (Essay and Letter Writing). Tier III: Skill Test/Typing Test. Exam Pattern: Tier I is objective type, while Tier II is descriptive. There is negative marking in Tier I.
SSC CHSL Free Study Material We provide free resources including: PDF Study Notes: Detailed notes covering all important topics. Solved Previous Year Papers: Provides insight into commonly asked questions. Mock Papers: Realistic practice papers with varying difficulty levels.
SSC CHSL Preparation Tips Focus on Basics: Strengthen foundational knowledge in all subjects. Practice Writing: Essential for the descriptive section in Tier II. Review Past Papers: Familiarize yourself with the question types and difficulty. Stay Updated: For General Awareness, read current affairs regularly.
SSC CHSL Practice Tests Our practice tests help students gain confidence and improve time management: Sectional and Full-Length Tests: Practice in both focused and exam-like settings. Instant Feedback: Detailed analysis of each test for targeted improvement.
SSC MTS (Multi-Tasking Staff) Coaching SSC MTS coaching is designed for candidates aiming for Group C positions. Our coaching covers all essentials for this entry-level exam: Focused Coaching: Covering all required topics in Quantitative Aptitude, Reasoning, and General Awareness. Basic to Advanced Training: Sessions tailored for beginners as well as advanced learners. Mock Tests: Practice in an exam-like environment.
SSC MTS Syllabus and Exam Pattern Paper I: General Intelligence, English Language, Numerical Aptitude, General Awareness. Paper II: Descriptive Test (Essay/Letter Writing). Exam Pattern: Paper I is objective with negative marking, and Paper II is descriptive to assess writing skills.
SSC MTS Free Study Material Our free study materials include: Topic-Wise Notes: Clear explanations with practice questions. Previous Year Question Papers: Helps understand the exam pattern. Study Guides: Focus on key concepts and frequently asked questions.
SSC MTS Preparation Tips Regular Revision: Particularly for Numerical Aptitude and General Awareness. Practice Writing: Essential for the descriptive paper. Mock Tests: Practice regularly to improve speed and accuracy.
SSC MTS Practice Tests To ensure readiness, we offer: Timed Mock Tests: To simulate real exam conditions. Sectional Practice: For focused improvement in weaker areas. Performance Insights: Detailed feedback after each test. Courses Offered Our SSC coaching center provides various courses tailored to meet the unique needs of SSC aspirants. From classroom and online coaching to personalized programs, we offer a range of options with comprehensive study resources for effective SSC preparation.
-
SSC Classroom Coaching Our classroom coaching program is ideal for students who thrive in a traditional, interactive learning environment. It includes: In-Person Lectures: Delivered by expert faculty with years of experience in SSC coaching. Daily Practice and Doubt Sessions: Regular practice sessions and personalized doubt-clearing. Mock Tests and Performance Tracking: Assess your progress with regular tests and track your improvement.
-
SSC Online Coaching Our online coaching program offers flexibility for students who prefer remote learning or have time constraints: Live Online Classes: Real-time, interactive classes covering the entire syllabus. Recorded Lectures: Access recorded sessions for self-paced study and revision. 24/7 Doubt Resolution: Online discussion boards and chat support for resolving doubts.
-
Personalized Coaching Programs Our personalized coaching programs are tailored to the individual strengths and needs of each student, focusing on: Customized Study Plans: Adaptive schedules based on your strengths and areas for improvement. One-on-One Sessions: Individual mentoring sessions for focused attention. Goal Setting and Tracking: Personalized targets and regular progress reviews.
-
Study Resources Our coaching includes a variety of study resources designed for comprehensive SSC preparation, accessible across platforms.
Online Video Lectures Topic-Wise Video Lectures: Covering each subject thoroughly. Concept-Focused Videos: Explaining complex concepts in an easy-to-understand manner. Downloadable Content: Download videos for offline access and revision.
Important SSC Exam Topics and Guides Exam Guides: Complete topic breakdowns for SSC exams, focusing on high-scoring areas. Tips and Strategies: Subject-specific strategies to tackle each section efficiently. Frequently Asked Questions: Insights into commonly asked questions across all SSC exam tiers.
SSC Exam Preparation Apps and Tools We recommend and provide access to apps and tools to assist with SSC preparation: Daily Practice Apps: Mobile-friendly apps offering quizzes and daily practice questions. Performance Analytics Tools: Track your performance, identify weak areas, and customize your study plan. SSC Prep Games: Engaging apps with educational games and flashcards for easy learning.
Downloadable E-Books for SSC Exams Access a library of downloadable e-books covering key SSC topics: Quantitative Aptitude and Reasoning: Books with solved examples, formulas, and practice questions. General Awareness and English Language: Comprehensive guides with theory, practice, and revision notes. Mock Test Collections: E-books with mock tests and detailed solutions for exam practice.
Blog Our blog keeps students updated with the latest insights and tips for SSC exam preparation. SSC Exam Updates and News: Stay informed about exam dates, syllabus changes, and other key updates. SSC Exam Preparation Tips: Practical tips from experts to help students maximize their potential. Time Management for SSC Exams: Guides on managing time effectively for each section. Common Mistakes to Avoid in SSC Exams: Learn about common pitfalls and how to avoid them.
-
-
@ 129f5189:3a441803
2024-09-09 23:23:45Project 2025, outlined in the "Mandate for Leadership" document by the Heritage Foundation, is a crucial guide for the next Republican administration. Crafted by conservative intellectuals from major American think tanks, this plan promises to have significant influence on a potential Donald Trump administration, even if he does not formally acknowledge it as his government plan. https://image.nostr.build/443d69c16dc32659be2353ce48d170d397e0ee682ffc3c4108df3047fd54472d.jpg This document presents proposals to depoliticize government agencies, increase efficiency, and reduce costs, aiming to dismantle the Deep State and combat the Woke agenda associated with the Democratic Party. https://image.nostr.build/06de3f0de3d48e086f47d0418d30e32cbfe0d88f452a93706987b7394458952d.jpg Dissolution of the DHS and Redistribution of Functions The Department of Homeland Security (DHS) was established in 2002 in response to the September 11 attacks, with the goal of consolidating various agencies responsible for domestic security under a single command. The DHS includes agencies such as FEMA, TSA, ICE, and CISA. Project 2025's proposal to dissolve the DHS and redistribute its functions to other agencies aims to address excessive bureaucracy and a lack of cohesion, arguing that centralization has failed to effectively integrate its diverse missions. https://image.nostr.build/ffca8d274914b725183b8fb19162c1b63f4d987c24e598f2eca88901d4a1a43c.jpg Impact on the Democratic Deep State: The dissolution of the DHS would pose a significant threat to the Democratic Deep State, as it would redistribute the power concentrated in a single entity across multiple other agencies, making it more difficult to politicize and centralize control over domestic security operations. This decentralization would reduce the ability to use the DHS as a political tool against opponents. https://image.nostr.build/1597e3b88572fe8aae7ce67cdaf975a873cf8bc68f76d59cb4253ad1520fc7bc.jpg Primary Recommendations Combining Immigration Agencies: Merge U.S. Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), U.S. Citizenship and Immigration Services (USCIS), the Office of Refugee Resettlement (ORR) of the Department of Health and Human Services (HHS), and the Executive Office for Immigration Review (EOIR) of the Department of Justice (DOJ) into a new autonomous border and immigration agency. https://image.nostr.build/58eef4f2eca0ed2400261ec878c1dba2ca4bca519a16751b1fb7abd45da2906b.jpg Privatization of the TSA: Privatize the Transportation Security Administration (TSA), drawing inspiration from Canadian and European models, to reduce costs and improve service for travelers. Division of the Secret Service (USSS): The U.S. Secret Service (USSS), responsible for protecting national leaders and investigating financial crimes, would be divided. The protective element would be transferred to the Department of Justice (DOJ), while the financial investigations element would be moved to the Department of the Treasury. https://image.nostr.build/0a065cdbf158db4bc17b9aacd4af5a94029004caaa152eebf2c557042b08a641.jpg Impact on the Democratic Deep State: The division of the USSS would significantly weaken centralized control over protection and financial investigations, making it more difficult to use these functions for political purposes. Transferring the protective element to the DOJ and the financial investigations element to the Treasury would complicate efforts for any group or party to manipulate these crucial government functions for partisan objectives. https://image.nostr.build/1597e3b88572fe8aae7ce67cdaf975a873cf8bc68f76d59cb4253ad1520fc7bc.jpg Cybersecurity and Infrastructure Security Agency (CISA) Established in 2018, CISA is a federal agency responsible for protecting the U.S. critical infrastructure from cyber threats. CISA's mandate includes ensuring cybersecurity for sectors such as energy, transportation, and healthcare, and it collaborates with public and private entities to strengthen the country’s cyber resilience. Criticisms and Restructuring Proposals: Project 2025 strongly criticizes CISA for deviating from its original mission and being used as a political tool for censoring speech and influencing elections. The proposal is to transfer CISA to the Department of Transportation (DOT) and return the agency to its statutory focus. https://image.nostr.build/8bfb4a45053de96a775f67e3e1b83a44d9a65fee4705e3b16d3359bd799b8af2.jpg Review of Executive Order 12333 Executive Order 12333, issued in 1981, sets guidelines for U.S. intelligence activities, including the collection, analysis, and dissemination of information. Project 2025 proposes a review of this order to ensure that intelligence agencies are not used for political purposes but are focused on protecting national security. Objectives of the Review: Prevent Abuse: Ensure that intelligence collection is conducted legally, without being used to target political opponents. Ensure Impartiality: Reaffirm that intelligence operations must be conducted impartially, with a sole focus on the country's security. https://image.nostr.build/90d31cb35a33048d311716df2fbc65c97bd4c1972977e266133654404393fca0.jpg Reforms in Public Service Facilitation of Public Employee Dismissal: Project 2025 emphasizes the need to simplify the process for dismissing public employees who do not perform their duties impartially or who promote specific political agendas. Performance Evaluations: The document highlights the importance of merit-based compensation, stating that performance evaluations are only effective when tied to real consequences. Research indicates that 90% of major private companies in the U.S. use a merit-based pay system linked to evaluations. However, in the federal government, compensation remains largely based on seniority, despite efforts to adopt merit-based pay. https://image.nostr.build/1b858fd7b2a23c3c65c0677d3e69c44976721bbdcbe7facf4682ba3371562cff.jpg Inclusion of Employees Aligned with Conservative Values: Aligned Hiring: Establish mechanisms to hire public employees who share conservative values, ensuring that the policies and practices of agencies are consistent with the principles endorsed by the administration. https://image.nostr.build/ddbf5c59e7bb479998433991347f9d301dd117fbca0edb0f94e98fcac90b2974.jpg Controversial Cases and Politicization: Hunter Biden Laptop Case: Project 2025 harshly criticizes the FBI and the Department of Justice, accusing them of acting in a biased and politically motivated manner. The authors suggest that the agency is intimidating parents who protest by labeling them as "domestic terrorists," while simultaneously suppressing politically unfavorable speech under the guise of combating "disinformation." Furthermore, the critique highlights that the FBI is alleged to be neglecting violent attacks on pregnancy centers and violations of laws prohibiting attempts to intimidate Supreme Court justices. The criticism intensifies with allegations that the FBI interfered in domestic elections and engaged in propaganda operations, specifically citing the purported Russian collusion conspiracy in 2016 and the suppression of the Hunter Biden laptop case in 2020, which is seen as a threat to the Republic. https://image.nostr.build/e4f571a14102a939164465498bef514379ec0443e71a58e12f50c518e00570c6.jpg Politicization of the FBI: Election Interference: Russia Hoax and Trump, Suppression of Hunter Biden’s Laptop, and Big Tech Collusion. Revelations about the FBI’s role in the 2016 "Russia Hoax" and the suppression of Hunter Biden’s laptop in 2020 suggest that the agency may have strayed from its impartial duties. These actions indicate concerning politicization, where the agency appears to have been used to influence the political landscape in favor of certain interests. This includes collaboration between the FBI and Big Tech companies to control discourse. https://image.nostr.build/5dcd45fcec939b782d29d8d2e3d3b45244c525b5dbd3240f1629a4632e390a86.jpg Comprehensive Review of FBI Investigations: It is crucial to conduct an immediate and thorough review of all significant investigations and activities within the FBI, terminating those that are illegal or contrary to national interests. This step is essential for restoring public trust in the FBI. A public report on the findings of this review could enhance transparency and confidence. https://image.nostr.build/df98e2c6aff123d806187eab13d24a3ebb30a87df1f44cf57be97dc5624fff88.jpg Structural Reorganization: Align the FBI within the Department of Justice (DOJ) according to its purposes of national security and law enforcement. The agency should be under the supervision of the Assistant Attorney General for the Criminal Division and the National Security Division, ensuring that the FBI does not operate as an independent entity but is instead subordinated to the DOJ’s directives. https://image.nostr.build/0d1c0015c6b67a8afc2dd1595357ea571fcd5a9d83829065f49f9b60cf553eb0.jpg Prohibition on Policing Speech: Prohibit the FBI from engaging in activities related to combating "disinformation" or "misinformation" disseminated by Americans who are not linked to plausible criminal activities. The Constitution, through the First Amendment, prohibits the government from policing speech, ensuring a healthy public debate without governmental intervention. All these measures represent a significant attack on the "Deep State" within American institutions. These public policies have been considered a dictatorial threat by many sectors of the American press. However, the real issue should be the politicization of unelected bureaucrats by a political faction. https://image.nostr.build/9a44b19d15d53314f89528c1d89e2f637030ea18d8907a6a8c4e27d07064b8ec.jpg Combating Woke Culture in the Intelligence Community Future leadership of the Intelligence Community (IC) needs to implement a plan to replace the "woke" culture and identity politics that have spread throughout the federal government. The goal is to restore traditional American values such as patriotism, racial impartiality, and job competence, which have been replaced by advocacy for "social justice" and identity politics. https://image.nostr.build/7929dca5e36273c8e751f36d6ca6229f362e30792bce735f10be7e5d8581af5f.jpg Final Considerations The Heritage Foundation’s Project 2025 is not merely an administrative reform plan; it is a manifesto of resistance against the Washington status quo. The proposals aim to dismantle established power structures, eliminate politicization, and combat the Woke agenda. If implemented, this plan would profoundly impact how the U.S. government operates, promoting a more efficient, limited government aligned with conservative principles. Threat to the Democratic Deep State: A potential new administration under Donald Trump represents an existential threat to the Democratic Deep State entrenched in American institutions. The dissolution of the DHS, depoliticization of intelligence agencies, division of the Secret Service, review of Executive Order 12333, privatization of the TSA, and the hiring of employees aligned with conservative values are all measures that would significantly weaken centralized control and the ability to use these institutions for political purposes. By dismantling concentrated power and promoting a more transparent and accountable government, Project 2025 aims to restore public trust and ensure that government agencies serve national interests rather than partisan ones. Of course, not all aspects of the plan may be implemented, but the prospect of several of these measures being enacted should be a cause for concern for the Democratic Deep State.
-
@ 9017cf6a:3d8a7adb
2024-10-27 21:46:06Ricardo Nunes (MDB) é eleito prefeito de São Paulo
O prefeito de São Paulo, Ricardo Nunes (MDB), conquistou sua reeleição neste domingo (27) e agora terá mais quatro anos para administrar a maior cidade do Brasil.
Apoiado por Jair Bolsonaro (https://www.conexaopolitica.com.br/tag/jair-bolsonaro/) e pelo PL (https://www.conexaopolitica.com.br/tag/pl/), que indicou seu vice na chapa, o emedebista foi confirmado como o vencedor do segundo turno disputado contra o esquerdista Guilherme Boulos (PSOL).
Nunes assumiu a prefeitura da capital paulista em 2021, após a morte de Bruno Covas (PSDB), de quem era vice na chapa eleita em 2020. Aos 56 anos, ele agora terá um mandato completo para gerenciar a principal metrópole da América do Sul.
Comments: https://www.conexaopolitica.com.br/ultimas/ricardo-nunes-mdb-e-eleito-prefeito-de-sao-paulo/#respond
https://www.conexaopolitica.com.br/ultimas/ricardo-nunes-mdb-e-eleito-prefeito-de-sao-paulo/
-
@ b7ccd493:6ba2260f
2024-10-26 06:48:44符文代币(Rune Token)$DOG的高价值并不仅仅源于其市场上的炒作或代币的稀缺性,而是基于Satoshi Nakamoto的比特币(Bitcoin)架构中所蕴含的核心技术和理念,尤其是Satoshis(聪)在这个代币体系中所扮演的基础性作用。
-
符文代币的价值根源:基于比特币的架构 符文代币 $DOG 是基于比特币(Bitcoin)及其区块链技术设计的,因此它的价值体系与比特币本身紧密相关。比特币被称为“电子黄金”,是数字时代的价值储存工具,而符文代币通过与比特币网络的联系,继承了其许多关键特性。尤其是比特币底层的Satoshi单位,在整个代币体系中起到了基础的支撑作用,具体体现为以下几个方面:
-
Satoshis:比特币的最小单位,支撑$DOG的基本运作 Satoshis 是比特币的最小单位,1比特币等于1亿聪(Satoshis)。这一设计不仅是为了让比特币可以支持微交易,也是为了赋予比特币更高的灵活性和普适性。在符文代币 $DOG 的设计中,Satoshis的作用是至关重要的,它为整个符文代币系统提供了价值的基础单位。Satoshis的存在确保了$DOG代币与比特币价值的对接,进一步强化了其在区块链网络中的作用。
-
Satoshis的稀缺性与安全性 比特币的总供应量被限定在2100万枚,而Satoshis作为比特币的最小单位也遵循这一稀缺性规则。每一个符文代币 $DOG 在架构设计中,都与比特币的区块链基础挂钩,依靠这种稀缺性构建了其内在的价值存储功能。同时,比特币网络以其强大的安全性著称,这一点源于其分布式的区块链结构和工作量证明(Proof of Work,PoW)机制。在符文代币体系中,Satoshis通过这种安全机制,确保了$DOG代币的交易和持有都具有高水平的安全保障。
-
智能合约与Satoshis的结合 Satoshis作为比特币最小的计量单位,能够与符文协议(Rune Protocol)中的智能合约进行有效结合。这意味着符文代币 $DOG 可以通过基于比特币网络的智能合约进行各种自动化操作和复杂的去中心化金融(DeFi)应用。例如,通过Satoshis的精细化分配,符文协议能够使$DOG代币具备用于支付、借贷、质押等多种应用场景。这种灵活性让$DOG具备了更高的实际应用价值。
-
Satoshis推动的去中心化交易与全球流通 由于Satoshis是比特币的基础单位,它们推动了比特币网络的去中心化交易模式,而$DOG代币作为一种基于符文协议的代币,自然继承了这一去中心化优势。在比特币网络中,交易不依赖任何中心化机构,每一笔交易都通过分布式网络验证。Satoshis通过这种无国界、去中心化的网络结构,确保了$DOG代币在全球范围内的自由流通,并且不受传统金融体系的限制。这种全球流动性增强了$DOG的潜在使用场景,使得它可以在各种去中心化金融应用中发挥作用。
-
$DOG的价值体现在未来经济中的潜力 由于符文代币 $DOG 建立在比特币网络及其Satoshis单位的基础上,它不仅仅是一个简单的加密货币代币,而是一个能充分利用区块链和比特币优势的价值载体。未来,$DOG代币可能会在更多领域中发挥作用,包括数字支付、资产数字化、去中心化金融(DeFi)、NFT交易、以及基于区块链的智能合约协议。在这些应用中,Satoshis为代币提供了基础的价值支撑,而符文协议则通过创新技术进一步扩展了它的潜力。
-
Satoshis与代币价格波动的调节机制 比特币的价格波动一直是影响市场的重要因素,而Satoshis作为比特币的最小单位,其稳定性和分割性使其在调节市场波动时起到了关键作用。符文代币 $DOG 依靠这种价格调节机制,能够在高波动的市场中保持相对的稳定性。特别是当$DOG与比特币价格挂钩时,Satoshis的精确性和微小单位分割让投资者可以灵活应对市场的价格变化,从而降低投资风险。
总结:Satoshis如何为符文代币 $DOG 注入价值 Satoshi Nakamoto设计的比特币架构通过其最小单位Satoshis,为整个区块链网络带来了稀缺性、安全性和全球化的流通机制。在符文协议及其代币$DOG的体系中,Satoshis作为比特币的核心构成,发挥了不可或缺的作用。它们不仅是价值存储和交易的基础单位,还推动了符文协议的去中心化应用,并为未来的智能合约和DeFi应用提供了强大的支持。正是因为Satoshis的技术与比特币网络的结合,符文代币 $DOG 才具备了深厚的内在价值,使其成为在加密货币生态中备受关注的资产。
通过Satoshis的精确性、稀缺性以及与智能合约的结合,符文代币 $DOG 的价值超越了单纯的代币市场炒作,成为了一个能够真正支持去中心化金融和未来经济的有力工具。
-