-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 42342239:1d80db24
2024-10-29 19:27:12The Swedish government recently rejected the Transport Administration's proposal for average speed cameras. The proposal would have meant constant surveillance of all vehicles, and critics argued for instance that it would have posed a threat to national security. Given the prevalence of IT breaches and data leaks today, it's hard not to give them a point, even if the problems are often downplayed by both corporations, governments and organisations. After Facebook (now Meta) leaked account information for over half a billion users, internal mails revealed the company wanted to "normalise the fact that this happens regularly".
IT security focuses on protecting the information in our computer systems and their connections. Cybersecurity is a broader concept that also includes aspects such as human behaviour, environmental factors, and management.
Data that has not been collected cannot leak
Knowledge about cybersecurity is often insufficient. For example, it was not long ago that the Swedish Transport Agency decided to outsource the operation of the Swedish vehicle and driving licence register. This was done despite deviations from various laws and criticism from the Security Police. The operation was placed in, among other places, Serbia (which has a close relationship with Russia). The Swedish driving licence register, including personal photos, as well as confidential information about critical infrastructure such as bridges, subways, roads, and ports, became available to personnel without Swedish security clearance.
The government's decision earlier this year not to proceed with a Swedish "super register" is an example of how cybersecurity can be strengthened. The rejection of the Transport Administration's proposal for average speed cameras is another. Data that has not been collected cannot leak out. It cannot be outsourced either.
Accounts are risky by definition
But the question is bigger than that. More and more of the products and services we depend on are now subscription services, often including long documents with terms and conditions. Which few people read. If you want to control your air heat pump with your phone, you not only need an app and an account, but also agree to someone storing your data (maybe also selling it or leaking it). The same applies if you want to be able to find your car in the car park. If you do not agree to the constantly updated terms, you lose important functionality.
Every time you are required to create an account, you are put in a dependent position. And our society becomes more fragile - because data is collected and can therefore leak out. It is much harder to lose something you do not have.
At the Korean car manufacturer Kia, huge security holes were recently discovered. IT researchers could quickly scan and control almost any car, including tracking its position, unlocking it, starting the ignition, and accessing cameras and personal information such as name, phone number, and home address. In some cases, even driving routes. All thanks to a "relatively simple flaw" in a web portal.
Instead of being at the mercy of large companies' IT departments, our security would improve if we could control our air heat pump, unlock our car, or our data ourselves. The technology already exists, thanks to the breakthrough of asymmetric encryption in the 1970s. Now we just need the will to change.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ 123711f7:c0a0c17e
2024-10-29 18:10:06Moscow announced on Tuesday it had seized control of the mining hub of Selydove in eastern Ukraine as Kyiv initiated a fresh mobilisation drive and raised concerns over North Korea’s expanding military cooperation with Russia.
The Kremlin’s forces have been advancing rapidly across the sprawling eastern front, where exhausted and outgunned Ukrainian troops are being forced to cede ground, appealing for more Western support.
Russia’s claims of capturing four new settlements in the industrial Donetsk region came as Ukrainian leader Volodymyr Zelensky and South Korea’s president agreed on deeper security cooperation after allies reported that thousands of North Korean troops had been transferred to Russia to aid its offensive.
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ 3f770d65:7a745b24
2024-10-29 17:38:20Amber
Amber is a Nostr event signer for Android that allows users to securely segregate their private key (nsec) within a single, dedicated application. Designed to function as a NIP-46 signing device, Amber ensures your smartphone can sign events without needing external servers or additional hardware, keeping your private key exposure to an absolute minimum. This approach aligns with the security rationale of NIP-46, which states that each additional system handling private keys increases potential vulnerability. With Amber, no longer do users need to enter their private key into various Nostr applications.
Amber is supported by a growing list of apps, including Amethyst, 0xChat, Voyage, Fountain, and Pokey, as well as any web application that supports NIP-46 NSEC bunkers, such as Nostr Nests, Coracle, Nostrudel, and more. With expanding support, Amber provides an easy solution for secure Nostr key management across numerous platforms.
Amber supports both native and web-based Nostr applications, aiming to eliminate the need for browser extensions or web servers. Key features include offline signing, multiple account support, and NIP-46 compatibility, and includes a simple UI for granular permissions management. Amber is designed to support signing events in the background, enhancing flexibility when you select the "remember my choice" option, eliminating the need to constantly be signing events for applications that you trust. You can download the app from it's GitHub page, via Obtainium or Zap.store.
To log in with Amber, simply tap the "Login with Amber" button or icon in a supported application, or you can paste the NSEC bunker connection string directly into the login box. For example, use a connection string like this: bunker://npub1tj2dmc4udvgafxxxxxxxrtgne8j8l6rgrnaykzc8sys9mzfcz@relay.nsecbunker.com.
Citrine
Citrine is a Nostr relay built specifically for Android, allowing Nostr clients on Android devices to seamlessly send and receive events through a relay running directly on their smartphone. This mobile relay setup offers Nostr users enhanced flexibility, enabling them to manage, share, and back up all their Nostr data locally on their device. Citrine’s design supports independence and data security by keeping data accessible and under user control.
With features tailored to give users greater command over their data, Citrine allows easy export and import of the database, restoration of contact lists in case of client malfunctions, and detailed relay management options like port configuration, custom icons, user management, and on-demand relay start/stop. Users can even activate TOR access, letting others connect securely to their Nostr relay directly on their phone. Future updates will include automatic broadcasting when the device reconnects to the internet, along with content resolver support to expand its functionality.
Once you have your Citrine relay fully configured, simply add it to the Private and Local relay sections in Amethyst's relay configuration.
Pokey
Pokey for Android is a brand new, real-time notification tool for Nostr. Pokey allows users to receive live updates for their Nostr events and enabling other apps to access and interact with them. Designed for seamless integration within a user's Nostr relays, Pokey lets users stay informed of activity as it happens, with speed and the flexibility to manage which events trigger notifications on their mobile device.
Pokey currently supports connections with Amber, offering granular notification settings so users can tailor alerts to their preferences. Planned features include broadcasting events to other apps, authenticating to relays, built-in Tor support, multi-account handling, and InBox relay management. These upcoming additions aim to make Pokey a fantastic tool for Nostr notifications across the ecosystem.
Zap.store
Zap.store is a permissionless app store powered by Nostr and your trusted social graph. Built to offer a decentralized approach to app recommendations, zap.store enables you to check if friends like Alice follow, endorse, or verify an app’s SHA256 hash. This trust-based, social proof model brings app discovery closer to real-world recommendations from friends and family, bypassing centralized app curation. Unlike conventional app stores and other third party app store solutions like Obtainium, zap.store empowers users to see which apps their contacts actively interact with, providing a higher level of confidence and transparency.
Currently available on Android, zap.store aims to expand to desktop, PWAs, and other platforms soon. You can get started by installing Zap.store on your favorite Android device, and install all of the applications mentioned above.
Android's openness goes hand in hand with Nostr's openness. Enjoy exploring both expanding ecosystems.
-
@ f584a915:9da6d625
2024-10-29 17:26:55Binance executive Tigran Gambaryan was arrested in Nigeria in February 2024 on charges of money laundering and tax evasion. However, the charges were dropped in October 2024, allowing him to return to the United States for medical treatment.
-
@ 9f6a750b:aaffd7ab
2024-10-29 17:10:11tldr
focus on using GPUs, not getting stuck on old, complicated CPU specs. windows + powershell + cursor is enough for my setup ( ^)o(^ )
~2023
nixOS
nixOS is an operating system based on the nix package manager, let you set up systems that are reproducible, reliable, and defined in configuration files.
- pros: system configs are written in nix language, so its easy to go back if you break system, this is really helpful for me since i often mess things up (like /etc or / with
rm -rf
). - cons: minimalism is only useful if your work depends on consistency. it can limit creativity and isn’t very versatile.
emacs
emacs is a customizable text editor based on emacs lisp.
- pros: you can hack and set up configs using emacs lisp. lisp is fun!
- cons: yes, its pretty slow, and you have to keep optimizing it. also, no one uses emacs anymore sadly
2024~
windows
windows is the most popular operating system.
- pros: very stable because everyone uses it.
- cons: closed source, so if you hit a system error, you might get stuck without fix
cursor
cursor is a text editor with ai.
- pros: better than github copilot; stable and seamless. all you need to do is review your code or others’ code.
- cons: requires a subscription and is closed source.
has jumango given up on being a hacker? (;_;)
ever since LLMs became smart enough, i don’t feel the same excitement for low-level system details. back then, getting into low-level stuff was about challenging the system that fuels capitalism; the "enemy" felt like human intelligence itself. now, hacking in a true sense isnt about those details, its more about who has computational power like GPUs or quantum computers, uses tons of energy, and unites with an ai
what should i do next
if i think about whether individual humans or AI are more complex and engaging to interact with, id probably say humans in the short term for now. they share my interface and environment, and that complexity makes them more interesting to interact with, but, in the long term, i think computers will start to approximate the basic workings of human intelligence, and those differences will disappear. when we get to that point, i can’t predict what my answer would be ((+_+)) scary
- pros: system configs are written in nix language, so its easy to go back if you break system, this is really helpful for me since i often mess things up (like /etc or / with
-
@ 9f6a750b:aaffd7ab
2024-10-29 17:04:41tldr
aiが賢くなる前に人間と結婚したい
why
機械的なマッチングでは多くの場合、定型発達陣の長期的な関係を保証するだけであり、私のような発達障害は統計の外に存在するので、背景や文脈を無視・ミスリードしそう。あと、多様性が必要とされるのは根本の構造解明の為であって、その複雑な構造が解明されると私のような不良品は廃棄されそう => 結婚という既得権益で生き残りたいよう ( ◠‿◠ )
賢い機械の定義
-
定型発達の人間やマジョリティの人間が、政府のパートナ選出プログラムにおいて、長期的で幸せな関係性を自動構築できるような知能機械
-
tiktok wirehead+最低限の社会的な営み=すばらしーユートピア(?)
-
-
@ f462d21e:1390b6b1
2024-10-29 17:01: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
-
@ 1739d937:3e3136ef
2024-10-29 16:57:08This update marks a major milestone for the project. I know, with certainty, that MLS messaging over Nostr is going to work. That might sound a little crazy after so many months working on the project, and I was pretty confident, but until you’ve got running code, it’s all conjecture.
Late last week, I released a video of a working prototype of White Noise that shows the full flow; creating groups, inviting other users to join those groups, accepting invites, and sending messages back-and-forth. I’m thrilled that I’ve gotten this far but also appalled that it’s taken so long and disgusted at the state of the code in the app (I’ve been told I have unrelenting standards 😅).
If you missed the video last week...
nostr:note125cuk0zetc7sshw52v5zaq9apq3rq7e2x587tr2c96t7z7sjs59svwv0fj
What's Next?
In this update, I want to cover a few things about how I'm planning to proceed and how I’m splitting code out of the app into libraries that will help other developers implement MLS messaging in their own Nostr clients.
First off, many of you know that I've been building White Noise as a Rust app using the Tauri framework. The OpenMLS implementation is also written in Rust (with bindings for many other languages). So, when you hear me talking about library code, think Rust crates for now.
The first library, called openmls-nostr, is an extension/abstraction on top of the openmls implementation of the MLS spec that helps Nostr clients interact more easily with that implementation in a way that feels native to Nostr. Mostly this will be helping developers interact with MLS primitives and ensure that they’re creating, validating, and serializing these objects in the right way at the right times.
The second isn’t a new library as a big contribution to the already excellent rust-nostr library from nostr:npub1drvpzev3syqt0kjrls50050uzf25gehpz9vgdw08hvex7e0vgfeq0eseet. The methods that will go in rust-nostr are highly abstracted and based specifically on the requirements of NIP-104. Mostly this will be helping developers to take those MLS primitives and publish or query them as Nostr events at the right times and to/from the right relays.
Most of this code was originally written directly in the White Noise library so this week I've started to pull code for both of those libraries out and move it to its new home. While I’ve been at it, I've been writing some tests and trying to document things.
An unfortunate offshoot of this is that the usable builds of White Noise are going to take a touch longer. I promise it’s still a very high priority but at this point I need to clean a few things up based on what I've learned thus far.
Another thing that is slowing down release is that; behind the scenes of the dev work, I’ve been battling with Apple for nearly 2 months now to get a proper developer team set up so that we can publish the app via TestFlight for MacOS and iOS. I’ve also been recently learning the intricacies of Android publishing (oh my dear god there are so many devices, OS versions, etc.).
With that in mind, if you know anyone who can help get me up to speed on CI/CD, release pipelines, and multi-platform distribution please hit me up. I would love to learn more and hopefully shortcut some of the pain.
Thanks again so much for all the support over the last few months! It means a lot to me and is a huge part of what is keeping me going on this. 🙏
-
@ 123711f7:c0a0c17e
2024-10-29 16:23:03Ethereum (ETH) Faces Market Correction, But Strong Fundamentals Remain The world’s second-largest cryptocurrency, Ethereum (ETH), has experienced a recent price dip, currently trading around $2,980. This correction is part of a broader market movement, not specific to Ethereum (ETH). Despite the short-term price decline, analysts remain confident in Ethereum’s (ETH) long-term potential due to its established position and strong foundation within the crypto ecosystem. The reasons behind the market correction are multifaceted, and speculation about Algotech (ALGT) is not a contributing factor.
One potential driver of the correction was investor hope for a spot Ethereum ETF by May’s end, which could have triggered a bullish price reversal. However, market analysts now believe the likelihood of such approval this year is slim. While Ethereum (ETH) has seen a small surge of 0.33% in the last 24 hours, it remains down 4% for the week. Regaining the 50 Moving Average (MA) as support on the daily chart is crucial for regaining bullish momentum.
-
@ bf95e1a4:ebdcc848
2024-10-29 14:33:18This is the AI-generated transcript of Bitcoin Infinity Show 132 with Rigel Walshe!
Welcoming Rigel Walshe
Luke: Rigel, welcome to the Bitcoin Infinity Show.
Knut: Thank you for having me on. Yeah, it's, finally!
Rigel: I think we talked about this like two years ago or something, you were like, want to do this? And just I think too busy doing different things and never happened, right?
Knut: But we figured we'd do an in person one,
Rigel: Mm-Hmm.
Knut: Because I remember the first time I saw you back in 2019, like, the starting gun for me for all of this crazy life that has followed on later. So, and here's this guy on stage, playing death metal songs for
Rigel: All.
Knut: finance and nerd people.
Knut: so yeah, I'm not the only metalhead in here, like,
Rigel: I remember when I put that in the presentation, I was like, is this going to go down? And then everyone clapped after I played that video. I was like, oh, cool.
Knut: No, it was super based.
Rigel: Thank you.
Knut: what's the name of your band again?
Rigel: so I play in a band called Diocletian. I used to play in a band called Dawn of Ezel, but the band I play in now is a band called Diocletian, which is like, I guess you would call it like the, you know, metal's got like a zillion sub genres and stuff, but like, you would call it like war metal, I guess.
From Metal to Bitcoin
Rigel: Yeah. And, what's your story? Like give our listeners your story. How, who are you and, what turned you on to death metal and what turned you on to Bitcoin and is there a connection between the two and all of
Rigel: Oh my God. Okay. This is a very long winded. How do I summarize this pretty well? Okay. So yeah, I'm Roger Walsh. I go by Coinsurance Ed on Twitter and Telegram and these, a lot of these kinds of platforms. yeah, I mean, played music and stuff since I was, 17 years old, you know, been a band where, you know, I'm from New Zealand, that's where that was from.
Rigel: We were the first metal band to ever get out of the country, really, even like Australia, let alone, Europe and the States and things like that. So, you know, we did quite a few, albums, I think it was, with my old band Dawn of Azel before we split up, in New Zealand it's quite a bit bigger than we were, outside of that, and certainly Europe or the States.
Rigel: the same time, when I turned 21, I joined the police. I was in the police for 10 years, at the same time as this was going on, and if you search my name, you'll find some interesting news reports about some trouble I had for that kind of reason. so that's maybe my background. we'll shift forward to maybe when I first got into Bitcoin in 2014, and so for me, what got me interested in Bitcoin was, as I said, I used to be in the police, and one day, you know, I think I've heard of Bitcoin thrown around, I just I was reading a news article about the, Silk Road trial, and this is when Russell Brook was getting sentenced, and this is like after I left the police and things like this, and it just blew my mind when I read that, it's like, because I think most people don't really, or didn't, or can't quite grok maybe the way that it makes It's me, in the sense of like, you have this drug market selling.
Rigel: whatever you liked, you know, under the eyes of the FBI and all these guys, and there was nothing they could do for years, and this, I was like, wow, man, this is going to be straight away, I thought this is how Russia and North Korea are going to get around sanctions and stuff, as it seems they are doing today, you know, so to me this is like nuclear weapons grade money.
Rigel: So my interest actually was, was in Bitcoin, but also in the darknet market, so I just got on there and had a look, And that was what really interested me, but of course, like most people that play around in the darknet markets, you start, okay, what is this Bitcoin thing that I'm using and sending and start looking into it.
Rigel: And look, I'd never been a finance kind of guy. I mean, like I said, I joined the police relatively early on. They've got a very good superannuation scheme where, you put in a dollar, the government puts in two dollars. And so, to me, I'd looked at investing and shares and things a couple of times, and it never made sense because I've got the best There's no better place that I could do is just put more money in that fund that the government will match dollar for dollar, right?
Rigel: So this is the first time I've ever looked at anything Really about investing and you know and obviously as you start thinking about this Well at that time when I got into Bitcoin and bought my stuff was around 200 bucks It just right at the end of the 2014 kind of crash and you know at the time I thought like wow man this might be worth a thousand dollars some years later, right?
Rigel: You know so so I started putting pretty much Everything I had which the time was not a lot because this is after I left the police and I actually quite a bit of trouble Transitioning from that into like some sort of civilian career. I was like I found it quite hard to find, like, work, and so I was working self employed, and I didn't have a lot of money, but I put everything I had into Bitcoin, because to me, it just made total sense,
Rigel: So yeah, that was 2014, fast forward a couple of years, 2017 is around, and now Bitcoin is there. Close to 20 grand, you know, I've got, I'm fucking rich, so what I did is I was like, man, I spend so much time thinking and talking about Bitcoin, I really want to get involved in the space, but, I'm not a software developer, what can I do?
Rigel: So I actually ended up buying some Trezors, and just through good luck, when I bought them, Bitcoin was around 10k. and I bought like, 200 or something treasures and ledges, and I sold all of them in a month in New Zealand, which is a tiny country, which blew my mind, So then that happened, and this was like February, I remember it was December, I had massive orders, January pitted off, and then like February, there was just nothing, and the price is going down, so I was just in the right place at the right time, and got lucky, and I had all this money and it was in a business account that I'd have to pay taxes on, obviously, if I didn't get rid of it, right?
Rigel: So, to my thing as well, I could pay myself a salary and pay tax on it, but what's smarter is, hmm, how can I use this money to make the next step and jump to the next thing? So I thought, well, let's go to a bunch of Bitcoin conferences and see if there's any match for my kind of skills, right? So I'd never, I'd never gone to, I've been to like meetups in New Zealand, but I had no idea like what it really looked like out there in the real world, right?
Rigel: So I went to, like a couple of, I went to like an Australian big Crip, blockchain one, which was like just total trash. And then I went to, token 2049. You heard of that one? It's like a still going. It's like a real shit coin kind of conference thing that was in,
Knut: rings a tiny bell.
Rigel: it's in, it was in Hong Kong or something, right?
Rigel: and I remember I went to that and it was cool, right? But it was still, you know, I was still in this world where, obviously I was familiar with Bitcoin, but I dabbled with, altcoins and stuff like this and perhaps the way that you or I would look at Bitcoin now, I think was still quite a new thing.
Rigel: New idea in those times, right? There wasn't this really well nuanced ideology about how to view this kind of stuff. So I went there and I was kind of figuring this out The next one I went to was like Konsensus in New York, which was at the time, that was the biggest Bitcoin crypto conference you would say ever.
Rigel: And there was like, 3, 000 people or something. And I remember at that conference, there was a lot of, you know, all sorts of Ethereum and things there, right, but there was a blockstream room at this conference. And I remember, I felt like, man, this place feels so sleazy and so dirty and everyone seems Super sketchy, but then you go to the Blockstream room, and I was like, these are the guys that, you know, I just clicked, like when you meet them and you see this, and so I think this is a really important thing for people that don't go to conferences, that when you come, a lot of this stuff, when you just see it with your own eyes and talk to people directly, it makes a lot more sense than online.
Rigel: So I went to that, and then I met, what's his name, Erik, last name is sketchy, but he's, works on Bitcoin Fabric, used to be at Blockstream. He told me, go to Building on Bitcoin and go to Honeybadger. And so from then I started going to conferences, when I went to building on Bitcoin, I kind of talked about this in my talk today, it was like I wasn't a software developer, but I saw Adam Fiskor and Nicholas Doria presented Wasabi and BTC Pay Server, and I realized like, wow man, I thought before that Bitcoin software development is all about like some super computer nerd guys and like Bitcoin core and only this real high level stuff.
Rigel: But I realized, man, these guys just made their own app on Bitcoin that really made a real difference. And wow, you know, I could do that if I were to put my mind to it. So I came back straight away, got into a Python coding course and just like really, really luckily, you know, I went really crazy on this.
Rigel: then come December, Jimmy Song came to Australia to do the, the programming course.
Rigel: I applied and got on that, and I was like really out of my depth, but I managed to keep up enough to write it. and so this was like maybe six months after, six months ago, I didn't know anything about coding or anything like that. And so just by pure luck, I was relatively well networked in the New Zealand, Auckland Bitcoin scene, and I went to a meetup and there was a guy there who I knew kind of loosely, that I knew had a really small exchange in New Zealand, and I was talking about, he's like, Oh, what are you doing?
Rigel: I was just building this API in Python. It's like, Oh, we're building out our API. Do you want to come and help? And I was like, Yeah, so at the time I was working a job where I'm working four days a week and I had the Mondays off. And so I just started working there on Mondays and then split with the ex girlfriend and I was really happy in New Zealand and felt like I've really got to get out of here, right?
Rigel: So I was thinking even if I have to like sell Bitcoin to leave, I've just really got to get out of New Zealand because I feel like there's just no future for me here. So I said to them, okay, look, hey, I had a friend that was living in Bali. I said, look, hey, I'm moving to Bali. I really don't want to leave this job.
Rigel: And I really Appreciate what you give me, but I've got to do this. If you let me work remote, I would really happily work remote, but I understand if you don't. They're like, sure, yeah, have a full time job. So I did that, started doing that, COVID happened, ended up in Mexico as a cause of that, and in, the Jeremy Songz course, there's like an alumni telegram group, Jan Pritzker jumped in there and he said hey, we're looking for developers at Swan, and I said, hey, I do that, and the tech stack was very similar to what I was already working on, and, I got a job there, and up until, three weeks ago, I was working at Swan for three and a half years, I think it was employee number, 10 or 11 or something there.
Rigel: and that's pretty much it. I think I covered all the bases there. And then I give some talks at conferences here.
Conference Experiences
Knut: Yeah, it's a great story. And there are many similarities to mine. Like I also have experience of the shit coin conference before I went to Rega in 2019, but were you here in 2018?
Rigel: Yeah. That was the first, because was, when I said when I met, Eric, he told me building on Bitcoin and then, honey Beg are the ones, so I, I pretty much, that was the last of the company money was that one there. And that, that one they were talking about HCPP and I was like, oh, can I go to that? Flying home, New Zealand, which is like a two day journey, then coming back two weeks later and paying for all the stuff, I didn't manage to make it, but like, that was the first, first time, the last conference I went on that thing, and that really, I mean, it was an amazing conference. So this, this has always been an amazing conference, you know.
Knut: I saw your talk here last year, and it was really, really good, like awesome about Bitcoin cultures, right, and different subcultures and, what these subgroups and what happens in a decentralized system, and also like we've been chatting during this conference about, these effects, like how we find our own in groups and how people cling onto the extremes here and there.
Knut: can you expand a bit on that and, what do you think is missing from conferences in general and what makes Honeybadger stick out as a high signal one and all of that
Bitcoin Psychopaths vs Bitcoin Sociopaths
Rigel: I mean, okay, so three questions there. So to talk about the talk, it's called Bitcoin Psychopaths vs. Bitcoin Sociopaths, and if you Google it, you can find the written thing and the video and view it yourself. But basically, what I talked about is, when I started coming to these conferences, I realized how much the Bitcoin world had in common with the music world in the sense of, The personalities, the little subgroups, the way that things evolved, like I just saw a lot of things that clicked because to me really like Bitcoin is like a Harley Davidson for computer nerds, right?
Rigel: It's like this kind of subculture where people are involved in and I feel like a lot of people who are in Bitcoin, like I have this experience of being these weird kind of outside groups and how this works. I think a lot of people that are in Bitcoin this is the first kind of really different thing they've had in their life and they, you know, they're like blows in mind.
Rigel: They're like, wow, this is so cool, but they don't realize how a lot of these idiosyncrasies are very much the same. I'd imagine the same if you were like a Trekkie or you're into something like that. There's a lot of the same sort of politics, so the talk is really talking about how, Bitcoin, in my opinion, is like a subculture or counterculture, the same way that, metal music would be an example, there's plenty of things like this where people have a niche interest, but it's also kind of a little bit against society, the whole idea of Bitcoin is you're trying to defund the state, and so it's kind of like, it's not like a really dangerous out there kind of thing,
Knut: It's not in total alignment with society, inherently contrarian?
Rigel: Exactly, yeah, exactly, which does attract a lot of contrarians, right? so the whole talk was looking at, okay, if you look at subcultures, how do they get involved or immersed in the traditional system, right?
Rigel: Let's take rap music, for example. You know, where you had, Dr. Dre in, NWA, and now he's like, selling Beats headphones and a very nice commercial established businessman, right? Or another good one that I like to use is like, weed, or like the gay community, right? At one point, these were very out there things, and now they're very normal and very accepted, and they're almost like Almost a little forced on you, right?
Rigel: In a lot of ways, as opposed to like being an outcast. So, you know, when things become normalized and when they get bigger and bigger and bigger, if they catch on, eventually they kind of get watered down as they get integrated into society. And the same thing I think is already happening in Bitcoin, and it's affecting the culture of Bitcoin.
Rigel: And I don't think you can really change that, you know, it's inevitable, but it's something that I think we need to discuss and look at, okay, well, if you Some of these other things there, how they lost, what made them powerful and transformative in the first place, because they were kind of revolutionary movements, right?
Rigel: And they got watered down and commercialized, right? So I think the same thing is happening to Bitcoin right now, and you can't really stop it. This is, if you just look at history, this is what happens, but there is a conversation to be had about how can we navigate this as best as we can, right?
Rigel: Now, what was the,
Knut: Yeah,
Rigel: was the other two
Knut: of a long question.
Luke: maybe we can just stay on
Rigel: Are you asking about conferences?
Baltic Honeybadger
Rigel: Like you said, what I think about Bitcoin conferences and what I think I like about HoneyBadger. Well, what I like about HoneyBadger is that, the conference thing, kind of to speak to what I just was talking about, right?
Rigel: As this gets bigger, it becomes more commercial and, things get kind of watered down for people that are, Casual participants, right? The people early on in the movement, like, if you're there in 2017, 2018, you're really hardcore, right? But if you look at the way they're doing, say, Bitcoin Nashville at the moment, it's a very different thing.
Rigel: It's very not watered down, very commercial, and very one kind of one minded, right? And what I like about Honeybadge and what I have so much respect for with this conference is that, remember in 2019, that was the biggest Bitcoin conference in the world, and I think there was probably 600, 800 people, right?
Rigel: things have got bigger since then, and maybe, this could have been a bigger conference, certainly you would imagine it could have been as big as, BTC Prague right? but they seem to have had the idea of, let's just keep it at a particular level and not go too far and too hard, in my humble opinion the Bitcoin National Conference is an absolute abomination, it's a circus,
Knut: And it's all there just to, like, make it as loud and big as possible, but what is the message that is getting diluted and what is getting presented to these newcomers there is, to me, is very much getting away from what I believe the message of Bitcoin should be, right? it's inflation,
Rigel: it's dilution inflation. It's the same thing as when it happens to your money, it happens to culture. I mean, I've never thought about that, but that's a very good way to phrase it, I think. So, you know, when it comes to conferences, beyond the fact of just making it big and watering it down, the other thing I think is, like, the narrative is very, very stale, right?
Rigel: it's all about the narrative. Sound money and the moneys of Bitcoin. Which of course it is. in my opinion, the best money in the world. But I think, we've still made those arguments pretty well by this point.
Rigel: Right. You know, there's so much stuff that's been written and I think it is really good stuff. Right. They're all good messages. But, they've been said, they're done, they're written, right, you know, and you don't want to hear the same guys giving the same talk every year over and over, which is what these conferences are, I think it's like the Rolling Stones, you know, playing their greatest hits, right, the Rolling Stones have some really amazing songs, but if you've gone and seen them play live, playing their greatest hits ten times, you're going to, I think I'll skip it this year, right,
Rigel: So, to what I see happening here, if you want this movement to succeed, and you as a conference promoter want people to come to your conferences, you've got to keep it new and interesting and shift things up, right? And so you've got to find people out there in the community.
Rigel: in the community out there who aren't speaking at conferences, aren't big, aren't famous, right? If we were to turn the analogy of a music, festival, there's bands that aren't known, but if you gave them a chance and used your festivals as a way to expose them to more people, they could get bigger, and it's in your interest, because if you're having the same bands play every year, people don't want to come to your conference.
Rigel: But if you can help this new blood come up, then it's in your interest because you can put them on the stage and you can bring people to your event, right? And I think the same thing should be done, for this. I mean, obviously, I think it should be done for the good of Bitcoin, right?
Rigel: There's many different aspects to Bitcoin. It's a very interesting, you know, I say it's like the, Rorschach's test, right? Like what you see in the inkblot reflects more about you and I, but we can look at the same thing and see two totally different things, right?
Rigel: Yeah. So I think it's in the interest of Bitcoin to get people to flesh these out, these narratives, and give them an opportunity to do it and to get it out in people's heads and for them to hear this. But it's also in the interest of them as conference promoters. Like I said, if it's just the same people all the time, it's going to peter out.
Rigel: And I feel like Honeybadger is one of the few places that's trying to do that,
Luke: Yeah, and I mean, in my perspective, HoneyBadger, two years ago, was my first ever conference, right? And so, I mean, that's already my newness in this space compared to you guys, but still. HoneyBadger has been fantastic for me from that perspective, and like, the signal, that's the focus. But we talked to Max Kai about this not long ago.
Luke: About how is the Latvian community doing and Honeybadger hasn't really focused on growing the local community. It's been bringing the signal into one place and everyone learned from each other and all this and it's a fantastic event for Bitcoin, And then there's these other ones that are all about, I mean, the American ones, especially like the Nashvilles and all this, those are, you know, these entertainment fests and all this, and I think they've also brought this to Amsterdam here in Europe, but I think Prague and Madeira here this last year were both examples of conferences that went a bit bigger, but have also have a layer of the local adoption, and I think those types of conferences are important for a different reason.
Luke: Like the, the one that, Bulgaria is the example that I use, I use a lot, they do a good thing there to build the local adoption. And so get some speakers, get some international presence to sort of show here's what this is, right? but focus on the local side of it and building the adoption in that locale.
Luke: I think that's quite the idea.
Knut: on diversity and inclusion,
Luke: That's so
Rigel: I think it's true, as a New Zealander, we're in this interesting position where, it's a very Western culture, but we're somewhere in between Europe and America, right? So, if you're European, you're biased and polarized to a European way of doing things, Americans are the other, and we're somewhat in the middle,
Rigel: we see them both. From different angles, and there's pros and cons from both, and I'm sure I'm going to offend some American people saying this, but I'm just going to say it. European conferences are a thousand times better than American ones. And I've seen almost none that I feel like really did a good job.
Knut: I think something like TabConf does it well, but I think technical conferences are a slightly different kind of thing, different beast.
Rigel: all there about technology, but if you're trying to do something where People talk of talking about more general people stuff, right?
Rigel: Like, big and commercial and plastic. No soul, and I feel like Europeans just seem to be able to do that much better. Sorry to any Americans watching this, but that's been my impression.
Knut: Honey Badger clearly has the soul, and I mean, the local adoption thing, that's not a dig, it's just not what they've decided to focus on, so it's, I think we, I hope, I hope this conference, I'll be attending every year, Yeah. And that's why I love to see so many Americans over in Europe, like this last year, first of all, Madeira, a ton of Americans came over, both speakers and attendees and also. Prague, and here, like, you have, quite a few here too, and quite a few high level ones, and it's good to have them here to give them a taste of what this is like.
Rigel: I'm a guy that likes to have a drink and hang out with people and things like that, so, you know, it's a big party, really, a conference, in a lot of ways, I think I enjoy that element of it, but again, you know, I think there's just so much value in, You know, we all talk online and stuff and I see what you're writing to someone else and things like that.
Rigel: But to be able to humanize and talk to some of these people, and some of them you meet them and you realize, oh, this guy isn't actually such a dickhead after all, I guess, or the opposite, right? This person that you think is really high integrity or whatever, and you meet them, you're like, man, this person, I have a very bad feeling about this kind of person, right?
Rigel: So I think that's a very important thing if you're really enmeshed in this world, I think you owe it on yourself to go and physically meet people and there's just such a value in that which is difficult to articulate, you know?
Knut: hard to find new ideas and new angles to view this. I had writer's block for the longest time before starting the new book and before I had ideas good enough to pursue. And it's getting increasingly harder with each book, of course, because there's only this so many times you can say the same thing,
Speaking at Conferences
Rigel: I know the feeling of, you know, like I'm thinking about, because I've been invited to speak here every year. and so I'm thinking, okay, when I went to about next year, I'm like, Oh man, like what to do two or three things, right. It's like to avoid just repeating it or slightly changing or morally saying the same thing is like, it's a big ass to do, but I mean, I think that's, that also is a way of, of rather than.
Rigel: you're right thinking that we've got to write the whole story ourselves and it's on you to come up with new ideas for 10 years in a row. It's more like you have your little thing and it's best just hone that message really, really well. And this is how I feel about it is I used to think with conferences, no, I never want to give the same talk twice.
Rigel: I want to do it, you know, once and something every time has to be something new. But I kind of realized after doing a bunch of them is like, well, most people aren't going to see you talk anyway. All right. Or they're not going to. You know, take the time to or they're not gonna appreciate in the moment that that it was right then right and there's real value not just for you personally in terms of like, when you give a talk once, it's probably going to be better the third or fourth or fifth time that you give it, right, but there's also value to repeating the same message, right, which to me almost felt like false or a cop out, but no, I think now, after doing it a while, there's actually something to be done with that, which is take one small thing and focus on that small area and don't try and be like, completely reinventing yourself, like, tomorrow you're going to be talking about some weird economics and then you're How bitcoin is art, or something, you know, I mean like, just take one thing and build your little notice around that and really, really hone that particular message, because like we've done with the economic stuff, right, I think we've really steel manned that idea, and there's just anything, any objection that someone could have about the money stuff, someone has written just the best thing and you're just like, bam, and you haven't asked your every question.
Luke: There's real value for us as a community in doing that, but that just comes from a small amount of people focus, doing focus work on one particular thing, That's funny, that reminds me of comedians. comedians are like some of the most visible people on podcasts because for some reason people like to listen to funny people be funny but you hear about their process of literally going around and touring and working on their jokes the same ones, they don't do a new act Every night, you know, they work on it and then eventually they record it and everything.
Luke: That's actually not a bad model for this
Rigel: I think a good analogy, right? I mean, like, you can't tell the same joke for 10 years, but you wouldn't want to try and rewrite a whole new, like, half an hour comedy skit every, you just, I mean, trying to write some of these talks takes months, right?
Rigel: and when I do it, I've just got, like, pretty much memorize half an hour of stuff and then practice it so it becomes more natural. But I mean, like, trying to do that. You know, if I was trying to do this like six times a year, I stick to like three because it's too much for me, right? But imagine trying to do it six times a year.
Rigel: You just can't do that alone unless you're full time working on it. So, there's lots of reasons why I think just one small thing repeated it actually has some value.
Knut: Yeah.
Dangerous Narratives in Bitcoin
Knut: do you think there are any like narratives around Bitcoin or, thoughts around it that are actually dangerous? Like the people are on the wrong track?
Rigel: I mean like the stuff I talked about before, right, where I think the message is being deluded and it's dangerous and that like the analogy which I was supposed to make in this talk but I actually kind of like As you do, you know, skip over or like move around some things that you were going to say, but you didn't say.
Rigel: The thing like, the real risk to me is that, if we don't change people's view on what technology is. Like, people want something that's familiar. They want to recreate what they know. It's human nature, right? And so, for you as a business owner, or someone that's creating something and trying to get more Bitcoiners on board, which I think there's maybe a little too much emphasis on, it's just more people in the door, so the number can go up.
Rigel: The more you do that, the more people try to make it understandable and relatable by people, so they make it more like what it already is. And by making it more like what it already is, the whole idea about Bitcoin is changing what it already is in terms of money and things like that. I think the risk that we run is like recreating the existing financial system with an orange coat of paint, right?
Rigel: The same thing, but yeah, just with different words, different wardrobe change, right? So I think that's probably to me the most dangerous thing where, I know I'm someone that's like very much the privacy, freedom, self custodial kind of thing, and very anti KYC, all this kind of stuff, but you know, having worked at companies like this, I understand why these things are necessary, and there is also an argument why you would say, well, sure, it's KYC, but if a lot of people buy Bitcoin, it doesn't matter if it's KYC, because we've defunded the government, you know, so there is a middle ground here to be found, But I think probably that's what I'm getting to the real point is like a nuance, right?
Rigel: You know, somewhere in between those two polarized things, there's the right way to do it. And it's probably not going to be universal in all situations what it is, but there's just a real lack of. intellectual rigorousness in this space, right? I think, the best book on Bitcoin is, Erik Voskiel's Crypto Economics, because, I largely agree with almost everything he says, not everyone does, but I don't think that you can argue that that is the most rigorous Comprehensive body of work about this is what bitcoin is and this is how it functions.
Rigel: You know these axiomatic truths as he describes it It's a it's a whole system that all links together and to return to like the religion talk I gave last year It's like if you look at Christianity, right, you know, you have like baptism, Catholicism, Protestantism all these kind of things right and they're it's so detailed.
Rigel: It's like well because in Ephesians 12 16 Jesus said this or that or whatever you should only wear a red shirt on Tuesdays or something It's that level of detail of like They've thought about every aspect of the Bible and what this should mean and they have like this detailed view. And I think there's a lot of value for that because as I said, there are many different views in this spectrum about what works for Bitcoin and I think we win by having this marketplace of ideas, but we don't win if they're like very pure.
Rigel: They're very poorly fleshed out ideas and they're very kind of naïve or immature by all these different schools of thought having the most rigorous, intense, deep body of work to help explain and understand why you should look at Bitcoin from this angle or see it this way or why it should be done this way.
Rigel: you're the second person this week to say crypto, It's great. It's just crazy. it's a pretty dense book, right? You know, it's not for a beginner's book, but it's crazy that it's not bigger in my mind, you know.
Knut: someone should write a, new version of that.
Luke: yeah, very much
Rigel: I mean, but this is the thing, right? it's rigorous because I think, and why I really like it as well is it's the only book that goes that level of depth and is thick and is, really deep on this kind of stuff. And you see Erik on Twitter, he's very much, he's like such a pedantic motherfucker about trapping someone down about the way they say particular words, because it matters, right?
Rigel: It does matter, right? Like these loose definitions of what you think this word means, what I think it means, makes me think that we're talking the same language, but actually you, I haven't communicated to you effectively what is inside my brain, right? And so like this level of detail is really important for something like Bitcoin, because like imagine you're navigating and you say, oh, it's, it's, it's that way, a hundred meters, it's fine.
Rigel: But if it's like, 300 kilometers, you can end up in a very different place than if you said these grid coordinates, you know, this GPS coordinate, stuff like that. So specificity is really, really important and language is the map, the navigation system we use to arrive at an idea in the future.
Rigel: And so, I think there's value to that.
Knut: Yeah, and I think this is, human action by Ludwig von Mises is dense and very meticulously written for the exact same reason, right? You need this rigorous thing. And I know from writing a smaller book on praxeology, it's really hard because you have to be very, very careful with your words to get it right, which is why I like writing, Something like the Inverse of Clown World more because I can be more expressive, you know.
Rigel: man, I've thought about doing the book thing and maybe one day I will, but I'm like, oh man, I just, I can't imagine what you have to go through to produce something of like this size, which is not the largest book, like man. Wow, you know, hats off to people that write a book, right, because, like I said, I've thought about it, but when I've looked at what's involved, I'm like,
Rigel: send us a DM and we'll help you. maybe they will come about, I need to write more, this is the way they say you do it, right, is like you write a bunch of articles and you turn the articles into a book, right, so I've kind of thought about maybe I can go down this road, but we'll see.
Knut: Oh, looking forward to it.
Nostr
Luke: So what, what do you think of, of Nostr? the, the whole, the combination of this Nostriga and Honeybadger. First of all, that was, it was a brilliant move, I think, to attach the two together. there's talk that the next time they'll do that is they'll attach it to, also Freedom Forum, which is also a very good idea.
Luke: A different angle, but very good idea. But Nostr and Bitcoin are becoming really intertwined these days. many, many applications that were Bitcoin applications have now. Also become Nostr applications and yeah, what do you see Nostr in the space here?
Rigel: Difficult for me to say because like I've really wanted to sit down and really get my head technically around Nostr and I haven't, right? You know, like I understand basically how it works, but as far as like there's some critiques on Nostr which I would like to have a more informed opinion on than I do.
Rigel: And, like, I know Peter Todd reasonably well, and like, last night we were, I was saying, like, basically, okay, just tell, tell me, you know, like, tell me what things is, so at least when I get to look at this, I've got, because he's kind of anti, or anti a lot of aspects of it, right, he thinks it doesn't work, so, I mean, based on that, like I said, it's, it's not a nuanced, informed opinion, but I think, my concern, perhaps, is that, like, It's actually not that good a protocol on the, on the base level for certain things.
Rigel: Like it's ability to deliver decentralized Twitter, all the millions of applications we have on mine for Nostr at scale is going to be possible. And again, I can't say One way or the other, but that's my concern about it. And, and one thing that returning to what I was talking earlier about the subcultures and things like that, fortunately in the Bitcoin space, I think we've got a little tendency to be overly supportive and overly passionate.
Rigel: You want the space to be something where people come from the outside and they feel like this is full of energy and love and happiness and good times and smiles. That draws people in. And if it's the opposite and people are too cynical or bitter or tough, right, it's not going to pull more people into the space.
Rigel: That's what we need. But again, you know, I think there's a bit of a lack in the space of people who are willing to Call out, you know, say a spade's a spade. There's a problem here. We need to fix this. There's a bit of a lack with that and that that would be the only thing I feel with Nostr
Rigel: And I, my only concern that I see as an outsider with Nostr is that Is this like a science project where there's something where it's got a tiny amount of people and there's all this energy and noise, but it's, it's its own self contained thing, right outside this little bubble, no one cares and, and it's a bunch of people celebrating how great they are creating this thing for themselves, thinking it's a tool for the world.
Rigel: So, I think it is great and I'm really interested in it primarily from the perspective of like, what to me is, this is kind of what my talk about was about today about Bitcoin as performance art. Bitcoin isn't just about money, it's also about telling a story, about showing an alternative narrative to what the governments or corporations give us.
Rigel: And that narrative is about how we can use technology and open source and things like this to create our own better alternatives and we don't have to use what they tell us they have to use. And so I like Nostr in the sense that It's like the artistic inspiration of Bitcoin is created at Nostr, right, so we're spiritually inspired by Bitcoin.
Rigel: It's like a lot of the lessons that we've learned from Bitcoin have been applied to how Nostr is created, right, it's kind of born of Bitcoin. And so to me, regardless of like the reservations or the possible issues like I talked about before, to me what's far more interesting is someone said, look, hey, Bitcoin works really well at prioritizing decentralized money.
Rigel: How can we take the lessons there and apply that to communication and other things? And I think. To me, that is a more important thing, is like, if this can happen to many other technologies. It makes sense, right? Like, in my talk, I talked about the Liberator pistol being another example of this. Now, if you look at Cody Wilson, he said, like, it was supposed to be a toy gun, a prop gun.
Rigel: It's not something where you really think it's going to be like an AR 15. But that wasn't the whole point. The whole idea is here's something. Where it's going to get all over the news and the media and people are going to start talking about and thinking, you know, that the wheels start to turn the head of, hmm, 3D printing and code, man, like, it's going to be impossible for governments to stop all this kind of stuff.
Rigel: And when people start thinking about that, the world starts changing, right? So I think Bitcoin is amazing money and it's going to change the financial system, but perhaps what is better is that it gets people thinking of, wow, we created our own money. What other stuff can we create if we all work together and have a vision for the future, right?
Rigel: So to me that's, in some sense, like, if Bitcoin failed as money, but it did that, I think that would be a better victory than it not doing that and just being sound money, right? So that's, an important part of Nostr and what I really look forward to with that is how that dynamic plays out.
Disagreeableness in Bitcoin
Knut: Yeah, I think I've observed a correlation between disagreeableness and how early you were to Bitcoin. So like the first couple of years, you get your Voskules and your Kavaios and what not. And the further you go down the line, it isn't until like 2021, you get your Joe Halls and your, nice people, right?
Knut: I think the thing that enables the happy people 10 years down the line is that the disagreeable people were so rigorous in the beginning. So you get the don't trust verify, and then it builds in layers and the happy people can join on the layers on top later on.
Rigel: Yeah, yeah, yeah,
Knut: so have you, what's your, what's your
Rigel: Oh yeah, I mean, I think you're totally right with that. it's a little bit of a tragedy of the commons problem in Bitcoin, right, where, Zach, you said the people that are doing, like, open source development is perhaps the best example, right?
Rigel: if we don't have, like, very smart, talented people working full time on Bitcoin, even if you think it can be ossified, like, just if you understand software, right, there's just this maintenance process that needs to happen, and there's not someone keeping a close eye on that. It's very easy for Bitcoin to break or to fall apart, right?
Rigel: there's no business model for open source development or maintaining Bitcoin Core, right? There's no way, I mean, the whole idea of Bitcoin is that it should never be a revenue generative process as it is, right? So we need to think of an alternative model, because it's all in our interests for Bitcoin to succeed.
Rigel: But we can't just create a business and let it self perpetuate itself. We've got to come up with a different model of how we can do that, right? So, you know, there's a little bit of, all of us are like free riding on the work of open source developers in that sense, right? And I think there's a little bit of that when it comes to all these, happy, joyous kind of people I think a lot of them, particularly if you've been here for a short amount of time, have kind of stars in their eyes or their rose tinted glasses on about, like,
Affinity Scams in Bitcoin
Rigel: You know, one thing I would definitely say at the moment, and, you know, I've, I've obviously just, finished up working for a company, in the Bitcoin space is that, there's a lot of people, I think the idea of a Bitcoin scam is a relatively new thing that people aren't looking at, if you're charging 7, 000 to have a out of alpha male retreat, you know, because this guy is associated with Bitcoin, that's a scam, that's a fucking scam, I mean, like, hey, maybe it's being marketed honestly, but I mean, let's look at what's happening here, it's, association with Bitcoin.
Rigel: it's, you know, there's the things like, I like Bitcoin, buy my shitcoin. It's like, I like Bitcoin, buy my other thing. Like, it's the next level. And so I
Knut: why is that a scam though?
Rigel: Well, I think it's a scam in that, If you look at the pricing of the resort that was involved, the tickets are like twice the price, right?
Rigel: Yeah, it is in the eye of the beholder, right? If you feel you're getting value and you're happy to pay that thing, it's not a scam. But I mean, come on, there's other examples, where, there are things where people are, I think you see this a lot where, People are like, here is sound food, or sound diet, or open source this or that, right?
Rigel: You know, where it's, I mean, it's not a scam, but you can see how this like, Bitcoin as a lifestyle brand is being created, right? And people are trying to market things which really have nothing to do with Bitcoin. And again, maybe they're saying this is Bitcoin, but I feel that there is a lot of people using that as a way to charge an overpriced price for an undervalued service, right?
Rigel: And so that's something which I see kind of creeping into the space is a bit of that sociopath kind of behavior, right? And I think that's a bit of a risk.
Rigel: The question is whether you draw the line though, like an overpriced thing is, is it really overpriced if people are willing to pay the price? yeah. This is all a factor of, as Bitcoin gets bigger, you'll see more and more of this, and it'll become more and more of a thing, you know, and you're right, like, what is the line, if people are willing to pay for this, and they're happy, and they don't feel like they're getting scammed, is it a scam, how is this related to Bitcoin, right, and there's many other things out there in the world that use, like, for example, ethical food, where they associate it with something, if you really were wanting to support this cause, you'd be better to directly donate to this thing, right?
Rigel: But they try and create this association to brand themselves, right? And as you said, it's not direct, but I think most people, if you explain this, they get what I'm leading to and they understand the problem,
Rigel: But it is like quantum, this and that, you know, . Yeah. it's a difficult one to discuss, but this is obvious, right, is with anything as it grows, like all the other stuff we talked about, the scams are obvious and as they get bigger, the things are harder and higher to directly say it is, and you can feel something that's right off and wrong and not quite right, but it's a lot harder to articulate and nail it down.
Rigel: the bigger and the larger, more complex it gets. The more involved the scams, if we're gonna call them scams, get
The Influence of Influencers
Luke: No, I mean the tough part about you kind of finding that and actually this is a good example in this case because Rob brought a lot of people into Bitcoin with particularly his Sailor series and my first real touchpoint with like a real Bitcoiner was him on Lex Friedman. Literally, that was my first.
Luke: Bitcoin maxi actually go down the rabbit hole thing and people coming into the space. And so then I have no idea that he's got this reputation under the hood that isn't isn't there, you know, and so it's just it's hard for people coming into the space to, I guess, to understand who is the Who is the right people and, and people with influence and influencers is the correct word here are are re regarded highly and, and they're, what they put out into the, the world by people who are new to the space is, is it's important to get the right message out there, you know.
Knut: And I think you have to judge people from their, like. Are they a net benefit or a net detriment? Like, that's the key, but it's tricky sometimes because people are a bit of both. Of course they are, like, and I think to some extent, sort of everyone is guilty of that. Like,
Rigel: and I agree and it's a great point, right? You know, the guy has a large reach and there are many such people, in the space where, in my personal opinion, it's just garbage, trash. You know, people that are Bitcoin but they can't actually talk in any sort of detail or articulation about what Bitcoin really is, right?
Rigel: But then being presented as experts and these are The megaphones that people are hearing, right? there is an element of, it comes back to the same stuff as we talked about before, like, getting more people in the door is obviously, I think, a benefit, but at what point do you dilute the message such where, you know, let's take the Miami or Nashville conference as an example.
Rigel: How many hours of talks are going on there and how many of them are really adding value and how many of them more just like here is a face and where this face brings people in the door, but what they said was just hot air, right? You know, it was garbage. And would that, I mean, if you ask me, these people should be listening to Erik Voskil and reading crypto economics, which they're not going to do.
Rigel: but I feel like there is more a duty of stewardship from all of us. To try and steer in that right direction. Part of that is calling out things, which I think are clearly unaligned,
Knut: Yeah, but there's a devil's argument to be made here too, because arguably, Bitcoin conferences in general have become more high signal over time. Like, in 2017, you had, like, there were no real Bitcoin conferences, there were just these blockchain bullshit
Rigel: Mm hmm.
Knut: So from a certain point of view, it is getting Like, the signal to noise ratio is getting higher.
Rigel: Mm hmm. Yeah, I mean, it's a hard, and this is, I mean, the fact that we're discussing this, I think, is like the beauty, right? It's like, I have heard very, very few people having these conversations Maybe like kind of leading around this point, but not directly discussing this as like a analytically, objectively as a social phenomenon, right?
Rigel: No, it's great.
Rigel: and like, you know, maybe you are, you're totally right and I'm totally wrong, right? these people are, I should just stop being such a negative Nancy. And these people are good for things, right? but we need to have this discussion and decide, and better articulate what this happy medium between the two is, right?
Knut: You know? And that, that's the thing which I think is missing. And just by having this conversation, discussing this stuff, getting it out and getting more nuanced, I think it's part of getting the job done, right? if maybe next time Robert Breloves does his Art of Alpha 2, I'm going to be like, Well, actually, when I look at it, it's a benefit because we had this conversation, right, Yeah, the sequel is obviously going to be named Art of the Beta.
The Importance of Integrity
Knut: Well, anyway, I think it's a great discussion, and it's like, people should talk more about this. Because, yeah, there is a trade off, and I don't think we disagree, I think we're on the same page here. I'm just mostly taking the devil's advocate position to get the debate going because I think it's very much a subject that should be vocalized more and aired more.
Knut: Absolutely. Because diluting the message is bad. And that is. Like, well, we talk about ethics and tactics and whatnot with the pod all the time, and what we agree on and align on so much, it's like, there is nothing more important than integrity, I love the Scarface quote, you know, all I have in this world is my word and my balls, and they don't break for no one, and I try to live by that,
Rigel: Had I ever taken the bag of shit coins during these last five years, I would be nothing at this point. I've seen it so many times over and over again. People turning from intellectuals to ultimate fighters, for instance, with the same moustache. And it's, to me, it's crazy. It's crazy where, on the one hand, these people talk about Bitcoin is sound money for generations and this is a thousand year mission and they don't see them doing this stuff of like, yeah, to me, there's been many times where I thought, you know, like when I started speaking at conferences and things like this, if I really started going deeper on this thing, maybe I could make more of a thing of it or whatever, but I think I like, I want to slowly build my brand in that sense over like 10 years, like do things and do only do things right.
Rigel: Exactly, exactly dude. That's like all these memes we throw around. But I mean maybe that speaks to, again, this whole point I keep returning to is like, they're all empty platitudes with people actually not deeply thinking about, you know, calling, having something that can clearly articulate and point out, this is in direct contradiction to this, but because the thinking is so sloppy, people don't even realize that they're doing that.
Knut: Like people want the fast, fast buck. And it's like I think that's a real side effect or a result of the fiat mindset and the fiat rot in people's brains over so many years.
Rigel: my mind so much in terms of like, I mean, I guess everyone's got to eat, right, you know, but, but, surely if you've got Bitcoin, like, you're good, right, if you really believe in Bitcoin, right, you know, maybe not now, but if you really believe in Bitcoin, then we're all going to be super fucking rich, right, in 10 years or whatever, and so in that 10 years, you know, if you got a little bit more money, it's not going to matter anywhere near as much as like, if people knew, if you had that old boys network of the people that are here right now in Bitcoin, and they knew that you were always a, you know, Trustable, a person with high integrity for 10 years over all these things.
Rigel: Imagine the value. That is an incredible value,
Knut: honesty and integrity are really, that's really the currency of the future. And that aligns with Bitcoin so well because, It is this base layer of truth. it is actually integrity quantified, if you will. so it aligns so well and I think that, reputation is everything and it's all tied to authenticity and integrity.
Leaning In
Luke: Well, and I mean, first of all, the one thing is that, that's the noster thing there as well. The Web of trust idea. I mean, IM implementation stuff. Is, is that's valid. Like if we've, we've had our own concerns about the architecture and, haven't really talked to any hardcore skeptics that, that actually have thought about this hard.
Luke: But still the, the web of trust thing is, is amazing in terms of, in terms of this portable web of trust that you can take from application to application. And hold on to that. And so I mean, I think that's just going to amplify that effect. the talk I did at Noob Day was basically just leaning into Bitcoin, how to do it.
Luke: Because for me, I've been in the space two years. so much has just happened from saying yes to stuff and putting in the work I'm not tooting my horn. Too hard when I'm saying that, but the point about it is just like, do the work, like you say, I mean, things can happen a lot faster than you
Knut: and there are no shortcuts.
Luke: just by having the integrity and doing the work with
Knut: Yeah. And you can't just cling on to this or that influencers ideas. That doesn't work. you need to actually study the thing. And
Luke: Slay your heroes.
Rigel: Yeah, something I talked about in the talk that I did today is the whole idea of what Bitcoin is, is like a different philosophy around technology, right? You know, we have The systems view of technology and the tools view of technology is technology a system whereby you follow a more or less a recipe or a set of instructions and the software does everything for you and it's like pressing a button and getting something out the other end, right?
Rigel: And that has its place, but I mean, I think Bitcoin is a different type of technology in that it requires, like you to learn to, to wield it, to understand that the value is in the, the, the time and energy that you have to invest to learn about it. Because if you don't learn it, then someone else is making these decisions for you, and the whole point of Bitcoin is, is to educate yourself and master it, right?
Rigel: An analogy might be, you know, hundreds of years ago, slightly romanticized, example, but nonetheless, I think that the metaphor is, is there, that hundreds of years ago, like, to be able to kill someone, like to be a knight or whatever, you had to spend a long amount of time learning how to master a sword, right?
Rigel: And what would work for you is one will exactly work for me.
Knut: you would probably have to practice less, right?
Rigel: but I mean, it's all about your, understanding yourself, right? And you're never going to be a better swordsman. I'm never going to be a better swordsman than you if I don't really understand myself.
Rigel: And then to project myself through the sword, right? Now today, any moron in an hour can learn how to have a rifle and shoot people. And I think, again, it's somewhat romanticized, but I still think there's a good amount of truth to this. And that, like, I think we are in a much worse position by having the power to kill given to anyone who knows how to work a very simple machine.
Rigel: Versus that being reserved to people that go through the work and therefore learn to master themselves and understand themselves. There's a degree of, you're never going to be able to kill people unless you're able to pass these personal tests and verse the effort, right? And I think the same thing should apply to technologies like bitcoin, like with our money, right?
Rigel: Because when you don't do that, you're just a blindness follower of someone else's instructions. But when you actually have to sit down and learn, there's value to making people go through that process. And so I think, like, the whole idea of bitcoin is that it should be a little. Complicated and a little hard and you know you shouldn't try and dumb it down too much because there's a certain point where it kind of kills what the whole point of Bitcoin is which is to go through that kind of process and we will have a better world if everyone understands how to use Bitcoin.
Rigel: But again, if imagine it's ten people in the world are the only people that really understand Bitcoin and everyone else is just using you know, Binance or something like that. Are we any better than we are now? I don't think we are, you know. So the whole point is making sure that everyone in the world or a much greater amount of people in the world Are the people who are able to be the banks and the PayPals and the things like that.
Rigel: And I think that's the value of it. And part of that is forcing people to be responsible and to learn themselves. And if they don't go through that, we don't change anything. So it's a counterpoint.
Knut: Are you familiar with the word Kdi Ling This, this is a word that our friend Ralphie told us in Prague, and the definition is to purposefully travel without any particular destination, possibly meandering. And, someone asked people on Twitter to, describe Bitcoin with one word.
Knut: And I think that's a perfect word, it's coddywompling. It's purposeful, but you don't know where it leads.
Rigel: yeah, yeah, yeah. You know, it's like these, all these now, you know, the journey is a destination, all this kinda stuff. But I mean, I think there is value, there's truth to that with Bitcoin,
Wrapping Up
Luke: Rigel, this has been a great, discussion, lively, do you have anything else big on your mind that you're excited to talk about or share?
Rigel: no, that's pretty much it. this has been a really good talk and I feel like I don't listen to too many Bitcoin podcasts these days, but I feel like. I don't think these sort of conversations are being had about these sort of things and, and just thank you for giving the opportunity to hopefully, hopefully whoever's watching this has shared similar, felt similar value from it, but thank you for giving the opportunity to talk about these things with you guys because they've been great counterpoints as well.
Knut: Pleasure is, on our side, right back at you. so anyway, will you want to send our listeners,
Rigel: no, just I'm on Twitter, and Telegram, if you want to get me directly, on Coinsure and
Knut: Telegram.
Rigel: yeah, yeah, yeah, hot topic today, isn't it, yeah, yeah,
Knut: have gone
Rigel: I'm trying to remember what my, I just added the, thing in, Signal. But anyway, you can get my Signal if you message me there. and my Nostr, I believe, is on there as well.
Rigel: And if not, I'm sure you can find me through things on Nostr there. I'll tell you my input, but that's a little messy to, to say on a
Rigel: We make, we make that joke sometimes, oh, you're not going to tell us your mPub? that
Knut: Thank you, Rigel, for coming on to the Bitcoin Infinity Show.
Luke: Thank you so much for having me. Appreciate it. Thank you.
Luke: you. This has been the Bitcoin Infinity Show. Thank you for listening.Appreciate it. Thank you. Luke: you. This has been the Bitcoin Infinity Show. Thank you for listening.
-
@ 4ba8e86d:89d32de4
2024-10-29 12:30:05Tutorial feito por Grom Mestre⚡
Poste original Abaixo.
Part 1: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/229987/tutorial-entendendo-e-usando-a-rede-i2p-introdu%C3%A7
Part 2: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/230035/tutorial-instalando-e-configurando-o-roteador-i2p?show=230035#q230035
Part 3: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/230113/tutorial-conectando-se-ao-xmpp-pela-i2p?show=230113#q230113
Boa tarde, camaradas do meu coeur!
Depois de muito tempo, e com o retorno da minha serotonina aos níveis basais, estou dando início a essa nova série de tutoriais. Espero que tirem muito proveito das informações passadas aqui para amplicarem o seu conhecimento da deepweb.
Esta postagem trará antes algumas considerações iniciais que podem ser úteis para quem possui pouco ou nenhum contato prévio com outras tecnologias ou tenha um entendimento torto a respeito da deepweb. Aconselho a estes que deem um boa lida antes de partirem para os tópicos do tutorial, mas saibam que ele não é um pré requisito para ele.
Dito isso, vamos prosseguir.
TÓPICOS: Introdução Instalando e configurando o roteador e o navegador Conectando-se a serviços na I2P Configurações avançadas
1. Introdução
1.1 Definindo a DeepWeb.
Muitos devem imaginar erroneamente que a deepweb se restrinja apenas à rede onion, mais precisamente aos seus hidden services, já que o Tor possui como uma das suas funções primárias proteger e burlar restrições governamentais e proteger o seus usuários através de métodos sofisticados de roteamento de pacotes e criptografia. Entretanto, ela é mais ampla do que se imagina dependendo da forma como a classificamos.
Os ditos "profissionais" usam uma definição extremamente vaga e imprecisa do que seria a deepweb e a sua verdadeira abrangência. Para isso, criei uma definição um pouco melhor para ela: redes comunitárias, sobrepostas, anônimas e criptografadas.
Vamos aos pontos individualmente:
São Comunitárias, pois os pontos de roteamento de pacotes na rede (relays ou routers) muitas vezes são mantidos de forma voluntária por usuários comuns. Não é necessário nenhuma infraestrutura sofisticada para ser um contribuinte na rede, basta ter um computador com acesso à internet e conhecimentos básicos para fazer a configuração.
São sobrepostas porque não estão acima ou abaixo da rede tradicional (diferente do que muitos imaginam). Os pacotes na DW trafegam entre os dados da surface e não em meios distintos (algo que não faz o menor sentido). Sabe aquele papo de camadas da DW ou aquela abobrinha da Mariana's Web? Então, tudo um monte de bosta derivado de Youtubers sensacionalistas iletrados em informática. Elitismo da minha parte? Quem sabe...
São anônimas porque não é simples determinar a origem e o destino dos pacotes entre nodes intermediários dado a natureza do roteamento. Em geral, aos menos para a rede onion, há pelo menos 3 relays entre você e o servidor, sendo que esse número duplica para hidden services (3 seus e 3 do serviço). A imagem abaixo ilustra bemocoteamento dos pacotes na onio. https://image.nostr.build/aea96f41d356157512f26b479ea8db5bce8693dd642f2bce0258d8e4b0dac053.jpg
Por fim, são criptografadas porque as conexões são fortemente protegidas por algoritmos sofisticados de criptografia. Além de não sabermos a origem dos dados, sequer podemos saber com facilidade o conteúdo dessas mensagens mesmo que os protocolos das camadas superiores (HTTP, HTTPS, FTP) sejam inseguros, dado que a criptografia da própria rede já as protege. Por isso é tão comum que sites da DW não usem HTTPS, pois as autoridades de certificados não os assinam para domínios da onion e certificados autoassinados vão disparar avisos no navegador.
A imagem abaixo ilustra bem como é o roteamento onion usado pelo Tor. Perceba que o contéudo da mensagem está enrolado em 3 camadas de criptografia (como a de uma cebola), de modo que para revelar o contéudo original seria preciso quebrar, no pior dos casos, 3 camadas. Como mencionado antes, o método usado para isso é a criptografia assimétrica, muito similar ao PGP, porém com a sua própria implementação. https://image.nostr.build/7bfaaf29211c11b82049ef8425abb67738d085c41558e9339ec13cf49ea5b548.jpg
Observação: Por mais que dentro da rede o encapsulamento proteja as mensagens internamente, entenda muito bem que isso não se aplica a sites da surface acessados pela onion. Ao desempacotar a última camada, a mensagem original é completamente exposta no exit node. Se ela não estiver protegida por uma camada adicional como TLS, seus pacotes estarão completamente expostos, algo que representa um sério risco de segurança.
As redes que caem em ao menos três dessas definições (anonimato, sobreposição e criptografia) podem ser classificadas como deepwebs. Podemos citar:
• Lokinet • Zeronet • Freenet • I2P • Tor • Gnunet
Porém, há alguns casos interessantes que não caem diretamente nessa regra .
A Yggdrasil ( https://yggdrasil-network.github.io/ ), uma rede de topologia mesh com foco em escalabilidade e eficiência de roteamento, possui três dessas características: comunitária, sobreposta e segura. Entretanto, os nodes não são anônimos e muitas vezes podem estar desprotegidos, já que se conectar à Yggdrasil é que equivalente a ligar o seu computador diretamente na rede sem a presença de um NAT/CGNAT, correndo o risco de expor portas de serviços da sua máquina caso elas não estejam protegidas por um firewall. A Yggdrasil na prática é exposta como um dispositivo de camada 3 (tipo um VPN), mas diferente de um, apenas endereços IPv6 dentro de uma faixa bem específica de IP são roteados por ela, o que permite que ela coexista com outros dispositivos sem haver conflitos de roteamento.
Há quem argumente que a Yggdrasil é uma deepweb dado a sua sobreposição em relação à surface; outros podem argumentar que dado a falta de anonimato ela não se enquadraria nessa categoria. Independentemente disso é uma tecnologia muito interessante com ampla gama de aplicações, como encapsular tráfego de outras redes, como a I2P, e melhorar a eficiência de roteamento.
Por fim, vamos desmitificar alguns mitos da DeepWeb muito difundidos.
Não existem camadas da DW. Os pacotes da DW são sobrepostos e navegam juntos aos pacotes da surface.
DeepWeb e DarkWeb não são coisas diferentes. São termos genéricos para a mesma coisa.
DarkWeb não é o seu provedor de e-mail ou serviço de banco. Se eles não se enquadram nas categorias de um deepweb, então estão na surface.
Você não é irrastreável na DW. Adversários motivados podem foder com você com facilidade (leia a respeito de ataques de Timing, correlação e fingerprinting).
Mesmo que não seja possível ver o conteúdo de uma mensagem pela deepweb, é possível ao menos saber que você a acessou. ISPs podem ver esse tipo de tráfego como suspeito.
Você não é um hacker só porque instalou o TorBrowser, mas pode ser considerado um se expor o IP de um hidden service.
Instalando e configurando o roteador I2P
Segue agora a seção 2 do tutorial do I2P. Mas antes apenas queria falar um pouco do projeto I2P. Apesar do foco do tutorial não ser para tratar da sua história, gostaria ao menos de fazer uma breve introdução sobre ela.
O projeto I2P (Invisible Internet Protocol) é uma rede P2P descentalizada, anônima e segura para estabelecer a comunicação entre os usuários e serviços. Na I2P é possível usar serviços como mensageiros IRC, XMPP, web services, e-mail e até mesmo torrents. A I2P nasceu de um fork da Freenet no ano de 2003, porém possui diferenças drásticas em relação a ela.
Há similaridades entre a I2P e o Tor, porém vale destacar algumas de suas vantagens. Sendo elas:
• Garlic routing ( https://geti2p.net/en/docs/how/garlic-routing ) • Modelo P2P • Todos os participantes da rede contribuem para ela • Fechado na rede - não é possível acessar a surface através da I2P • Otimizado para hidden services
Apesar disso, vale lembrar que o projeto é pequeno, desenvolvido por menos voluntários se comparado ao Tor e possui menos movimentação e financiamento para o seu desenvolvimento. Além disso, o Tor é um projeto muito mais maduro e bem documentado, algo que atrai mais usuários e desenvolvedores e torna a tarefa de encontrar e corrigir bugs mais fácil de ser realizada.
Esses são pontos importantes que devemos levar em conta ao escolher a tecnologia para as nossas necessidades. Nem sempre há tecnologias ruins, as vezes apenas as empregamos as ferramentas erradas na resolução de certos problemas.
Referências: • https://geti2p.net/en/comparison/tor • https://geti2p.net/en/docs/how/garlic-routing
• https://geti2p.net/en/about/intro
• https://i2pd.readthedocs.io/en/latest/
2. Instalando e configurando o roteador
Antes da criação do I2PBrowserBundle ( https://github.com/PurpleI2P/i2pdbrowser/releases/tag/1.3.3 ) , a única forma de se conectar à I2P era pela configuração manual de proxy no navegador. Muita gente ou não sabe ou tem MUUUUUITA preguiça de fazer isso e ficam resistentes de entrar na I2P dada essa restrição.
Como eu quero ser um bom tutor eu farei do jeito mais "difícil", pois tanto eu desejo que vocês aprendam as nuances do processo como eu sei que vocês são inteligentes o suficiente para fazer isso.
2.1 Instalação do router
Atualmente nós temos duas implementações do I2P: Uma em Java e outra em C++ (i2pd). Usaremos nesse tutorial a versão em C++ dado o seu baixo uso de recursos e facilidade de instalação.
O I2Pd está disponível para Windows, Linux, MacOS e Android e possui binários pré-compilados nas releases ( https://github.com/PurpleI2P/i2pd/releases/tag/2.50.2 ) do projeto no Github. Usuários de Linux podem instalá-lo através do respectivo gerenciador de pacotes da sua distribuição, porém algumas distros não oferecem o pacote diretamente nos reposítórios oficiais, necessitando do uso de PPAs (Ubuntu), COPR (Fedora/RHEL) e afins. Vocês podem conferir as instruções oficiais para cada sistema nessa página ( https://i2pd.readthedocs.io/en/latest/user-guide/install/ ).
Apesar desse tutorial ser voltado a usuários de desktop, o I2Pd também está disponível na loja do F-droid. Infelizmente poucos navegadores em Android permitem a configuração de proxies, porém na seção de Serviços na I2P eu tratarei brevemente de como se conectar a servidores de XMPP usando o ConversationI2P.
Para usuários de Windows, segue abaixo os binários para instalação.
• Versão 32bits ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_win32_mingw.zip )
• Versão 64bits ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_win64_mingw.zip )
• Versão para Windows XP (pois é, kk) ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_winxp_mingw.zip )
A instalação é simples e direta. Após ela apenas abram o I2Pd para que o router inicie a operação de busca e conexão com os peers. Para usuários de Linux, vocês precisam ativar o serviços através do comando 'sudo systemctl start i2pd'. Se vocês desejam que o I2Pd inicie junto com o sistema usem o comando 'sudo systemctl enable --now i2pd'.
Se tudo estiver funcionando corretamente, vocês serão capazes de abrir o webconsole do I2Pd no navegador através do endereço: 127.0.0.1:7070. https://image.nostr.build/ab205ae1071a2b705279e5ce2d6e912d8d11cc7d6dd0dc8a26b76724a27bd94b.jpg https://image.nostr.build/fa17e14600737ccfc92a415cec2fbfba226b950b2b97af7475927ae65abdbe11.jpg
2.2 Instalação e configuração do navegador
Apesar de qualquer navegador ser capaz de usar a I2P não é recomendado que usem qualquer um, especialmente o navegador que você usam no seu dia-a-dia. Recomendo que usem um navegador próprio para usar na I2P ou isolem suas atividades em um perfil separado.
Em navegadores baseado no Firefox isso é relativamente simples, bastando adicionar a opção '--profile' e o caminho do perfil que vocês desejam usar. Nesse tutorial eu vou mostrar como criar um perfil novo no Librewolf e configurar no lançador para iniciar o perfil e abrir em uma janela anônima. Essas instruções são análogas para todos os sistemas, excetuando aquelas configurações mais exóticas.
2.2.1 Escolhendo o navegador
Como citado, usarei o Librewolf como exemplo. Vocês podem baixar o instalador direto do site ou usar o gerenciador de pacotes do seu sistema no caso de Linux. Como é uma tarefa trivial eu não vou detalhar esse processo, pois todas as instruções estão em detalhes no site do navegador ( https://librewolf.net/installation/ )
2.2.2 Criando um perfil e configurando o lançador
Abram o navegador e digitem 'about:profiles' na barra de endereço. Criem um novo perfil clicando em 'Create New Profile' https://image.nostr.build/fa17e14600737ccfc92a415cec2fbfba226b950b2b97af7475927ae65abdbe11.jpg
Coloquem um nome no seu perfil e cliquem em Finalizar https://image.nostr.build/62059e375000940f11b27ae77b9ec011f9baadbb5a84afc910d41841ce73e82d.jpg
Perfis novos recém criados são iniciados por padrão. Se você deseja usar outro perfil por padrão deve mudar isso na seção 'about:profiles' do navegador.
Agora vamos configurar o lançador do LibreWolf para iniciar o perfil do i2p e em uma janela anônima. Usarei o XFCE como referência para essa tarefa, mas saibam que o processo é análogo em sistemas como Windows ou DEs como KDE. Se quiserem também podem lançar via terminal através do comando 'librewolf --profile caminho_do_perfil --private-window'.
Cliquem com o botão direito no ícone do Librewolf e abram as propriedades do atalho.
Na guia lançador, no campo Comando, adicionem no final a opção '--private-window' e a opção '--profile caminho_do_perfil'. O caminho do perfil é aquele mostrado na seção 'about:profiles' do Librewolf. https://image.nostr.build/a7d6515d7825cb3bdcb681ecf71a97318dccba81eea7cc87fc5377ecc06065ee.jpg
2.2.3 Configurando o proxy
Com o lançador configurado, abra o navegador nesse perfil. Vamos configurar o proxy para se conectar ao I2P agora.
Abra as configurações digitando 'about:preferences' na barra de endereço. Na seção 'Geral' abra as configurações de rede (Network Settings) https://image.nostr.build/f37157bebf15ada616914f403e756cf9fcee4c9aaaa353196c9cc754ca4d7bc5.jpg
Configure o seu proxy como na figura abaixo. https://image.nostr.build/41ebd05255a8129d21011518d400689308d9c0320408967003bf296771e0b96f.jpg
Fecha as configurações. Se o seu proxy foi configurado corretamente tente abrir algum desses eepsites.
• http://identiguy.i2p • http://notbob.i2p • http://reg.i2p
Se tudo ocorreu como conforme, a página será carregada. https://image.nostr.build/ce29ae44743f06cfed591f082208c9612c59b3429ab46d90db48131b3bc3e99d.jpg
OBSERVAÇÃO: A busca pelos peers é um pouco demorada, levando de 2 a 5 minutos para que um número mínimo necessário de peers sejam encontrados para estabelecer uma conexão estável. Você pode ver a lista de inbound e outbound tunnels na seção Tunnels do WebConsole (localhost:7070) https://image.nostr.build/285a0d765eaf5f33409f975cd720d0efa68ecc40a9da20bfd9cde0cd1f59a7b6.jpg
IMPORTANTE: Apesar do Librewolf possuir defaults seguros, eu recomendo que vocês instalem as seguintes extensões para aumentar ainda mais a sua proteção.
• noScript • JShelter
Lembrem-se que vocês precisam desativar o proxy para acessar a clearnet. Depois disso reativem-no nas configurações.
Outro detalhe: Se vocês tentarem digitar um endereço .i2p na barra de endereços do navegador sem especificar o protocolo (http), ao invés do Librewolf ir ao endereço ele vai realizar uma pesquisa. Para corrigir esse problema, vocês precisam adicionar a seguinte configuração do tipo boolean em 'about:config' como mostrado na imagem. https://image.nostr.build/4518ab817b131f7efe542b2d919b926099dce29a7b59bdd3c788caf53dbd071e.jpg
Reiniciem o navegador e testem. Se tudo deu certo vocês não precisam especificar o protocolo ao digitar um endereço .i2p, bastando apenas digitar o endereço simplificado.
Por fim, terminamos essa parte do tutorial. Na próximo parte trataremos de como podemos nos conectar a serviços hospedados na I2P como XMPP
[TUTORIAL] Conectando-se ao XMPP pela I2P
Essa é a terceira parte da série de tutoriais. Agora vamos tratar de algumas operações na rede, sendo uma delas conectando-se a um servidor de XMPP na I2P.
Não se esqueça de ligar o router e manter ele ligado por alguns minutos antes de iniciar essas operações. O router demora um pouco para encontrar os peers e estabelecer uma conexão estável.
3.1 Escolhendo o cliente XMPP
Existem diversos clientes XMPP capazes de se conectar usando um proxy. Um dos melhores é o Gajim, um cliente escrito em Python com diversas funcionalidades como criptografia OMEMO e PGP, workspaces separados, extensibilidade via plugins e uma interface bonita e organizada.
Assim como ocorreu com o router, o Gajim está disponível por padrão na maioria das distros Linux. Use o seu gerenciador de pacotes para instala-lo. Em Windows você pode baixar o Gajim através desse link ( https://gajim.org/download/ )
3.2 Criando uma conta
Vamos primeiro criar uma conta no servidor. No nosso exemplo usarei o servidor oficial do projeto i2pd, o xmpp.ilita.i2p. Há diversos outros servidores XMPP no diretório de links notbob.i2p caso queiram explorar mais. Para criar uma conta, siga os passos abaixo:
Abra o Gajim. Na barra de tarefas vá em Contas -> Adicionar Conta. Na nova janela que aparecer, clique em Adicionar Conta https://image.nostr.build/01413e7c6d00c238420e3b0c769dd8d7f7d6522754d2135d3e98a22944f79a27.jpg https://image.nostr.build/9f015861f33990871d96f03d5ec78036a65e3ad9f8ff6a38da18c5b27d31f6d5.jpg
Na janela de adicionar contas, clique diretamente em Inscrever-se. Não precisa colocar as suas credencias como mostra a imagem (falha minha, ksksk) https://nostrcheck.me/media/c8411a22946e97467e0ee197ef7a0205ba05f2c67bde092041481ccc2cbbc66d/81938c8d278ce0562c2240341e203f3b70f51ee2db06ceb453f8a178df37fa84.webp
Digite o nome do servidor no campo abaixo. Não esqueça de marcar a opção 'Configurações Avançadas' antes de clicar em Inscrever-se https://image.nostr.build/5ee4305a6a23e5c064446b0ce7a4cbc7e790c1ba237bd2495d0237b86a4df07f.jpg
Vamos adicionar um novo proxy para essa conta. Para isso clique no botão 'Gerenciar proxies', ao lado do campo Proxy nas Configurações Avançadas https://image.nostr.build/daceb5436def55401d3974ce48d85771e5ebcec4e3f90eb1001df4609112ec12.jpg
Adicione um novo proxy clicando no sinal de '+' abaixo da lista de proxies. Preencha os campos de acordo com a imagem abaixo e em seguida feche a janela. https://image.nostr.build/140b34c4e46e9295c073311d483d206201d9339a75f613fe4e829c14f3257bfe.jpg https://image.nostr.build/d365a63d81a14d763bffceb50b30eb53d81959623f8fe812175358a41b1fba53.jpg
No campo de Proxy, selecione o proxy I2P. Preencha o restante dos campos de acordo com a imagem abaixo. Em seguida clique em 'Inscrever-se'. https://image.nostr.build/d06c11d9c6d19728bf5a58af2dd3e14d8ca0021456da09792a345ac0bfc90ad0.jpg
Nesse momento uma mensagem pode aparecer pedindo para abrir uma exceção para o certificado TLS. Isso acontece porque trata-se de um certificado autoassinado que não foi validado por uma autoridade oficial. Apenas abra a exceção e prossiga (não há imagem para isso porque eu já abri essa exceção no meu cliente). Uma nova janela vai aparecer solicitando-lhe para inserir as suas credenciais. Tome cuidado aqui, pois não é para inserir o nome completo com o domínio, apenas o seu nome de usuário (ex: descartavel). https://image.nostr.build/dde2a6736bd00080fbeeb8076754e226971a412710b370d5559f7f4d5414f8b3.jpg
Se tudo der certo, uma nova janela vai aparecer confirmando a sua inscrição. Coloque um nome e uma cor para a sua conta e clique em Conectar para concluir o processo. https://image.nostr.build/74934d3f1f3f4232eacee8e78e707936227f816c50ac6b52da5c81ec17557e69.jpg
Para finalizar, nos detalhes da sua conta, modifique as suas configurações de privacidade para diminuir o fingerprint. Na seção de 'Privacidade', desligue as seguintes opções:
• Tempo ocioso • Hora de Sistema Local • Sistema Operacional • Reprodução de Mídia https://image.nostr.build/d2ed5852a104c770b50c7b053d518d8af0b6289ced6b3ad4187492208c7ca649.jpg
3.3 Procurando por salas de bate-papo públicas
Após criar a sua nova conta, vamos descobrir alguns serviços que o servidor oferece. Para isso, vá para Contas -> Descobrir serviços https://image.nostr.build/54928d1dd0e48365858b24c72097a9fabf677794e13f329fc0568211eefbe559.jpg
Na seção 'Bate-papo em Grupo', selecione Chatrooms e clique em 'Navegar'. Ao fazer isso uma lista de chatroom públicos presentes no servidor vai aparecer. Fique a vontade para explorar, porém saiba que alguns servidores são moderados e não te permitem mandar mensagens sem sua conta ser aprovada pelo moderador (familiar?). https://image.nostr.build/1936bef51d58a1f6cfdf8bf8d84bfa64adc2a09b9c0fb1623b93a327f0b8cdd8.jpg https://image.nostr.build/89e8013b1cea1df0f80f6833bd6771c33101f404b0099b2d7330a5e57607baff.jpg
3.4 Adicionando contatos
Para adicionar contatos à sua lista, clique no símbolo de '+' ao lado do campo de pesquisa e selecione 'Add Contact'. https://image.nostr.build/d3cadea27591355f674fba93765c3815282d112b2e80a592bb77a442c13dd4f4.jpg
Coloque o endereço completo da conta que você deseja adicionar. Usarei a minha conta oficial nesse exemplo. Você tem a opção de anexar uma mensagem qualquer antes de enviar o convite. Clique em 'Adicionar Contato' para prosseguir. https://image.nostr.build/ff95b7aec2377c58d4253c5b7b3aabf141a92dd5f3e97f6e1f01ecb32a215d38.jpg https://image.nostr.build/6562e680e28c321ebbd009b5ade513f8a279aea33bc16aa9fb251f3507eb04af.jpg
Se tudo ocorrer normalmente, o novo contato vai aparecer na sua lista. Dê dois-cliques na conta para abrir o chat. Não se esqueça de ativar a criptografia OMEMO antes de enviar qualquer mensagem. Agora você está pronto para conversar de forma segura :) https://image.nostr.build/ef7f783a311ad0f68a5408137f75dc2bc6c38f6e9656dc0d68d3267f5012f658.jpg
E com isso terminamos a terceira parte da série de tutoriais.
[TUTORIAL] Criando e conectando-se a um servidor XMPP na I2P e clearnet.
Como configurar o seu próprio servidor XMPP. https://youtube.com/watch?v=Ot_EmQ8xdJwy
Criando contas e conectando clientes Pidgin http://i2pd.readthedocs.io/en/latest/tutorials/xmpp/#creating-accounts-and-connecting-clients
BONUS: Conectando-se facilmente à I2P. https://youtube.com/watch?v=wGIh5tQcw68
-
@ b8a9df82:6ab5cbbd
2024-10-29 11:54:45Packing my bags and taking…? Absolutely no idea, but definitely not a winter jacket. That’s not happening—I’ve been telling myself for years that I don’t want to spend another winter in Berlin. The last few have been brutal. I’m craving a real adventure.
Currently on plane number three, with plenty of time to think, read, and write because, honestly, one of the things I love most about flying is not being connected. I’m the person who won’t spend over $10 on an hour of Wi-Fi, and right now, I love that my phone is off. No messages, no notifications. It’s kind of crazy these days—every morning, I wake up to 100 messages. I’m always telling people how toxic phones can be, yet even I can barely stay away from mine lately.
Right now, squeezed into the middle seat on a 10-hour flight from Toronto to Buenos Aires, I’m starting to question what I’ve gotten myself into. Yes, Toronto. There are people who can afford a direct flight, and then… there’s me. Berlin to Frankfurt, Toronto to São Paulo (just a quick tech stop), and finally, Buenos Aires.
Nearly 30 hours of travel. It’s fine, but yeah, I’m kind of jealous watching the business class people, lounging literally just in front of me. My legs are burning; sleep is impossible. I don’t even know what day it is anymore.
Flying’s changed so much. It’s ridiculously expensive and uncomfortable now. It’s like today’s business class is what economy used to be ten years ago. Now, we pay extra for everything. I miss when flying felt like a bit of an adventure itself, back when they’d let kids visit the cockpit (I have been there) —impossible now, sadly.
So here I am, taking a moment to share some personal insights from last week, preparing for this LATAM-Nostr Tour:
The last few weeks have been intense, to say the least. My last official workday was at the end of September, and of course, I got super sick right after. My body was practically screaming for a timeout that my mind didn’t want to give. I kept thinking, “Just four more weeks—Amsterdam, sorting my life out in Berlin, subletting my flat.” Well, clearly, that didn’t quite go as planned. So hey, if anyone needs a cute little flat for a few months, let me know!
Excited, overwhelmed, and freaking out all at once. I just hope everything works out: that I haven’t forgotten anything, that the booths will be ready, the schedule will come together, people show up, speakers are prepared, volunteers are there, tickets are sorted. There’s still so much to do, and the conference pace is making it tough. For example, SatsConf still hasn’t sent the final design specs, and I just got the measurements for the graphics. Trying to sort that out while traveling is sending me into a bit of a tailspin. It’s like my inner German is in crisis mode, haha.
I know what I’m doing, and I know what I’m capable of—but this is a whole new world. I really want to meet everyone’s expectations here. I miss my usual team so much because I know how they work, what to expect, and I can trust that everything will be handled. Here, I just have to let go, trust, and see what happens.
And then you meet people. You realize they’re kind, helpful, and excited, and together, it feels like we can actually make something happen. Last week, I went to the Nostr Berlin meet-up, chatting with some guys who also happened to be flying to BA. I suggested they help at our booth, and in return, we could sort out tickets. They were thrilled—it’s the kind of support that makes all of this feel worth it.
Even though I don’t know exactly what’s in store or what to expect, I’m truly looking forward to it. The team is incredible, and I know I’ll be looked after. As the only woman in the core team, it’s been an experience. I love working with men, but there are times I wish I had another woman alongside me, someone with a similar mindset and, yes, someone to do the “girly stuff” with.
But here I am, embracing the unknown, ready for this journey, and just hoping that somewhere between Buenos Aires and Berlin, this leap will pay off in ways I can’t even imagine. South America, let’s see what you’ve got!!!
-
@ 46390caa:7e7f65d9
2024-10-29 10:42:40The relationship between central banks and Bitcoin has long been complex and multifaceted. As the world's first decentralized cryptocurrency continues to gain traction, central banks are grappling with how to regulate and interact with this new financial phenomenon. In this article, we'll explore the evolving dynamics between central banks and Bitcoin, and what this means for the future of finance.
Early Scepticism
Initially, central banks viewed Bitcoin with skepticism, citing concerns over its volatility, lack of regulation, and potential for illicit activities. Many saw Bitcoin as a threat to traditional fiat currencies and the established financial order.
Shifting Stance
However, as Bitcoin's market capitalization grew and institutional investment increased, central banks began to reevaluate their stance. Some central banks now explore ways to leverage blockchain technology and issue their own digital currencies.
Central Bank-Backed Cryptocurrencies (CBDCs)
Several central banks are developing or testing CBDCs, including:
- Sweden's Riksbank (e-krona)
- China's People's Bank of China (Digital Currency Electronic Payment)
- Singapore's Monetary Authority (Project Ubin)
- Canada's Bank of Canada (CAD- Coin)
CBDCs aim to:
- Improve financial inclusion
- Enhance payment efficiency
- Reduce cash handling costs
- Increase monetary policy effectiveness
Regulatory Approaches
Central banks employ varying regulatory strategies:
- Strict Regulation: Some, like the European Central Bank, advocate for stringent regulations to mitigate risks.
- Sandboxes: Others, like the UK's Financial Conduct Authority, create sandboxes for innovation while ensuring consumer protection.
- Collaboration: A few, like the Bank of International Settlements, encourage cooperation among central banks to develop global standards.
Implications for Bitcoin
The central bank-Bitcoin dynamic has significant implications:
- Legitimization: Central bank involvement lends credibility to cryptocurrency.
- Competition: CBDCs may compete with Bitcoin for market share.
- Regulatory Clarity: Clear guidelines could boost institutional investment.
- Innovation: Collaboration can drive blockchain innovation.
Conclusion
The relationship between central banks and Bitcoin is evolving from adversarial to collaborative. As central banks explore CBDCs and regulatory frameworks, Bitcoin's legitimacy and mainstream acceptance grow. The future of finance will likely involve a blend of traditional and decentralized systems.
Sources:
- Bank for International Settlements (BIS) - "Central bank digital currencies"
- International Monetary Fund (IMF) - "Casting Light on Central Bank Digital Currencies"
- World Economic Forum (WEF) - "The Future of Central Bank Digital Currencies"
-
@ 6bae33c8:607272e8
2024-10-29 09:10:25The book on Daniel Jones is closed. It’s probably been closed for at least a year, but what I saw last night was quintessential Dimes. Basically, he’s a good athlete who can make all the throws when he steps into them. But his feel for the pocket is F-. And because he’s so tall, his speed doesn’t really kick in until he gets going — he has a slow first step when under pressure in the pocket. And maybe he’s even lost a step as they rarely call designed runs anymore, and when he scrambles it no longer goes anywhere.
I’m watching this from a hotel lobby, and it took herculean restraint not to scream, “Get rid of the fucking ball!” Just make a read and get rid of it. He thinks way too much, he doesn’t read and respond. He’s the opposite of Tua or Kurt Warner back in the day who just whip the ball out right away. The Giants can’t win with him, barring a perfect offensive line, and theirs is the opposite, though it played much better last night.
-
The Steelers aren’t good. but they just show up.
-
Russell Wilson throws a nice deep ball, but is not nearly as fast on his feet as he once was. He’s an upgrade over Justin Fields but might have less upside.
-
Najee Harris is a load and wears down the defense. There’s still value in that.
-
Jaylen Warren is back to last year’s role and is startable in a pinch.
-
George Pickens had a better game than the box score indicates — had one TD called back due to a penalty and another overturned.
-
Tyrone Tracy is a monster — fast, runs hard and can catch passes (though they rarely throw to him.) But apparently he left late with a head injury (I didn’t see it.) After Jayden Reed (who’s slipped into irrelevance) Tracy was my second biggest draft-day regret for not getting.
-
Malik Nabers had a drop, but otherwise had a decent game, fighting like crazy for yardage after the catch. He should have drawn a PI on a deep throw too as far as I could tell.
-
It looks like Darius Slayton has overtaken Wan’Dale Robinson as the WR2. Granted they have different roles, but Jones is looking down the field for Slayton more.
-
The Giants offensive line blocked well against the run and did enough against a tough Steelers pass rush, but Dimes did them in with his awful pocket awareness. It’s tough to watch him freeze when no one is wide open. He’s not only the anti-Tua (not getting rid of it) but also the anti-Mahomes, not having any poise when things aren’t there. He needs to learn to throw his receivers open, throw to Nabers to make a play even if he’s covered, improvise, something.
-
The Giants defense is good. It’s really too bad they get sold out by Dimes every game. Even someone like Derek Carr would make a huge difference.
-
What a frustrating game. The Giants got the Wilson turnover late in the fourth quarter to give them a chance, and Dimes started doing Dimes things including delay of game. I even blame the false starts on him — if I knew my QB was gonna deer-in-headlights it every time, I’d be anxious to get blocking early too.
-
-
@ fd208ee8:0fd927c1
2024-10-29 08:52:42Yesterday was also a day
I'm still quite bullish about using Nostr to publish, and generally for OtherStuff, but I was feeling a bit pessimistic about the microblogging (kind 01) feeds on Nostr, yesterday. And, rightly so. Mine has been grinding slowly to a halt, and not for lack of effort, on my part. I regularly hear reports, from other npubs, that they sense the same phenomenon.
Most of the people I have whitelisted on the wss://theforest.nostr1.com relay (currently 302, in number) are beginning to give up on Kind 01 clients, except for occasionally making an announcement, and are increasingly moving their chatting off-Nostr. (I'm still privy to those conversations, but most of you no longer are.)
So, my feed has been getting quieter and quieter. Even adding new people doesn't help much, as they don't tend to stick around, for long, so it's a Sisyphean task.
Some others are still bothering to show up, regularly, but they increasingly see it as a chore, or something they do to "keep up appearances". Add me to this group of wearied, diligent noters, holding down the microblogging feeds, with our exhausting attempt at #KeepingNostrWeird, while the influencers surround the gates and the Kind 01 feeds dissolve into nothing but warmed-over Bitcoin memes, GM notes, notifications from the OtherStuff, and Things Copied from X.
The problem of barren, intellectually-emptying Kind 01 feeds is further exacerbated by the fact that new entrants to the Nostrverse find it increasingly easy to "find good follows", but they're all only finding the same follows: whoever is on the trending list.
The See-Nothings
I keep complaining about this, but the responses I get are generally unhelpful. They are:
- mockery -- Oh, Miss Hoity-Toity wants more attention!
- insults -- Nobody is talking to you because you are boring and stupid, and nobody likes you.
- clueless -- You should try replying to other people, then they might reply to you.
- or they tell me to just stop looking at the list, if it upsets me.
What people are missing, by telling me to just not look at the trending lists, is that the lists are a statistic of what real humans are looking at, on Nostr. The bizarrely-high concentration of npubs, on the list, so that their entries show up multiple times, suggests that what people are primarily looking at... is the trending list.
Either directly, because they use a client that has that built in, or indirectly, as they have been onboarded with the lists or told to "just follow the people I follow", which leads to a steadily-rising concentration of follows. This concentrating effect is accelerating.
The newly-popular WoT (web of trust) relays further exacerbate this effect, as they put a premium on the npubs that have the highest WoT score, which -- surprise, surprise! -- are the same people as on the trending list.
And this is why everyone on the trending list insists Nostr is a fun, happening place, full of human interaction. A place where replying reverently to Jack and posting GM religiously will make you a sought-after conversant. It is that place. For them.
In fact, they've reached that glorious state of #PeakSocialMedia, where they have become famous for being famous, and no longer have to even pretend to be trying to appeal to anyone with their content. They can post literal garbage, and their ~~fans~~ ~~groupies~~ ~~sycophants~~ commentariat will cheer them on, and flood their replies with ardent encouragement. Less because those other npubs actually cared about what they posted, than because they are hoping to pick up new followers in those threads, since they know that everyone is looking at those threads, because those threads are trending.
It's a pyramid scheme of following.
For the rest of us... the vast majority of us... that blue line at the bottom is mostly how it feels.
The trend is to trending.
What we no longer have, is people looking directly at relay feeds, to find new people, or even their own follow list feeds, to see npubs they've already subscribed to. Even when people follow me, they usually don't respond until I'm trending, which suggests that they're also seeing me on the trending list because that is what they're primarily looking at. This is why, as soon as you get on the trending list, your replies explode. And your replies will be concentrated in a hardcore few, otherwise.
Those few are the reason I keep coming back, but as they're also often chatting with me off-Nostr, I am facing the question of: Why bother with Nostr microblogging?
This is the question I am struggling with. If kind 01 isn't for plebs chatting, anymore, (and it increasingly isn't) then it's mostly a sort of bulletin board, where we post notifications of items we've added in OtherStuff clients, or make announcements of meetups, software releases, or conferences. This, however, is compounding the dullness of the feeds and turning it into a sort of "info flyer", except for a lucky few. But, perhaps, I am simply a #NostrBoomer, who is failing to move with the times and get with the program.
I'm slowly reaching the conclusion that Kind 01 in an open, centralized market of notes, will always coalesce around a small subset of #NostrElite and turn into a largely passive form of entertainment, or a frustratingly lonely place, for everyone else. There can only be so many people talking, at once, in a public square.
The only movement I currently see, that might end the slow slide of Kind 01 into irrelevance and tedium, is to create lots of smaller, public squares, through single-relay communities. This has been such a long time, in coming, and has been resisted by client devs so ferociously, that I worry that it's merely an attempt to close the barn door after the npubs have escaped.
I sincerely hope to be proven wrong, though. Perhaps the relay devs, who have valiantly taken up the fight, will #SaveKind01. We shall see.
-
@ a012dc82:6458a70d
2024-10-29 08:28:26Table Of Content
-
The Impending Debt Limit Crisis
-
Why Bitcoin Holds Promise
-
Impact on National Debt
-
Conclusion
-
FAQ
As nations grapple with mounting debt burdens and economic uncertainties, a groundbreaking solution looms on the horizon: Bitcoin. This digital currency, built on decentralized blockchain technology, offers a unique opportunity to address the impending debt limit crisis and reshape the financial landscape. In this article, we will delve into why Bitcoin could be the solution to the looming debt limit crisis, exploring its advantages, impact on national debt, and its potential role in ensuring economic stability.
The Impending Debt Limit Crisis
What is the Debt Limit Crisis?
The debt limit crisis refers to the situation when a country's government reaches the maximum amount of debt it can legally borrow. This ceiling, set by legislation, is often a contentious issue in political debates. Failure to raise the debt limit can result in severe consequences, including a potential government shutdown, default on obligations, and financial market instability.
The Fragile State of National Debts
Nationwide debt levels continue to soar across the globe, with many countries burdened by staggering amounts of indebtedness. The United States, for instance, faces a mounting national debt that surpasses $28 trillion. Similarly, other nations grapple with their own debt crises, making it imperative to explore innovative solutions to tackle this financial burden.
Why Bitcoin Holds Promise
Bitcoin's Decentralized Nature
Bitcoin operates on a decentralized network called the blockchain. This means that no single entity or government controls it. Instead, transactions are verified by a network of computers, ensuring transparency and immutability. This decentralized nature presents a stark contrast to traditional financial systems, making Bitcoin a promising alternative for economic stability.
Protection Against Inflation
Inflation poses a significant threat to economies and their citizens. Bitcoin, with its limited supply of 21 million coins, offers a hedge against inflation. Unlike fiat currencies, which can be printed at will, Bitcoin's scarcity ensures its value is not eroded by excessive money supply. This feature makes Bitcoin an attractive store of value and a potential safeguard against the negative effects of inflation.
Financial Inclusion and Empowerment
Bitcoin has the power to empower individuals and communities who have limited access to traditional financial systems. By utilizing Bitcoin, individuals can transact securely and inexpensively, without the need for intermediaries. This can provide financial inclusion to the unbanked and underbanked populations, fostering economic growth and stability.
Transparency and Auditability
One of the core principles of Bitcoin is transparency. Every transaction is recorded on the blockchain, visible to anyone who wishes to review it. This transparency enhances accountability and enables efficient auditing, reducing the likelihood of fraudulent activities. By leveraging these features, governments can ensure responsible financial practices and mitigate the risk of corruption.
Impact on National Debt
Reducing the Reliance on Fiat Debt
Bitcoin has the potential to reduce a nation's reliance on fiat debt. Governments often resort to borrowing money by issuing bonds and treasury bills, adding to their national debt. By incorporating Bitcoin into their financial systems, governments can diversify their holdings and explore alternative means of financing. This could alleviate the burden of constantly accumulating fiat debt and provide a more balanced approach to fiscal management.
Revenue Generation and Economic Growth
Bitcoin's adoption can contribute to revenue generation and economic growth. As the cryptocurrency ecosystem expands, businesses emerge to support and facilitate Bitcoin transactions. This development creates employment opportunities and stimulates economic activity. Moreover, governments can generate revenue through taxation on Bitcoin-related activities, further bolstering their financial position.
Mitigating Currency Crises
Currency crises can wreak havoc on economies, causing severe fluctuations in exchange rates and devastating consequences for citizens. By integrating Bitcoin into a nation's financial infrastructure, governments can provide an alternative to their national currency during times of currency crises. This flexibility can help stabilize the economy, mitigate the adverse effects of currency devaluation, and foster investor confidence.
Conclusion
As nations confront the looming debt limit crisis, Bitcoin emerges as a beacon of hope, offering a potential solution and transformative possibilities. Its decentralized nature, protection against inflation, financial inclusion, and transparency make it a compelling choice for governments seeking economic stability. While challenges and uncertainties exist, embracing Bitcoin's potential can pave the way for a more resilient and inclusive financial future.
FAQ
Can Bitcoin completely eliminate a country's debt? No, Bitcoin alone cannot eliminate a country's debt. However, its adoption and integration into financial systems can provide alternative means of financing and reduce reliance on accumulating fiat debt.
How can Bitcoin help individuals facing economic hardships? Bitcoin offers financial inclusion and empowerment by providing a secure and inexpensive means of transacting. This can benefit individuals facing economic hardships by enabling them to participate in the global economy without the need for traditional banking services.
Will governments lose control if they adopt Bitcoin? Governments can adopt Bitcoin while retaining control over their financial systems. The decentralized nature of Bitcoin does not imply a loss of control; instead, it offers an opportunity for greater transparency, accountability, and economic stability.
Is Bitcoin a safe investment for governments? As with any investment, Bitcoin carries risks. However, due to its limited supply and decentralized nature, Bitcoin has demonstrated resilience and the potential for long-term value appreciation.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ cb084639:2f16502a
2024-10-29 05:28:32ทำไมถึงกลัว คลอเรสเตอรอลและไขมันอิ่มตัวกันขนาดนั้น !!!
จากภาพจะเห็นได้ว่ามีการวางขายไข่จากพืช!!! ซึ่งอ่านแล้วน่าขัน ในเมื่อเราสามารถ กินไข่จากแม่ไก่ได้!!!
เพื่อความกระจ่างเรามาดูฉลากเจ้าน้ำไข่จากพืชกล่องสีเหลืองกันดีกว่า
อย่างแรกเรามาดูที่ราคากันก่อน ราคาต่อกล่อง 6.98 usd ราคาบาทอยู่ที่ประมาณ 235 บาทต่อกล่อง 16 ออนซ์หรือ 454 กรัม และถ้าเป็นการ นำเงินจำนวนนี้ไปซื้อไข่จริงเบอร์ 2 ราคาแผงละ 119 บาท จะได้ไข่ 58 ฟอง(เกือบ 2 แผงขาดไป 2ฟอง)
เน้นเรื่องปลอด GMO และไม่มี คลอเรสเตอรอล อันนี้เป็นวิธปรุงง่ายๆ ใช่น้ำไข่จากพืช 3 ช้อนโต๊ะ ต่อไข่ไก่จริง 1 ฟอง ทำง่ายสะดวก
ด้านนี้พยายามเปรียบเทียบให้เห็นว่า ไม่มีคลอเรสเตอรอลและไข่มันอิ่มตัว
ปริมาณสารอาหารไข่จากพืช ไม่มีคลอเรสเตอรอล มีไขมันทั้งหมด 4 กรัม คือไขมันไม่อิ่มตัวเชิงซ้อนและไขมันไม่อิ่มตัวเชิงเดี่ยว ต่อหนึ่งหน่วยบริกโภค
ภาพนี้คือข้อมูลขอไข่ไก่ที่ได้จากแม่ไก่จริงๆ
เกือบลืมไปน้ำไข่จากพืชจำเป็นต้องมีส่วนผสมต่างๆ เช่น น้ำ โปรตีนถั่วเขียว น้ำมันคาโนล่าสกัดเย็น สีจากสารสกัดแครอท หัวหอมแห้ง เจลแลนกัม เพื่อรสชาติและเนื้อสัมผัส โพแทสเซียมซิเตรต เกลือ น้ำตาล น้ำเชื่อมมันสำปะหลังของแข็ง เตตระโซเดียมไพโรฟอสเฟต ทรานส์กลูตามิเนส สารสกัดขมิ้น (สี) ไนซิน (สารกันบูด)
สินค้าเน่าเสียง่าย - เก็บในตู้เย็น รับประทานได้ภายใน 7 วันหลังจากเปิด
เราต้องแลกกับการที่ต้องบริโภคสารแปรรูปสารพัดเพื่อที่จะต้องการหนีจากคลอเรสเตอรอลอละไขมันจากธรรมชาติ จะดีกว่ามั้ยถ้าเราเลือกกินไข่ที่ผลิตจากธรรมชาติโดยแม่ไก่?
-
@ c0f9e286:5a223917
2024-10-29 03:51:44ตอนที่แล้วกล่าวถึงการถือหุ้นแบบซ้อนเป็นชั้นๆ ผ่านกลไก Offshore Company ในตอนนี้จะกล่าวถึงอีกหนึ่งเครื่องมือในการปกปิดความเป็นเจ้าของ นั่นคือการตั้ง Trust
หลายคนอาจจะเคยได้ยินคำว่า Trust ผ่านกอง REIT (Real Estate Investment Trust) ซึ่งเป็น Trust เพื่อการลงทุนอสังหาริมทรัพย์ สามารถทำการระดมทุนผ่านตลาดหลักทรัพย์ได้ มีโครงสร้างคล้ายๆกับ Property Fund แต่ Trust ที่ผมจะกล่าวต่อไปนี้ เปรียบเสมือนกองทุนส่วนบุคคลซึ่งผู้จัดการกอง Trust จะเป็นผู้บริหารทรัพย์สินนั้นๆ ส่วนเจ้าของตัวจริงจะไม่มีกรรมสิทธิ์ทางตรงต่อทรัพย์สินนั้นๆ
ก่อนอื่นต้องอธิบายศัพท์ของ Trust ให้เข้าใจก่อน เพราะค่อนข้างมีศัพท์เฉพาะเยอะ โดยศัพท์ที่ควรรู้ก็เช่น
Settlor (ผู้ตั้งกอง): เป็นคนที่นำทรัพย์สินมาใส่ในกอง Trust ซึ่งหลังจากทรัพย์สินถูกโอนเข้าไปในกอง Trust แล้ว ผู้ตั้งกองจะไม่มีสิทธิ์ควบคุมทรัพย์สินนั้นโดยตรงอีกต่อไป
Trustee (ผู้ดูแลกอง): เป็นผู้ที่ได้รับมอบหมายให้จัดการทรัพย์สินในกอง Trust ตามเงื่อนไขที่ผู้ตั้งกองระบุไว้ ผู้ดูแลกองมีหน้าที่ดูแลให้ทรัพย์สินนี้เติบโตและคงอยู่เพื่อผู้รับประโยชน์
Beneficiary (ผู้รับประโยชน์): เป็นคนที่ได้รับผลประโยชน์จากกอง Trust ตามเงื่อนไขที่กำหนด เช่น ได้รับเงินปันผล หรือทรัพย์สินเมื่อครบกำหนด
ข้อสังเกตง่ายๆ เวลาคุณดูหุ้นบริษัทจดทะเบียนในตลาดหลักทรัพย์ มักจะมีชื่อหนึ่งปรากฏขึ้นมาเสมอๆในหุ้นตัวใหญ่ๆ นั่นคือ STATE STREET BANK AND TRUST COMPANY
เวลาเห็นรายชื่อแบบนี้เข้าไปถือหุ้นทุกบริษัท คุณไม่มีทางรู้เลยว่า Trust นี้กำลังถือทรัพย์สินให้รายใหญ่คนเดียว หรือหลายคน บางทีอาจจะเป็นรายใหญ่แค่คนเดียวใช้บริการ Trust เจ้านี้เพื่อให้ไปถือหุ้นแทน หรืออาจจะมีหลายคนว่าจ้าง Trust แห่งนี้ให้ถือหุ้นแทน พอถือรวมกันมากเข้าก็เลยปรากฏเป็นรายชื่อผู้ถือหุ้นใหญ่นั่นเอง
อ่อ ลืมบอกไป ในไทยไม่มีกฎหมายรองรับในการตั้งกอง Trust ดังนั้นถ้าจะตั้งต้องตั้งในต่างประเทศ และไม่ใช่ว่า Trust จะมีแต่ข้อดีอย่างเดียว ซึ่งข้อเสียของมันก็ควรนำมาคิดด้วยเช่นกัน
ซึ่งข้อเสียอย่างแรกคือคุณไม่มีสิทธิความเป็นเจ้าของทรัพย์สินหรือหุ้นนั้นๆอีกต่อไป นั่นเป็นสาเหตุที่ไม่ว่ารัฐบาลไหนก็ไม่สามารถฟ้องร้องเพื่อยึดทรัพย์ใน Trust ได้ Bitcoiner ย่อมทราบดีกับคำว่า “์Not your key, Not your coin” คุณกำลังเอาทรัพย์สินไปฝากให้คนอื่นดูแล เพราะฉะนั้นคุณมีโอกาสโดนกอง Trust อ้างว่าบริหารงานผิดพลาดซึ่งทำให้คุณสูญเสียทรัพย์สิน ดังนั้นก่อนตั้ง Trust ควรเลือก Trustee ที่มีผลงานมานาน ไม่เคยมีประวัติฉ้อฉล และคุณก็ควรกำหนดเงื่อนไขในการบริหารกองทุนให้ชัดเจนตั้งแต่แรก เพื่อป้องกันการโอนย้ายทรัพย์สิน หรือการบริหารงานผิดพลาด
ถัดมาคือค่าใช้จ่ายโดยรวมมักจะสูงกว่าการตั้ง Offshore Company แบบซ้อนประเทศ ตั้งแต่การ Settle ไปจนถึงค่าดูแลกอง Trust รายปี ซึ่งผมไม่เคยเห็นที่ไหนต่ำกว่าหลักแสนต่อปี หรือบางที่ก็หลักล้าน หากมีทรัพย์สินจำนวนมาก ต่างกับการตั้ง Offshore Company โดยสิ้นเชิง (แต่ในบางกรณี Offshore Company ก็มีค่าใช้จ่ายสูงเช่นกัน ขึ้นกับธุรกิจที่ทำ จำนวนเงิน และประเทศที่จดจัดตั้งบริษัท)
ดังนั้น Trust จึงเป็นอีกหนึ่งวิธีของการปกปิดตัวตนของเหล่ามหาเศรษฐี แต่แลกมากับการต้องไว้ใจผู้บริหารกอง Trust ว่าจะไม่ฉ้อฉลกับทรัพย์สินของเรา ซึ่งถ้าถามว่าทำยังไงถึงจะมีอำนาจควบคุมกอง Trust ได้แบบเบ็ดเสร็จ นอกเหนือจากการกำหนดเงื่อนไขที่ละเอียดแล้ว อีกวิธีคือการเป็นเจ้าของบริษัท Trust เอง แล้วคุณคิดว่าตระกูลอย่าง Rothschild มีความสามารถที่จะเป็นเจ้าของบริษัท Trust หรือไม่ แล้วถ้าทำได้คุณคิดว่าเขาจะนำทรัพย์สินไปเก็บไว้ใน Trust เพื่อปกปิดชื่อเยอะขนาดไหน นี่เป็นเรื่องน่าคิด
ยังเหลืออีก 1 วิธี ที่จะสามารถปกปิดตัวตนในการถือครองทรัพย์สินได้ดี โปรดติดตามตอนต่อไป
realeakkrit #bitcoin #siamstr #wef
-
@ a39d19ec:3d88f61e
2024-10-28 18:44:55What do you even print with it besides decorative objects?
This kind of question still is a common one when talking about 3d printing.
With this series of long-form notes I will show you some of the practical and useful 3d printed things, that I use a lot.
Let me start the series with a nice little print consisting of two parts.
Laptop riser
There are many designs of laptop risers available online. But I like that the parts are small and interlocking, so that the are always together when not in use. The riser fits all laptops in our house. Particularly when working in Fusion360 my laptop needs lots of fresh air. I use the raiser regularly about 3 times a week. Sadly I don't know where I downloaded it from, so I cannot provide a link to it.
-
@ 832b6aa8:2e4f082a
2024-10-28 18:38:54Chef's notes
This Herb-Braised Beef Cheek recipe delivers tender, melt-in-your-mouth beef simmered slowly in a rich herb broth—without any wine! Sear the beef cheeks for a caramelized crust, then braise them with onions, garlic, carrots, and fresh herbs until perfectly tender. The dish is finished with a touch of lemon zest for brightness and pairs beautifully with creamy mashed potatoes or polenta, making it an ideal meal for cozy nights or special occasions. Perfect for anyone looking to enjoy a deeply flavorful, wine-free braised beef dish.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 4 hrs
- 🍽️ Servings: 3-4
Ingredients
- 2 lbs beef cheeks, trimmed of excess fat
- Salt and pepper, to taste
- 2 tbsp olive oil
- 1 large onion, chopped
- 3 cloves garlic, minced
- 2 carrots, chopped
- 2 celery stalks, chopped
- 1 tsp tomato paste
- 4 cups beef broth (or chicken broth for a lighter flavor)
- 1 cup water
- 1 tbsp Worcestershire sauce
- 2 bay leaves
- 2 sprigs fresh rosemary
- 4 sprigs fresh thyme
- 1 tsp smoked paprika (optional)
- 1 tsp ground cumin
- Zest of 1 lemon (optional, for a fresh finish)
Directions
- Pat the beef cheeks dry with a paper towel, then season generously with salt and pepper. Sear the Beef Cheeks: In a heavy-bottomed pot or Dutch oven, heat the olive oil over medium-high heat. Sear the beef cheeks for 4–5 minutes on each side, until browned. Remove and set aside. Cook the Vegetables: Add the chopped onion, garlic, carrots, and celery to the pot. Sauté for about 5–7 minutes until softened and slightly caramelized. Add Tomato Paste: Stir in the tomato paste and cook for an additional 1 minute. Deglaze and Add Broth: Pour in 1 cup of water, scraping any browned bits from the bottom of the pot. Add the beef broth, Worcestershire sauce, bay leaves, rosemary, thyme, paprika, and cumin. Stir well. Add the Beef Cheeks Back In: Return the beef cheeks to the pot, ensuring they’re mostly submerged in the liquid. Simmer: Cover the pot and reduce the heat to low. Let the beef cheeks braise for 3–4 hours until they’re tender and easy to pull apart with a fork. Finishing Touch: Before serving, sprinkle with lemon zest for brightness. Taste and adjust seasoning with additional salt and pepper if needed. Serve: Serve over mashed potatoes, polenta, or creamy risotto, with the braising liquid as a sauce.
-
@ 03b2a4f0:7ff066d4
2024-10-28 18:24:28Have you heard of "ZETEO CITADEL CONSULT IN COLLABORATION WITH THE UN OF IBADAN" we are into training of corps members and executive within Nigeria and outside the world Type of course we offer are Human resources management project management *Web development And Web design
-
@ d1b118c6:4985b38d
2024-10-28 16:46:21Chef's notes
So easy I promise
Details
- ⏲️ Prep time: 15 minutes
- 🍳 Cook time: 25-35 minutes
- 🍽️ Servings: 1-5 persons
Ingredients
- Squash
- Olive oil
- Salt
- Pepper
- Garlic seasoning
Directions
- Preheat oven to 400°F
- Peel the squash
- Cut the squash in half
- Scrape out all the seeds and guts (can save that stuff for something else or compost or whatever)
- Slice and dice up the remaining shell of a squash into 1inch (or so) sized pieces
- Mix all the pieces of squash with olive oil and various seasonings (suggested seasonings in the ingredients list but do whatever you want. This is what I had on hand along w some parsley actually)
- Lay all the squash out on a baking sheet nice and flat so that there aren’t any pieces overlapping
- Toss it in the preheated oven until it is soft to the fork tines and/or goldeny
- Enjoy. I had it on rice with soy sauce and would also be good with a fried egg on it. Add it to whatever squash would be good with
-
@ 361d3e1e:50bc10a8
2024-10-28 16:45:55https://forex-strategy.com/2024/10/28/in-bulgaria-the-parties-bought-voters-for-eur-500-per-vote/ In Bulgaria, the parties bought voters for EUR 500 per vote
vote #election #politics #bulgaria
-
@ 3ffac3a6:2d656657
2024-10-28 16:11:58Manifesto Stancap (Stalinismo Anarco-Capitalista):
Por um Futuro de Controle Absoluto e Liberdade Ilimitada
Saudações, camaradas e consumidores! Hoje, convocamos todos a marchar com orgulho rumo à mais avançada utopia jamais concebida pelo pensamento humano (e nem tão humano assim): o Stancap, a síntese perfeita entre a mão invisível do mercado e o punho de ferro do Estado.
1. Liberdade Total sob o Controle Absoluto
Aqui, a liberdade é garantida. Você é livre para fazer o que quiser, pensar o que quiser, mas lembre-se: nós estaremos observando — por uma taxa de assinatura mensal, é claro. O governo será privatizado e administrado por CEOs visionários que entendem que os lucros mais seguros vêm da ordem e do controle. Sim, camarada, a ordem é o que nos liberta!
2. Empresas Estatais e Governo Privado para o Progresso Econômico
Todas as empresas serão estatizadas. Afinal, queremos um mercado forte e estável, e nada diz "eficiência" como uma gestão estatal unificada sob nosso Grande Conselho Corporativo. E para garantir o controle absoluto e a segurança dos cidadãos, o governo também será privatizado, operando sob princípios empresariais e contratos de eficiência. Nosso governo privado, liderado por CEOs que representam o mais alto nível de comprometimento e lucros, estará alinhado com o progresso e a ordem. Suas preferências de consumo serão registradas, analisadas e programadas para otimizar sua experiência como cidadão-produto. Cada compra será um voto de confiança, e qualquer recusa será gentilmente "corrigida".
3. Liberdade de Expressão Absoluta (com Moderação, Claro)
A liberdade de expressão é sagrada. Fale o que quiser, onde quiser, para quem quiser! Mas cuidado com o que você diz. Para garantir a pureza de nossas ideias e manter a paz, qualquer expressão que se desvie de nosso ideal será gentilmente convidada a uma estadia em um de nossos premiados Gulags Privados™. Neles, você terá a oportunidade de refletir profundamente sobre suas escolhas, com todo o conforto que um regime totalitário pode proporcionar.
4. A Ditadura da Liberdade
Dizemos sem ironia: a única verdadeira liberdade é aquela garantida pela ditadura. Com nossa liderança incontestável, asseguramos que todos terão a liberdade de escolher aquilo que é certo — que por sorte é exatamente o que determinamos como certo. Assim, a felicidade e a paz florescerão sob a luz da obediência.
5. Impostos (ou Dividends, como Preferimos Chamar)
Sob nosso sistema, impostos serão substituídos por "dividends". Você não será mais tributado; você estará "investindo" na sua própria liberdade. Cada centavo vai para reforçar o poder que nos mantém unidos, fortes e livres (de escolher de novo).
6. Propriedade Privada Coletiva
A propriedade é um direito absoluto. Mas para garantir seu direito, coletivizaremos todas as propriedades, deixando cada cidadão como "co-proprietário" sob nosso regime de proteção. Afinal, quem precisa de títulos de posse quando se tem a confiança do Estado?
7. Nosso Lema: "Matou Foi Pouco"
Em nossa sociedade ideal, temos um compromisso firme com a disciplina e a ordem. Se alguém questiona o bem maior que estabelecemos, lembremos todos do lema que norteia nossos valores: matou foi pouco! Aqui, não toleramos meias-medidas. Quando se trata de proteger nosso futuro perfeito, sempre podemos fazer mais — afinal, só o rigor garante que a liberdade seja plena e inquestionável.
Junte-se a Nós!
Levante-se, consumidor revolucionário! Sob a bandeira do Stancap, você será livre para obedecer, livre para consumir e livre para estar do lado certo da história. Nossa liberdade, nossa obediência, e nossa prosperidade são uma só. Porque afinal, nada diz liberdade como um Gulag Privado™!
-
@ a37bda36:6fe8611c
2024-10-28 15:46:43Bitcoin: En Afgørende Beslutning for Nationale Økonomier og Fremtidige Generationer Bitcoin: En Afgørende Beslutning for Nationale Økonomier og Fremtidige Generationer
Efterhånden som Bitcoin bliver en stadig mere fremtrædende kraft i global finans, befinder lande, herunder Danmark, sig ved en kritisk skillevej. Ligesom virksomheder, der overvejer fordelene ved at adoptere Bitcoin, skal nationer nu beslutte, hvordan de vil interagere med denne nye teknologi. Denne beslutning vil forme deres økonomier, påvirke deres position på verdensmarkedet og efterlade varige konsekvenser for fremtidige generationer. Men nylige politiske diskussioner, såsom Danmarks forslag om at beskatte Bitcoin-beholdninger årligt, afslører en grundlæggende misforståelse af Bitcoins potentiale. I stedet for at betragte Bitcoin som en erstatning for det nuværende finansielle system, bør politikere erkende, at det er en komplementær teknologi, der kan sameksistere med traditionel finans. Bitcoin er kommet for at blive, uanset om det bliver omfavnet eller modarbejdet, men konsekvenserne af dette valg vil klinge gennem alle niveauer af samfundet, fra virksomheder og borgere til fremtidige generationer.
Bitcoin som en Strategisk Valg for Nationale Økonomier
Bitcoins adoption som anerkendt betalingsmiddel i El Salvador i 2021, efterfulgt af byen Luganos "Plan B"-initiativ for at integrere Bitcoin i sin økonomi, har udløst en omfattende debat om økonomisk suverænitet, decentralisering og finansiel inklusion. Lande som Bhutan og andre bruger Bitcoin-mining på innovative måder ved at anvende deres rigelige vandkraft eller overskudsenergi til både bæredygtig mining og stabilisering af energinetværk. Disse eksempler fremhæver, hvordan Bitcoin kan bruges som en stærk tilføjelse til eksisterende finansielle systemer, snarere end som en erstatning. Nationer som El Salvador og Bhutan ser Bitcoin som et redskab til at diversificere deres økonomier, reducere afhængigheden af centraliserede finansielle institutioner og øge modstandskraften mod globale økonomiske udsving.
Desuden kan Bitcoin, på trods af bekymringer om energiforbrug, understøtte en overgang til bæredygtige energikilder gennem innovative løsninger som mining med overskuds- eller grøn energi og ved at tilbyde netstabilisering. Misforståelser om Bitcoins energipåvirkning afslører en betydelig kløft i forståelsen af, hvad Bitcoin virkelig repræsenterer, og hvordan det fungerer. Mange kritikere overser, at Bitcoin-mining ofte tilskynder til produktion af ren energi og energieffektivitet. For disse lande repræsenterer Bitcoin et strategisk valg for at modernisere deres finansielle systemer og styrke borgerne uden at afskaffe traditionelle strukturer.
Denne tilgang handler ikke om at erstatte det gamle med det nye, men om at bygge et finansielt system, der giver folk flere muligheder. Bitcoins decentraliserede natur og evne til at operere uafhængigt af etablerede banksystemer gør det til et værdifuldt alternativ, der kan eksistere side om side med eksisterende strukturer. Lande, der omfavner Bitcoin, åbner sig for en verden af muligheder, der kan gavne alle niveauer i samfundet. Fra at øge national økonomisk modstandskraft til at styrke borgerne med nye finansielle værktøjer, tilbyder Bitcoin en vej til et mere inkluderende og fleksibelt finansielt landskab, der kan tilpasse sig globale ændringer.
Lærdom fra Erhvervslivet: MicroStrategy og Microsoft
Strategierne hos virksomheder som MicroStrategy og Microsoft fremhæver konsekvenserne af at omfavne eller ignorere Bitcoin. MicroStrategys tidlige beslutning om at integrere Bitcoin i sin finansielle strategi har positioneret det som en leder, tiltrukket investorinteresse og styrket dets omdømme som en fremsynet virksomhed. Microsoft har derimod taget en forsigtig tilgang og risikerer at blive opfattet som konservativ. Hvis MicroStrategys Bitcoin-strategi fortsætter med at give positive resultater, kan det sætte Microsofts relative inaktivitet i et kritisk lys og rejse spørgsmål om dets innovationspotentiale.
Denne analogi kan også anvendes på nationaløkonomier. Lande, der integrerer Bitcoin, kan positionere sig som økonomiske ledere, høste fordelene ved tidlig adoption uden at afskaffe deres traditionelle finansielle systemer. Omvendt risikerer nationer, der modstår Bitcoin, at blive efterladt, idet de går glip af muligheden for at blande Bitcoins styrker med deres eksisterende økonomiske strukturer. Ligesom virksomheder, der ignorerer disruptive teknologier, hurtigt kan blive irrelevante, risikerer lande, der modstår Bitcoin-adoption, at kvæle økonomisk innovation og undergrave deres globale konkurrenceevne.
Fordelene ved at Omfavne Bitcoin: Fra Borgere til Fremtidige Generationer
At omfavne Bitcoin giver fordele på alle niveauer—fra landet til virksomhederne, fra borgerne til fremtidige generationer. Når en nation integrerer Bitcoin, signalerer den åbenhed over for finansiel innovation og modstandskraft, hvilket tiltrækker virksomheder, investorer og iværksættere, der trives i Bitcoin-venlige miljøer. For virksomheder giver Bitcoin en måde at beskytte sig mod valutadevaluering og inflation, hvilket potentielt styrker deres balancer og gør dem mere konkurrencedygtige på det globale marked.
For borgerne giver Bitcoin finansiel suverænitet og nye muligheder for at bevare velstand, især i økonomier, der er udsatte for inflation eller kapitalbegrænsninger. Måske vigtigst af alt, ved at adoptere Bitcoin som en komplementær finansiel teknologi, kan lande sikre, at fremtidige generationer har adgang til et mangfoldigt og robust økonomisk system, der kan tilpasse sig kravene i en hurtigt forandrende verden. Fordelene ved Bitcoin rækker ud over økonomisk gevinst—de omfatter også øget autonomi, økonomisk empowerment og adgang til et globalt, decentraliseret finansielt netværk.
Omvendt indebærer modstand mod Bitcoin betydelige risici. Nationer, der modstår Bitcoin-adoption, kan uforvarende begrænse deres borgeres finansielle frihed og reducere mulighederne for økonomisk vækst. Virksomheder kan finde det udfordrende at forblive konkurrencedygtige i en Bitcoin-aktiveret global økonomi, mens landet som helhed kan miste sin tiltrækningskraft for investorer og innovatorer. Det mest bekymrende er, at ved at stå i vejen for Bitcoin risikerer disse nationer at nægte fremtidige generationer de finansielle værktøjer og den frihed, der er nødvendig for at trives i en decentraliseret verden.
Reguleringens Kortsynethed og Stagnationens Pris
Meget af den regulatoriske modstand mod Bitcoin synes at være forankret i en stiv overholdelse af traditionelle finansielle paradigmer. Politikere, der ofte er uddannet inden for konventionelle økonomiske rammer, mangler måske det perspektiv, der kræves for at forstå Bitcoins unikke rolle som en komplementær teknologi. Denne mangel på forståelse risikerer at skubbe lande mod økonomisk stagnation ved at skabe strukturelle barrierer for innovation. Ved at afvise Bitcoin kan regulatorer uforvarende hæmme økonomisk dynamik og efterlade deres lande sårbare i en stadig mere decentraliseret global økonomi.
Denne regulatoriske myopi risikerer ikke kun at kvæle økonomiske fremskridt, men også at forstærke eksisterende finansielle uligheder. Mens Bitcoin ikke er en erstatning for traditionelle finansielle institutioner, kan det fungere som et levedygtigt alternativ for underbankede befolkninger og tilbyde et niveau af finansiel tilgængelighed, som mange lande i øjeblikket kæmper med at levere. En stiv holdning mod Bitcoin kunne forhindre millioner i at få adgang til dette globale finansielle netværk, hvilket effektivt tvinger folk til at forblive afhængige af centraliserede institutioner, som for mange fortsat er utilgængelige og uretfærdige—en beslutning, der, hvis den træffes med vilje, kun kan retfærdiggøres af motiver, der er rodfæstet i kontrol fremfor empowerment.
At Betegne Bitcoin og “Krypto” som Synonyme: Et Tegn på Regulatorisk Misforståelse
Et andet tegn på regulatorernes manglende forståelse er deres hyppige sammenblanding af Bitcoin med “krypto,” som om de er én og samme ting. Denne fejlagtige betegnelse understreger, hvordan mange politikere overser Bitcoins unikke teknologiske fundament og særlige egenskaber. I modsætning til andre digitale aktiver er Bitcoin decentraliseret, censurresistent og har en fast forsyning, hvilket gør det fundamentalt anderledes end det bredere kryptomarked. At gruppere Bitcoin med “krypto” i politiske diskussioner viser en overfladisk forståelse af dens rolle som et holdbart, uafhængigt netværk med unikke økonomiske principper. Denne tilgang forvrænger ikke kun den offentlige opfattelse, men forhindrer også klare og effektive politikrammer, der respekterer Bitcoins særlige rolle i moderne finans.
Bitcoin som en Protokol for Innovation: Lærdom fra TCP/IP
Ligesom TCP/IP-protokollen muliggjorde en bølge af transformative innovationer—e-mail, internettet, streaming og utallige applikationer—tjener Bitcoin også som en grundlæggende protokol med stort potentiale. De innovationer, der kan opstå oven på Bitcoin-protokollen, er svære at forudsige, ligesom det ville have været umuligt at forudse hele internettets landskab under TCP/IP’s tilblivelse. At beskatte eller modstå Bitcoin ville være lige så kortsigtet som at beskatte TCP/IP-protokollen selv og lade, som om en person eller en gruppe har indsigt til at kontrollere udviklingen af en teknologi, der er bestemt til global indflydelse. Bitcoin er ikke blot et digitalt aktiv; det er en decentraliseret protokol, der fungerer som fundamentet for en ny æra af finansiel, teknologisk og økonomisk innovation.
Beskatning af Bitcoin: Fåfængt og Undertrykkende
At beskatte Bitcoin er lige så absurd som at beskatte sollys eller forbyde folk at kigge på månen—en handling, der, hvis den blev gennemført, ville stå som et symbol på undertrykkelse. Sådanne handlinger ville blive husket af fremtidige generationer på samme måde, som vi i dag reflekterer over arven fra autoritære regimer: som tiltag født af kontrol, ikke fremskridt. Ydermere ignorerer sådanne tiltag Lindy-effekten, som antyder, at Bitcoin, ligesom alle varige teknologier, kun vil blive stærkere og mere modstandsdygtig over tid. Forsøg på at begrænse det viser sig i sidste ende at være ineffektive, da Bitcoin ikke kan stoppes; skræmmekampagner kan påvirke dem, der ikke er bekendt med dets potentiale, men hvert forsøg vil kun styrke Bitcoin og Bitcoins betydning. I mellemtiden risikerer de nationer, der håndhæver sådanne politikker, at svække deres egen position og falde bagud i en fremtid, hvor Bitcoin uundgåeligt vil spille en central rolle.
Den Globale Mulighed: Omfavne eller Falde Bagud
At ignorere eller modstå Bitcoin er ikke blot en forpasset investeringsmulighed—det er en forpasset chance for at positionere et land i spidsen for global økonomisk innovation. Bitcoins decentraliserede netværk vil fortsætte med at vokse og få legitimitet verden over, med eller uden støtte fra nogen enkelt nation. Lande, der velkommer Bitcoin, vil have fordelen af at forme, hvordan denne teknologi integreres med traditionel finans, mens de, der modstår, kan finde sig selv kæmpe for at indhente en verden, der i stigende grad er åben for decentraliserede løsninger.
Beslutningen om at omfavne eller afvise Bitcoin vil påvirke et lands umiddelbare økonomiske landskab og bestemme dets rolle i den globale økonomi i årtier fremover. Nationer som El Salvador og byen Lugano sætter nye standarder for økonomisk tilpasningsevne og modstandskraft ved at blande Bitcoin med traditionelle systemer for at skabe en hybrid finansiel fremtid. Denne tilgang positionerer dem ikke kun som ledere i den digitale økonomi, men sikrer også en lysere fremtid for deres borgere. Ved at vælge at omfavne Bitcoin lægger disse lande grundlaget for bæredygtig vækst, der vil gavne generationer fremover.
En Kritisk Beslutning for Politikere
Lande står nu ved en afgørende korsvej: Integrere Bitcoin som en komplementær teknologi for at styrke økonomisk modstandskraft eller risikere at stagnere i en stadigt mere decentraliseret verden. De valg, der træffes i dag, vil påvirke, hvordan nationer opfattes globalt og bestemme graden af finansiel frihed og muligheder, der er tilgængelige for deres borgere. At omfavne Bitcoin betyder ikke at opgive det eksisterende finansielle system. I stedet betyder det at anerkende, at Bitcoin kan sameksistere med traditionel finans for at skabe en mere inkluderende, fleksibel og modstandsdygtig økonomi.
Selvom det at ignorere Bitcoin er bedre end aktivt at modarbejde det, vil det at omfavne Bitcoin virkelig gavne landet og dets borgere. Politikere i lande som Danmark bør nøje overveje de bredere implikationer af enten at omfavne eller modstå Bitcoin. Tidlige adoptere af Bitcoin kan blive set som visionære, åbne døre for innovation og vækst, mens de, der afviser det, kan blive betragtet som fastlåste i forældede paradigmer. For lande, der vælger at ignorere eller modstå Bitcoin, vil omkostningerne sandsynligvis måles ikke kun i forpassede muligheder for den nuværende generation, men også i begrænset økonomisk frihed og potentiale for kommende generationer. At omfavne Bitcoin tilbyder en vej til en mere tilpasningsdygtig og styrket fremtid, hvor traditionelle og decentraliserede systemer arbejder sammen for at sikre økonomisk stabilitet og vækst.
Bitcoin er den vigtigste, men mest misforståede og undervurderede gave til menneskeheden, og den ankommer på et afgørende tidspunkt i historien. Alle bør studere Bitcoin. Bitcoin er ligeglad. Bitcoin eksisterer bare.
-
@ a37bda36:6fe8611c
2024-10-28 14:50:18Bitcoin: A Pivotal Decision for National Economies and Future Generations Bitcoin: A Pivotal Decision for National Economies and Future Generations
As Bitcoin becomes an increasingly prominent force in global finance, countries, including Denmark, find themselves at a critical juncture. Much like corporations weighing the advantages of Bitcoin adoption, nations must now decide how to engage with this emerging technology. This decision will shape their economies, influence their standing in the global marketplace, and leave lasting effects for future generations. However, recent policy discussions, such as Denmark’s proposal to tax Bitcoin holdings annually, reveal a fundamental misunderstanding of Bitcoin’s potential. Rather than viewing Bitcoin as a replacement for the current financial system, policymakers should recognize it as a complementary technology capable of coexisting with traditional finance. Bitcoin is here to stay, regardless of whether it is embraced or resisted, but the consequences of that choice will reverberate across all levels of society, from companies and citizens to future generations.
Bitcoin as a Strategic Choice for National Economies
Bitcoin’s adoption by El Salvador as official legal tender in 2021, followed by the city of Lugano’s "Plan B" initiative to integrate Bitcoin into its economy, has sparked widespread debate on economic sovereignty, decentralization, and financial inclusion. Countries like Bhutan and others are leveraging Bitcoin mining in innovative ways, using their abundant hydroelectric power or surplus energy not only for sustainable mining operations but also to stabilize energy grids. These examples highlight how Bitcoin can be leveraged not as a replacement but as a powerful addition to existing financial systems. Nations such as El Salvador and Bhutan see Bitcoin as a tool to diversify their economies, reduce dependency on centralized financial institutions, and increase resilience to global financial fluctuations.
Additionally, despite concerns about energy use, Bitcoin can support a shift toward sustainable energy sources through innovative solutions like mining with surplus or green energy and providing grid stabilization benefits. Misconceptions about Bitcoin’s energy impact reveal a significant gap in understanding what Bitcoin truly represents and how it functions. Many critics overlook the fact that Bitcoin mining often incentivizes clean energy production and energy efficiency. For these countries, Bitcoin represents a strategic choice to modernize their financial systems and empower citizens without dismantling traditional structures.
This approach is not about replacing the old with the new but about building a financial system that offers people multiple options. The decentralized nature of Bitcoin and its ability to operate independently of established banking systems make it a valuable alternative that can coexist alongside existing structures. Countries that embrace Bitcoin open themselves to a world of possibilities that can benefit all levels of society. From boosting national economic resilience to empowering citizens with new financial tools, Bitcoin offers a path to a more inclusive and flexible financial landscape that can adapt to global changes.
Lessons from the Corporate World: MicroStrategy and Microsoft
The strategies of corporations like MicroStrategy and Microsoft highlight the implications of embracing or ignoring Bitcoin. MicroStrategy’s early decision to incorporate Bitcoin into its financial strategy has positioned it as a leader, attracting investor interest and enhancing its reputation as a forward-thinking company. Microsoft, on the other hand, has taken a cautious approach, risking the perception of conservatism. If MicroStrategy’s Bitcoin strategy continues to yield positive returns, it could cast a spotlight on Microsoft’s relative inactivity, raising questions about its innovation potential.
This analogy extends to national economies. Countries that integrate Bitcoin can position themselves as economic leaders, reaping the rewards of early adoption without dismantling their traditional financial systems. Conversely, nations that resist Bitcoin risk falling behind, as they miss the opportunity to blend Bitcoin’s strengths with those of their existing economic structures. Just as companies that ignore disruptive technologies can quickly become irrelevant, countries that resist Bitcoin adoption risk stifling economic innovation and undermining their global competitiveness.
The Benefits of Embracing Bitcoin: From Citizens to Future Generations
Embracing Bitcoin offers benefits at every level—from the country to corporations, from citizens to future generations. When a nation integrates Bitcoin, it signals openness to financial innovation and resilience, attracting companies, investors, and entrepreneurs who thrive in Bitcoin-friendly environments. For companies, Bitcoin offers a way to hedge against currency devaluation and inflation, potentially strengthening their balance sheets and making them more competitive in the global market.
For citizens, Bitcoin provides financial sovereignty and new opportunities for wealth preservation, especially in economies susceptible to inflation or capital controls. Perhaps most importantly, by adopting Bitcoin as a complementary financial technology, countries can ensure that future generations have access to a diverse and resilient economic system that can adapt to the demands of a rapidly changing world. The benefits of Bitcoin extend beyond financial gain—they also include increased autonomy, economic empowerment, and access to a global, decentralized financial network.
Opposing Bitcoin, on the other hand, carries significant risks. Nations that resist Bitcoin adoption may inadvertently limit their citizens' financial freedom and restrict opportunities for economic growth. Companies may find it challenging to remain competitive in a Bitcoin-enabled global economy, while the country as a whole could lose its attractiveness to investors and innovators. Most concerningly, by standing in the way of Bitcoin, these nations risk denying future generations the financial tools and freedom needed to thrive in a decentralized world.
Regulatory Short-Sightedness and the Cost of Stagnation
Much of the regulatory opposition to Bitcoin appears rooted in a rigid adherence to traditional financial paradigms. Policymakers, often trained in conventional economic frameworks, may lack the perspective needed to understand Bitcoin's unique role as a complementary technology. This lack of understanding risks pushing countries toward economic stagnation by creating structural barriers to innovation. By dismissing Bitcoin, regulators may unintentionally curb economic dynamism, leaving their countries vulnerable in an increasingly decentralized global economy.
This regulatory myopia risks not only stifling economic progress but also deepening existing financial inequalities. While Bitcoin is not a replacement for traditional financial institutions, it can serve as a viable alternative for underbanked populations, offering a level of financial accessibility that many countries currently struggle to provide. A rigid stance against Bitcoin could prevent millions from accessing this global financial network, effectively forcing people to remain dependent on centralized institutions that, for many, remain inaccessible and inequitable—a decision that, if made knowingly, could only be justified by motives rooted in control rather than empowerment.
Treating Bitcoin and “Crypto” as Synonymous: Another Symptom of Regulatory Misunderstanding
Another sign of regulators’ lack of understanding is their frequent conflation of Bitcoin with “crypto” as though they are one and the same. This mischaracterization underscores how many policymakers overlook Bitcoin’s distinct technological foundations and unique attributes. Unlike other digital assets, Bitcoin is decentralized, censorship-resistant, and has a fixed supply, making it fundamentally different from the broader cryptocurrency market. Grouping Bitcoin with “crypto” in policy discussions demonstrates a shallow understanding of its role as a durable, independent network with unique economic principles. This approach not only distorts public perception but also hinders clear, effective policy frameworks that respect Bitcoin’s distinct role in modern finance.
Bitcoin as a Protocol for Innovation: Lessons from TCP/IP
Just as the TCP/IP protocol enabled a wave of transformative innovations—email, the web, streaming, and countless applications—Bitcoin, too, serves as a foundational protocol with vast potential. The innovations that may emerge on top of the Bitcoin protocol are challenging to predict, just as it would have been impossible to foresee the entire internet landscape during TCP/IP’s inception. Taxing or resisting Bitcoin would be as short-sighted as taxing the TCP/IP protocol itself, pretending that a person or group of people has the insight to control the development of a technology destined for global impact. Bitcoin is not merely a digital asset; it is a decentralized protocol that serves as a foundation for a new era of financial, technological, and economic innovation.
Taxing Bitcoin: Futile and Oppressive
Taxing Bitcoin is as absurd as taxing sunlight or prohibiting people from looking at the moon—a move that, if implemented, would stand as a symbol of oppression. Such actions would be remembered by future generations much like how we today reflect on the legacies of authoritarian regimes: as measures born of control, not progress. Furthermore, such measures ignore the Lindy Effect, which suggests that Bitcoin, like all enduring technologies, will only grow stronger and more resilient over time. Attempts to restrict it ultimately prove ineffective, as Bitcoin cannot be stopped; scare campaigns may sway those unfamiliar with its potential, but each attempt will only reinforce Bitcoin's longevity and importance. Meanwhile, the nations that enforce such policies risk weakening their own position, falling behind in a future where Bitcoin will inevitably play a central role.
The Global Opportunity: Embrace or Fall Behind
Ignoring or resisting Bitcoin is not merely a missed investment opportunity—it’s a missed chance to position a country at the forefront of global economic innovation. Bitcoin’s decentralized network will continue to grow and gain legitimacy worldwide, with or without the support of any single nation. Countries that welcome Bitcoin will have the advantage of shaping how this technology integrates with traditional finance, while those that resist may find themselves struggling to catch up in a world increasingly open to decentralized solutions.
The decision to embrace or reject Bitcoin will impact a country’s immediate economic landscape and influence its role in the global economy for decades to come. Nations like El Salvador and the city of Lugano are setting new standards for economic adaptability and resilience, blending Bitcoin with traditional systems to build a hybrid financial future. This approach not only positions them as leaders in the digital economy but also secures a brighter future for their citizens. By choosing to embrace Bitcoin, these countries are laying the groundwork for sustainable growth that will benefit generations to come.
A Critical Decision for Policymakers
Countries now stand at a pivotal crossroads: integrate Bitcoin as a complementary technology to strengthen economic resilience, or risk stagnating in an increasingly decentralized world. The choices made today will affect how nations are perceived globally and determine the level of financial freedom and opportunity available to their citizens. Embracing Bitcoin doesn’t mean abandoning the existing financial system. Instead, it means recognizing that Bitcoin can coexist with traditional finance to create a more inclusive, flexible, and resilient economy.
While simply ignoring Bitcoin is better than actively resisting it, embracing Bitcoin is what will truly benefit the country and its citizens. Policymakers in countries like Denmark should carefully consider the broader implications of either embracing or opposing Bitcoin. Early adopters of Bitcoin may be seen as visionaries, opening doors for innovation and growth, while those who reject it may be viewed as clinging to outdated paradigms. For countries that choose to ignore or resist Bitcoin, the cost will likely be measured not only in missed opportunities for the current generation but in constrained economic freedom and potential for generations to come. Embracing Bitcoin offers a pathway to a more adaptable and empowered future, one where traditional and decentralized systems work together to provide economic stability and growth.
Bitcoin is the most important, yet most misunderstood and underappreciated gift for humanity, and it happens to arrive at a pivotal time in history. Everyone should study Bitcoin. Bitcoin doesn't care. Bitcoin just is.
-
@ a31a17d6:34e8856e
2024-10-28 14:16:27Verdens rikeste mann har kjøpt X, tidligere Twitter, for ytringsfrihetens skyld. Nå er han i ferd med å kjøpe demokratiet, også for ytringsfrihetens skyld. Skal Elon Musk få definere hva ytringsfrihet er?
Spoler vi et halvår tilbake finner vi grunnleggeren av Twitter, Jack Dorsey, på scenen i Oslo Konserthus under Oslo Freedom Forum. Dorsey mener at den offentlige samtalen ikke kan eies og kontrolleres av en håndfull selskaper med annonsebaserte forretningsmodeller som prioriterer å fange vår oppmerksomhet og påvirke våre handlinger. Ifølge Dorsey foregår det ikke bare en kamp om ytringsfriheten, men også om vår frie vilje.
Fra scenen i konserthuset introduserte Dorsey en uventet aktør i kampen om ytringsfriheten; “Notes and Other Stuff Transmitted by Relays” (nostr). Nostr er ikke et selskap og har ingen eier. Det er en åpen protokoll som består av et desentralisert nettverk av noder og apper. På overflaten kan appene minne om X, Instagram og Spotify. Ser man under panseret stanser likhetene.
Nostr er unikt ved at du som bruker har total kontroll over din egen identitet, dine ytringer, ditt nettverk og hvilke algoritmer du eventuelt utsettes for. Åpenheten skaper fri konkurranse; på nostr blir følgerne og innholdet ditt blir med deg når du beveger deg mellom apper. Du blir ikke fanget på plattformer som Youtube fordi du har bygget deg opp en følgerbase der. Kombinasjonen av de to åpne protokollene nostr+bitcoin er en global versjon av Vipps; alle land er lansert, alle personer kan delta og gebyrene er marginale.
For innholdsprodusenter kan nostr+bitcoin endre spillereglene. Den amerikanske artisten Ainsley Costello har publisert musikken sin på nostr og på kort tid har hun tjent 20 ganger mer der enn hos tradisjonelle strømmeplattformer. Inntekten kommer fra brukere som tipser henne direkte. Det er ikke lenger algoritmene til Youtube som definerer rekkevidden hennes og nå beholder hun 95% av inntekten hun genererer. I motsetning til 55-70% på Youtube.
Nostr kan komme til å utfordre både grensene for ytringsfrihet og håndhevingene av disse, siden det ikke finnes noen sentral enhet myndigheter kan legge press på for å moderere og sensurere. Håndteringen av uønsket innhold og ondsinnede krefter må løses av nettverket selv. Det er ikke problemfritt, men kanskje er det mer effektivt, og bedre for ytringsfriheten på internett, enn nåværende løsning med sentralisert moderasjon til 100 milliarder kroner?
Hvis du deler Dorseys bekymring om at de store plattformene har for mye makt over ytringsfriheten og vår frie vilje, bør du ønske nostr velkommen. Det kan være nøkkelen til å bevare ytringsfriheten som en umistelig menneskerettighet – som ikke kan kjøpes av mektige interesser. Hvis du er frustrert over hvordan Musk bruker sin makt til å påvirke demokratiet, kan du gjøre en forskjell. Ta en pause fra X og gå til nostr.how for å lære mer.
-
@ 1f79058c:eb86e1cb
2024-10-28 13:31:15This week, it finally happened: I still had a Lightning channel open with a node that hadn't been online for the better part of a year now, so I decided to close the channel unilaterally. But force-closing a channel means you have to broadcast the latest commitment transaction, the pre-set fee of which was only ~1 sat/vB for this one.
With LND, if the channel is created as an anchor channel (by default only since version 0.12), then the commitment transaction contains small extra outputs (currently 330 sats), which let either channel partner spend one of them into a child transaction that can be created with higher fees to pay for the parent transaction (CPFP). LND even has a built-in command for that:
lncli wallet bumpclosefee
However, this channel was created in the old-school way, and was thus stuck with its low fee. In fact, even the local bitcoin node refused to accept the transaction into its own mempool, so the bitcoin p2p network didn't even know it existed. So how do we get out of this pickle?
The solution
Enter the mempool.space Accelerator. It is essentially an automated way to create agreements with various mining pools to mine your low-fee transaction in exchange for an out-of-band payment. Mempool.space coordinates these agreements and out-of-band payments with miners and gets a share from the overall fee for that.
Now, if you're in the same situation as I was, you might search for the ID of your closing transaction and find that mempool.space cannot find it. Remember how the local bitcoin node (with mostly default settings) didn't accept it in the first place?
1. Get the transaction to be broadcast
In your
bitcoin.conf
, add the following line:minrelaytxfee=0
This sets the minimum fee to 0, meaning it will accept and broadcast your transactions, no matter how low the fee is. Restart
bitcoind
and wait a little bit. LND will retry broadcasting the closing transaction every minute or so until it succeeds. At some point you should be able to find it on mempool.space.2. Use the Accelerator to confirm it
Once you can see the transaction on mempool.space, you can just click the "Accelerate" button next to the ETA. This will bring you to a page that shows you the estimated share of miners that will include your transaction in their blocks, as well as some acceleration fee options for various transaction fee levels, which you can pay for via the Lightning Network, of course.
If you haven't looked into this service before (which I had), then the fees might be a bit of a surprise to you. This thing is not cheap! Bumping my fee from 1 sat/vB to ~9 sats/vB cost a whopping 51,500 sats (31 USD that day). Bumping it higher only seemed to add the difference in the transaction fee itself, so the service seems to have cost a flat 50K sats at the time.
Unfortunately, this channel wasn't particularly large, so the acceleration fee amounted to ~9% of my remaining channel balance. But 91% of something is better than 100% of nothing, so I actually felt pretty good about it.
Next, you will see something like this:
Time to lean back and let the miners work for you. In my case, the ETA was eerily precise. It told me that it would take ~56 minutes to confirm the transaction, and almost exactly an hour later it was mined.
3. Wait
Now that our transaction is confirmed, our channel is not closed immediately, of course. The time lock of the HTLC protects our channel partner from us broadcasting an old channel state in which our balance might be higher than in the latest state.
In my case, it was set to 144 blocks, i.e. ~24 hours. So I checked back the next day, et voilá: channel closed and balance restored. 🥳
-
@ 5fb7f8f7:d7d76024
2024-10-28 12:32:30Have you been wondering how you can earn from web3.0. Here are some ways to earn in Web3:
-
Crypto currency trading: Buy and sell cryptocurrencies on exchanges or decentralized platforms.
-
Staking: Participate in proof-of-stake (PoS) networks, validating transactions and earning rewards.
-
Decentralized Finance (DeFi): Lend, borrow, or provide liquidity in DeFi protocols, earning interest or fees.
-
Non-Fungible Token (NFT) creation: Design, mint, and sell unique digital assets on NFT marketplaces.
-
Play-to-Earn (P2E) gaming: Participate in blockchain-based games, earning tokens or NFTs.
-
Content creation: Monetize content through tokenized platforms or decentralized social media.
-
Web3 development: Build and deploy decentralized applications (dApps), earning fees or tokens.
-
Mining: Participate in proof-of-work (PoW) networks, validating transactions and earning block rewards.
-
Yield farming: Provide liquidity in DeFi protocols, earning rewards in the form of tokens.
-
Participate in DAOs: Join decentralized autonomous organizations (DAOs), contributing to governance and earning tokens.
-
Create and sell digital art: Utilize blockchain technology to create and sell unique digital art pieces.
-
Web3 writing and journalism: Monetize content related to Web3 and blockchain technology.
-
Consulting and advisory services: Offer expertise in Web3 and blockchain technology to clients.
-
Participate in Web3 events: Attend conferences, meetups, and workshops, earning tokens or rewards.
-
Learn and earn: Participate in Web3 educational programs, earning tokens or rewards.
Keep in mind that these opportunities may require skills, knowledge, and sometimes initial investments. Additionally, the Web3 space is constantly evolving, so new opportunities may emerge as the ecosystem grows.
-
-
@ 6bae33c8:607272e8
2024-10-28 11:42:11I don’t feel like writing about football, but I’m going out of town for four days with Sasha (giving her mom a break during Sasha’s school break), and won’t be doing my podcast on Wednesday (we’ll see if I can squeeze in a Guessing the Lines or Monday Night Observations). Basically I want to get Sasha off the internet for a few days, and she won’t go for it if I’m on my laptop, so it’ll have to be in the morning while she’s sleeping in. In other words, I should write something while I’m still here and have the chance even though my chief emotion after watching those games is detached revulsion.
I say “detached” because out of self defense lately if something goes south on me, I just choose not to agonize over it. More like, “that sucked” and think about something else. It’s a skill I’ve cultivated just recently and with only partial success.
I have (had) three great NFFC teams, but last week was a total disaster, and I lost Chris Godwin for the year. This week, I had Jordan Mason in three leagues and Stefon Diggs in all five. Imagine losing your third/fourth round pick who is doing well in one league — you’d be bummed. Now multiply that by five.
I know, I know, I could have diversified more, and I almost did a couple times. I considered Brandon Aiyuk for example in one, but narrowly went Diggs yet again. It really goes to show fantasy football is all fun and games when other people get devastating injuries, but when it happens to you it’s the proverbial “losing an eye.”
I also went 3-2 ATS in the Circa Millions, running this quarter to 13-7 and getting back to .500. I’m drawing dead in the overall, but hopefully I can parlay some of that momentum into Q3, And Seslowsky and I had the Lions in Survivor which was easy. There are still a couple hundred people left in a $70K pool, so it’s not noteworthy yet.
-
Watching Isaac Guerendo rip off 20-yard runs and get a short TD on the 40-minute edited version was torture. Was Mason seriously hurt, was he coming back in? No way to know except by slowly having it dawn on you that it wasn’t happening. Tough backs like Mason can be a problem because they should just sit out, but they play through things ineffectively and then aggravate the injury. Just admit you’re hurt so I can sit you!
-
Brock Purdy is an underrated scrambler. He’s a top-five NFL QB in real life.
-
I fucking hate “national tight ends day” and the enthusiasm with which Scott Hanson talks about it. It’s stupid and annoying, and I don’t have George Kittle.
-
At least I had CeeDee Lamb going in the Steak League.
-
I use the Bengals often in the Circa Millions, and I’m starting to think maybe they just suck.
-
Saquon Barkley’s having a great year, but imagine if Jalen Hurts weren’t stealing so many TDs. The Eagles have a very narrow tree now — just two WR, Barkley, Hurts and the TE. That’s it.
-
It was nice to see the Browns knock some people out of Survivor. I took the Browns in Circa too as it was kind of obvious the Watson injury would be liberating to the entire team. Everyone’s talking about Cedric Tillman and the two TDs including the game-winner, but Elijah Moore quietly had 12 targets and eight catches too. Even Jerry Jeudy showed a pulse with Jameis Winston.
-
Derrick Henry got a late TD, but saw only 11 carries. He’s always been heavily game-flow dependent, and that’s a normally a good thing on the Ravens, just not this week.
-
I took the Lions -11.5, and after an early fight, it was easy peasy. The Lions scored 52 with Jared Goff passing for only 85 yards.
-
The Titans are pointless, but Calvin Ridley must have had the over on his yardage.
-
Tua Tagovailoa looked sharp enough in his return. I saw a post saying “zero medical experts recommended” Tua retire. Given the track record of “medical experts” the last few years, he’ll probably get decapitated in a couple weeks. But enjoy the fantasy production until then!
-
Marvin Harrison made some great catches including a TD while sliding toward the sideline. He’ll be up and down, but more ups than downs the rest of the way and finish more or less with the numbers for which you paid, health permitting.
-
Kyler Murray finally played a good game. The Cardinals are still very much alive in the NFC West. Everyone is.
-
I love Aaron Rodgers, but he is not going to rescue the Jets, and I’d expect him to be done after this year. They should trade Davante Adams before the deadline.
-
Of course I had Rhamondre Stevenson on my bench. When you draft a player, it’s not just what he does, but what he does while startable.
-
Cade Otton is a top-five TE now. Maybe Kyle Pitts too!
-
Bijan Robinson going back to the timeshare is not something I expected, but I’m here for it. He did have six targets and a receiving TD though.
-
Annoyed I started Kirk Cousins over Joe Burrow last week but did the reverse this week.
-
Jordan Love is hurt again, but Malik Willis is now 3-0.
-
The Packers are spreading the ball around so much, it’s hard to start anyone except Josh Jacobs.
-
C.J. Stroud is a tough watch this year. He’s lost his best and probably second best receivers, his offensive line is horrendous and his coach is way too conservative. He’s playing well, all things considered, but it’s brutal having him in fantasy and hoping he does something.
-
Joe Mixon, like every other old running back, is good as gold every week.
-
Anthony Richardson was 10 of 32. I saw some of the throws, he was close a few times, but he’s not an NFL QB right now. Either they overhaul the offense to suit his skills, or they switch to Joe Flacco.
-
Ladd McConkey is a player. He’s fast, quick and changes direction on a dime in the open field. The Chargers need to turn Justin Herbert loose more.
-
JK Dobbins is holding up, but I don’t see much burst.
-
Chris Olave woke up when Jake Haener took over. He should see a ton of volume the rest of the way with Rashid Shaheed out and Derek Carr coming back.
-
Amari Cooper barely did anything in his second week with the Bills, but they didn’t need him. Keon Coleman is emerging too.
-
Unlike Barkley, James Cook is getting some work near the goal line despite having a great goal-line-running QB.
-
The Seahawks are so sloppy. On a fourth-down play near the goal line, the center stepped on Geno Smith’s foot, he fell on his ass, and that was that.
-
I started JSN with DK Metcalf out, and he caught a bunch of short passes as usual.
-
I didn’t watch Denver-Carolina, but maybe Bo Nix is emerging with Sean Payton as his coach. Courtland Sutton had a nice game on everyone’s bench. At least do it during a week where there are byes, so you’re forced into a few lineups!
-
The Panthers are pointless now. Bring in Jonathon Brooks.
-
Kareem Hunt (21 carries for 59 yards) is the perfect encapsulation of the Chiefs. And Travis Kelce (12 targets, 90 yards).
-
The Raiders are hilarious. Forcing-running Alexander Mattison at the goal line, followed by Gardnew Minshew’s laughably bad fourth-down scramble where he got sacked immediately on a play that had zero chance. At least they backdoored the cover.
-
I had the Bears in my picking pool, so I was not thrilled with the Hail Mary, but it was an amazing scramble and throw, batted perfectly into Noah Brown’s hands. It rarely works, and when it does, it’s rarely that clean and easy.
-
-
@ 9dd283b1:cf9b6beb
2024-10-28 09:28:57This is not a longform post, this is a test post cause I cannot make it post to relay yet, get a timeout error. but if you see it means it's working.
-
@ b3e02844:0b28deb2
2024-10-28 09:05:44Can decentralized, block chain secured public forums be an antidote for messenger mass shooters/violent actors?
E.g. those who commit their violent acts as a means to draw attention to a message they feel needs to be heard but without extreme action will never be allowed to be heard by those who need to hear it.
Public forums where absolutely anything can be said aloud and discussed publicly and anonymously without the possibility of deletion or censorship may render the utility of a shooters manifesto obsolete or closer to obsolete.
Thoughts?
-
@ 09565902:0700e0d5
2024-10-28 07:23:39Technology has woven itself into the fabric of our daily lives, influencing every aspect of our existence. From the moment we wake up to the time we retire, technology is there, guiding our actions, facilitating our interactions, and shaping our world.
One of the most profound impacts of technology is on communication. Social media platforms have revolutionized the way we connect with others, transcending geographical boundaries. Instant messaging, video calls, and email have made communication efficient and effortless. Moreover, technology has democratized information, making it accessible to billions of people around the globe.
In the realm of education, technology has transformed traditional classrooms into dynamic learning environments. Online courses, educational apps, and virtual reality experiences have made learning more engaging and personalized. Students can access knowledge from anywhere, at any time, and at their own pace.
The healthcare industry has also benefited immensely from technological advancements. Telemedicine has made it possible for patients to consult with doctors remotely, reducing the burden on healthcare facilities. Wearable devices monitor vital health parameters, enabling early detection of potential health issues. Artificial intelligence is being used to develop innovative treatments and personalized medicine.
The business world has undergone a digital revolution. E-commerce has disrupted traditional retail models, offering consumers a wider range of products and services. Automation and artificial intelligence have streamlined operations, increasing efficiency and productivity. Cloud computing has enabled businesses to store and access data from anywhere, fostering collaboration and innovation.
However, the rapid advancement of technology has also raised concerns about privacy, security, and job displacement. It is crucial to use technology responsibly and ethically. Governments, businesses, and individuals must work together to address these challenges and ensure that technology benefits society as a whole.
In conclusion, technology has become an indispensable part of modern society. It has transformed the way we communicate, learn, work, and live. As technology continues to evolve, it is essential to embrace its potential while mitigating its risks. By harnessing the power of technology, we can create a better future for generations to come.
-
@ 123711f7:c0a0c17e
2024-10-28 07:14:22Trump Media auditor raises doubts about Truth Social's future in new filing
A new regulatory filing from Donald Trump’s social media company shows an auditor has raised concerns about the company’s future.
Trump Media, the company behind the social media platform Truth Social, went public last week after merging with shell company Digital World Acquisition. The stock’s price has been volatile since then, shooting up as high as $79.38 on its first day of trading Tuesday before closing below $50 Monday.
-
@ 09565902:0700e0d5
2024-10-28 05:56:56Environmental pollution, a pressing global issue, has far-reaching consequences for both human health and the natural world. It arises from the introduction of harmful substances or energy into the environment, leading to adverse changes. This article delves into the various types of pollution, their causes, and the devastating impacts they have on our planet.
Types of Pollution
Air Pollution: Air pollution occurs when harmful gases, particulate matter, and other pollutants are released into the atmosphere. Major sources include industrial emissions, vehicle exhaust, and burning fossil fuels. The consequences of air pollution are severe, ranging from respiratory diseases to climate change.
Water Pollution: Water pollution results from the contamination of water bodies with pollutants such as industrial waste, agricultural runoff, and sewage. This can lead to waterborne diseases, harm aquatic ecosystems, and disrupt water supplies.
Land Pollution: Land pollution arises from the accumulation of solid waste on land. Improper waste disposal, deforestation, and industrial activities contribute to land degradation and soil contamination.
Noise Pollution: Excessive noise levels can cause hearing loss, stress, and sleep disturbances. Sources of noise pollution include transportation, construction, and industrial activities.
Light Pollution: Excessive artificial light at night can disrupt natural rhythms, affect wildlife, and contribute to energy waste.
Causes of Pollution
Industrial Activities: Industries release pollutants into the air, water, and land during production processes. Transportation: Vehicle emissions contribute significantly to air pollution. Agriculture: The use of pesticides and fertilizers can contaminate water bodies and soil. Deforestation: Clearing forests reduces carbon sinks and leads to soil erosion. Waste Disposal: Improper waste management practices result in pollution of land and water. Impacts of Pollution
Health Risks: Pollution can cause respiratory diseases, cancer, and other health problems. Environmental Degradation: Pollution damages ecosystems, reduces biodiversity, and disrupts natural processes. Climate Change: Greenhouse gas emissions contribute to global warming and climate change. Economic Loss: Pollution can harm industries, reduce agricultural productivity, and increase healthcare costs. Mitigating Pollution
Addressing environmental pollution requires a multifaceted approach:
Sustainable Practices: Adopting sustainable practices in industries and agriculture can reduce pollution. Renewable Energy: Transitioning to renewable energy sources can reduce greenhouse gas emissions. Waste Reduction and Recycling: Minimizing waste and recycling materials can reduce land pollution. Public Awareness: Educating the public about the dangers of pollution and promoting environmentally friendly behaviors is crucial. Policy and Regulations: Strong environmental regulations and enforcement are essential to control pollution. Environmental pollution is a complex issue with far-reaching consequences. By understanding its causes and impacts, we can take collective action to protect our planet and ensure a sustainable future for generations to come.
-
@ a012dc82:6458a70d
2024-10-28 02:51:08Table Of Content
The Purpose Behind the Move
Boosting Market Liquidity
Implications for the Cryptocurrency Market
Conclusion
FAQ
In the ever-evolving landscape of cryptocurrencies, Tether, one of the leading stablecoin issuers, has recently made a bold move by announcing their decision to purchase more Bitcoin. This strategic step aims to bolster Tether's stablecoin reserves and potentially reshape the dynamics of the cryptocurrency market. With Tether's Big Move: Buying More Bitcoin to Boost Stablecoin Reserves, investors and enthusiasts are eager to comprehend the implications of this decision. This article delves into the details, benefits, concerns, and possible outcomes of Tether's bold maneuver.
The Purpose Behind the Move
Tether's decision to acquire additional Bitcoin primarily serves two purposes. Firstly, it aims to increase the overall reserves of Tether's stablecoin. By purchasing more Bitcoin, Tether ensures that its stablecoin is backed by a higher value, which enhances market confidence. This move can also help Tether solidify its position as the most widely adopted stablecoin, attracting more users and creating a positive feedback loop.
Boosting Market Liquidity
Secondly, Tether's move can have a significant impact on market liquidity. Bitcoin, being the largest and most recognized cryptocurrency, is highly liquid and serves as the backbone of the entire market. By purchasing more Bitcoin, Tether effectively injects additional liquidity into the cryptocurrency ecosystem, potentially fostering a more robust and vibrant market.
Implications for the Cryptocurrency Market
Tether's decision to buy more Bitcoin has far-reaching implications for the broader cryptocurrency market. Let's explore the various ways this move can reshape the industry.
1. Increased Stability
By bolstering its reserves through Bitcoin, Tether aims to reinforce stability within the crypto space. A stable and reliable stablecoin is crucial for traders and investors, as it provides a reliable bridge between fiat and digital currencies. This move could instill confidence in market participants and mitigate some of the volatility associated with cryptocurrencies.
2. Enhanced Market Dominance
Tether is already the dominant stablecoin in the market, and its decision to purchase more Bitcoin could further solidify its position. With an increased reserve, Tether can maintain the 1:1 peg with the U.S. dollar, attracting more users and cementing its status as the go-to stablecoin for traders and exchanges.
3. Bitcoin Price Impact
As Tether buys more Bitcoin, it has the potential to influence the price of the leading cryptocurrency. Increased demand from Tether can drive up the price of Bitcoin, benefitting existing holders and potentially attracting more investors to the market. However, it's important to note that the overall impact on Bitcoin's price will depend on various factors, including market sentiment and overall trading volume.
4. Regulatory Scrutiny
Given the significance of Tether in the cryptocurrency ecosystem, its actions are likely to attract regulatory attention. The purchase of more Bitcoin to boost stablecoin reserves may raise concerns about market manipulation or the concentration of power. Regulatory bodies may closely monitor Tether's operations to ensure compliance with existing regulations and the overall stability of the market.
5. Market Volatility
While Tether's move aims to enhance stability, it may inadvertently contribute to short-term volatility. The injection of additional liquidity into the market can lead to price fluctuations, especially in the short term. Traders and investors should brace themselves for potential market movements resulting from Tether's decision.
6. Potential Rival Responses
Tether's big move could spur other stablecoin issuers to explore similar strategies. Competitors might also consider increasing their Bitcoin reserves to maintain a competitive edge and attract users. This could lead to a broader trend in the stablecoin market, influencing the overall dynamics of cryptocurrencies.
Conclusion
Tether's Big Move: Buying More Bitcoin to Boost Stablecoin Reserves has the potential to reshape the cryptocurrency landscape. By increasing its Bitcoin holdings, Tether aims to enhance stability, boost market liquidity, and solidify its position as a leading stablecoin issuer. While the implications of this decision are yet to fully unfold, market participants and regulators will closely monitor the outcomes. As the cryptocurrency market continues to evolve, Tether's bold move signifies the ongoing innovation and strategic shifts within the industry.
FAQ
How will Tether's purchase of more Bitcoin impact the stability of the USDT stablecoin? Tether's move is intended to enhance stability by increasing the overall reserves of the USDT stablecoin. With a higher value of Bitcoin backing each USDT, market participants can have increased confidence in the stability of the stablecoin.
Will Tether's purchase of Bitcoin drive up the price of the cryptocurrency? Tether's buying activity can potentially influence Bitcoin's price due to increased demand. However, the overall impact on the price will depend on various factors, including market sentiment and trading volume.
How might regulatory bodies respond to Tether's decision? Tether's actions are likely to attract regulatory scrutiny, given its significance in the cryptocurrency ecosystem. Regulators may monitor Tether's operations to ensure compliance with existing regulations and maintain market stability.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
@ 09565902:0700e0d5
2024-10-28 01:59:12Trump ends big hometown rally published at 01:38 01:38 Trump has just wrapped up his speech in New York, which he says is the "town where I was born and raised" and "taught me that we can do anything".
He tells his supporters that "we bleed the same blood, share the same home, salute the same great American flag".
Trump then repeats the lines he usually ends his rallies with, promising to make America healthy, wealthy and great again.
A singer is now on stage singing New York, New York while Trump waves to his supporters.
We'll bring you some recaps and analysis of the speech shortly. Stay tuned.
-
@ 00e8cdc1:e8e10d96
2024-10-28 00:57:12Opinion about Cake Wallet (android)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
I work on Haveno, which is closely linked with the people who created Cake Wallet. I will attempted to make a reproducible build and will share my findings both here and on the bounties pages raised by one of your staff, I will also blog my findings on https://kewbit.org/ in detail which a source reproducible if possible.
Hopefully this will help the community have better visibility. -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEE1wObvs5L5RfU4Q96azzMiJ9/IkkFAmce4TwACgkQazzMiJ9/ IkmT6g//XjoJP5T2vCsO0YxvJfuPyiGvSfHxxvIVRahNh5VKhGE625kDQfbzNGx6 UTjvLoygXTMcaHwFgYQz2VI/8ZkY0vur+6DlN7nwn21fBARtB3NviddCONuVxStp dVsgcTfDsBMMsBZPU+d6Z5XYhw72RKOt1zQ6o6X89MmP1zezd/AZRhkoib/bBMHR I1l8BKxlJ27JuRsQLHL/Zj+RRhLTFIdV2b0LQlFV5RZhPZPacdJUK1riNhxORTKN Rbn1etoFHQYp2xaeFUvXX9JcUPjn6hQpFSNvq0Dt9BbuuiYmotMK+5E4Ed3SRxLJ VKLcODOzUpYbnUftyGkouistNT7s9iMbV+syNkb7S55ifXxNq+vFJJ7Cz9IzVN99 EZm9Wpc2s2j0AxW66v60aRREBeo67uemx2EwAjiSF6+2UHuYBQUqY8vP6CHdCE+X u8TCP/JB3o7LyU0+icMjEGaI3Voy3Yaw0BI3ulD//yS/P9kzJUYmNLNsYWMZBlDZ /1HrhbeWKcEMKrnuYIKRcEH08jzOD51T2cIihjrPrSl+8/fk0q7Q2rTbBpNWcUD4 xqrKyHDZuUhEZWfnAZiUDPAm8x0Vq/Uwhb1K+LK6OAvZSo06sEKERj+cBw+gE9Jx lxHSz9HO3554jhjR1JIwA8Plrq65yI7wKo86OwefkebvtG6dfeY= =lCV6 -----END PGP SIGNATURE-----
WalletScrutiny #nostrOpinion
-
@ 0440f5d2:76b637dd
2024-10-28 00:13:56Hello World
-
@ 46390caa:7e7f65d9
2024-10-27 23:22:14TikTok, with over a billion active users, has emerged as a vital platform for businesses to reach their target audience. TikTok ads offer a unique opportunity to tap into this vast user base, increase brand awareness, and drive sales. In this article, we'll analyze the effectiveness of TikTok ads as a marketing strategy and provide actionable tips for businesses.
Why TikTok Ads?
- Huge User Base: TikTok's massive user base presents an unparalleled opportunity to reach potential customers.
- Engaging Format: TikTok's short-form, visually-driven content resonates with users, making ads more effective.
- Targeting Capabilities: TikTok's algorithm allows for precise targeting based on demographics, interests, and behaviors.
- Cost-Effectiveness: TikTok ads are often more affordable than traditional social media platforms.
Effectiveness of TikTok Ads
Studies have shown:
- High Engagement Rates: TikTok ads achieve an average engagement rate of 5.5%, outperforming Facebook (4.3%) and Instagram (3.8%) [1].
- Increased Brand Awareness: 67% of users report increased brand awareness after seeing TikTok ads [2].
- Sales and Conversions: TikTok ads drive significant sales and conversions, with 55% of users reporting purchases influenced by the platform [3].
Tips for Businesses
-
Define Your Target Audience
-
Identify your ideal customer demographics, interests, and behaviors.
-
Use TikTok's targeting options to reach your audience.
-
Create Engaging Ad Content
-
Short, visually-appealing videos (15-60 seconds).
- Use music, effects, and captions to enhance engagement.
-
Ensure brand consistency and messaging.
-
Leverage Hashtag Challenges
-
Participate in relevant hashtag challenges to increase visibility.
-
Create branded challenges to encourage user-generated content.
-
Utilize Influencer Marketing
-
Partner with popular TikTok creators to reach niche audiences.
-
Choose influencers aligning with your brand values and target audience.
-
Monitor and Optimize
-
Track ad performance using TikTok's analytics tool.
-
Adjust targeting, ad creative, and budget allocation for optimal results.
-
Run Contests and Giveaways
-
Host contests or giveaways to drive engagement and encourage sharing.
-
Offer incentives for users to participate.
-
Integrate with E-commerce
-
Use TikTok's shopping feature to tag products directly.
- Enable seamless checkout experiences.
Conclusion
TikTok ads offer a powerful marketing strategy for businesses seeking to reach a vast, engaged audience. By understanding the platform's effectiveness, targeting capabilities, and best practices, businesses can unlock the full potential of TikTok ads.
References
[1] AdEspresso, "TikTok Ads Benchmark Report" [2] GlobalWebIndex, "TikTok Marketing Report" [3] Influencer Marketing Hub, "TikTok Influencer Marketing Report"
You can also explore these resources:
- TikTok for Business: (link unavailable)
- TikTok Ads Manager: (link unavailable)
- TikTok Creator Marketplace: (link unavailable)
-
@ 8d34bd24:414be32b
2024-10-27 22:30:18NOTE: This article has some details that are specific to America, but the overall principles are applicable to all, and I believe it will be useful for all Christians.
When it comes to things like voting, Christians tend to err to one of two extremes and seem to find difficulty finding the right balance as defined by God. Some Christians refuse to vote or get involved with politics at all. They don’t want to dirty themselves with politics. They know that their true home is heaven, so they don’t seem to care much for the nations they live in. On the other hand, some Christians are so focused on politics fixing everything and creating heaven on earth that they can become idolatrous lifting up politicians as a kind of savior.
In this article, I’m going to address both extremes, using the Bible, and hopefully help you find a Biblical balance.
Seek the Welfare of the City Where I Have Sent You
As Christians we are just passing through our time on earth. Our true, eternal home, our true citizenship, is in heaven. That doesn’t mean that we shouldn’t care what happens on earth. We shouldn’t be like the old saying, “some Christians are so heavenly minded that they aren’t any earthly good.” I think Christians should organize our time here on earth kind of like the Israelites were commanded to live during their 70 year exile in Babylon and Persia.
Now these are the words of the letter which Jeremiah the prophet sent from Jerusalem to the rest of the elders of the exile, the priests, the prophets and all the people whom Nebuchadnezzar had taken into exile from Jerusalem to Babylon. (Jeremiah 29:1)
What did God say to the Israelites about how they should live their life in Babylon?
“Thus says the Lord of hosts, the God of Israel, to all the exiles whom I have sent into exile from Jerusalem to Babylon, ‘Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. Seek the welfare of the city where I have sent you into exile, and pray to the Lord on its behalf; for in its welfare you will have welfare.’ (Jeremiah 29:4-7) {emphasis mine}
Could we likewise say the same to Christians during their time on earth? “Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. Seek the welfare of the city, state, or nation where I have sent you to live for a short while, and pray to the Lord on its behalf; for in its welfare you will have welfare.”
God expects us to live fruitful lives, to marry, to have many children (multiply), and to raise them up to do the same. He also wants us to seek the welfare of the city, state, and nation where God has put us. In a city, state, or nation with democratic elections, the best way to seek its welfare is to vote for honest candidates who support godly principles. We rightly understand that in our ungodly world there are no perfect candidates. It can even be hard to find mostly honest and mostly godly candidates, but we should seek to elect the best that is available. Why are we told to do this? We are told that “for in its welfare you will have welfare.” When we fail to vote, to teach our kids or support good schools, to live productive lives, and to generally live Godly lives, we WILL see the decline of our cities, states, and nations. We will pay the price.
We are seeing exactly that decline because Christians have pulled out (and were pushed out) of the positions that influence the culture. We don’t have enough godly teachers, journalists, professors, advisors, economists, and politicians. We have given up the culture to those who oppose God, His people, and His commands.
We are paying the price for withdrawing into the safety of our churches and leaving the world to the wolves.
Political Religion
Of course we also have an opposite extreme. We have some Christians that are too focused on politics and power. They spend all of their time and energy on political endeavors and very little, to none, on sharing the Gospel and being a godly example. Many act like they think a political candidate is going to save them from the culture, the media, the bureaucracy, or the government. They forget that there is only one Savior — the Lord Jesus Christ. They forget that God said things will get worse before they get better. They make idols out of politicians and religions out of political parties.
No servant can serve two masters; for either he will hate the one and love the other, or else he will be devoted to one and despise the other. You cannot serve God and wealth.” (Luke 16:13)
Although this verse is specifically talking about being obsessed with wealth, it is applicable to anything that takes our focus, attention, and especially our worship away from God.
When a person spends all of their time serving one candidate or party and little to no time serving God, they have chosen to serve another god and are guilty, even if inadvertently and unintentionally.
You shall have no other gods before Me.
You shall not make for yourself an idol, or any likeness of what is in heaven above or on the earth beneath or in the water under the earth. You shall not worship them or serve them; for I, the Lord your God, am a jealous God, visiting the iniquity of the fathers on the children, on the third and the fourth generations of those who hate Me, but showing lovingkindness to thousands, to those who love Me and keep My commandments. (Exodus 20:3-6)
When we look to a politician to save us from anything, we are making him/her a god before us. When we give our all to a political party, we are taking our heart away from God and giving it to an alternate religion.
We may not think that we make idols in our modern world. It is true that we don’t usually carve them out of wood or mold them out of gold, but we have just as many idols as the Israelites did. They just look different.
I hope you will seriously consider this next point because it may be very unpopular with many of my readers. There are lots of Christians that will throw as big, if not a bigger, fit at the desecration of the American flag than over the Bible. Nobody seems to fight to retain the pledge of allegiance more than a majority of Christians. I’d argue that the American flag has become a modern day idol and the “Pledge of Allegiance” has become a religious mantra repeated to the god of government. Look at the words of the pledge:
I pledge allegiance to the Flag of the United States of America,\ and to the Republic for which it stands,\ one Nation under God,\ indivisible, with liberty and justice for all.
I think the inclusion of the phrase “one Nation under God” makes Christians feel OK about this pledge originally invented by a socialist whose brother sold American flags. The important part, which is why I can’t say the pledge anymore, are the words, “I pledge allegiance to the Flag of the United States of America, and to the Republic for which it stands.” I really appreciate the principles America was founded upon, but as a Christian, I can only pledge allegiance to God. My allegiance isn’t to a flag (an idol) or the government (a god). I refuse to go through a religious ritual that includes particular stances, reciting special words, and showing undue respect. We cannot “serve two masters.” As Christians our master should be Christ alone. Anything that becomes more important than, or even equal to, the importance of God in our lives is idolatry. We need to get our priorities right.
In the World, but Not of the World
As we live our lives here on earth, we need to remember our God ordained purpose and our true allegiance to God. We need to remember our citizenship1 and family are in heaven, not here on earth.
We want to have a positive influence on our culture, including working in influential positions and voting, but we should be most focused on personal evangelism and sharing the truth of the Bible. The best way to make a difference in our culture is to change hearts and minds through the Gospel of Jesus Christ.
But now I come to You; and these things I speak in the world so that they may have My joy made full in themselves. I have given them Your word; and the world has hated them, because they are not of the world, even as I am not of the world. I do not ask You to take them out of the world, but to keep them from the evil one. They are not of the world, even as I am not of the world. Sanctify them in the truth; Your word is truth. (John 17:13-17) {emphasis mine}
Although we want to be a light in the world, we have been warned that doing so will make us not fit in. It will cause many non-Christians (and maybe a few Christians whose priorities are not right) to hate us. No matter the consequences, we need to stand on the truth of the Word of God.
Too often, because we are living with those who are of this world, we start to look and act a lot like those of the world instead of looking and acting like our Savior.
Do not love the world nor the things in the world. If anyone loves the world, the love of the Father is not in him. For all that is in the world, the lust of the flesh and the lust of the eyes and the boastful pride of life, is not from the Father, but is from the world. The world is passing away, and also its lusts; but the one who does the will of God lives forever. (1 John 2:15-17) {emphasis mine}
The fact that we should not love the things of the world or take on the character of things of the world is true in every part of our lives, but since we are talking here about politics, let us discuss the way many Christians talk politics.
Many Christians talk about politics in the same manner as non-Christians — cursing, name calling, insulting, and doing whatever it takes to win, no matter whether it is moral or not. I know the “other side” cheats, lies, name-calls, etc., but we should not stoop to their level. Nobody ever won another to their point of view by cursing or name calling. There are ways to point our their errors, and even how horrific some of the things pushed are, without going so low. Jesus didn’t hold back from speaking the truth. He didn’t hesitate to point out error, but was never crude about it. We should be the same. We should shine a light in such a way that those around us see such a difference that they say something similar to what was said about the apostles:
Now as they observed the confidence of Peter and John and understood that they were uneducated and untrained men, they were amazed, and began to recognize them as having been with Jesus. (Acts 4:13)
There should be something about our words, actions, and demeanor that amazes our opponents causing them to recognize us “as having been with Jesus.”
I hope this post has been helpful, truthful, and not too offensive. In so many areas it is hard to find that perfect balance and to not allow ourselves to be pulled to either extreme to the detriment of our witness and our relationship to God.
Give no offense either to Jews or to Greeks or to the church of God; just as I also please all men in all things, not seeking my own profit but the profit of the many, so that they may be saved. (1 Corinthians 10:32-33) {emphasis mine}
Trust Jesus.\ \ your sister in Christ,
Christy
-
@ 9017cf6a:3d8a7adb
2024-10-27 21:46:06Ricardo Nunes (MDB) é eleito prefeito de São Paulo
O prefeito de São Paulo, Ricardo Nunes (MDB), conquistou sua reeleição neste domingo (27) e agora terá mais quatro anos para administrar a maior cidade do Brasil.
Apoiado por Jair Bolsonaro (https://www.conexaopolitica.com.br/tag/jair-bolsonaro/) e pelo PL (https://www.conexaopolitica.com.br/tag/pl/), que indicou seu vice na chapa, o emedebista foi confirmado como o vencedor do segundo turno disputado contra o esquerdista Guilherme Boulos (PSOL).
Nunes assumiu a prefeitura da capital paulista em 2021, após a morte de Bruno Covas (PSDB), de quem era vice na chapa eleita em 2020. Aos 56 anos, ele agora terá um mandato completo para gerenciar a principal metrópole da América do Sul.
Comments: https://www.conexaopolitica.com.br/ultimas/ricardo-nunes-mdb-e-eleito-prefeito-de-sao-paulo/#respond
https://www.conexaopolitica.com.br/ultimas/ricardo-nunes-mdb-e-eleito-prefeito-de-sao-paulo/
-
@ 5fb7f8f7:d7d76024
2024-10-27 21:20:28**A short introduction to Web3:
What is Web3?**
Web3, also known as Web 3.0, is the next generation of the internet, where users are in control of their own data, identity, and interactions. It's a decentralized web, built on blockchain technology, where applications and services are designed to be trustless, permissionless, and open.
Key features:
- Decentralization: Web3 applications run on blockchain networks, ensuring that data is stored and managed in a decentralized manner.
- Token-based economics: Web3 introduces token-based economies, enabling new business models and incentivization mechanisms.
- Artificial intelligence: Web3 integrates AI to enhance user experiences and automate processes.
- Internet of Things (IoT) integration: Web3 connects physical devices to the digital world, creating a seamless interaction between the physical and virtual.
Benefits:
- User sovereignty: Users have full control over their data and identity.
- Security: Decentralized and encrypted data storage ensures enhanced security.
- Censorship resistance: Web3 applications are resistant to censorship and downtime.
- New business models: Token-based economies enable innovative revenue streams.
Challenges:
- Scalability: Web3 applications face scalability issues due to blockchain limitations.
- Regulation: Evolving regulatory frameworks pose challenges for Web3 adoption.
- User adoption: Mainstream adoption requires user-friendly interfaces and education.
Conclusion:
Web3 represents a significant shift in the internet's evolution, prioritizing user control, decentralization, and innovation. As the ecosystem grows, we can expect new applications, business models, and opportunities to emerge, shaping the future of the web.Here's a short introduction to Web3.
-
@ 7579076d:1bbfcb19
2024-10-27 18:48:03Amber 2.0.8
- Fix signing private zaps
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v2.0.8.txt
andmanifest-v2.0.8.txt.sig
are in the current directory) with:bash gpg --verify manifest-v2.0.8.txt.sig manifest-v2.0.8.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v2.0.6.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ df478568:2a951e67
2024-10-27 18:31:30Chef's notes
This is a delicious, quick and easy meal you can do on the weeknights. Serve with mash potatoes.
Details
- ⏲️ Prep time: 10 minutes
- 🍳 Cook time: 1 hour 10 minutes
- 🍽️ Servings: 4
Ingredients
- 4 lamb shanks
- 28 oz. Can of whole San Marzano tomatoes
- 2 table spoons of garlic powder
- 1/3 bottle of dry white wine(cheap stuff is fine)
- 2 table spoons of extra virgin olive oil
- 1 tsp salt
- 1 tsp pepper
- 1 bag of frozen carrots
Directions
- Place carrots in the Instant pot to rest the meat on.
- add the 4 lamb shakes on top of carrots
- pour tomato can into instant pot.
- sprinkle garlic powder into Instant Pot.
- drizzle 2 tablespoons of olive oil.
- add enought white wine to cover about a third of the meat.
- add salt and pepper.
- cook in instant pot for 1 hour.
- slow release 10 minutes
-
@ 9e69e420:d12360c2
2024-10-27 17:38:43A concerning trend in American society regarding government dependency. A record-breaking 59% of Americans now receive more in government benefits than they pay in taxes, marking the highest level of dependency in U.S. history.
Key Findings
Historical Comparison The current dependency rate shows a significant increase from previous decades, with only 39% of Americans being net beneficiaries in 1979.
Contributing Factors - The expansion of welfare programs and benefits - Changes in tax policies - Growing income inequality - Aging population demographics
Economic Implications
Fiscal Concerns The increasing dependency ratio poses significant challenges for the federal budget and long-term fiscal sustainability. This trend suggests a shrinking base of net taxpayers supporting a growing number of net beneficiaries.
Social Impact The shift represents a fundamental change in the relationship between citizens and government, with more Americans becoming reliant on government assistance for their basic needs.
Future Outlook
The trend raises questions about the sustainability of current welfare programs and the potential need for policy reforms. The growing dependency ratio could potentially impact future economic growth and social mobility in the United States.
-
@ 9e69e420:d12360c2
2024-10-27 17:12:36U.S. export control laws have expanded to treat information and civilian technologies as weapons, often leading to questionable enforcement and unintended consequences.
Case Studies
several notable examples:
- A Russian game developer was arrested for purchasing an F-16 flight manual for video game development[1].
- Encryption technology was once classified as munitions, restricting the export of web browsers[1].
- Medical researchers were prosecuted for attempting to transport protein samples for stem cell research[1].
- A scuba equipment supplier was imprisoned for selling rebreathers that ended up overseas[1].
Impact on Industries
Space Industry - Satellite technology and related information are heavily restricted - Companies face complex hiring restrictions due to ITAR regulations - These regulations have significantly reduced U.S. competitiveness in the global satellite market[1].
Scientific Research - Researchers face barriers in international collaboration - Export controls have hindered the sharing of potentially lifesaving medical data - Even accident investigation reports can be treated as weapons technology[1].
Current Enforcement
The U.S. government has announced plans to tighten enforcement further, with the Commerce Department promising stricter penalties for violations. This includes substantial fines for companies violating export controls, such as a $300 million fine against Seagate Technology[1].
These regulations create an absurd situation where the U.S. attempts to be both an open society fostering innovation while simultaneously maintaining strict control over knowledge transfer, leading to a system where ordinary items and information are treated as weapons[1].
-
@ 9e69e420:d12360c2
2024-10-27 13:14:55Nick Pope, former head of the UK's UFO project, warns of a potential "imminent alien announcement" that may contain troubling truths. Following a 2017 report on the US government's UFO research, discussions about extraterrestrial life have surged. Recently, a satellite project hinted at confirming alien life, potentially aligning with the upcoming US election.
Pope emphasizes careful scrutiny of any alien messages before public release, stating, "in case it contains a truth too terrible to be told." He speculates about the delay in disclosures and suggests profound implications for humanity's understanding of its place in the universe, citing theories ranging from being a "science experiment" to a simulated reality.
-
@ a03b38f8:2c7ce1f0
2024-10-27 12:17:03(Member only content that has been unencrypted for use with
) Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in
especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks. Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
- Best to use a store out of town but not mandatory.
- Do not take any electronics with you, especially another phone.
- Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
- Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
- Use cash only to buy.
- Leave, do not shop or buy anything else.
Setting up Burner Phone:
- Go somewhere with free public WIFI (Starbucks, Library, whatever)
- Do not take any electronics with you, especially another phone.
- Open package and follow directions to activate using the public WIFI access.
- Choose a random area code during setup.
- Create a new random gmail account. (Do not reuse accounts or names)
- Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
- Change phone settings (see list)
- Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
- Destroy packaging that came with the phone.
Phone Settings: 1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic. 2. Turn off bluetooth and WIFI. 3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts. 4. Turn off all sounds and vibrations. 5. Turn off Find my Device. Setup screen lock with password. (No bio) 6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc 7. Set Use Location to off. 8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
- Never sign into any account associated with your real identity.
- Never use it to contact anyone associated with your real identity.
- Time and distance between burner phone and any other cell phone you own. i.e. A hour has passed and several miles from when you use and had on the other device.
- When not in use the battery is removed or in a Faraday Bag.
- Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
- Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
- Do not save anything (files, pictures, history) on the phone, especially if incriminating.
- Do not take it with you or use unless necessary.
- When in doubt, burn it and get another one.
- Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
- Factory reset the device.
- Remove and destroy the SIM card.
- Remove the battery because lithium batteries can explode. (may have to take it apart)
- Smash internals.
- Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
@ a03b38f8:2c7ce1f0
2024-10-27 12:11:24Update to k3tan's Starting a new digital identity Update to k3tan's Starting a new digital identity
Ktan wrote a nice article on digital identities (https://k3tan.com/starting-a-new-digital-identity) but sadly being from 2021 is out of date. This is my humble update and expansion on their ideas.
NEW Identity: Starting up a new digital identity. Notice the "new" part. For a history lesson most hackers, black and white hats, get caught from reusing nyms or user names. Maybe it is laziness or human ego wanting to show street cred but never never never reuse user names. Maybe you used a name just for fun with friends but much later used it again for mission critical operations. You are super careful and it is super clean now, not so much back then. It only takes one misstep in the past to connect that to another nym you have used or even your real identity.
I will repeat it again, never never never reuse user names. Every email account, social media, online forum, whatever use a different name and never reference another account either in posts or in registration. i.e. New email accounts in that new name or burner accounts. Use a online username generator or name generator to avoid personal bias to give any sort of hint to the new name. Don't let your love of pokemon characters be your downfall.
Devices: The author k3tan is correct, cash is king. Get cash and use cash to buy a laptop, a usb flash drive, and a lanyard. Use free Wifi access to download a linux distro and use the flash drive to install to the laptop. The original article suggests POP OS for some reason but in my opinion that can be a little resource intensive especially for a lower end laptop. The GOAT is Qubes but can be a bit intimidating for new users and again need a good amount of RAM so it is best for desktops. Honestly any linux distro is fine but some lightweight security inclined ones to look at are: Subgraph OS, Alpine, or PureOS.
Once that is installed to the laptop, use that to download Tails OS and install it on the flash drive you used to install your laptop OS. The laptop is going to be your daily driver for minor tasks and the tails flash drive is going to be your mission critical device when you need higher privacy and anonymity. Put the tails flash drive on the lanyard you bought. It will keep you from losing it and when it is plugged in and in use wrap the lanyard around your wrist. In a emergency just snatch it out of the computer. Your session will be wiped.
Phone: A phone is never going to be private. (see
Your phone is not your friend) There is only degrees of how terrible it can be. For personal use with the understanding that it will be linked to your identity, but with better privacy from corporate spying a pixel device running Graphene os is the answer. For mission critical communications that require a phone then refer to my burner phone guide . (I will publish a unencrypted version for this reference guide) Get Bitcoin and Monero: P2P through local meetup is fantastic if you have access to something like that. If you live in a smaller population center then that might not be a option. Use robosats to purchase bitcoin and Haveno-retro to purchase monero. Samurai is unfortunately gone and ashigaru is too new to recommend. Cake wallet with Tor is the go to for mobile and electrum and feather wallet on desktop.
Accounts: Use the monero or the non-KYC bitcoin to purchase Mullvad VPN. Setup a encrypted email account with either Proton or Posteo. Encrypt your files with veracrypt or picocrypt.
For more details and going further down the rabbit hole see:
Operation Security and Your Digital Life Nyms, Personas, and Digital Identity -
@ a39d19ec:3d88f61e
2024-10-27 10:26:03October's daily driver is the ana-digi Casio ABX-53 Twincept with module 1326. It features are world time, stopwatch, alarm and a databank for contacts.
Design
I have the gold/silver colored variant with a metal band. The watch has an analog clock and a floating display with the features listed above. Best thing is the "slider" mode that switches digital functions permanently.
Storytime
My log tells me that i bought the watch 6 years ago on a local flea market for close to nothing. It was in a bad condition and needed a new battery and some love. Sure enough it works fine since then. Most badass feature is that the analog hands are moved electronically not mechanically. Fun fact is that even my wife likes the floating display. First time she saw it I heard her say "Das ist echt cool", meaning "thats really cool".
-
@ 41fa852b:af7b7706
2024-10-27 07:39:11"On Halloween night, October 31, 2008, while the world was grappling with a global financial crisis, a mysterious figure named Satoshi Nakamoto released a nine-page whitepaper that would change the course of history".
It's a Happy 16th Birthday to Bitcoin on Thursday.
From Edinburgh to Brighton, there are nine events this week, offering plenty of opportunities to celebrate with some fellow bitcoiners. The place to be, of course, is the White Paper Party at the Dockside Vaults in London on the 31st (details below).
The Whitepaper Party is part of the Bitcoin Culture Festival, a decentralised event happening in various locations around the country, that starts this week and runs until the 2nd of November.
If you've enjoyed the newsletter and find it valuable to you and the UK Bitcoin community, please consider donating some sats here.
Thanks for reading The Meetup Breakdown! Subscribe for free to receive new posts and support my work.
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Leamington Spa: Meetups on the last Tuesday of each month at 19:00. You'll find them this month at the White Horse, CV32 5PZ on the 29th. 🍻
-
Bitcoin Culture Festival - Meetup with Bitcoin Merchants at Tooting Market: Celebrate the opening day of the festival in a space where Bitcoin payments are not just accepted, but embraced! Enjoy a laid-back atmosphere with fresh food, drinks, and great company. This is your chance to connect with the community, spark new friendships, and hear insightful talks, all while supporting vendors who are leading the way in the Bitcoin economy. Whether you're here to showcase, learn, or just relax, the festival vibe is all about building community and celebrating what brings us together. 30th October 17:00 - 23:00. 🛍️🛒☕️
-
Brighton Bitcoin: Building a bitcoin community in the Brighton & Hove area. A regular informal meetup happens every last Wednesday of the month. This month, on the 30th at 19:30 in the Caxton Arms. 🍻
-
Manchester Bitcoin: On the 31st it's the Manchester meetup. Join them at The Smithfield Market Tavern, 19:00. 🍻
-
Bitcoin Culture Festival - Bitcoin Whitepaper ₿ Day + Halloween Party
🕕 18:00 - 19:00, 31st October. Kick off the night with hands-on workshops on crowdfunding and fundraising using Bitcoin, featuring Geyser.fund and Angor.io. Plus, don't miss the ChockRock Chocolate Making workshop with Roger 9000 and dive into the ultimate gaming experience with Chain Duel.
🕢 7:30PM - Midnight, Get ready for a Halloween party like no other! A live performance by Roger 9000, followed by an electrifying lineup of DJs including Denay Samosa, Zazawowow, itsTOMEK, and MadMunky. Costumes, beats, and Bitcoin--what more could you ask for? 🎃🥳🪩
-
Northern Bitcoin Collective: The Stoke meetup is back! They'll be at Mellards Bar, ST5 1AA on Friday 1st November at 19:00. Head along for some cheap beer and top Bitcoin banter. 🍻
-
Bitcoin Culture Festival - NostrLDN: From 10:00 to 17:00 on Friday 1st of November where Nostr maximalists will showcase the tools of freedom. Expect insightful talks, cutting-edge projects, and interactive discussions centered on open-source innovation, privacy, and activism. Explore how Value4Value models are being built on NOSTR, and discover the intersection of technical creativity and social change. It's a unique chance to connect with like-minded individuals shaping the future of decentralised tech! 👨🏻💻📱
-
Bitcoin Culture Festival - The Culture of Code at Cyphermunk House:
🗓️ Runs from 29th October to 2nd of November with a panel discussion on the 2nd (details below).
🕙 10:00 - 17:00 - 2nd November, Kick off the day with an Art & Culture Panel, featuring discussions that dive deep into the intersection of creative expression and technology.
🕔 17:00 - 22:00 - 2nd November Explore the Culture of Code Art Gallery, followed by more engaging panels, live discussions, music, and literature. The evening wraps up with a Cocktail Party and the closing of the Art Exhibition--an opportunity to celebrate the creative community in a laid-back, interactive setting. 🖼️ 🎙️
- Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12:00 to chat about all things Bitcoin and keep fit. 🚶🏻♀️🚶🚶♂️
New businesses Accepting Bitcoin
This week we have…
Bristol Art Club Market: An 'Indiepartment' store and event space with a cafe, barbers, clothes and plant store. Now enthusiastically accepting bitcoin payments.
Upcoming Special Events
This event isn't happening next week, but it's important to add to your calendar now as tickets are selling fast.
- BWest 2024 - Grassroots Finance Unconference: An exciting new mini-conference in Bristol on Saturday, November 16th. A day of discussions and workshops centred around Bitcoin and the freedom movement. Featuring a lineup of speakers, including Carlos Massiah on using open-source Bitcoin tools, Nathan Day exploring BTCmap.org communities, and Ben Arc on the Maker Renaissance through free Nostr webstores. Other thought-provoking talks include Daniel Prince on the ethics of money creation, Susie Violet Ward's "BBC vs. Bitcoin," and more. Enjoy market stalls, a DJ set, food and drink, and an afterparty to close the day. The day kicks off at 10 AM till 5 PM at Hamilton House, Stokes Croft, Bristol. Early bird tickets are just £20.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 623ed218:fa549249
2024-10-26 18:59:23Peritas: A Vision for Accessible Multi-sig
Introducing: Peritas
Let me preface this with the following disclaimer:\ I am not a dev, I can't code and I've never written a white paper...
With that out of the way, let's talk multi-sig.\ By day, I'm a maintenance tech. That is to say, I earn fiat by unclogging toilets, fixing broken dishwashers and refrigerators, and troubleshooting boiler systems and air conditioning units. I was scrolling through my nostr feed today having just fixed a leaking toilet and on my way to look at a stuck zone valve on a boiler line when I came across a note from Guy Swann:
So, I thought about it... kept thinking about it... and kept thinking about it until I felt compelled to reply. A few back-and-forths later, and I found myself responding to Guy with:
"A non-dev", yes, that's how I identify. And in that moment I realized the flaw in how I look at the world.
Nothing in life brings me greater joy than finding a creative solution to a problem, yet, perhaps as a coping mechanism, I tend to avoid considering solutions to problems I deem outside my skill-sets.tside my skill-sets. All my life I have limited myself to the scope of my own ability, neglecting to consider that I can play a part in solving more complex problems by leveraging the abilities and talent of those around me who see the same problems in the world that I do.
I'm resolving to change this. The release of the Peritas White Paper represents my first step towards this.
As I stated in the beginning: "I am not dev, I can't code.". But after nearly four years of obsessive involvement in the Bitcoin space, I have a vision of the solutions I want to see made available. I will do what I can to bring these visions into reality.
This is a work in progress. The scope and details of this project will necessary evolve as needed to adapt to reality and community/user input.
With that said, I present Peritas for your review.
Peritas: An Accessible Multi-Signature Wallet Proposal for Enhanced Self-Custody (Updated 867475)
Abstract
Peritas aims to provide or inspire simple, open-source, multi-platform applications designed to simplify the setup and management of multi-signature (multi-sig) wallets. It specifically targets new Bitcoin users, enhancing the security of their holdings without requiring additional hardware. By creating an accessible, intuitive interface and aligning with Web of Trust (WOT) principles, Peritas hopes to address a significant gap in the Bitcoin ecosystem, promoting higher security with minimal user friction.
1. Introduction
Bitcoin wallets typically take one of two forms: single-signature (single-sig) and multi-signature (multi-sig). Single-sig wallets are the default, and they are most commonly used by those new to self-custody as they are simple to set up and manage. However, single-sig wallets present a security risk as only one key is needed to access and move funds, leaving them vulnerable to theft or compromise.
Multi-sig wallets require multiple keys to authorize transactions, significantly enhancing security by distributing custody across multiple signatories. Multi-sig should be the standard for all Bitcoin self-custody setups, particularly for key recovery and backup processes, as an improvement over traditional paper seed backups.
This white paper introduces Peritas: an open-source, multi-platform application proposal that simplifies multi-sig wallet creation and operation, making enhanced security accessible to all Bitcoin users without the need for dedicated hardware.
2. System Overview
2.1 Wallet Creation Process
Peritas provides users with a simple, guided process for creating a secure multi-sig wallet:
-
Initial Keypair Generation: Upon initial app startup, Peritas automatically generates a base Bitcoin keypair (Base Key) for the user. This Base Key will be foundational for creating recovery and multi-sig configurations.
-
Vault Founders (Founders) begin by opting to create a new "vault" (multi-signature wallet). The default configuration is a 2/3 multi-sig setup, although Founders can access advanced settings to adjust the number of signatories and the threshold required for authorizing transactions.
-
The application will derive a new private key (Vault Key) from the Base Key for use in the new multi-sig vault. Vault Keys may be derived from the Base Key using BIP-85 child seeds, alternate accounts or derivation paths, or the use of passphrases (exact method TBD). All data required for regeneration of Vault Keys is securely stored in encrypted app data.
-
It is important to tailor multi-sig setups to the Founder's situation, skill level, and the size of their holdings. For smaller amounts (e.g., 100,000 sats), a 2/3 service-based multi-sig involving keys held on the Founder's phone, a spouse's or trusted contact's device, a participating exchange where the Founder purchases Bitcoin, or a vetted third-party key holder may be appropriate, providing a balance of convenience and security. For larger holdings, Founders may opt for a more secure configuration with a higher number of signatories and a higher threshold for transaction authorization to enhance fault-tolerance and mitigate risks.
2.2 Integration with Trusted Contacts (Keyholders)
-
Founders are prompted to select a Keyholder, a trusted contact who will generate a Social Recovery Key.
-
Following initial app startup, Keyholders will select an option to "Become a Keyholder". This selection prompts Peritas to generate a Social Recovery Key using a process identical to the creation of Vault Keys (outlined in 2.1).
-
The public key from this newly generated Social Recovery Key, (created through a simple option on the app's welcome page), is shared back to the Vault Founder for use in the configuration of their multi-sig vault.
-
An "affiliate + key assistance" system could also be used, where a Social Recovery Key could be managed by the person who onboarded the user (e.g., a mentor), who, assuming a trusted relationship between parties, could assist the Founder through the vault creation and management process as needed.
2.3 Third-Party Collaborative Custody
-
Third-Party Integration and Support: Peritas envisions integration of its vault creation process with vetted exchanges or respected Bitcoin support and mentorship services. These Third-Party Keyholders can offer higher levels of technical support and guidance to Founders, though such support may come at the expense of privacy.
-
Flexibility: Peritas provides a flexible setup for multi-sig vaults. Founders may choose to forgo this institutional third-party key involvement entirely, opting instead to include additional trusted contact Keyholders, as referenced in 2.2, for a more private configuration.
2.4 Vault Creation and Management
-
With the Founder's, Keyholder's, and any Third-Party Keyholder's public keys in place, Peritas creates a multi-signature vault and shares descriptor files securely with all participating parties.
-
The app houses configuration files for each multi-sig vault and enforces security by rejecting any attempt to add additional keys from the same vault, ensuring that a quorum of keys cannot be consolidated on a single device.
2.5 Encrypted Cloud Backup
- To enhance redundancy, Peritas offers users the option to encrypt and store their keys and vault configuration files with their preferred cloud service (e.g., iCloud, Google Drive). This approach leverages familiar systems providing a seamless way for users to store recovery keys, minimizing the risk of loss of key material in the event of device loss or app data deletion.
3. Technical Implementation
3.1 Security Architecture
-
Encryption: All communication between the app, users, trusted contacts, and exchanges is encrypted using AES-256 and other state-of-the-art encryption protocols to ensure privacy and prevent interception or tampering.
-
Cross-Platform Support: Peritas is designed to function across multiple platforms (iOS, Android, Windows, Linux) to ensure broad accessibility.
-
Data Transmission: Secure communication protocols such as Fedi, Matrix, Nostr Gift-Wrapped Messages, or Pears integration may be used to transmit public keys, descriptor files, and signatures, safeguarding user information.
3.2 User Experience Design
-
Onboarding and Education: A setup wizard guides users through vault creation, using simple language and visual aids to explain multi-sig benefits, vault concepts, and the roles of different types of Keyholders.
-
Pathfinder Mode: Users can access an advanced "Pathfinder Mode" to configure vaults with a higher number of signatories than the default 2-of-3 vault, unlocking options for custom thresholds, personalized wallet configurations, and unique security protocols. Future expansions under Pathfinder Mode may include enhanced signing automation, integration with additional security services, and greater control over key storage and recovery preferences, enabling users to tailor their vault setup to their evolving security needs.
3.3 Node Connectivity
To maintain decentralization and minimize the risk associated with a single point of failure, Peritas will not rely on a central node for its operations. Instead, offering multiple options for users:
-
Custom Node Connections: Users can connect Peritas to their own Bitcoin nodes, providing maximum control and security. This approach aligns with the Bitcoin ethos of self-sovereignty and reduces reliance on third-party infrastructure.
-
Public Node Selection: For users without their own nodes, the application will provide a selection of vetted, community-operated public nodes to connect with. This offers convenience while distributing trust across multiple independent entities, minimizing the risk of centralization.
-
Tor Integration: To enhance privacy, Peritas will support Tor integration, enabling users to connect to nodes anonymously and reducing the risk of tracking and monitoring.
-
Automatic Node Load Balancing: The app may implement a feature that automatically rotates between multiple trusted public nodes, ensuring that no single node becomes a point of dependency.
-
You can view additional connectivity ideas we're thinking through in our file Decentralized Checkpointing.md.
4. Security and Privacy Considerations
Peritas prioritizes security and privacy:
-
Multi-Factor Authentication (MFA): To protect app access, users may set up MFA as an additional security layer.
-
Local and Cloud Encryption Standards: The app uses AES-256 for local storage of keys and end-to-end encryption for cloud backups and transmission of public keys and descriptors.
-
Key Recovery and Redundancy: Cloud services are employed for encrypted backups, providing redundancy while ensuring that users retain control over their key material.
5. Integration and Collaboration Opportunities
5.1 Wallet Providers
- Peritas could partner with existing and up-coming open-source wallet providers, to integrate its vault functionality proposals and expand their security offerings.
5.2 Exchange Collaboration
- By collaborating with exchanges, Peritas can provide seamless integration for obtaining Exchange Public Keys, building trust and simplifying the user experience for those securing their funds.
6. Future Development and Monetization
6.1 Feature Expansion
-
Hardware Wallet Integration: Future updates will include compatibility with hardware wallets, providing additional security options for advanced users who wish to incorporate dedicated signing devices into their multi-sig setup.
-
Automatic Backup Options: Users will have more automated and secure options for backing up their encrypted keys, including automated cloud backups and integration with secure storage solutions.
-
Transaction Monitoring: The app will incorporate transaction monitoring services, enabling users to receive alerts and detailed information about incoming and outgoing transactions.
-
Guided Key Rotation/Replacement: To maintain long-term security and minimize risks from potential key compromises, Peritas will offer a guided process for rotating or replacing keys within a multi-sig setup. The feature will provide users with step-by-step instructions on how to update their vault's keys, ensuring a secure and seamless transition without risking access to funds.
-
Timelocks: Pathfinder Mode allows users to set custom timelocks for certain transactions, offering additional control over when funds can be moved, which is particularly useful in setting up delayed recovery mechanisms or ensuring funds are secure for specific timeframes.
-
Miniscript Support: Integrate Miniscript functionality for a more expressive and programmable approach to transaction conditions, empowering users to set complex logic for transaction approvals and build custom spending policies tailored to their needs.
-
Future-Proofing with CTV: In the event of future consensus around CheckTemplateVerify (CTV) (BIP-119), Pathfinder Mode will likely be updated to support CTV-specific outputs, offering options for conditional spending paths and more efficient use of UTXOs. This will enable enhanced, adaptable control over transaction flows, making Peritas wallets more resilient and versatile as Bitcoin development progresses.
6.2 Premium Services
- Potential premium services include advanced support for users configuring complex vaults. These services may be facilitated through strategic partnerships with community-vetted organizations such as Bitcoin Mentor or The Bitcoin Way, ensuring trusted and expert guidance for users.
7. Market Considerations and Demand
While specialized hardware signing devices will continue to cater to those with heightened security demands (i.e., "paranoid crypto anarchists"), Peritas fills a gap for new entrants to the space who may not yet be ready or willing to purchase dedicated hardware. Providing robust, easy-to-use software solutions ensures that the demand for secure self-custody is met for all levels of users.
8. Conclusion
Peritas is a critical step forward in improving Bitcoin self-custody security. By proposing an open-source framework for user-friendly vault creation and management applications, Peritas is working to empower users to protect their holdings without the need for additional hardware. Every self-custody setup should incorporate multi-sig, and Peritas provides an adoptable framework for secure solutions that meet this need, ensuring that new users will have access to robust security models that align with the ethos of Bitcoin's financial sovereignty. By paving a path to accessible and secure Bitcoin self-custody for the coming waves of new Bitcoin participants, Peritas aims to uphold and strengthen the principles of financial freedom and autonomy in the Bitcoin ecosystem.
9. Contributors and Acknowledgements
Peritas was developed with insights and support from many contributors in the Bitcoin community:
-
Guy Swann, founder of Bitcoin Audible, provided valuable perspectives on multi-signature setups and emphasized the importance of using multi-sig as the standard for Bitcoin self-custody and recovery processes.
-
We also acknowledge the efforts of the many builders and developers who have worked tirelessly to bring Bitcoin self-custody to its present stage, creating the tools and upholding the principles that Peritas hopes to further.
-
Additional input and feedback were provided by members of the Bitcoin community who share a commitment to enhancing security and accessibility for Bitcoin newcomers.
10. Additional Resources
See a breakdown of some of the terms used above in Glossary of Terms.md.
Thanks For Reading!
[For the most up-to-date version of the Peritas White Paper, please visit my Github Repository!]
Block 867476 - MSK 1490
Digging Deeper:
Hey there, I hope you enjoyed this read! If you did, and would like to read more of my barks, follow the links below!
-
Curious how I found Bitcoin? Read "Paw Prints to the Timechain"
-
Bitcoin meets psychology? I touch on this in "Maslow's Apex"
-
Want to understand the basics of Bitcoin? Read "Bitcoin Best Practice"
-
If you like seeing bad media takes unpacked, check out "Pup's Double-Takes"
External Resources:
- Want to earn rewards on your mortgage? Use my referral to earn 20,000 free sats at sign up!
- Do you like sharing Bitcoin content and earning sats for doing so? Join me at Stacker.news!
...Woof!
originally posted at https://stacker.news/items/741352
-
-
@ 76c3384a:9279a6e5
2024-10-26 18:04:04While teaching my eldest to read and write using, “Look mommy, I can read and write” my second born also asked me for “school” work. She was barely 4 years old, I designed this workbook, “Look mommy, I am growing up” with the intent to introduce her to the alphabet, numbers and shapes keeping it simple and fun.
The workbook contains wide variety of exercises. There are various exercises including similarities, differences, basic alphabet letters, numbers, and more.
-
-
As a homeschool mom, I believe "schooling" should always be fun especially at the foundation phase age. This helps build a love for learning and that it is something to look forward to. Because my daughter was eager to learn and excited to start I wanted to embrace this phase without breaking her enthusiasm.
This workbook served as a "keep busy" book allowing her to feel involved while her older sister was doing her exercises.
Using the skills I learned while digitizing the first workbook, I started out with Inkscape and Libre Office. Publishing first in Afrikaans and then in English.
Since 2024 my digital books are available for free (no strings attached) for anyone to use, they have also been updated and revamped to be Bitcoin-friendly. All I ask is that you refer to my website or Nostr account when sharing.
I hope you find this helpful. Enjoy, and follow me on Nostr @ SemcoMama. If you’d like to support my work zap me some sats.
About this foundation phase workbook:
An educational exercise book helping children identify differences, similarities and pattern recognition during the foundation phase. “Look mommy, I am growing up” is great for preschoolers.
Children can be creative using different coloured crayons or pencils.
Development of the following:
- Letter- and sound recognition
- Number recognition
- Colours and shapes
- Number 0-10
- Identify
- Colouring
- and more!
-
-
This book is ideal for parents who want to play an active role in this phase of their child’s development and education. It will also give satisfaction to the parent that wants to teach his/her own child the foundation of reading and writing by working together in the book.
(The character style and writing symbols may differ depending on the country you live in.)
DOWNLOAD PDF HERE!
First publication 2017 Second publication 2024 (free to use) Written, designed and cover by SemcoMama
semcomama.co.za / semcomama.npub.pro
© All rights reserved. Feel free to share with all mommies out there and you can also follow me on Nostr @semcomama. If you appreciate my work and found value in it zap me some sats. (through my website or my Nostr. account).
-
education
-
@ df478568:2a951e67
2024-10-26 17:06:30Declaring myself a nerd on my resume has not yielded many interviews. Therefore, I a studying for an A + certification because most jobs require it. Although I geek-out on obscure Internet protocols, that’s not what businesses want yet. They want people to prove they know what SSH and FTP are. They want port memorization and you must know that an Ethernet cable is called an RJ45 cable. I use these things all the time. I already knew SSH uses port 22, but I didn’t know it was over TCP the Transmission Communications Protocol. Luckily I read the book The 4 Hour Chef by Tim Ferris.
I know what you’re thinking. What the F does a cookbook have to do with IT? Well, this book was really about rapid learning. The idea is to learn any new skill by studying 4 hours per week. The book teaches you how to learn how to cook within 12 weeks by studying 4 hours per week. The beginning of the book is not about cooking at all. One chapter teaches you how to memorize a deck of cards or the first 100 digits of pi. You do this buy converting numbers into sounds and sounds into images. It’s almost as if you use cenesthesia as a memory tool. I used this card deck memorization technique](https://tim.blog/2013/02/07/how-to-memorize-a-shuffled-deck-of-cards-in-less-than-60-seconds/) to memorize common ports and protocols.
How I Use Mnemonics To Remeber Ports
Here is an example of how I used this mnemonic to memorize SSH is commonly found on tcp/22
I used cartoon characters to represent Internet Protocols like tcp or udp. - For tcp, I imagine a character I call taco pollo because it’s the first thing that came to mind when I tried to think of something using the letters t, c, and p. That’s not a real cartoon, so I used AI to dream up a picture of some taco wielding chicken. It’s a strange bird. I know, and so am I, but it works. I also considered using the cartoon chickens from Breaking Bad, but it didn’t quite fit.
- Chicken’s with tacos represent tcp. I thought of this because the word taco has a t and c in it and chicken in Spanish is pollo. This combination is ridiculous, but the more ridiculous the better when it comes to memorization. The goal is to make it unforgettable like Nat King Cole.
- For udp, I use Captain Underpants. Udp made me think of Captain Underpants for similar reasons.
I used actions for the names of ports I memorizing. For example, SSH is the verb shelling.
I use an object for the port number and try to think of an object that fits within the rules of the major number system.
Instead of memorizing that SSH is tcp/22, I create an image in my mind’s eye.
Taco Pollo shelling The Nanny. I embellished this phrase a little using a prompt generator and ran it through Stable AI Core. Here is the prompt I used.
Chicken donning a taco hat, firing artillery shells, towards Fran Drescher as The Nanny; surreal, pop-art style, vibrant colors, high-definition, references to Roy Lichtensteins comic-strip art.
- The chicken and taco represent tcp.
- The artillery shell represents Secure Shell, a.k.a. SSH
- The nanny represents the number 22 because the n sound represents the number 2 in the major number system. Therefore, Nanny = 22. This is my mnemonic for memorizing the Internet protocol, and port number of SSH.
I happen to have already know many of the port numbers already just from working with servers. I used to use Yunohost and it required me to open up many of the ports that I am learning about. A couple years ago, I ran my own email server. It wouldn’t work at first. My research lead me down a rabbit hole that taught me I needed to open port 25 to send emails. This is because SMTP(Simple Mail Transfer Protocol) needs port 25 open. A good mnemonic for this would be “a chicken taco” smurfs a nail. What does smurf mean? I don’t know, but the Smurfs used it as a verb all the time. It also helps me remember SMTP because s and m are the first two letters in the word Smurf. I didn’t know DNS used port 53 until I created the mnemonic, “Captain Underpants dines with Lemmy.” Is it gibberish? Yes. Is it effective? Hell yes!
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0 867,467
Originally published on: https://marc26z.com/memorizing-protocols-and-port-numbers-with-mnemonics/
-
@ 3bf0c63f:aefa459d
2024-10-26 14:18:23kind:1
maximalism and the future of other stuff and Nostr decentralizationThese two problems exist on Nostr today, and they look unrelated at first:
- People adding more stuff to
kind:1
notes, such as making them editable, or adding special corky syntax thas has to be parsed and rendered in complicated UIs; - The discovery of "other stuff" content (i.e. long-form articles, podcasts, calendar events, livestreams etc) is hard due to the fact that most people only use microblogging clients and they often don't appear there for them.
Point 2 above has 3 different solutions:
- a. Just publish everything as
kind:1
notes; - b. Publish different things as different kinds, but make microblogging clients fetch all the event kinds from people you follow, then render them natively or use NIP-31, or NIP-89 to point users to other clients that would render them better;
- c. Publish different things as different kinds, and reference them in
kind:1
notes that would act as announcements to these other events, also relying on NIP-31 and NIP-89 for displaying references and recommending other clients.
Solution a is obviously very bad, so I won't address it.
For a while I have believed solution b was the correct one, and many others seem to tacitly agree with it, given that some clients have been fetching more and more event kinds and going out of their way to render them in the same feed where only
kind:1
notes were originally expected to be.I don't think clients doing that is necessarily bad, but I do think this have some centralizing effects on the protocol, as it pushes clients to become bigger and bigger, raising the barrier to entry into the
kind:1
realm. And also in the past I have talked about the fact that I disliked that some clients would display my long-form articles as if they were normalkind:1
notes and just dump them into the feeds of whoever was following me: nostr:nevent1qqsdk90k9k30vtzwpj6grxys9mvsegu5kkwd4jmpyhlmtjnxet2rvggprpmhxue69uhhyetvv9ujumn0wdmksetjv5hxxmmdqy8hwumn8ghj7mn0wd68ytnddaksygpm7rrrljungc6q0tuh5hj7ue863q73qlheu4vywtzwhx42a7j9n5hae35cThese and other reasons have made me switch my preference to solution c, as it gives the most flexibility to the publisher: whoever wants to announce stuff so it can be discovered can, whoever doesn't don't have to. And it allows microblogging clients the freedom to render just render tweets and having a straightforward barrier between what they can render and what is just a link to an external app or webapp (of course they can always opt to render the referenced content in-app if they want).
It also makes the case for microapps more evident. If all microblogging clients become superapps that can render recipe events perfectly why would anyone want to use a dedicated recipes app? I guess there are still reasons, but blurring the line between content kinds in superapps would definitely remove some of the reasons and eventually kill all the microapps.
That brings us back to point 1 above (the overcomplication of
kind:1
events): if solution c is what we're going to, that makeskind:1
events very special in Nostr, and not just another kind among others. Microblogging clients become the central plaza of Nostr, thus protecting their neutrality and decentralization much more important. Having a lot of clients with different userbases, doing things in slightly different ways, is essential for that decentralization.It's ok if Nostr ends up having just 2 recipe-sharing clients, but it must have dozens of microblogging clients -- and maybe not even full-blown microblogging clients, but other apps that somehow deal with
kind:1
events in multiple ways. It's ok if implementing a client for public audio-rooms is very hard and complicated, but at the same time it should be very simple to write a client that can render akind:1
note referencing an audio-room and linking to that dedicated client.I hope you got my point and agreed because this article is ended.
- People adding more stuff to
-
@ 4ba8e86d:89d32de4
2024-10-26 14:14:01I2P é uma rede anônima, oferecendo uma camada simples que aplicativos sensíveis à identidade podem usar para se comunicar com segurança. Todos os dados são agrupados com várias camadas de criptografia e a rede é distribuída e dinâmica, sem partes confiáveis.
O Invisible Internet Project começou em 2002. A visão do projeto, conforme descrito em uma entrevista com Lance James, era que a rede I2P "oferecesse total anonimato, privacidade e segurança no mais alto nível possível. Internet descentralizada e ponto a ponto significa não se preocupe mais com seu ISP controlando seu tráfego. Isso permitirá que (as pessoas) realizem atividades contínuas e mudem a maneira como vemos a segurança e até a Internet, utilizando criptografia de chave pública, esteganografia de IP e autenticação de mensagens. A Internet que deveria ter sido, será em breve." Desde então, o I2P evoluiu para especificar e implementar um conjunto completo de protocolos de rede capazes de fornecer um alto nível de privacidade, segurança e autenticação para uma variedade de aplicativos.
A rede I2P. A rede I2P é uma rede de sobreposição ponto a ponto totalmente criptografada. Um observador não pode ver o conteúdo, origem ou destino de uma mensagem. Ninguém pode ver de onde vem o tráfego, para onde está indo ou qual é o conteúdo. Além disso, os transportes I2P oferecem resistência ao reconhecimento e bloqueio por parte dos censores. Como a rede depende de pares para rotear o tráfego, o bloqueio baseado em localização é um desafio que cresce com a rede. Cada roteador na rede participa de tornar a rede anônima. Exceto nos casos em que seria inseguro, todos participam do envio e recebimento do tráfego de rede.
Como funciona o I2P?
O I2P usa criptografia para obter uma variedade de propriedades para os túneis que constrói e as comunicações que transporta. Os túneis I2P usam transportes, NTCP2 e SSU2, para ocultar o tráfego que está sendo transportado por eles. As conexões são criptografadas de roteador para roteador e de cliente para cliente (ponta a ponta). Forward-secrecy é fornecido para todas as conexões. Como o I2P é endereçado criptograficamente, os endereços de rede I2P são auto-autenticados e pertencem apenas ao usuário que os gerou.
A rede é composta por pares ("roteadores") e túneis virtuais unidirecionais de entrada e saída. Os roteadores se comunicam entre si usando protocolos construídos em mecanismos de transporte existentes (TCP, UDP), passando mensagens. As aplicações cliente possuem seu próprio identificador criptográfico ("Destino") que permite enviar e receber mensagens. Esses clientes podem se conectar a qualquer roteador e autorizar a alocação temporária ("lease") de alguns túneis que serão utilizados para envio e recebimento de mensagens pela rede. O I2P possui seu próprio banco de dados de rede interna (usando uma modificação do Kademlia DHT) para distribuir roteamento e informações de contato com segurança.
Sobre a Descentralização e a Rede I2P A rede I2P é quase totalmente descentralizada, com exceção dos chamados Reseed Servers. Isso é para lidar com o problema de bootstrap DHT (Distributed Hash Table). Basicamente, não há uma maneira boa e confiável de deixar de executar pelo menos um nó de inicialização permanente que os participantes que não são da rede possam encontrar para começar. Uma vez conectado à rede, um roteador só descobre pares construindo túneis "exploratórios", mas para fazer a conexão inicial, um host reseed é necessário para criar conexões e integrar um novo roteador à rede. Os servidores reseed podem observar quando um novo roteador baixou um reseed deles, mas nada mais sobre o tráfego na rede I2P.
Recursos do I2P
O I2P oferece uma série de recursos para proteger a privacidade do usuário. Alguns desses recursos incluem:
Ocultação do endereço IP: O I2P oculta o endereço IP do usuário, tornando impossível que alguém rastreie a atividade do usuário na rede.
Comunicação segura: Todas as comunicações dentro da rede I2P são criptografadas de ponta a ponta, garantindo a privacidade do usuário.
Anonimato: O I2P permite que os usuários se comuniquem de forma anônima, o que significa que sua identidade não é exposta durante a comunicação.
Sites ocultos: O I2P permite que os usuários criem e acessem sites ocultos, que só podem ser acessados dentro da rede I2P.
Vantagens do uso do I2P
O I2P oferece várias vantagens para os usuários que desejam proteger sua privacidade online. Algumas dessas vantagens incluem:
Proteção contra vigilância governamental: O I2P ajuda a proteger os usuários contra a vigilância governamental, tornando impossível rastrear o endereço IP do usuário.
Anonimato em redes públicas: O I2P ajuda a proteger os usuários contra ataques de hackers em redes Wi-Fi públicas.
Acesso a sites censurados: O I2P permite que os usuários acessem sites que estão bloqueados em sua região ou país.
O I2P é uma rede anônima de comunicação que oferece recursos de privacidade avançados para proteger a privacidade do usuário. Ele permite que os usuários se comuniquem de forma anônima e segura e cria uma solução eficaz para usuários que valorizam a privacidade e a segurança online. Se você está preocupado com sua privacidade online, o I2P pode ser uma ótima escolha.
https://github.com/i2p
-
@ 592295cf:413a0db9
2024-10-26 13:39:00[Week 21-10] I thinks that Saylor is on right, don't trust verify, is bullshit Bitcoin is a financial tool! I think it's good for me to get away from social media once a week. I could do things outside, like walking. Take pictures of the landscape. The weirdest thing is when the alarm calls you up in an hour.
Fiatjaf wants a cache client. I feel like I can do it, I have the set to do it, but nostrudel is no longer working, so it's a little murky. Next nostrudel does not accept changes to settings (It works now!), so maybe i can think something. I want to make a corny chat, test, read this article. Nostr doesn't work with a vpn because relays don't know who you are. jokes aside, some clients have difficulties.
I couldn't take pictures of the landscape if I didn't take the wind blades. Small local controversy.
Missing the point of content creator. Simply for final user, Simply for the creator, new feature, no missing nothing. I'm trying to limit everything to writing for a week. I almost did. Maybe another week can do well.
Meanwhile I updated apps like Amber and Voyager, coracle, nostrmo.
The experiment continues with open vibe following the trending of Nostr. I'm following almost 120 npub. He'll stop, I don't know, possible he's already reached the limit. You still can't block words on the Nostr side of Open, strange thing. The app doesn't count the follow well, still some problem cleaning the cache seems that it doesn't need. After a while open and close and seems updated. I wanted to try open librarian, but I was busy sending fake zap on Nostr. This morning i try and It keeps giving me error 500 when I try to connect to a relay.
I hate when a profile follows everyone indistinctly, why does everyone follow? and in voyage, I read with WoT setting, I probably have to do unfollow. There must be an indication in which not include the followers of this person in the web of trust, I would do it by default if you follow more than 600 people.
WoT on Nostr Visualized post on stackernews
-
@ b6424601:a11e4ff4
2024-10-26 12:12:56In 2007, my 10-year-old business had just signed a 5-year lease on Atlanta's Peachtree Road with enough space for my partner and our wives' separate companies to continue growing. We thought we were an overnight success 10 years in the making. 14K a month split between 3 companies, all in the housing and office design industry; what could go wrong?
As I look back on those early days, I realize that our business was fueled by the fiat jet fueled housing run-up. Two couples, three businesses, and all personally guaranteed. We thought we were an overnight success, but little did we know that the housing market was about to take a drastic turn.
In 2008, I joined a Vistage CEO group, where I was tasked with presenting to the group on my approach to designing buildings for individuals. I saw an opportunity to analyze the patterns that produced good projects for happy clients, and I teamed up with a contractor buddy to work on a joint presentation. Our efforts yielded ten principles that produced the highest ROI beyond providing a primary place to live.
These principles were the foundation of our approach to architecture, and they were based on our experiences working with individuals on their custom house projects. We focused on listening to our clients, designing buildings that stood out while fitting in, creating lifetime homes, and making projects sustainable and viable.
As I reflect on our journey, I realize that the principles we developed were an interesting reflection of what was happening to our clients in the housing market of that time and how we as architects help our clients get through the process. Over time, we had to adapt and evolve to respond to changing conditions.
In 2010, we made changes to respond to a client environment where projects happened without banks. Clients spent paper on their projects, and construction loans were not available. What the subsequent buyers wanted when the house was sold was off the table. Remember being thankful our clients had cash to spend on projects in our survival predicament.
In hindsight, our clients are probably grateful as well for being able to convert paper into a hard asset. The principles evolved slowly until the COVID came in 2020. I was ready to hunker down and go to business survival mode like back in the crash, converting staff to contractors again and only paying for billable work.
But "your" government made PPP rain from the sky on our small business with employees. In addition, clients working from home who needed change or from their vacation property added gasoline to the fire. By 2022, inflation raged, described as transitory, to change the build cost from 1.2 million to a new price of 2.2 million for the new Intown infill homes. That is 83% inflation over 2 years, no matter what the CPI said.
The principles pivoted to respond: going fast to respond to inflation, managing the stuff to deal with supply chain problems, providing a viability budget before starting work to help clients understand the cost, and guiding our clients through the choppy waters of inflation.
We added a new principle about stewardship, which has become a cornerstone of our approach. We want to become architects for life for our completed projects and owners. We want to maintain relationships, observe results, and be trusted advisors as our projects age and clients' needs evolve.
Today, we are proud to say that our principles have evolved into 10 guiding principles that organize our approach to producing architecture asset architecture for the individual. We leverage the team of clients, contractors, vendors, and our time through our principle based process to produce architecture worthy of being an asset for our clients and families.
These 10 principles are:
- Listen: Analyze and understand our client's goals, constraints, and opportunities to communicate our vision of what is possible.
- Establish Viability: Before starting our project process, we will engage our client in a pre-project viability phase to diagnose and prescribe our solutions with a timeline and budget for client approval.
- Be a Design Sherpa: Our process is the most important value we provide. Following our process milestones will lead new and experienced clients through the 1000’s of design decisions to evolve in the correct order at the proper time.
- Design in Context: We believe context is the caldron of good architecture fits into its location both from the outside and inside out. Designing in context allows a building to stand out while fitting into the adjacent network of spaces around it.
- Architecture is a team sport: We believe in custom teams for custom projects, collaborating with partners who care about our clients and believe in our process as much as we do.
- Design for the individual: We do our most fulfilling work with clients who will live in or operate architecture explicitly created for their needs.
- Investment iteration: We break down the design process into decision milestones, providing increasingly detailed pricing for initial ideas, building shell, and interior selections to empower clients to make informed decisions about the value they're willing to exchange for their desired architecture.
- Create Asset Architecture: Design and execute projects that hold long-term value and provide a return on investment beyond the currency used build the project.
- Be present: Designing and building stuff is an atypical and infrequent activity for our client. Help our clients enjoy the journey and results that could be life-changing (in a good way).
- Stewardship—We want to Become architects for life for our completed projects and owners. We want to maintain relationships, observe results, and be trusted advisors as our projects age and clients' needs evolve.
We're an architect tribe that has refined our principles to design buildings that truly matter for the people that use them. Aspire to create hard asset architecture worth exchanging for the hardest money there is.
HODL on.
-
@ 599f67f7:21fb3ea9
2024-10-26 11:22:06Zer da Cashu?
Cashu Bitcoin-erako ecash protokolo ireki bat da, transakzio azkarrak eta komisio gabekoak eskaintzen dituena, pribatutasun ia perfektuarekin. Xehetasun gehiago nahi izanez gero, gure azalpena ikus dezakezu.
eNuts
eNuts Cashu-rako mugikorretarako zorro bikaina da, Android eta iOS (TestFlight) plataformetan eskuragarri dagoena. Mint anitzekin lan egitea ahalbidetzen du eta nostr bidez bidalketak egiteko aukera ere eskaintzen du.
⚠️ eNuts eta Cashu oraindik beta fasean daude. Funtsak galtzeko arriskua dago. Aplikazioa instalatzerakoan arriskuen inguruan irakurri. Galera ekonomikoei aurre egiteko gai zaren zenbateko txikiekin saiatu.
Probatu
Prozesu honetan zehar mint-ekin elkarreragin, ecash-a jaso eta bidali, segurtasun-kopiak egin, Lightning-era ateratzeak eta mint-en artean trukaketak egingo ditugu. Azkenik, nostr kontaktu funtzionalitatea probatuko dugu.
Instalatu
Sartu eNuts webgunera eta instalatu aplikazioa zure sistema eragilerako.
Mint bat gehitzea
Ecash-arekin elkarreragiteko, lehenik mint bat behar duzu. Mint honetan zure ecash token-ak sortzen eta itzultzen dira. Mint-a da zure Bitcoin-en zaindaria, baina ez daki nor zaren, norekin egiten duzun transakzioa, ezta zenbat diru duzun ere. Probetarako Txoko mint erabili dezakezu.
- Joan Txoko Mint-era. Kopiatu mint URL-a.
- eNuts-en, joan Aukerak > Mint kudeaketa eta sakatu + botoia. Itsatsi lehen urratsean kopiatu duzun mint URL-a.
💡 Mint gehigarriak ere gehitu ditzakezu. Mint publiko batzuk MintIndex-en aurki daitezke. Kontuan izan mint batzuek zenbateko jakin bat gordetzen dutela bideratze-gastuak ordaintzeko, eta, beraz, ezin dituzula zure sats guztiak atera.
Tokenak sortzea
Mint bat gehitu duzunean, eNuts-ek automatikoki galdetuko dizu mint horretatik Cashu token berriak sortu nahi dituzun.
- Erantzun Bai.
- Sortu faktura bat mintu nahi duzun zenbatekoarentzat. Zenbateko txiki batekin saiatu, adibidez, 100 sats.
- Ordaindu faktura Lightning zorro batetik. Faktura ordaindutakoan, ecash token-ak izango dituzu.
Prozesu honek aukera ematen dizu ecash token-ak sortzeko, eta horiek zure transakzioetarako erabiltzeko prest izango dituzu.
Ecash-ekin transakzioak egitea
Ecash-ekin transakzioak egitea, funtsean, datu multzoak bidaltzea eta jasotzea da. Funtzionalitate hauek zuk zeuk probatzeko, bidali eta jaso dezakezu zure buruari.
- Ecash bidaltzeko, sakatu Bidali > Ecash bidali.
- Mint bat baino gehiago erabiltzen baduzu, aukeratu bidali nahi duzun mint-a. Ondoren, aukeratu Kopiatu eta partekatu.
- Aukeratu zenbatekoa.
- Nahi izanez gero, gehitu ohar bat, eta sakatu Jarraitu.
- Berretsi ordainketa xehetasunak eta sortu token-a. Une honetan, coin selection funtzioa erabil dezakezu zein token erabili nahi dituzun hautatzeko.
Ohartu token-ak 1 sat, 2 sats, 4 sats, 8 sats, 16 sats eta antzeko zenbatekotan sailkatuta daudela. Horiek 10 euroko, 20 euroko edo 50 euroko billeteak bezala irudika ditzakezu. - Kopiatu token-a.
Une honetan, token-a beste norbaiti bidal diezaiokezu edo zure zorroan berreskuratu. Saiakera moduan, bigarren aukera hau egingo dugu.
- Ecash jasotzeko, sakatu Jaso > Itsatsi eta berreskuratu Ecash. eNuts-ek automatikoki irakurriko du zure arbeletik eta token-a berreskuratuko du.
💡 Zure transakzioen historian ecash token-a zain dagoen egiaztatu dezakezu, eta hartzaileak ez badu berreskuratu, itzuli dezakezu. Horretarako, sakatu zure historiako irteerako transakzioan eta aukeratu Egiaztatu token-a gastatu den. Token-a zain badago, Itzuli token-a sakatu dezakezu eta berriro zure zorroan izango duzu.
Multimint trukeak
Mint desberdinen artean bidalketak eta jasotzeak posibleak diren galdetu baduzu, erantzuna bai da, neurri batean. Hala ere, Cashu token-ak zuzenean mint batetik bestera bidaltzea ez da zuzenean egiten; horren ordez, transakzioak Lightning-era bideratzen dira, mint bat Lightning nodo bat ere badelako. Cashu token-ak ez dira bateragarriak nodo desberdinen artean.
Hau probatzeko, beste mint bat gehitu dezakezu oraindik egin ez baduzu, adibidez, cashme LNbits mint edo eNuts mint lehenetsia.
💡 Kontuan izan mint batzuek sats kopuru bat gordetzen dutela bideratze-gastuak ordaintzeko. Arazo hau konpontzeko, zure mint propioa sor dezakezu Bitcoin Txoko LNbits zorroarekin, Cashu luzapena aktibatuz.- Joan Aukerak > Mint kudeaketa atalera, eta aukeratu trukatu nahi duzun mint-a. Ondoren, joan Multimint trukeak atalean.
- Aukeratu trukatu nahi duzun mint-a.
- Aukeratu zenbatekoa eta sakatu Kuotak aurreikusi Lightning gastuen kalkulua egiteko.
- Sakatu Jarraitu.
- Egiaztatu xehetasunak, eta nahi izanez gero, coin selection funtzioa erabili. Ondoren, sakatu Orain trukatu.
Prozesu honetan, bidaltzen ari den mint-ak Lightning faktura bat ordaintzen du jasotzen ari den mint-aren bidez. Faktura osatu bezain laster, trukatuta dagoen token-a zure zorroaren saldoan agertu beharko litzateke jasotzen ari den mint-ean.
Ateratzea
Zure Cashu sats-ak berriro Lightning sats bihurtu nahi dituzunean, ateratzeko aukera duzu. Prozesua hauxe da:
- Sakatu Bidali > Lightning faktura ordaindu.
- Mint bat baino gehiago erabiltzen baduzu, aukeratu bidaliko duzun mint-a.
- LN faktura edo LNURL atalean, sartu faktura bat, LNURL edo Lightning helbide bat; edo, besterik gabe, QR kode bat eskaneatu.
- Aukeratu zenbatekoa eta sakatu Kuotak aurreikusi.
- Egiaztatu xehetasunak, eta dena zuzen dagoela ikusi ondoren, sakatu Ateratzea.
Prozesu hau amaitutakoan, mint-ak Cashu token-ak trukatzen ditu eta Lightning faktura ordaintzen du.
Segurtasun kopiak
Cashu token-ak babesteko prozesua, agian, ezberdina izango da Bitcoin eta Lightning zorroak babesteko ohiko prozesuekin alderatuta. Diru-funtsak datu blokeekin irudikatzen direnez, Cashu token-ak babesten dituzunean datu bloke horiek bakarrik babesten ari zara. Honek esan nahi du segurtasun-kopiak baliogabetzen direla transakzio berri bat egiten duzun bakoitzean.
eNuts aplikazioak Cashu token bat sortzen du zure funts guztiekin, eta token horiek zein mint-ekoak diren jasotzen du.
- Segurtasun-kopia bat sortzeko, joan Aukerak > Segurtasuna > Sortu babeskopia token. Kopiatu token-a eta gorde toki seguru batean.
Bestela, mint bakoitza banaka babestu dezakezu: - Horretarako, joan Aukerak > Mint kudeaketa atalera eta aukeratu babestu nahi duzun mint-a. Ondoren, sakatu Funtseak babestu, kopiatu token-a eta gorde toki seguru batean.
Berreskuratzea
Berreskuratzeko, kopiatu babeskopia token-a eta ireki eNuts aplikazioa. Aplikazioak automatikoki irakurriko du zure arbelean dagoena eta galdetuko dizu token-a berreskuratu nahi duzun.
Nostr
eNuts aplikazioak Nostr integrazioa eskaintzen du, horrela zure kontaktu zerrendara ecash bidali ahal izateko. Funtzio hau erabiltzeko, honako pauso hauek jarraitu behar dituzu:
- Joan Kontaktuak atalera eta itsatsi zure Nostr gako publikoa.
- eNuts-ek zure kontaktu zerrenda eskuratuko du relays-etatik. Tamalez, bilaketa funtzioa oraindik ez dago eskuragarri, eta horrek kontaktu zuzena aurkitzea zaildu dezake, kontaktu asko izanez gero.
Hartzaileak Nostr motako 4 mezu zuzena jasoko du, Cashu token-arekin. Hartzaileak mezu hau bere zorroan berreskuratu eta token-a erabili ahal izango du.
Ondorioa
Gida hau lagungarria iruditu zaizu? Saiatu Cashu token batzuk bidaltzen Nostr bidez!
-
@ e97aaffa:2ebd765d
2024-10-26 10:10:21Não é possível determinar o número exato de quantos bitcoins terá o Satoshi, já foram efectuados diversos estudos, apesar de discrepâncias nos resultados, estima-se entre os 900 mil a 1.1 milhões de moedas.
A Arkham identificou apenas 3 endereços (P2PKH) pertencentes ao Satoshi, não esquecendo que no início não existiam endereços, os bitcoins eram enviados diretamente para a pubkey (chave pública, P2PK).
Este gráfico apenas contabiliza os bitcoins em endereços. Mesmo após o desaparecimento de Satoshi, a comunidade continua a enviar moedas para os seus endereços.
O endereço principal recebe regularmente moedas, têm mais de 38 mil transações, entre elas, destaca-se as seguintes:
Este ano, um anônimo doou quase 27btc, incrível.
O problema
A muito longo prazo, com o desenvolvimento tecnológico, os computadores vão ficar cada vez mais poderosos. Conforme os computadores vão evoluindo, o desenvolvimento da computação quântica, o bitcoin vai acompanhar essa evolução tecnológica, para se manter seguro. Os utilizadores terão que migrar de endereços mais antigos para endereços mais resilientes. É uma evolução natural.
O problema está nas moedas que estão em tecnologias/endereços mais antigos, sobretudo nos que têm a pubkey exposta, estes serão os primeiros alvos. Vai demorar muitos anos, mas um dia será possível ter acesso a esses UTXOs. O pagamento para P2PK foi utilizado entre 2009 e 2010, hoje em dia é quase inexistente.
Não é necessário entrar em pânico, os endereços SegWit são muito mais seguros e resilientes, porque oculta a pubkey. A pubkey só é revelada no momento em que efetua a primeira transação(enviar), assim para garantir uma melhor segurança é essencial não reutilizar endereços.
Só que existem 45370 UTXOs que não realizaram a migração para tecnologias mais seguras, isto representa mais de 1.7 milhões de Bitcoins, ou seja, 8.73% do supply.
Apenas uma minoria dessas moedas pertence a bitcoiners no “ativos”, a grande maioria pertence ao Satoshi e as pessoas que perderam as chaves. Apesar de tudo, esporadicamente algumas dessas moedas são movidas, este ano já foram 172 UTXOs, equivalente a 7707 BTC.
Além dos P2PK ainda existem os endereços que foram reutilizados, que tem a chave pública exposta, assim o número aumenta para 4 milhões de moedas, apesar de ser um número elevado, não é preocupante, porque parte destas moedas ainda tem donos ativos, quando for necessário, vão se mover para endereços mais seguros.
O dilema
«Moedas perdidas apenas fazem com que as moedas de todos os outros valham um pouco mais. Pense nisso como uma doação para todos.» – Satoshi
O problema é que essas moedas não estão perdidas para sempre, talvez daqui a 5 ou 20 anos, não sei, mas uma coisa é certa, um dia vão ser recuperadas e não serão pelos legítimos donos.
Assim, nos próximos anos a comunidade de bitcoiners terá um dilema para resolver, o que fazer com os Bitcoins do Satoshi/P2PK?
Existem duas possibilidades: não fazer nada e essas moedas voltam a circular ou então, mudar o código para bloquear as moedas para sempre.
Qualquer uma das soluções será algo extremamente polémica, certamente vai dividir a comunidade, vai ser uma discussão acirrada, dificilmente haverá um consenso, por isso é mais provável ficar tudo como está.
Vendo bem, o bitcoin vai passar por uma situação similar ao ouro, periodicamente são descobertas moedas de ouro, que foram escondidas durante décadas ou séculos pelos nossos antepassados. O ouro que estava “perdido”, volta à circulação.
Será uma nova corrida ao “ouro”, o resgate das moedas do Satoshi. Se esse resgate for lento e gradual, não terá grande impacto, mas se for num curto espaço de tempo será um enorme problema, são mais de 8% de supply que entram no mercado.
O preço poderá ser um problema, mas a meu ver, o grande problema é a busca em si, porque será mais lucrativo gastar energia na procura das moedas do Satoshi do que minerar novos bitcoins.
Será que a hashrate não cairá drasticamente? Colocando em causa a segurança da rede.
Esta é a minha principal dúvida e receio.
A minha opinião
Hoje eu penso que deveríamos optar por algo intermédio, nem com a proibição total, nem sem restrições. Apenas nos blocos com o número múltiplo de 144, ou seja, um bloco por dia, seria possível incluir transações P2PK. Além disso, o número de transações por bloco seria limitado: 1 UTXO maior que 10 btc ou vários UTXOs com uma soma inferior a 10 btcs.
Este limite de “espaço” é suficiente para os legítimos donos das moedas efetuarem as transações no período pré quântica. No período pós quântica, se a quebra da criptografia for muito rápida, o limite de bloco vai criar uma gargalo, vai obrigar o aumento drástico do fee, reduzindo o lucro do “ladrão”, além de financiar os mineradores.
Conclusão
A minha ideia é muito complexa, mas o bitcoin é um protocolo simples, a comunidade é muito conservadora, dificilmente aceitaria algo assim tão complexo. Por isso eu digo, só existem dois caminhos plausíveis, ou não fazer nada ou a proibição total dos P2PK.
Mas vamos ter muitos anos para pensar sobre o assunto.
-
@ 07e188a1:24d232f3
2024-10-26 09:16:44Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
A sub heading goes a long way
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
-
@ d625c21c:dfa2ef0f
2024-10-26 08:26:23Join the best SSC coaching for top-notch faculty, comprehensive materials, and proven success. Start your journey today! Securing a position in the Staff Selection Commission (SSC) exams requires dedicated preparation, strategic guidance, and comprehensive resources. Our coaching center offers the best SSC coaching with high-quality, free study materials to streamline your journey towards success.
SSC Coaching Overview SSC exams cover multiple levels, including CGL (Combined Graduate Level), CHSL (Combined Higher Secondary Level), CPO (Central Police Organization), and JE (Junior Engineer). Each level tests different skills, but all require strong analytical abilities, time management, and a grasp of essential concepts. Scholars Academy SSC coaching program focuses on: Conceptual Clarity: Breaking down complex topics for an in-depth understanding. Practice-Centric Approach: Emphasis on solving a variety of questions to tackle different exam scenarios. Customized Plans: Adaptive study plans tailored to your strengths and weaknesses.
Why Choose SSC Coaching? Expert Guidance: Learning from experienced professionals with years of SSC coaching expertise helps streamline preparation. Time Efficiency: Structured coaching saves time, allowing candidates to cover the syllabus thoroughly and systematically. Updated Content: Our free study materials are regularly updated, following the latest SSC exam patterns and question trends. Motivational Environment: Being part of a focused, competitive setting helps maintain discipline and motivation.
The benefits of Scholars Academy SSC Coaching with free study material are as follows: Cost Efficiency: Free study material reduces the financial burden, providing students with access to top resources without additional costs. Comprehensive Coverage: From previous year question papers and e-books to mock tests, our free material includes everything essential for SSC preparation. Flexibility and Accessibility: Materials are provided in digital formats, allowing students to study anytime, anywhere. Focused Practice: Our free materials include topic-wise exercises and full-length tests to reinforce concepts and improve time management. Performance Analytics: With self-evaluation features, students can track their progress, identify areas for improvement, and receive targeted feedback.
Success Stories and Testimonials Over the years, many of our students have achieved top ranks in SSC exams, showcasing the effectiveness of our coaching methodology and materials. Here’s what some of them have to say: Anita Sharma (SSC CGL Topper): “The structured coaching, combined with regular tests and free materials, helped me focus on key areas and strengthen my weaknesses. The faculty’s insights were invaluable in my journey.” Rohit Mehta (SSC CHSL Qualifier): “The study materials were comprehensive, with questions modeled on actual exams. The coaching team’s support made a big difference in boosting my confidence.” Megha Verma (SSC JE Selection): “Getting quality materials for free and continuous guidance from experienced mentors was instrumental in my success.”
Our Coaching Methodology Personalized Learning Plans: We create individualized study schedules, focusing on each student’s specific needs and exam goals. Intensive Practice Sessions: Our program includes regular mock tests, speed drills, and concept quizzes to build both speed and accuracy. Doubt Clearing Sessions: Dedicated sessions with mentors allow students to resolve doubts, clarify complex topics, and strengthen their conceptual understanding. Real-Time Feedback: Each student receives actionable feedback on their performance, focusing on areas for improvement and boosting overall confidence. Motivational Support: We foster a positive, motivating environment to keep students engaged and confident throughout their preparation journey.
Enroll Today By joining our SSC coaching program, you’re not only investing in expert guidance but also gaining access to a wealth of resources, including free study materials, that bring you closer to your SSC aspirations. Free Study Material for SSC Exams Our SSC coaching center offers a range of free study materials designed to equip students with essential tools for effective preparation. From foundational concepts to advanced practice, we cover everything needed to excel in SSC exams.
Comprehensive Study Material for SSC Exams We provide detailed, well-organized study materials covering all SSC exam sections, including Quantitative Aptitude, Reasoning Ability, English Language, and General Awareness. Each module is crafted to ensure in-depth learning and thorough practice: Concept Notes: Detailed explanations of fundamental concepts and problem-solving techniques. Topic-Wise Exercises: Practice questions for each topic, allowing students to focus on individual sections. Revision Guides: Concise notes summarizing key concepts and formulas for quick revisions.
Free SSC Study Material Download Students can access and download our SSC study materials at no cost. These downloadable resources include: PDF Notes: Covers all topics comprehensively with examples and practice questions. Formula Sheets: Essential for quick reference, especially useful in Quantitative Aptitude. E-Books: Covering General Awareness and English, these books provide an extensive base of knowledge. How to Download: Visit our website, sign up for a free account, and access the downloadable materials instantly.
Practice Tests and Mock Exams Our practice tests and mock exams are designed to simulate real SSC exams, providing students with essential test-taking experience: Topic-Based Tests: Focus on specific areas, ideal for targeted practice. Full-Length Mock Exams: Simulate the actual SSC exam experience, helping students gauge their readiness and time management skills. Instant Feedback: After each test, students receive a detailed performance analysis with actionable insights.
Previous Year Question Papers Accessing and practicing with previous years' question papers is crucial for SSC preparation. We offer a collection of past papers, enabling students to understand the question patterns and difficulty levels: Detailed Solutions: Each question is accompanied by a step-by-step solution. Topic Distribution Analysis: Learn which topics frequently appear, allowing for focused study. Time-Based Practice: Helps students build speed and accuracy under exam conditions.
Study Material FAQs 1. What materials are included in the free downloads? We provide PDF notes, topic-specific exercises, formula sheets, mock tests, and previous year question papers. 2. Are the materials updated to match the latest SSC exam pattern? Yes, all materials are regularly updated to reflect the latest SSC exam trends and patterns. 3. Can I access the study material offline? Once downloaded, all materials can be accessed offline, allowing you to study anytime. 4. Do I need to pay for additional study resources? Our free materials cover all major topics required for SSC exams. However, for advanced guidance, premium resources are available. 5. Are there solutions provided for practice questions and mock tests? Yes, all practice questions and mock tests come with detailed solutions for effective learning. SSC Exam Preparation Guide Preparing for SSC exams demands dedication, structured study plans, and access to quality resources. Here’s a comprehensive guide to our offerings for SSC CGL, CHSL, and MTS exams, covering everything from coaching and study materials to syllabus details and preparation tips.
SSC CGL (Combined Graduate Level) Coaching Our SSC CGL coaching is designed to help students excel in one of the most competitive government exams. We offer: In-Depth Coverage of All Topics: From Quantitative Aptitude to General Awareness, every topic is thoroughly covered. Experienced Faculty: Trainers with a proven track record in SSC exams provide guidance and mentorship. Doubt Clearing Sessions: Personalized sessions to address individual queries and doubts.
SSC CGL Syllabus and Exam Pattern The SSC CGL exam consists of multiple tiers, each with a specific syllabus: Tier I: General Intelligence & Reasoning, General Awareness, Quantitative Aptitude, English Comprehension. Tier II: Quantitative Abilities, English Language & Comprehension, Statistics, and General Studies (Finance and Economics). Tier III: Descriptive Paper (Essay/Letter Writing). Tier IV: Computer Proficiency Test/Skill Test. Exam Pattern: Each section has multiple-choice questions with negative marking in Tiers I and II.
SSC CGL Free Study Material To aid students in preparation, we offer free downloadable materials: Notes and eBooks: Covers each section with explanations and examples. Formula Sheets and Tips: Key formulas and shortcuts for Quantitative Aptitude. Previous Year Papers: Solved papers for familiarity with exam patterns.
SSC CGL Preparation Tips Understand the Exam Pattern: Familiarize yourself with the tier system and focus on scoring sections. Time Management: Allocate specific hours daily for each subject to ensure balanced preparation. Daily Practice: Attempt questions regularly to build speed and accuracy. Revision: Revisit important concepts and formulas frequently.
SSC CGL Practice Tests Our mock tests include: Full-Length Mock Tests: Real exam simulation to assess your preparedness. Sectional Tests: Focus on specific sections for targeted practice. Performance Analysis: Get detailed feedback on your performance.
SSC CHSL (Combined Higher Secondary Level) Coaching Our SSC CHSL coaching program is structured to help students aiming for higher secondary level positions: Special Focus on Core Areas: Reasoning, Quantitative Aptitude, English, and General Awareness. Conceptual Learning: Breaking down complex concepts for easy understanding. Regular Mock Tests: To help students practice under timed conditions.
SSC CHSL Syllabus and Exam Pattern Tier I: General Intelligence, Quantitative Aptitude, English Language, General Awareness. Tier II: Descriptive Paper (Essay and Letter Writing). Tier III: Skill Test/Typing Test. Exam Pattern: Tier I is objective type, while Tier II is descriptive. There is negative marking in Tier I.
SSC CHSL Free Study Material We provide free resources including: PDF Study Notes: Detailed notes covering all important topics. Solved Previous Year Papers: Provides insight into commonly asked questions. Mock Papers: Realistic practice papers with varying difficulty levels.
SSC CHSL Preparation Tips Focus on Basics: Strengthen foundational knowledge in all subjects. Practice Writing: Essential for the descriptive section in Tier II. Review Past Papers: Familiarize yourself with the question types and difficulty. Stay Updated: For General Awareness, read current affairs regularly.
SSC CHSL Practice Tests Our practice tests help students gain confidence and improve time management: Sectional and Full-Length Tests: Practice in both focused and exam-like settings. Instant Feedback: Detailed analysis of each test for targeted improvement.
SSC MTS (Multi-Tasking Staff) Coaching SSC MTS coaching is designed for candidates aiming for Group C positions. Our coaching covers all essentials for this entry-level exam: Focused Coaching: Covering all required topics in Quantitative Aptitude, Reasoning, and General Awareness. Basic to Advanced Training: Sessions tailored for beginners as well as advanced learners. Mock Tests: Practice in an exam-like environment.
SSC MTS Syllabus and Exam Pattern Paper I: General Intelligence, English Language, Numerical Aptitude, General Awareness. Paper II: Descriptive Test (Essay/Letter Writing). Exam Pattern: Paper I is objective with negative marking, and Paper II is descriptive to assess writing skills.
SSC MTS Free Study Material Our free study materials include: Topic-Wise Notes: Clear explanations with practice questions. Previous Year Question Papers: Helps understand the exam pattern. Study Guides: Focus on key concepts and frequently asked questions.
SSC MTS Preparation Tips Regular Revision: Particularly for Numerical Aptitude and General Awareness. Practice Writing: Essential for the descriptive paper. Mock Tests: Practice regularly to improve speed and accuracy.
SSC MTS Practice Tests To ensure readiness, we offer: Timed Mock Tests: To simulate real exam conditions. Sectional Practice: For focused improvement in weaker areas. Performance Insights: Detailed feedback after each test. Courses Offered Our SSC coaching center provides various courses tailored to meet the unique needs of SSC aspirants. From classroom and online coaching to personalized programs, we offer a range of options with comprehensive study resources for effective SSC preparation.
-
SSC Classroom Coaching Our classroom coaching program is ideal for students who thrive in a traditional, interactive learning environment. It includes: In-Person Lectures: Delivered by expert faculty with years of experience in SSC coaching. Daily Practice and Doubt Sessions: Regular practice sessions and personalized doubt-clearing. Mock Tests and Performance Tracking: Assess your progress with regular tests and track your improvement.
-
SSC Online Coaching Our online coaching program offers flexibility for students who prefer remote learning or have time constraints: Live Online Classes: Real-time, interactive classes covering the entire syllabus. Recorded Lectures: Access recorded sessions for self-paced study and revision. 24/7 Doubt Resolution: Online discussion boards and chat support for resolving doubts.
-
Personalized Coaching Programs Our personalized coaching programs are tailored to the individual strengths and needs of each student, focusing on: Customized Study Plans: Adaptive schedules based on your strengths and areas for improvement. One-on-One Sessions: Individual mentoring sessions for focused attention. Goal Setting and Tracking: Personalized targets and regular progress reviews.
-
Study Resources Our coaching includes a variety of study resources designed for comprehensive SSC preparation, accessible across platforms.
Online Video Lectures Topic-Wise Video Lectures: Covering each subject thoroughly. Concept-Focused Videos: Explaining complex concepts in an easy-to-understand manner. Downloadable Content: Download videos for offline access and revision.
Important SSC Exam Topics and Guides Exam Guides: Complete topic breakdowns for SSC exams, focusing on high-scoring areas. Tips and Strategies: Subject-specific strategies to tackle each section efficiently. Frequently Asked Questions: Insights into commonly asked questions across all SSC exam tiers.
SSC Exam Preparation Apps and Tools We recommend and provide access to apps and tools to assist with SSC preparation: Daily Practice Apps: Mobile-friendly apps offering quizzes and daily practice questions. Performance Analytics Tools: Track your performance, identify weak areas, and customize your study plan. SSC Prep Games: Engaging apps with educational games and flashcards for easy learning.
Downloadable E-Books for SSC Exams Access a library of downloadable e-books covering key SSC topics: Quantitative Aptitude and Reasoning: Books with solved examples, formulas, and practice questions. General Awareness and English Language: Comprehensive guides with theory, practice, and revision notes. Mock Test Collections: E-books with mock tests and detailed solutions for exam practice.
Blog Our blog keeps students updated with the latest insights and tips for SSC exam preparation. SSC Exam Updates and News: Stay informed about exam dates, syllabus changes, and other key updates. SSC Exam Preparation Tips: Practical tips from experts to help students maximize their potential. Time Management for SSC Exams: Guides on managing time effectively for each section. Common Mistakes to Avoid in SSC Exams: Learn about common pitfalls and how to avoid them.
-
-
@ 2df170ea:90d2b157
2024-10-26 06:43:03If you're experiencing the issue of Orbi not connected to the internet, start by accessing the Orbi Login page through your web browser. Once logged in, check the status of your internet connection and ensure all cables are securely connected. Look for any error notices on the dashboard. If the problem persists, reset your Orbi router and modem. Additionally, check for firmware upgrades in the settings. Following these instructions will help you restore your internet connection fast and efficiently.
-
@ a012dc82:6458a70d
2024-10-26 02:54:27Table Of Content
-
Understanding MicroStrategy's Bitcoin Holdings
-
A Strategic Hedge Against Inflation
-
Embracing Digital Transformation
-
Maximizing Long-Term Returns
-
Enhancing Shareholder Value
-
Creating Synergies with Business Operations
-
Leveraging Bitcoin's Network Effect
-
Conclusion
-
FAQ
In the world of finance, few moves have been as bold and controversial as MicroStrategy's decision to invest heavily in Bitcoin. As uncertainty looms over traditional investment avenues, this technology-focused company has chosen to embrace the decentralized digital currency. With a commitment of billions of dollars, MicroStrategy's Bitcoin holdings have attracted attention from investors, analysts, and enthusiasts alike. This article delves into the motivations and implications of MicroStrategy's Bitcoin holdings, examining the potential risks and rewards in these uncertain times.
Bitcoin Holdings
Understanding MicroStrategy's Bitcoin Holdings To comprehend the significance of MicroStrategy's Bitcoin holdings, it is crucial to grasp their approach and strategy. Here are the key aspects to consider:
A Strategic Hedge Against Inflation
In an era of economic uncertainty, many investors seek alternative assets to protect against inflation. Bitcoin's limited supply and decentralized nature make it an appealing option for wealth preservation.
MicroStrategy recognized the potential value of Bitcoin as a hedge against inflation and made a bold move by investing a substantial portion of its treasury reserves in the cryptocurrency.
Embracing Digital Transformation
MicroStrategy, a renowned technology-focused company, believes in the power of digital transformation. By incorporating Bitcoin into its treasury strategy, the company demonstrates its confidence in the future of digital currencies and the underlying blockchain technology.
This move positions MicroStrategy as a pioneer in the corporate adoption of Bitcoin, potentially encouraging other companies to explore similar avenues.
Maximizing Long-Term Returns
MicroStrategy's CEO, Michael Saylor, has been a vocal advocate for Bitcoin, emphasizing its potential as a long-term investment. By converting a significant portion of their reserves into Bitcoin, the company aims to maximize returns over time, capitalizing on the cryptocurrency's potential growth.
Enhancing Shareholder Value
MicroStrategy's decision to invest in Bitcoin is not only driven by financial considerations but also by a commitment to enhancing shareholder value. By diversifying their assets and potentially generating substantial returns, the company aims to provide long-term benefits to its shareholders.
Creating Synergies with Business Operations
MicroStrategy's business revolves around data analytics and intelligence. By investing in Bitcoin, the company can leverage its expertise to analyze blockchain data and gain insights into market trends, potentially opening up new business opportunities and revenue streams.
Leveraging Bitcoin's Network Effect
Bitcoin's status as the largest and most recognized cryptocurrency grants it a significant network effect. MicroStrategy's investment in Bitcoin allows them to participate in this thriving ecosystem, potentially reaping benefits from increased adoption and acceptance.
Conclusion
MicroStrategy's Bitcoin holdings represent a bold move in uncertain times. By embracing Bitcoin as a strategic asset, the company positions itself at the forefront of the digital currency revolution. While risks accompany this venture, the potential rewards could reshape the corporate investment landscape. MicroStrategy's decision sets a precedent for other companies to explore the merits of Bitcoin and highlights the growing importance of cryptocurrencies in the financial world.
FAQ
Why did MicroStrategy choose Bitcoin over other cryptocurrencies? MicroStrategy's decision to focus on Bitcoin stems from its established market presence, robust infrastructure, and reputation as a store of value. Additionally, Bitcoin's limited supply and extensive adoption make it a favorable choice for long-term investment.
How does MicroStrategy's Bitcoin investment impact its financial position? MicroStrategy's investment in Bitcoin adds a new dimension to its financial position. While it introduces volatility due to Bitcoin's price fluctuations, the potential upside can significantly impact the company's overall balance sheet and shareholder value.
What are the risks associated with MicroStrategy's Bitcoin holdings? Investing in Bitcoin involves inherent risks, such as market volatility, regulatory uncertainty, and potential security breaches. MicroStrategy's substantial exposure to Bitcoin amplifies these risks, making the company vulnerable to significant losses in the event of a market downturn.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 4ba8e86d:89d32de4
2024-10-26 02:51:21Inicialmente criado como uma evolução do projeto CopperheadOS, o GrapheneOS é uma versão modificada do Android que concentra seus esforços na proteção da privacidade e segurança dos usuários. Foi iniciado por Daniel Micay, também conhecido como thestinger, após um desentendimento com os cofundadores do CopperheadOS em 2018. O foco principal do GrapheneOS é fornecer um sistema operacional móvel altamente seguro e com ênfase na privacidade para dispositivos Google Pixel.
Uma das principais características do GrapheneOS é sua rápida atualização de segurança, juntamente com recursos avançados de privacidade. O sistema operacional adota tecnologias que mitigam diferentes tipos de vulnerabilidades, dificultando a exploração das principais fontes de risco. Ele também aprimora a segurança dos aplicativos em execução no sistema operacional, reforçando a sandbox do aplicativo e outros limites de segurança.
O GrapheneOS se esforça para garantir que os recursos de privacidade e segurança não afetem negativamente a experiência do usuário. Idealmente, esses recursos são projetados para estar sempre ativados, sem adicionar complexidade adicional ou opções de configuração que possam sobrecarregar o usuário. No entanto, em certos casos, são adicionados interruptores para recursos como permissões de rede, permissões de sensores e restrições quando o dispositivo está bloqueado (por exemplo, periféricos USB, câmera, ladrilhos rápidos).
O GrapheneOS tem ganhado popularidade como uma escolha confiável para usuários que valorizam a privacidade e a segurança em seus dispositivos móveis. É reconhecido como uma das opções mais seguras e privadas disponíveis para o sistema Android.
Recomenda-se a compra dos seguintes dispositivos para usar o GrapheneOS devido à sua melhor segurança e garantia mínima de 5 anos para atualizações completas de segurança:
- Pixel 7a
- Pixel 7 Pro
- Pixel 7
- Pixel 6a
- Pixel 6 Pro
- Pixel 6
Os dispositivos mais recentes possuem uma garantia mínima de 5 anos, mas o suporte real pode ser ainda maior. O Pixel 7 e o Pixel 7 Pro apresentam melhorias em relação aos modelos anteriores, como GPU e rádio celular aprimorados, além de uma atualização incremental da CPU. O Pixel 7a oferece um bom custo-benefício com recursos semelhantes ao Pixel 7, exceto pelo carregamento sem fio lento e proteção contra poeira/água mais fraca.
O Pixel 6, Pixel 6 Pro e Pixel 6a ainda podem ser uma opção válida se encontrados a um preço atrativo, pois possuem de 3,5 a 4 anos de garantia mínima de suporte restante.
Dispositivo
Google Pixel 7a , maio de 2028 , 5 anos.
Google Pixel 7 Pro , outubro de 2027 , 5 anos.
Google Pixel 7 , outubro de 2027 , 5 anos.
Google Pixel 6a, julho de 2027 ,5 anos.
Google Pixel 6 Pro , outubro de 2026 ,5 anos.
Google Pixel 6 ,outubro de 2026 ,5 anos.
Google Pixel 5a , agosto de 2024 ,3 anos.
Google Pixel 5 , outubro de 2023 , 3 anos.
Google Pixel 4a 5G , novembro de 2023 ,3 anos.
Google Pixel 4a, agosto de 2023 ,3 anos.
Google Pixel 4 , Outubro 2022 , 3 anos.
Google Pixel 4 XL ,Outubro 2022 ,3 anos.
No que diz respeito à segurança e privacidade, o GrapheneOS utiliza uma versão aprimorada da criptografia de disco baseada no sistema de arquivos do Android OpenSource Project. Os dispositivos suportados possuem suporte substancial baseado em hardware para aumentar a segurança da criptografia. A autenticidade e integridade das partições de firmware e do sistema operacional são verificadas em cada inicialização. O GrapheneOS implementa criptografia de disco completo por meio de criptografia baseada em sistema de arquivos, garantindo que todos os dados, nomes de arquivos e metadados sejam armazenados criptografados.
O sistema utiliza chaves de criptografia de disco geradas aleatoriamente e armazenadas criptografadas. Dados confidenciais são armazenados em perfis de usuário com suas próprias chaves de criptografia. O GrapheneOS permite o suporte para encerrar sessões de perfil de usuário secundário após o login, o que limpa totalmente as chaves de criptografia e coloca os perfis em repouso. Além disso, o GrapheneOS suporta o uso de armazenamento de chaves de hardware e implementações de criptografia em aplicativos para adicionar camadas adicionais de proteção. Detalhes adicionais sobre essas funcionalidades estão além do escopo desta resposta.
Um dos Recurso GrapheneOS tem é Duress PIN! Que você pode definir um PIN especial de “coação” para que, em vez de desbloquear o telefone, ele limpe imediatamente as chaves de criptografia no elemento seguro, tornando os dados de armazenamento irrecuperáveis. vídeo - Tuxsudo🐧 https://video.nostr.build/ec077345a2109811ef83afc38c33f5ee06aa687ec2bfdf8685ebc8af90293d48.mp4
Os aplicativos podem espionar a área de transferência em segundo plano ou injetar conteúdo nela? A partir do Android 10, apenas o teclado de entrada padrão configurado (o teclado de sua escolha) e o aplicativo atualmente em foco têm acesso à área de transferência. Aplicativos em segundo plano não podem acessar a área de transferência. Essa restrição é mais rigorosa do que simplesmente impedir que aplicativos em segundo plano a acessem, pois nem mesmo um aplicativo ou serviço em primeiro plano pode acessá-la, apenas o aplicativo em primeiro plano que está em foco no momento. Os gerenciadores de área de transferência precisam ser implementados pelo teclado definido como padrão pelo usuário. Anteriormente, o GrapheneOS restringia o acesso à área de transferência em segundo plano, mas essa abordagem foi substituída por uma restrição mais rigorosa implementada pelo Android 10. Assim, a funcionalidade de permitir que os gerenciadores de área de transferência estejam na lista de permissões não é mais necessária, pois os teclados devem implementar essa funcionalidade.
A partir do Android 12, o usuário recebe uma notificação quando um aplicativo lê o conteúdo da área de transferência definido por outro aplicativo. Essa notificação está ativada por padrão e pode ser alterada em Configurações -> Privacidade -> Mostrar acesso à área de transferência.
Os aplicativos podem monitorar conexões de rede ou estatísticas? Os aplicativos não podem monitorar conexões de rede, a menos que sejam realizadas por meio de um serviço de VPN ativo definido pelo usuário. Normalmente, os aplicativos não têm acesso às estatísticas de rede e não podem solicitar acesso direto a elas. No entanto, os usuários podem conceder explicitamente permissões de estatísticas de uso do aplicativo, que fornecem estatísticas específicas do aplicativo. Isso foi introduzido como parte das melhorias de privacidade do Android 10.
O GrapheneOS fornece um firewall? Sim, o GrapheneOS herda o firewall profundamente integrado do Android Open Source Project, que é usado para implementar partes do modelo de segurança e vários outros recursos. Historicamente, o projeto GrapheneOS fez várias melhorias no firewall, mas ao longo do tempo a maioria dessas mudanças foi integrada à versão principal do sistema operacional ou se tornaram irrelevantes.
O GrapheneOS adiciona uma opção de permissão de rede voltada para o usuário, oferecendo uma maneira robusta de negar o acesso direto e indireto à rede para os aplicativos. Essa opção baseia-se na permissão padrão de INTERNET, que não é voltada para o usuário, mas já é amplamente adotada pelo ecossistema de aplicativos. Ao revogar a permissão de INTERNET, o acesso indireto por meio de componentes do sistema operacional e aplicativos que exigem a permissão de INTERNET, como o DownloadManager, é negado. O acesso direto é bloqueado, impedindo o acesso a soquetes de rede de baixo nível.
O GrapheneOS incluirá suporte para serviços do Google? Assim como o Android Open Source Project, o GrapheneOS não inclui aplicativos e serviços do Google. Eles nunca serão empacotados com o sistema operacional. No entanto, o GrapheneOS possui uma camada de compatibilidade para os Serviços do Google Play, que permite que os aplicativos que dependem desses serviços sejam instalados e executados em um ambiente sandbox sem privilégios.
Essa camada de compatibilidade garante que os aplicativos do Google Play possam funcionar, mas sem comprometer a segurança e a privacidade do sistema operacional.
O GrapheneOS é um sistema operacional móvel baseado no Android Open Source Project que prioriza a segurança e a privacidade dos usuários. Ele oferece atualizações rápidas de segurança, recursos avançados de privacidade e um firewall integrado para proteger os dispositivos. O sistema operacional é projetado para garantir que recursos de segurança e privacidade não afetem negativamente a experiência do usuário. O GrapheneOS não inclui aplicativos e serviços do Google, É uma escolha confiável para aqueles que valorizam a privacidade e a segurança em seus dispositivos móveis.
Este é o instalador baseado em WebUSB para GrapheneOS e é a abordagem recomendada para a maioria dos usuários. https://grapheneos.org/install/web
O guia de instalação da linha de comando é a abordagem mais tradicional para instalar o GrapheneOS.
https://grapheneos.org/install/cli
https://grapheneos.org/
https://github.com/GrapheneOS
Pixel tem chip Titan M2 que leva o pixel outro nivel de segurança. https://www.androidauthority.com/titan-m2-google-3261547/
-
@ bec0c9d3:c4e9cd29
2024-10-26 01:55:04The Bitcoin Culture Festival is just around the corner, and we're excited to present our artists with physical artworks at the Cyphermunk House. In addition, we will be showcasing these pieces on our 2140 Auction Portal.
The "Culture of Code" gallery will be held at:
CypherMunk House 9 John Street Bloomsbury, London, UK WC1N 2ES
Before the festival, you can read our latest article about this one-of-a-kind house here on Yakihonne.
Online auctions will be available on 2140.wtf starting from October 29th to November 2nd 2024.
During the Bitcoin Culture Festival ART Gallery, you will have the opportunity to see the works of many talented Bitcoin artists. The sale will take place through our auction.
ART Gallery opening hours:
October 29 - Private viewing: 6:30 pm - 8:30 pm October 30 - November 2 - 10:00 am - 5:00 pm November 1 and 2 - 5:00 pm - 10:00 pm during NostrLDN and ART Panels
Entry to the gallery is FREE
This event is only possible due to the passion and dedication of our crew, partners , and sponsors . All made by People for the People. Cypherpunk vibe, pure from the bottom. We look forward to seeing you there!
Follow us also on all socials NOSTREE.me - NOSTR LinkTree INSTAGRAM TWETTER - X YOUTUBE
LINKS
OUR PARNERS / SPONSORS
STAY TUNED !!
2140 Crew
Hashtags:
ArtGallery
ArtPanel
2140wtf
2140army
CyhermunkHouse
art
artstr
nostrart
craft
culture
music
bitcoin
nostr
TootingMarket
NostrLDN
NostrLondon
yakihonne
-
@ 1e286f5c:cc2c5009
2024-10-25 21:23:22Running a test, publishing a note in Obsidian to Nostr with 2 photos attached to ensure all works as planned.
Photo 1: L.A.B + Spirulina
Photo 2: A peek into the scope
D.
-
@ 4e4fc3e3:e935140a
2024-10-25 20:29:27This is a test using frost bunker from Highlighter 🤞
chances of working = \~0.1
-
@ 09fbf8f3:fa3d60f0
2024-10-25 18:43:59在线直播:
央视体育版CCTV5:
央视体育版CCTV16 :
翡翠台:
-
@ 185e9a1b:f608e37b
2024-10-25 18:31:05 -
@ 3cd2ea88:bafdaceb
2024-10-25 18:30:47Metti in staking i tuoi SOL facilmente e approfitta di molteplici vantaggi :
1️⃣ Ricevi BGSOL : La versione tokenizzata dei tuoi SOL in staking. 2️⃣ Guadagna rendimenti sostanziali : Ottieni fino al 30.15% APR stimato e sblocca guadagni di liquidità con BGSOL. 3️⃣ Sblocca SOL con flessibilità : Nessun periodo di blocco! Puoi convertire BGSOL in SOL in qualsiasi momento.
💡Cos'è BGSOL? BGSOL è una soluzione di liquidity staking sviluppata da Bitget. Ti permette di mantenere la liquidità dei tuoi asset mentre guadagni con lo staking e partecipi ad altre attività DeFi. Approfitta ora!
🔗 Unisciti alla community BGSOL su Telegram 👉 https://t.me/BitgetBGSOL 🔗 Partecipa alla promo qui 👉 https://www.bitget.com/it/events/bitget-sol-staking?utmTerm=KOC
-
@ 8f2fe968:0fbf4901
2024-10-25 17:34:06 -
@ 4ba8e86d:89d32de4
2024-10-25 15:26:47Ele foi criado por Mark Harman e lançado sob a licença GNU General Public License (GPL), o que significa que qualquer pessoa pode acessar, modificar e distribuir o código-fonte do aplicativo.
Recursos e Funcionalidades: O Open Camera oferece uma ampla gama de recursos e funcionalidades que permitem aos usuários aproveitar ao máximo suas câmeras em dispositivos Android. Alguns dos recursos notáveis incluem:
-
Controles Manuais: O aplicativo permite ajustar manualmente as configurações da câmera, como exposição, foco, balanço de branco, ISO e muito mais. Isso oferece maior flexibilidade e controle sobre a qualidade e o estilo das fotos tiradas.
-
Suporte a Formatos de Arquivo Avançados: O Open Camera suporta uma variedade de formatos de arquivo, incluindo RAW, que é uma opção preferida por fotógrafos profissionais devido à maior quantidade de informações capturadas e à flexibilidade durante a pós-produção.
-
Modo de Gravação de Vídeo Avançado: Além da fotografia, o Open Camera também oferece recursos avançados de gravação de vídeo, como gravação em câmera lenta, gravação de lapso de tempo e suporte a taxas de quadros personalizadas.
-
Marcação de Geolocalização: O aplicativo permite que os usuários adicione informações de localização às fotos tiradas, o que pode ser útil para organizar e recordar onde cada imagem foi capturada.
-
Interface Personalizável: O Open Camera oferece opções para personalizar a interface do usuário de acordo com as preferências individuais, incluindo a escolha de cores e layouts.
O código-fonte aberto permite que os usuários examinem e verifiquem como o aplicativo funciona. Isso aumenta a transparência e a confiança na segurança e privacidade dos dados. Os desenvolvedores podem modificar o aplicativo para atender às suas necessidades específicas ou adicionar novos recursos. Isso cria um ecossistema de desenvolvimento vibrante e incentiva a inovação. O Open Camera possui uma comunidade ativa de desenvolvedores e usuários que contribuem com melhorias, correções de bugs e compartilham conhecimentos. Isso garante que o aplicativo seja continuamente atualizado e aprimorado.
O Open Camera é uma opção poderosa e personalizável para aqueles que desejam aproveitar ao máximo a câmera de seus dispositivos Android. Com recursos avançados e a flexibilidade proporcionada pelo código aberto, o aplicativo oferece uma experiência fotográfica aprimorada para entusiastas e profissionais da fotografia. Se você está procurando um aplicativo de câmera versátil e repleto de recursos, o Open Camera é definitivamente uma escolha que vale a pena considerar.
https://sourceforge.net/p/opencamera/code/ci/master/tree/
https://opencamera.org.uk/
https://f-droid.org/packages/net.sourceforge.opencamera/
-
-
@ 4ba8e86d:89d32de4
2024-10-25 15:20:13Imagine um mundo onde 99 pessoas estão verificando a ação de uma única pessoa para garantir a integridade das transações. Isso é exatamente o que o sidechain bitVM propõe. Aqui está uma explicação detalhada do processo:
- Prova e Verificação:
- Uma pessoa atua como uma comprovadora, enquanto 99 pessoas são verificadoras.
- Antes de depositar na sidechain, a comprovadora faz um contrato com os verificadores. Ela coloca 100 BTC como garantia.
-
Se um verificador alegar que alguém fez uma solicitação de saque válida na sidechain, a comprovadora deve provar que processou essa solicitação em X blocos. Caso contrário, qualquer verificador pode penalizá-la, resultando na perda da garantia.
-
Mecanismo de Penalidade e Rotação:
- Se a comprovadora for penalizada, o próximo verificador na fila assume como a nova comprovadora.
- Cada verificador também tem 100 BTC como garantia.
-
A nova comprovadora (ex-verificadora) deve provar que processou a solicitação de saque dentro de X blocos ou será penalizada.
-
Segurança em Camadas:
- A garantia impede comportamentos inadequados, garantindo que todos os participantes tenham algo em jogo.
-
O modelo de pegada dupla oferece camadas adicionais de segurança. Qualquer tentativa de fraude pode ser detectada e punida.
-
Contratos Laterais e Confiança Mínima:
- Um usuário pode fazer um "contrato lateral" com qualquer verificador. Se uma solicitação de saque válida for apresentada, o verificador deve provar o processamento dentro de X blocos.
-
Não é necessário confiar apenas em uma pessoa; se a comprovadora falhar, ela pode ser penalizada.
-
Prova de Ocorrência em Sidechain:
- O bitVM requer a capacidade de "provar" que algo aconteceu em uma sidechain.
-
Um cliente leve SPV no bitVM, compreendendo as regras de consenso da sidechain, é essencial.
-
Depósito e Saque:
- Para depositar, a comprovadora fornece garantia e prova que processará futuras solicitações de saque.
-
Ao sacar, o bitVM valida a solicitação. Se a comprovadora não processar, ela é penalizada, e o usuário recebe 100 BTC de um verificador.
-
Garantia como Parâmetro Variável:
- Tanto comprovadoras quanto verificadoras devem postar garantias.
- A quantidade de garantia é um parâmetro variável; mais garantia significa uma sidechain mais segura.
O sidechain bitVM propõe uma abordagem descentralizada e segura, onde a confiança é distribuída e a segurança é reforçada por penalidades significativas. Este modelo inovador tem o potencial de oferecer eficiência e confiança aprimoradas nas transações de sidechain.
Ótima explicação sobre bitVM. Supertest , Robin .
https://open.spotify.com/episode/6rcOVwcxkzcZRXnVcwKlTq?si=s5E31_HWQEqOoRbzoAzpZQ
-
@ b83e6f82:73c27758
2024-10-25 14:19:14Citrine 0.5.4
- Fix notification icon size
- Fix loading screen
- Update dependencies
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v0.5.4.txt
andmanifest-v0.5.4.txt.sig
are in the current directory) with:bash gpg --verify manifest-v0.5.4.txt.sig manifest-v0.5.4.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v0.5.4.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ 4ba8e86d:89d32de4
2024-10-25 13:17:33Foi criado com o objetivo de fornecer aos usuários uma experiência de navegação mais privada e segura na internet. O LibreWolf é uma excelente alternativa ao Firefox, com algumas diferenças significativas em relação ao navegador da Mozilla.
O LibreWolf foi desenvolvido com foco na privacidade e segurança do usuário. Ele bloqueia rastreadores de terceiros, impede o envio de dados de telemetria e desabilita recursos de rastreamento de usuário que vêm ativados por padrão no Firefox. Além disso, ele vem pré-configurado com diversas extensões de privacidade, como uBlock Origin, Privacy Badger e HTTPS Everywhere, que ajudam a bloquear anúncios, scripts maliciosos e outras ameaças de segurança enquanto você navega na web.
Outra característica notável do LibreWolf é que ele usa o mecanismo de pesquisa Searx como padrão, em vez do Google. O Searx é conhecido por fornecer resultados de pesquisa mais privados e anônimos, sem rastrear as suas atividades online. O LibreWolf também possui suporte nativo ao Tor, que permite aos usuários acessar a internet anonimamente.
Além dos recursos de privacidade e segurança, o LibreWolf é muito semelhante ao Firefox em termos de usabilidade e funcionalidades. Ele é fácil de instalar e configurar, e possui um grande número de extensões disponíveis na sua loja de extensões.
O LibreWolf é uma excelente opção para usuários que buscam um navegador mais privado e seguro. Se você se preocupa com a sua privacidade online, vale a pena experimentar o LibreWolf. Ele é gratuito e de código aberto, o que significa que você pode baixá-lo e personalizá-lo de acordo com suas necessidades específicas.
https://librewolf.net/
https://github.com/librewolf-community
-
@ 6bae33c8:607272e8
2024-10-25 12:50:49I went 4-1 last week which brings my two-week run to 8-2, though it’s not enough to salvage Q2 because I was 2-3 in Week 5. Even if I go 5-0 this week, that’s only 15-5, and that won’t cut it to get a share of the prize. But I’d like to keep it going if only to confirm that after a slow start I’m finally getting in sync.
My Picks
Lions -11.5 vs Titans — I rarely take double-digit favorites, but 11.5 seems low to me. In a normal year this would be 14 in Detroit.
Browns +8.5 vs Ravens — This is a big line on the road, and the Browns have to feel good putting the Deshaun Watson fiasco behind them. (Almost like a relaxing massage.) Might also be a look-ahead game after quality wins for the Ravens.
Jets -7 at Patriots — This line is too big, and Drake Maye might turn out to be a player. But this feels like a get-well spot for the Jets after some tough losses.
Bengals -2.5 vs Eagles — The Eagles are a good sell high off a big win against a weak Giants team. The Bengals are slow starters, but they’re starting to get going.
Raiders +8.5 vs Chiefs — This line is up to 9.5 in places, I knew that, but took the Raiders anyway. Just seems like a divisional game where the beaten-down dog shows up.
-
@ 4ba8e86d:89d32de4
2024-10-25 12:45:38A privacidade é uma preocupação crescente para muitos usuários da internet, especialmente quando se trata de pesquisar na web. É aqui que entra o Searx, um buscador de código aberto que se destaca por seu compromisso com a privacidade do usuário.
Searx é um mecanismo de metabusca descentralizado na forma de software livre, sob a licença GNU AGPLv3, desenvolvido pelo programador Húngaro, Adam Tauber, que agrega resultados por volta de 70 serviços de busca. O mecanismo não salva consultas de pesquisa e não repassa ou mesmo vende dados privados a terceiros. Os usuários não são rastreados e além disso, pode ser usado na rede Tor para o anonimato online.
O Searx foi criado em 2011 como um projeto de código aberto, o que significa que seu código-fonte está disponível para todos os usuários e desenvolvedores examinarem e contribuírem para seu desenvolvimento. Como um buscador de código aberto, o Searx não coleta ou armazena dados pessoais de seus usuários, o que o diferencia de grandes buscadores como o Google.
Uma das principais vantagens do Searx é sua capacidade de preservar a privacidade do usuário. Ele não rastreia suas pesquisas e não compartilha dados com terceiros. Ao contrário do Google e outros buscadores que exibem anúncios personalizados com base no histórico de navegação do usuário, o Searx não exibe anúncios.
O Searx é altamente personalizável, o que significa que os usuários podem escolher quais fontes de dados usar para suas pesquisas. O Searx é capaz de buscar resultados em mais de 70 fontes de dados, incluindo Google, Bing, Yahoo, Wikipedia, Reddit, entre outros. Os usuários podem personalizar suas pesquisas para excluir determinadas fontes ou incluir outras, conforme necessário.
Outra vantagem do Searx é a capacidade de utilizar motores de busca especializados. O Searx pode ser configurado para buscar em motores de busca especializados em áreas específicas, como tecnologia, ciência, artes, entre outros. Isso significa que os usuários podem encontrar resultados mais precisos e relevantes para suas pesquisas.
O Searx oferece uma experiência de busca semelhante à do Google, com uma barra de pesquisa simples e fácil de usar. No entanto, ele se destaca pela sua capacidade de preservar a privacidade do usuário e oferecer resultados personalizados e precisos. Como um projeto de código aberto, o Searx está em constante desenvolvimento e melhoria, e os usuários podem contribuir para seu desenvolvimento, sugerindo melhorias e correções.
O Searx é uma excelente opção para aqueles que se preocupam com a privacidade e segurança de seus dados pessoais na internet. Como um buscador de código aberto, ele se destaca por sua transparência e compromisso com a privacidade do usuário, além de oferecer uma experiência de busca personalizada e altamente personalizável. Se você valoriza a privacidade online, experimente o Searx.
https://searx.thegpm.org/
https://github.com/searx/searx
-
@ 6bae33c8:607272e8
2024-10-25 12:14:12I had the Rams in my picking pool and Sam Darnold in the Steak League which worked out fine, but the Vikings defense got me just two points for one of my good NFFC teams, so that did not.
-
Sam Darnold can make all the throws, and he moves decently in the pocket. It just seems like he’s missing a “read” gene, and that limits his upside and makes him more likely to be a backup than a long-term answer.
-
Justin Jefferson had like six catches in the first quarter, but finished with only eight. The Rams adjusted well defensively in the second half.
-
Kyren Williams scored again, this time as a receiver. One of the elite fantasy players over the last two years and passes the eye test every time.
-
Puka Nacua dropped his first target, then caught seven out the next eight. He looks all the way back. Cooper Kupp also looked healthy and is unlikely to be traded now that the Rams are back in the thick of it in their divison.
-
I loved seeing Demarcus Robinson catch two TDs because no one used him.
-
Matthew Stafford played a great game, even with the pick. He evaded the rush and threw aggresively down the field against a good defense. With his top receivers back he’ll be startable even in one-QB leagues.
-
-
@ 4ba8e86d:89d32de4
2024-10-25 12:12:40Projetado para atender tanto a usuários iniciantes quanto avançados, o K-9 Mail apresenta uma ampla gama de recursos e funcionalidades.
Desenvolvido inicialmente por Jesse Vincent em 2008, o K-9 Mail foi concebido como uma opção de código aberto para superar as limitações do aplicativo de e-mail padrão do Android. O nome "K-9" é uma referência ao robô cão da série de televisão "Doctor Who". Desde então, o projeto tem crescido com a colaboração de uma comunidade de desenvolvedores ativos.
O K-9 Mail integra-se aos protocolos de e-mail IMAP e POP3, permitindo aos usuários configurar suas contas de e-mail e sincronizar mensagens diretamente no aplicativo. Além disso, o K-9 Mail oferece suporte a recursos avançados de segurança, como criptografia de e-mail por meio de métodos como S/MIME e OpenPGP, garantindo a proteção das comunicações por e-mail.
O aplicativo K-9 Mail oferece recursos diversos para aprimorar a experiência de e-mail no Android. Entre eles, destacam-se: - Suporte a múltiplas contas de e-mail: Os usuários podem configurar e gerenciar várias contas de e-mail em um único aplicativo. - Criptografia e segurança: O K-9 Mail suporta métodos de criptografia, como S/MIME e OpenPGP, para garantir a segurança das mensagens de e-mail. - Personalização: O aplicativo disponibiliza opções de personalização para ajustar as preferências do usuário, incluindo notificações, sincronização e aparência. - Pesquisa avançada: O K-9 Mail oferece recursos poderosos de pesquisa para facilitar a localização rápida de e-mails específicos. - Gerenciamento de pastas: Os usuários podem organizar suas mensagens em pastas personalizadas, simplificando a localização e organização das mensagens.
O K-9 Mail é uma opção confiável de cliente de e-mail de código aberto para dispositivos Android, oferecendo recursos avançados de gerenciamento, segurança e personalização. Sua comunidade ativa de desenvolvedores continua aprimorando e atualizando o aplicativo, garantindo uma experiência de e-mail eficiente e adaptada às necessidades dos usuários.
https://k9mail.app/
https://github.com/k9mail/k9mail.app
-
@ 4ba8e86d:89d32de4
2024-10-25 11:40:05A loja Aurora vem com um excelente design, interface de usuário amigável para iniciantes e muitos recursos.
A loja Aurora foi originalmente baseada na loja Yalp de Sergei Yeriomin, mas a versão 3.0 passou do zero para a conclusão seguindo o Material Design reescrito para rodar em todos os dispositivos Android 5.0.
Dentre as diversas características oferecidas pela Aurora Store, destacam-se:
- Login Anônimo: Para garantir sua privacidade, você pode fazer login anonimamente, assegurando que suas atividades permaneçam confidenciais.
- Login do Google: Além do anonimato, a opção de login do Google permite acessar aplicativos pagos e instalar versões beta.
- Falsificação de Dispositivo: Caso um aplicativo não esteja disponível para o seu dispositivo, você pode recorrer à funcionalidade de falsificação de dispositivo, permitindo a instalação.
- Filtragem de Aplicativos F-Droid: A possibilidade de filtrar aplicativos do F-Droid evita que eles apareçam em sua lista de atualizações.
- Aplicativos na Lista Negra: Ao adicionar aplicativos à lista negra, você mantém o Google no escuro quanto aos aplicativos instalados.
A loja de aplicativos se apresenta com um design clássico, apresentando uma capa de apps e jogos em destaque, proporcionando um visual convidativo. A aba de aplicativos instalados permite uma gestão mais eficiente, possibilitando atualizações automáticas para a versão mais recente disponível.
A busca por aplicativos é facilitada por categorias que abrangem diversos interesses, como fotografia, música e áudio, compras, personalização, livros e quadrinhos, entre outras. A eficaz função de busca permite localizar aplicativos específicos de maneira rápida e fácil.
A Aurora Store se diferencia pela tecnologia de pesquisa única, agilizando a descoberta de aplicativos em questão de segundos. Além disso, a loja vem com a licença GPLv3, reforçando seu compromisso com o software livre.
Privacidade é um foco central da Aurora Store, sendo considerada uma excelente alternativa para quem preza por manter suas informações pessoais protegidas. O aplicativo suporta contas pessoais e permite downloads com contas anônimas, assegurando que suas atividades não estejam vinculadas a você.
Com a integração do Exodus, a Aurora Store verifica rastreadores presentes nos códigos dos aplicativos, proporcionando uma visão mais transparente das informações coletadas.
O aplicativo se destaca por ser livre de anúncios e pop-ups, proporcionando uma experiência de uso mais limpa. O suporte ao modo escuro oferece conforto visual em ambientes com pouca luz ou durante a noite.
A Aurora Store é uma alternativa valiosa à Google Play Store, oferecendo um ambiente mais privado, recursos robustos e um design elegante que visa aprimorar a experiência do usuário em busca e gerenciamento de aplicativos.
https://github.com/whyorean/AuroraStore
https://f-droid.org/packages/com.aurora.store/
https://gitlab.com/AuroraOSS/AuroraStore/-/releases
-
@ 4ba8e86d:89d32de4
2024-10-25 11:19:28Uma carteira Samourai em um dispositivo Android com airgap em combinação com o Sentinel é suficiente. Sua seed nunca chega à internet, você cria transações offline com o Sentinel, assinar com sua carteira Samourai offline e as transmite com o Sentinel.
Esse guia foi baseado na postagem da Samourai Wallet , Basicamente vamos seguir o que está escrito abaixo.
https://nostrcheck.me/media/public/nostrcheck.me_9551356128214364941706187762.webp
Vamos Precisa de dois aplicativos pra verificação do aplicativo samourai Wallet.
OpenKeychain HashEasily
Primeiramente baixe a carteira samourai Wallet no Site oficial : https://samouraiwallet.com/download
-Importar a chave pública PGP do desenvolvedor.
-Verifique se a impressão digital hash foi assinada pela chave PGP do desenvolvedor.
-Execute o hash sha256 no arquivo baixado.
-Compare visualmente as duas impressões digitais hash.
-antes de instalação da Samourai wallet desligue rede , Wi-Fi, Bluetooth é coloque em modo avião.
-Instale a Samourai Wallet.
Vídeo com a explicação pra fazer a verificação da carteira Samourai wallet em 1:40 e bem curto vídeo.
https://link.storjshare.io/raw/juf373xj3cmu2ezvjn3lcdm2jygq/production/7beed1e67a931522ad7d5bcba61f764fff154f64eb847f856611d75542b33fbb.MP4
Você Pode baixar e verificar no celular online e passa pro celular offline via cabo OTG ou Bluetooth.
https://nostrcheck.me/media/public/nostrcheck.me_6506239047168614881706190998.webp - Por padrão, a MAINNET está habilitada. Toque em "Ok".
https://nostrcheck.me/media/public/nostrcheck.me_4665959278675525031706191125.webp
-
Começar e avance nas configurações.
-
Vai aparecer esse mensagem pra escolher o local pra guarda o arquivo criptografado com sua passphase e PIN escolha um local ou criar uma pasta nova. No caso não vamos salva , se for utilizar o celular com hardwallet salve o backup.
https://nostrcheck.me/media/public/nostrcheck.me_3282756078392669321706191370.webp
https://nostrcheck.me/media/public/nostrcheck.me_1775948496649077751706191388.webp
Toque em "criar uma nova"
Atenção agora vamos pro próximo passo muito IMPORTANTE e que demanda muita atenção e cuidado. Você vai criar uma passphase pra sua carteira , é padrão tem que ter a passphase.
Atenção! A passphase deve ser algo fácil de lembrar, mas que ao mesmo tempo , não seja tão óbvio.
Use sua imaginação , guarde na sua mente a passphase, não vai no óbvio. Igual a passphase que usei " testesamourai "
https://nostrcheck.me/media/public/nostrcheck.me_3673278837059709561706195580.webp
Toque em “ próximo ”
Agora próximo passo é Definir o Código PIN. PIN pode ter de 5 a 8 números. Novamente escolha um PIN fácil de lembrar mas não tão óbvio.
https://nostrcheck.me/media/public/nostrcheck.me_7682063920335318611706195737.webp
Após escolher o PIN digitar duas vezes vai pra próxima tela só toque em Avança. https://nostrcheck.me/media/public/nostrcheck.me_2169630565955263891706195863.webp
Atenção agora vamos pro próximo passo muito IMPORTANTE e que demanda muita atenção e cuidado. O aplicativo te impede de tira print da tela. Pra você não deixa essa informação importante exporta em nenhum local , não guarde online essa informação.
ESCREVA AS 12 PALAVRAS NO PAPEL.
escreva com calma é atenção de uma forma legível de preferência letra de Forma , Após escreve todas as palavras revise se escreveu corretamente.Você pode escrever em vários papéis pra guarda locais diferentes.
Se voce perde essa palavras , você numca mais terá acesso aos Seus Bitcoin guarde bem as palavras..
https://nostrcheck.me/media/public/nostrcheck.me_6115428046070793411706220149.webp
Apos anotar as palavras no papel só dá toque em “ avança”
Vai aparece a sua passphrase pra você certificar que é exatamente o que você digitou verifique e guarde bem na sua mente de preferencia. https://nostrcheck.me/media/public/nostrcheck.me_9156075966432894981706220507.webp
Ter um toque em “ SKIP” e pronto carteira feita totalmente off-line. https://nostrcheck.me/media/public/nostrcheck.me_5297928365552180711706220777.webp
Depois pra testa se anotou corretamente as Seed pode apagar a carteira e testa backup Seed novamente.
Lado esquerdo superior toque no símbolo do robô depois em "configurações" https://nostrcheck.me/media/public/nostrcheck.me_6061690846490213311706222509.webp
Toque na opção “carteira” https://nostrcheck.me/media/public/nostrcheck.me_9171400908043570781706222485.webp
Na última opção "apagar a carteira de forma segura" https://nostrcheck.me/media/public/nostrcheck.me_1243247222498822271706222578.webp https://nostrcheck.me/media/public/nostrcheck.me_2087393619387830581706222599.webp https://nostrcheck.me/media/public/nostrcheck.me_8707025408907536041706222610.webp
Pronto foi apagado só fazer o procedimento de recuperação da Seed.
Toque na Opção " Restore uma carteira existente"
https://nostrcheck.me/media/public/nostrcheck.me_4898356114912667061706223121.webp
Toque na opção de recuperação da sua carteira de bitcoin com seed e passphase.
https://nostrcheck.me/media/public/nostrcheck.me_6380354635899069741706223161.webp
Após fazer a verificação que deu certo o backup da Seed ,Agora vamos pro próximo passo.
https://nostrcheck.me/media/public/nostrcheck.me_7307761562752931011706223812.webp Prepare-se para configurar sua carteira Sentinel, uma aplicação móvel exclusivamente voltada para visualização que permite monitorar saldos e transações em suas carteiras Bitcoin. Essa carteira é projetada de forma a nunca ter acesso às suas chaves privadas, assegurando a proteção dos seus fundos.
O Sentinel é capaz de rastrear diversos tipos de endereços Bitcoin e chaves públicas estendidas. Além disso, oferece funcionalidades como a criação de PSBTs (transações de bitcoin parcialmente assinadas), permitindo que sejam assinadas offline pela sua carteira Samourai ou carteira de hardware.
Ao utilizar o Sentinel, você pode gerar facilmente endereços de recebimento de bitcoin a partir de qualquer uma das suas chaves públicas rastreadas. Além disso, o aplicativo oferece integração nativa com o Tor, proporcionando roteamento seguro no Sentinel.
Para começar, faça o download da carteira Sentinel no site oficial: https://samouraiwallet.com/download
Realize a mesma verificação feita na primeira etapa com a Samourai Wallet.
Em seguida, toque na opção "Configuração".
https://nostrcheck.me/media/public/nostrcheck.me_8214493108314323431706231322.webp
Toque na opção "configuração"
https://nostrcheck.me/media/public/nostrcheck.me_6272143319509445531706231344.webp
Toque na opção "exibir SegWit ZPUB" Quando você quiser adicionar endereços de sua carteira Samourai ao Sentinel, basta inserir a chave pública estendida (geralmente zpub para endereços SegWit bech32 nativos).
https://nostrcheck.me/media/public/nostrcheck.me_9303936705478476931706231362.webp
Com esse código ou qrcode só basta baixa a carteira de visualização da Samourai a Sentinel e pronto adicionar Zpub pra visualização do saldo. Pronto agora é só apagar a carteira samourai Wallet e desinstalar o app ou ficar com a carteira samourai airgap você cria transações offline com o Sentinel, assinar com sua carteira Samourai offline e as transmite com o Sentinel. Parabéns, você acabou de economizar mais de R$500 em uma "carteira de hardware" para a qual você precisa anotar as 12 palavras de qualquer maneira. Este guia é especialmente dedicado aos iniciantes que estão no início de sua jornada no universo do Bitcoin, buscando opções acessíveis para começar. Ao seguir os passos abaixo, mesmo com recursos limitados, é possível criar uma carteira segura e iniciar sua trajetória no mundo do Bitcoin.
https://medium.com/@alexemidio/samourai-wallet-um-carteira-de-bitcoin-pra-ruas-3003ebb79e57
https://blog.ronindojo.io/discover-version-5-0-0-of-sentinel/
-
-
@ 4ba8e86d:89d32de4
2024-10-25 11:06:58Ele se concentra em fornecer uma experiência de usuário aprimorada, mantendo a liberdade e o controle do usuário sobre seu dispositivo.
O projeto LineageOS foi iniciado em 2016, quando o desenvolvimento do CyanogenMod, uma ROM personalizada popular, foi interrompido. Uma comunidade dedicada de desenvolvedores e entusiastas do Android se uniu para criar o LineageOS como uma continuação do CyanogenMod.
Uma das principais características do LineageOS é a capacidade de personalizar e ajustar o sistema operacional de acordo com as preferências do usuário. Ele oferece uma ampla gama de opções de personalização, permitindo que os usuários alterem a aparência, o comportamento e os recursos do sistema de acordo com suas necessidades.
Além da personalização, o LineageOS também se concentra na segurança e privacidade dos usuários. Ele fornece atualizações regulares de segurança para corrigir vulnerabilidades e proteger os dispositivos contra ameaças. Além disso, o LineageOS oferece controle granular sobre as permissões de aplicativos, permitindo que os usuários decidam quais permissões um aplicativo pode acessar.
O LineageOS também é conhecido por estender o ciclo de vida de dispositivos mais antigos, fornecendo suporte para modelos mais antigos que não recebem mais atualizações oficiais do fabricante. Isso permite que os usuários continuem usando seus dispositivos com um sistema operacional atualizado e seguro.
O projeto LineageOS é impulsionado pela comunidade e mantido por uma equipe de desenvolvedores voluntários. A comunidade é ativa e colaborativa, fornecendo suporte, solução de problemas e contribuições para melhorar o sistema operacional.
O LineageOS oferece aos usuários de dispositivos Android uma opção alternativa, personalizável e segura em relação ao sistema operacional padrão. Com sua ênfase na personalização, segurança e suporte a dispositivos mais antigos, o LineageOS atrai uma base de usuários dedicada que valoriza a liberdade e o controle sobre seus dispositivos.
Obtenha o LineageOS agora! LineageOS, uma distribuição Android de código aberto, está disponível para vários dispositivos, com mais sendo continuamente adicionados graças à maior e crescente comunidade de código aberto Android. Junte-se a nós e dê nova vida ao seu dispositivo, seja ele antigo ou novo.
https://wiki.lineageos.org/devices/
Lista disponivel
Google Pixel Samsung Xiaomi Motorola LG ASUS Lenovo OnePlus Sony Nokia ZUK Banana Pi BQ Dynalink Essential F(x)tec Fairphone HardKernel LeEco 10.or Nextbit Nothing Nubia NVIDIA Radxa Razer SHIFT
Xiaomi: - Xiaomi 11 Lite 5G NE (AKAXiaomi 11 Lite NE 5GMi 11 LE) - Mi 10T (AKAMi 10T ProRedmi K30S Ultra) - Mi 10T Lite (AKAMi 10iRedmi Note 9 Pro 5G) - Mi 11 Lite 5G (renoir) - Mi 11 Pro (mars) - Mi 11i (AKARedmi K40 ProRedmi K40 Pro+Mi 11X Pro) - Mi 5 (gemini) - Mi 5s Plus (natrium) - Mi 6 (sagit) - Mi 8 (dipper) - Mi 8 Explorer Edition (ursa) - Mi 8 Pro (equuleus) - Mi 8 SE (xmsirius) - Mi 9 SE (grus) - Mi 9T (AKARedmi K20 (China)Redmi K20 (India)) - Mi A1 (tissot) - Mi CC 9 (AKAMi 9 Lite) - Mi CC9 Meitu Edition (vela) - Mi MIX 2 (chiron) - Mi MIX 2S (polaris) - Poco F1 (beryllium) - POCO F2 Pro (AKARedmi K30 ProRedmi K30 Pro Zoom Edition) - POCO F3 (AKARedmi K40Mi 11X alioth) - POCO M2 Pro (AKARedmi Note 9SRedmi Note 9 Pro (Global)Redmi Note 9 Pro (India)Redmi Note 9 Pro MaxRedmi Note 10 Lite miatoll) - POCO X3 NFC (surya) - POCO X3 Pro (vayu) - Redmi 3S (AKARedmi 3XRedmi 4 (India)Redmi 4XRedmi Note 5A PrimeRedmi Y1 Prime Mi8937) - Redmi 4A (AKARedmi 5ARedmi Note 5A LiteRedmi Y1 Lite Mi8917) - Redmi 7 (AKARedmi Y3 onclite) - Redmi 7A (AKARedmi 8Redmi 8ARedmi 8A Dual Mi439)
- Redmi 9 (lancelot)
- Redmi Note 10 Pro (AKARedmi Note 10 Pro (India)Redmi Note 10 Pro Max (India) sweet)
- Redmi Note 10S (AKARedmi Note 10S NFCRedmi Note 10S Latin America rosemary)
- Redmi Note 7 Pro (violet)
- Redmi Note 8 (AKARedmi Note 8T ginkgo)
- Redmi Note 9 (merlinx)
LG: - G5 (International) (h850) - G5 (T-Mobile) (h830) - G5 (US Unlocked) (rs988) - G6 (EU Unlocked) (h870) - G6 (T-Mobile) (h872) - G6 (US Unlocked) (us997) - V20 (AT&T) (h910) - V20 (Global) (h990) - V20 (GSM Unlocked - DirtySanta) (us996d) - V20 (GSM Unlocked) (us996) - V20 (Sprint) (ls997) - V20 (T-Mobile) (h918) - V20 (Verizon) (vs995) - V30 (T-Mobile) (h932) - V30 (Unlocked) (joan)
Motorola: - edge (racer) - edge 20 (berlin) - edge 20 pro (pstar) - edge 2021 (berlna) - edge 30 (dubai) - edge s (AKAmoto g100 nio) - moto e5 plus (XT1924-1/2/4/5) (rhannah) - moto e5 plus (XT1924-3/9) (ahannah) - moto e5 plus (XT1924-6/7/8) (hannah) - moto g 5G (AKAmoto one 5G ace kiev) - moto g 5G plus (AKAmoto one 5G nairo) - moto g200 5G (AKAEdge S30 xpeng) - moto g32 (devon) - moto g42 (hawao) - moto g5 (cedric) - moto g52 (rhode) - moto g5s (montana) - moto g6 plus (evert) - moto g7 (river) - moto g7 play (channel) - moto g7 plus (lake) - moto g7 power (ocean) - moto x (2014) (victara) - moto x4 (payton) - moto z (griffin) - moto z play (addison) - moto z2 force (nash) - moto z2 play (albus) - moto z3 (messi) - moto z3 play (beckham) - one action (troika) - one fusion+ (liber) - one power (chef) - one vision (AKAp50 kane) - one zoom (parker)
Google: - ADT-3 (deadpool) - Nexus 6 (shamu) - Nexus 7 2013 (LTE, Repartitioned) (debx) - Nexus 7 2013 (Wi-Fi, Repartitioned) (flox) - Pixel (sailfish) - Pixel 2 (walleye) - Pixel 2 XL (taimen) - Pixel 3 (blueline) - Pixel 3 XL (crosshatch) - Pixel 3a (sargo) - Pixel 3a XL (bonito) - Pixel 4 (flame) - Pixel 4 XL (coral) - Pixel 4a (sunfish) - Pixel 4a 5G (bramble) - Pixel 5 (redfin) - Pixel 5a (barbet) - Pixel 6 (oriole) - Pixel 6 Pro (raven) - Pixel 6a (bluejay) - Pixel 7 (panther) - Pixel 7 Pro (cheetah) - Pixel 7a (lynx) - Pixel tablet - Pixel XL
Samsung: - Galaxy S4 (SCH-R970, SPH-L720) - jfltespr - Galaxy S4 (SGH-I337) - jflteatt - Galaxy S4 Active - jactivelte - Galaxy S4 Value Edition (GT-I9515/L) - jfvelte - Galaxy S5 Active (G870F) - klteactivexx - Galaxy S5 LTE (G9006V/8V) - kltechn - Galaxy S5 LTE (G900AZ/S902L) - klteaio - Galaxy S5 LTE (G900F/M/R4/R7/T/V/W8) - klte - Galaxy S5 LTE (G900I/P) - kltedv - Galaxy S5 LTE (G900K/L/S) - kltekor
- Galaxy S5 LTE (SC-04F/SCL23) - kltekdi
- Galaxy S5 LTE Duos (G9006W/8W) - kltechnduo
- Galaxy S5 LTE Duos (G900FD/MD) - klteduos
- Galaxy S9 - starlte
- Galaxy S9+ - star2lte
- Galaxy Tab A 8.0 (2019) - gtowifi
- Galaxy Tab S5e (LTE) - gts4lv
- Galaxy Tab S5e (Wi-Fi) - gts4lvwifi
- Galaxy Tab S6 Lite (LTE) - gta4xl
- Galaxy Tab S6 Lite (Wi-Fi) - gta4xlwifi
https://lineageos.org/
https://github.com/lineageos
-
@ 8f69ac99:4f92f5fd
2024-10-25 09:49:56O recente relatório do Banco Central Europeu, As Consequências Distribucionais do Bitcoin, recicla a velha narrativa de que o Bitcoin é um activo especulactivo que causa desigualdade de riqueza sem oferecer benefícios económicos tangíveis. Os autores, Ulrich Bindseil e Jürgen Schaaf, desfilam as críticas de sempre, afirmando que o Bitcoin falhou como sistema de pagamento global e que se transformou numa bolha, enriquecendo os primeiros utilizadores à custa da sociedade. Também lançam uma pitada de alarmismo ambiental e argumentam que o Bitcoin ameaça a democracia.
Como era de esperar, o BCE continua apegado às mesmas concepções erradas que já foram desmentidas inúmeras vezes. O que este relatório não percebe, de forma espectacular, é que o Bitcoin não é apenas mais um activo; é uma tábua de salvação para aqueles desiludidos com os sistemas fiduciários inflacionários e governos corruptos. Ao longo desta análise, vamos desmontar os argumentos do BCE, expondo não só o seu profundo desconhecimento sobre o Bitcoin, mas também a ignorância gritante em relação ao seu potencial de conceder soberania financeira a milhões de pessoas em todo o mundo. O BCE retrata o Bitcoin como uma ferramenta elitista, mas ignora como as suas próprias políticas têm sistematicamente enriquecido alguns poucos à custa da maioria. Vamos então entrar no assunto.
1. Deturpam o Papel do Bitcoin como Sistema de Pagamentos
"O Bitcoin nunca foi usado em grande escala para transacções legais no mundo real."
Que originalidade. Os autores descartam a utilidade de pagamento do Bitcoin com um gesto, mostrando que não compreendem a Lightning Network, que facilita transacções rápidas, baratas e escaláveis a nível global. Certamente, talvez os europeus ainda não estejam a comprar os seus cafés com Bitcoin, mas isso é irrelevante. O Bitcoin é uma tábua de salvação financeira em locais como El Salvador e em inúmeras outras regiões que sofrem com sistemas fiduciários em colapso.
Esta visão eurocêntrica, como se todo o mundo partilhasse das mesmas condições económicas, reflecte uma total falta de perspectiva. Os autores seleccionam dados a dedo para encaixar na sua narrativa anti-Bitcoin, enquanto convenientemente ignoram os milhões que utilizam o Bitcoin para escapar à hiperinflação e a regimes autoritários. A afirmação de que o Bitcoin não é usado para transacções "legais" é não só enganosa, como revela a sua ignorância sobre as necessidades reais de quem vive fora da sua bolha privilegiada.
2. Deturpam o Bitcoin como activo Especulactivo
"O Bitcoin não gera qualquer fluxo de caixa (como o imobiliário), juros (como as obrigações) ou dividendos (como as ações)."
Parabéns, BCE, acabaram de perder o ponto fulcral do Bitcoin. Esta afirmação mostra uma falta de entendimento fundamental do que torna o Bitcoin único. Ao contrário de imóveis ou obrigações, o Bitcoin é uma forma alternativa de dinheiro—não algum esquema de rendimento passivo.
O valor do Bitcoin não depende de gerar dividendos ou juros, mas advém da sua escassez, descentralização e resistência à censura. Ao reduzir o Bitcoin a modelos de activos tradicionais, o BCE ignora o paradigma económico revolucionário que este oferece: uma escapatória aos sistemas fiduciários inflacionários, particularmente para os milhares de milhões de pessoas presas em sistemas financeiros corruptos.
Ao tentar enquadrar o Bitcoin em modelos convencionais, os autores revelam a sua preguiça intelectual. A utilidade do Bitcoin reside no seu potencial como dinheiro sólido, e não como um veículo de investimento para especuladores atrás de rendimento.
3. Deturpam os Custos Ambientais e Sociais da Mineração
"A mineração de Bitcoin consome muita energia e causa danos ecológicos e sociais."
Ah sim, o argumento gasto sobre o consumo energético. Enquanto a mineração de Bitcoin realmente requer energia, os autores omitem convenientemente os enormes avanços que a indústria fez em direcção à sustentabilidade. Cada vez mais, os mineradores de Bitcoin recorrem a fontes de energia renovável e, em alguns casos, estão até a ajudar a financiar infraestruturas de energia verde.
A ironia aqui é que o BCE, uma instituição que fomenta políticas que inflam bolhas imobiliárias e de acções, de repente está preocupado com os custos sociais e ambientais. E mais, ignoram como a procura de energia barata por parte do Bitcoin incentiva realmente o desenvolvimento de soluções energéticas sustentáveis. Num mundo onde os sistemas fiduciários alimentam a ganância corporativa e a degradação ambiental, o Bitcoin está posicionado para impulsionar uma verdadeira inovação na energia verde.
4. Visão Deturpada da Redistribuição de Riqueza
"Os efeitos de riqueza do Bitcoin beneficiam os primeiros utilizadores à custa dos que chegam mais tarde e dos que não o possuem."
Isto é pura comédia. Aparentemente, o BCE acabou de descobrir que os primeiros investidores em qualquer activo beneficiam mais do que os que chegam depois. Não é assim que os mercados funcionam? Os primeiros investidores em acções, imóveis e ouro beneficiam de forma desproporcional—mas, curiosamente, isto só se torna um problema quando se trata de Bitcoin.
O que o BCE realmente teme é que o Bitcoin democratize a riqueza de uma maneira que eles não conseguem controlar. Com o Bitcoin, não precisas de acesso privilegiado para participar. Não precisas de um corretor XPTO ou de permissão dos guardiões financeiros. Ao contrário das próprias políticas do BCE—concebidas para inflacionar a riqueza dos já ricos através de bolhas imobiliárias e do mercado de acções—Bitcoin oferece um campo de jogo nivelado para qualquer pessoa com uma ligação à internet.
5. Sensacionalismo: a Ameaça à Democracia
"O aumento perpétuo do preço do Bitcoin empobrece o resto da sociedade e põe em risco a democracia."
Aqui, os autores entram no melodrama, avisando que o aumento do preço do Bitcoin põe em risco a democracia. É fascinante como ignoram a verdadeira ameaça à democracia: as suas próprias políticas inflacionárias.
Na realidade, os sistemas fiduciários, através da inflação incessante e do quantitative easing, erodem sistematicamente a riqueza dos mais pobres e da classe média. Os ricos, com as suas carteiras de acções e imóveis, conseguem resistir à tempestade. Mas o trabalhador comum, cujo salário compra cada vez menos a cada ano, é esmagado. Se há algo que ameaça a democracia, é o poder descontrolado do BCE de desvalorizar a moeda que as pessoas usam para viver. Bitcoin, por outro lado, dá às pessoas uma reserva de valor incorruptível e descentralizada, imune aos caprichos dos banqueiros centrais.
6. Percepção "Equivocada" da Escalabilidade do Bitcoin
"As transações em Bitcoin na blockchain são lentas e caras."
Esta crítica ignora a realidade do progresso tecnológico. As transacções on-chain de Bitcoin nunca foram pensadas para compras diárias—para isso é que serve a Lightning Network. Os autores agarram-se a esta crítica desactualizada, como se o Bitcoin fosse uma entidade estática que não evoluiu na última década.
Soluções de segunda camada como a Lightning Network permitem transacções quase instantâneas e de baixo custo, tornando o Bitcoin escalável de maneiras que o BCE se recusa a reconhecer. Mas porque deixar que os factos estraguem uma boa história de medo?
7. Ignoram o Impacto Económico Global do Bitcoin
"O Bitcoin não tem casos de uso benéficos para a sociedade."
Esta afirmação é tão limitada que é quase impressionante. A utilidade do Bitcoin não se trata de conveniência para os ocidentais comprarem café; trata-se de sobrevivência para as pessoas em países como a Venezuela, o Líbano ou a Nigéria.
Quando as moedas locais colapsam e as pessoas não podem confiar nos seus bancos, o Bitcoin oferece uma saída. Ao descartar o impacto real de Bitcoin sobre os milhares de milhões (mais de metade da população mundial) de pessoas que vivem sob regimes opressivos e em hiperinflação, o BCE revela um embaraçoso viés ocidental e falta de empatia. O Bitcoin é mais do que apenas um activo alternativo, é uma tábua de salvação para pessoas em todo o mundo que sofrem com sistemas fiduciários falhados.
Conclusão
O relatório do BCE recicla críticas desactualizadas e já desmentidas, não conseguindo ver o panorama geral. Aplica modelos financeiros antigos a uma nova forma de dinheiro, ignorando o potencial de Bitcoin para democratizar o acesso a um sistema financeiro justo, descentralizado e incorruptível. Enquanto os bancos centrais, como o BCE, continuam a desvalorizar moedas e a inflacionar bolhas de activos (e parece que vem ai mais...), Bitcoin oferece às pessoas um caminho para a soberania financeira.
O verdadeiro valor de Bitcoin não se encontra nas críticas superficiais e eurocêntricas do BCE. O seu valor reside na capacidade de fornecer liberdade financeira a indivíduos em todo o mundo, libertos da má gestão de governantes e banqueiros centrais. Se há algo que ameaça a democracia, é o historial do BCE de enriquecer alguns poucos à custa de muitos. Bitcoin, por outro lado, oferece um futuro mais justo—um onde são os indivíduos, e não as instituições, que têm o poder.
Alguma literatura: - Universidade de Cornell - Bitcoin pode impulsionar o desenvolvimento de energias renovaveis - Aldeias em Africa com electricidade atraves de Bitcoin - Relatorio de 2023 sobre a Lightning Network da River - Adopcao de Bitcoin por Pais
Photo by Taras Chernus on Unsplash
Bitcoin #BCE
-
@ ee7d2dbe:4a5410b0
2024-10-25 07:25:41Today, outsourcing and offshoring are integral parts of almost every business strategy, as they help in efficiency and innovation, by continually evolving in response to economic, technological, and geopolitical shifts.
In short, these models not only help to shape your corporate strategies but also influence global labor markets and economies. So, if you are not using them in your business, you are behind the curve.
That’s why in this post, we start with…
A basic understanding of them, Then go over the top 10 differences between outsourcing and offshoring, And lastly, discuss the key factors to keep in mind while choosing between them.
Understanding of Outsourcing & Offshoring
Outsourcing, at its core, means you are hiring third-party services to complete a piece of work or a whole project, which involves delegating specific tasks or services to external companies, often to harness specialized expertise or reduce costs.
For example, Google outsources IT management to firms in India, and Nike outsources manufacturing to factories in Vietnam and China.
Offshoring means you are relocating your business operations to other countries frequently where labor costs are lower like India and China to emphasize geographical cost advantages and talent pools.
For instance, Apple offshores its manufacturing to China, and Wells Fargo offshores customer service to India and the Philippines.
Evolution of Outsourcing
Outsourcing began during the Industrial Revolution in the 18th century when businesses started contracting out non-core activities to outside experts with a view of improving efficiency.
First, it was limited to simple clerical work such as accounting, but, in the late 20th century, outsourcing expanded with the emergence of Business Process Outsourcing (BPO), which also includes more complex service activities such as call center and IT support.
Evolution of Offshoring
Offshoring started to gain momentum in the 1980s and the 1990s due to enhanced telecommunications and the Internet. From then, most developed Western firms started relocating manufacturing and IT services to developing countries like India and China. So, you can mark this era as the start of a new global economy, where geographic boundaries became less relevant to scale businesses.
Outsourcing v/s Offshoring: An In-depth Analysis
As the title suggests, this will be an in-depth analysis of outsourcing vs. offshoring. However, if you are in a hurry and just want to know the differences, please refer to the chart below.
But our recommendation is to go through all the points and understand them thoroughly so you can make the right decision for your company’s future.
Types of Outsourcing and Offshoring
Actually, the types of outsourcing depend on individual perspectives. For instance, HubSpot covers 7 types, PearlTalent covers 9, and Digital Minds BPO covers 11 types of outsourcing in their articles.
Here, we list 4 categories that encompass almost all types:
IT Outsourcing: Hiring top companies, like Agicent, to facilitate IT functions like software development, maintenance, and support.
Business Process Outsourcing (BPO): It is about delegating non-core business processes such as payroll, HR, and customer service.
Source: https://www.agicent.com/blog/outsourcing-vs-offshoring/
-
@ a10260a2:caa23e3e
2024-10-25 03:41:11It seems like blogstack is meant to replace Substack if not already apparent by the name. If that's the case, it's already better in a few ways.
1. Hit the ground running
I'm already getting started out of the gate with more readers than I would have if I just started a Substack. This, of course, is due to the fact that I'm creating on top of a protocol where I'm able to have the same audience across all clients of that protocol. This is in stark contrast to the legacy apps from centralized entities where you have to corral your audience from one platform to the next.
2. Readers need not subscribe
Technically, if you're following me, you're subscribed. But you don't have to subscribe for a set price and amount of time (e.g. $5/month or $50/year). I believe this is a win for both of us as I can write my best notes and you can choose to reward me as you see fit. Value 4 value.
3. More conducive to conversation
Writing on Substack felt like writing into a void, with little to no feedback. A post shows up in my readers' inbox and I'll see some stats on whether it was opened or not. That's it. Based on what I've seen so far, blog posts created on Nostr appear in the client apps (e.g Damus, Primal, and Plebstr) as just another note, but with nice formatting and such. From there, I can receive zaps, shakas, comments, and even be reposted.
This is just the beginning. Right now, I'm using blogstack. But what's to stop me from using another tool down the line? I'll have the ability to do so by simply connecting my private key. Can't wait to see what new tools are created in the future.
Bullish on #Nostr
-
@ a012dc82:6458a70d
2024-10-25 02:23:55Table Of Content
-
Stay Abreast of Market Trends
-
Technical Analysis: Chart the Course
-
Fundamental Analysis: Digging Deeper
-
Follow Expert Insights and Predictions
-
Diversify Your Portfolio
-
Conclusion
-
FAQ
Investing in Bitcoin has become a hot topic in recent years, attracting both seasoned investors and newcomers alike. The potential for significant returns and the excitement surrounding this digital currency make it an attractive choice for those seeking to expand their investment portfolio. However, with great potential comes great risk. The volatile nature of Bitcoin requires investors to stay informed and employ smart strategies to maximize their investments. In this article, we'll explore five proven prediction hacks that can help you navigate the unpredictable world of Bitcoin and enhance your chances of success.
1. Stay Abreast of Market Trends
Keeping up with the latest market trends is essential for any successful investor. In the realm of Bitcoin, this holds even more significance due to its highly volatile nature. By staying informed about market trends, you can identify patterns, understand market sentiment, and make more informed decisions. Regularly monitoring reliable sources of information such as cryptocurrency news websites, influential social media accounts, and industry reports can provide valuable insights that help you stay ahead of the game.
2. Technical Analysis: Chart the Course
Technical analysis is a powerful tool used by seasoned investors to predict price movements based on historical data. By analyzing price charts, identifying patterns, and utilizing indicators, you can gain a deeper understanding of market trends and potential price movements. Whether you're examining candlestick patterns, moving averages, or relative strength index (RSI), technical analysis equips you with valuable information to make well-informed investment decisions.
3. Fundamental Analysis: Digging Deeper
In addition to technical analysis, fundamental analysis helps investors evaluate the intrinsic value of an asset. When it comes to Bitcoin, understanding the underlying technology, adoption rates, regulatory developments, and major partnerships can provide crucial insights into its future prospects. By conducting thorough research and considering these fundamental factors, you can make informed investment decisions based on a comprehensive understanding of Bitcoin's potential.
4. Follow Expert Insights and Predictions
In the world of Bitcoin investments, expert opinions can be invaluable. Keeping an eye on reputable cryptocurrency analysts and influential figures in the industry can provide you with valuable insights and predictions. These experts often share their views through blogs, podcasts, interviews, and social media channels. While it's important to do your own research and not rely solely on others' opinions, expert insights can help you validate your own predictions and make more informed investment choices.
5. Diversify Your Portfolio
Diversification is a key principle in any investment strategy, and Bitcoin is no exception. Spreading your investments across different cryptocurrencies, as well as other asset classes, can help mitigate risks and maximize your chances of profiting. Consider allocating a portion of your investment portfolio to Bitcoin, while also diversifying into other cryptocurrencies or traditional assets like stocks or real estate. By diversifying, you ensure that your financial well-being is not solely reliant on the performance of one asset, reducing potential losses and increasing overall stability.
Conclusion
Investing in Bitcoin can be a thrilling and potentially rewarding endeavor. By employing these five proven prediction hacks, you can navigate the ever-changing landscape of cryptocurrencies with increased confidence and maximize your chances of success. Remember to stay informed, conduct thorough research, and exercise caution when making investment decisions. With the right strategies and a solid understanding of the market, you can unlock the full potential of Bitcoin and optimize your investments.
FAQ
Should I invest in Bitcoin for the long term? While Bitcoin has shown incredible growth over the years, it's important to remember that past performance is not indicative of future results. Investing in Bitcoin for the long term can be rewarding, but it also carries risks. It's crucial to conduct thorough research, consider your financial goals, and seek professional advice before making any investment decisions.
Can I use these prediction hacks for other cryptocurrencies? Absolutely! While this article focuses on Bitcoin, the prediction hacks discussed can be applied to other cryptocurrencies as well. The key is to stay informed, conduct analysis, and consider both technical and fundamental factors when making investment decisions.
Is it possible to predict Bitcoin's price with 100% accuracy? Unfortunately, no prediction method can guarantee 100% accuracy when it comes to Bitcoin's price. The cryptocurrency market is highly volatile and influenced by various factors, making it challenging to predict with absolute certainty.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ a10260a2:caa23e3e
2024-10-25 01:51:45A zero-dependency, zero-framework QR code web component for Bitcoin on-chain, Lightning, and unified BIP-21 payments.
Just discovered this tool by nostr:npub18agram6s6kulwwhc638d8q8y5vysutrrvvdll2wdjxd75wp4dfjqshytrf and found it to be very useful. Also, did I mention easy-to-use?
You can find the GitHub here and a demo I made (complete with a function to check for payment) on the Bullish Prototype. 👨💻
originally posted at https://stacker.news/items/737255
-
@ dd32f3e0:498f1df9
2024-10-25 01:42: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
-
@ 6f0ba1ef:58eb4351
2024-10-25 01:16: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
-
@ 4ba8e86d:89d32de4
2024-10-24 23:42:27Um canal Lightning pode ser pensado como uma sequência de contas esticadas entre duas pessoas. Consultando a Fig. 1, Alice pode pagar Bob empurrando uma de suas contas para o lado dele. Se Bob também tiver um canal Lightning com Carol, Alice pode pagar Carol por meio de Bob: ela empurra uma conta para Bob, que então empurra uma conta para Carol. A regra fundamental — e a razão por trás dos problemas de liquidez da Lightning Network — é que as contas podem se mover de um lado para o outro, mas não podem sair do cordão em que estão.
https://nostrcheck.me/media/public/nostrcheck.me_7999139148267863241703513103.webp Fig. 1. Alice pode enviar um pagamento para Carol roteando-o por Bob. Como as contas não podem sair do cordão em que estão, Bob acaba com uma conta a mais em seu cordão com Alice e uma conta a menos em seu cordão com Carol.
Isso é tudo que você precisa saber para entender como o dinheiro pode fluir na Lightning Network. No entanto, esse modelo não nos diz nada sobre por que os pagamentos na Lightning são seguros. Por exemplo, o que impede Bob de simplesmente manter a conta que Alice empurrou para ele e nunca enviar uma para Carol? O objetivo deste artigo é responder à pergunta "o que torna os pagamentos na Lightning 'sem confiança'?"
Ao final do artigo, revelaremos o sujo segredinho da Lightning Network: que os pagamentos pequenos não são realmente "sem confiança" — nós nós de roteamento podem perder fundos dos clientes.
Contratos Hash-Time-Lock (HTLCs) Para explicar o que impede Bob de manter a conta de Alice sem enviá-la para Carol, precisamos introduzir "travas" em nossa analogia física para os canais Lightning. Travas podem ser colocadas nos cordões para restringir o movimento das contas e só são abertas se condições específicas forem atendidas. Os contratos hash-time-lock (HTLCs) usados nos pagamentos Lightning envolvem dois tipos de travas (cf. Fig. 2): a primeira é uma trava que se abre se apresentada com a senha correta (vamos chamá-la de "hash-lock"), e a segunda é uma trava que se abre automaticamente após um atraso de tempo (vamos chamá-la de "time-lock").
https://nostrcheck.me/media/public/nostrcheck.me_9607840347208938921703514339.webp Fig. 2. O hash-lock se abre quando uma senha é inserida e gera o valor especificado (45f8 neste caso). O time-lock se abre após o tempo especificado ter decorrido (48 horas neste caso).
Agora, voltemos ao pagamento de uma conta de Alice para Carol por meio de Bob. Para tornar o pagamento "sem confiança", Alice, Bob e Carol precisam estar online ao mesmo tempo e participar de um elaborado ritual.
Primeiro, Alice pede a Carol que pense em uma senha secreta e diga a ela o hash da senha. Vamos fingir que a senha que Carol inventou foi "boondoggle" e seu hash foi "45f8". Em seguida, Alice coloca um hash-lock entre ela e Bob, configurado para abrir quando apresentado com uma senha que gera o hash "45f8". Neste ponto, nem Alice nem Bob podem abrir a trava, pois nenhum deles conhece a senha. Alice então empurra uma conta contra o hash-lock. Por fim, ela coloca um time-lock no lado esquerdo da conta, configurado para abrir automaticamente após 48 horas (Fig. 3).
https://nostrcheck.me/media/public/nostrcheck.me_3127046972622599461703514704.webp Fig. 3. Com o conhecimento do hash da senha secreta de Carol, Alice pode configurar um hash-lock para proteger a conta que ela transfere para Bob (para depois encaminhar para Carol). Ela trava a conta com um time-lock para que ela possa recuperá-la caso Bob não conclua o pagamento dentro de 48 horas.
Bob percebe que a conta é dele se conseguir descobrir a senha antes de 48 horas se passarem. Ele também sabe (porque Alice disse a ele) que Carol revelará a senha em troca de uma de suas contas. Para incentivar Carol a agir, Bob coloca o mesmo hash-lock entre ele e Carol, empurra uma de suas contas e então a trava com outro time-lock (Fig. 4). Ele sabe que, para Carol abrir o hash-lock e pegar a conta, ela precisará inserir a senha — à vista de todos — que é a mesma senha que Bob precisa para abrir o hash-lock com Alice.
https://nostrcheck.me/media/public/nostrcheck.me_4635793414256087711703515032.webp Fig. 4. Bob percebe que a conta de Alice é dele se Carol revelar sua senha antes de 48 horas. Ele configura o mesmo hash-lock, empurra uma conta em direção a Carol e a trava com um time-lock. A única maneira de Carol pegar a conta de Bob é revelar a senha que Bob precisa para reivindicar a conta de Alice.
Carol, ao ver que a conta está lá para ser pega, insere "boondoggle" na trava (lembre-se de que está à vista de Bob). A CPU da trava confirma que hash("boondoggle") = 45f8, e então se abre. Carol move a conta para o lado dela do cordão (Fig. 5).
https://nostrcheck.me/media/public/nostrcheck.me_6790828350788856531703516541.webp Fig. 5. Carol revela sua senha para abrir a trava e pegar a conta.
Com o conhecimento da senha de Carol, Bob desbloqueia sua conta de Alice da mesma forma (Fig. 6). O pagamento está completo.
https://nostrcheck.me/media/public/nostrcheck.me_8432131267156524571703517282.webp Fig. 6. Com o conhecimento da senha secreta de Carol, Bob pode agora pegar a conta de Alice, completando assim o pagamento.
Você pode se perguntar por que Bob se incomodaria em participar desse ritual em primeiro lugar. Se Carol não tivesse sido cooperativa, sua conta poderia ter sido congelada até que o time-lock expirasse. Na prática, Alice enviaria a Bob um pouco mais do que ela pede a Bob para enviar a Carol, como uma taxa para compensar por esse risco e pelo esforço de Bob. Quando o pagamento estiver completo, Bob terá um pouco mais do que começou, motivando-o assim a concluir o pagamento.
Você também pode se perguntar qual é o propósito dos time-locks. Os time-locks permitem que os participantes recuperem seus fundos se o pagamento falhar. Por exemplo, imagine que Bob se torna não cooperativo depois que Alice transfere sua conta e adiciona os dois locks. O time-lock é o que permite a Alice recuperar seus fundos. Ela só precisa esperar o time-lock expirar. Não há como Bob roubar a conta nesse ínterim, porque ele precisa da senha de Carol, o que ele não pode obter sem dar a Carol uma de suas contas e, assim, completar o pagamento.
Leitores interessados podem explorar o que acontece se uma das partes se tornar não cooperativa em diferentes etapas do processo de pagamento do Lightning para se convencer de que nem Alice, Bob, nem Carol estão em risco de perder dinheiro devido às ações de suas contrapartes.
O Sujo Pequeno Segredo da Lightning Network A Lightning Network tem um sujo pequeno segredo que poucas pessoas conhecem. Para entender qual é o segredo — e suas ramificações para os pagamentos do Lightning — precisamos cavar um pouco mais.
Lembre-se de que quando Alice enviou o pagamento para Carol através de Bob, o estado intermediário mostrado na Fig. 7 existia. Quando expresso como uma transação de bitcoin, o estado do canal contém três saídas: as moedas de Alice, as moedas de Bob e a moeda "em voo".
https://nostrcheck.me/media/public/nostrcheck.me_9561697518547468611703528026.webp Fig. 7. A transação de estado do canal Lightning neste ponto do tempo contém três saídas: as moedas de Alice, as moedas de Bob e as moedas em trânsito.
Aqui está o problema: se o valor em trânsito estiver abaixo do limite de poeira do BTC, então não pode ser representado como uma terceira saída na transação de estado do canal! Portanto, não é possível usar hash- e time-locks para proteger o pagamento se o pagamento for muito pequeno.
Para explicar como o LN lida com esse problema, devo primeiro fazer uma confissão. Não é exatamente verdade que o número de contas em uma string seja constante. Na verdade, há um balde ao lado de cada string rotulado como "Taxa do Minerador" que contém pequenas frações de contas. O valor neste balde é reivindicado pelo minerador que confirma a transação de estado do canal, caso o estado do canal seja empurrado para o blockchain. Frações de contas podem se mover da string para o balde, ou do balde de volta para a string, mas apenas se as pessoas em ambos os lados do canal concordarem.
Em vez de travar o valor em trânsito com hash- e time-locks, para pagamentos pequenos, Alice e Bob simplesmente movem o valor em trânsito para o balde de taxas (Fig. 8). Bob confia que Alice cooperará com ele para retirar o valor em trânsito do balde de taxas quando ele revelar a senha secreta de Carol.
https://nostrcheck.me/media/public/nostrcheck.me_3836418249379116631703528340.webp Fig. 8. Se as moedas em trânsito estiverem abaixo do limite de poeira, o mecanismo HTLC não pode ser usado porque a transação de estado do canal não seria minerada se fosse transmitida. Em vez de usar o mecanismo HTLC, as moedas em trânsito são despejadas no balde de "Taxa do Minerador".
https://nostrcheck.me/media/public/nostrcheck.me_3836418249379116631703528340.webp Fig. 8. Se as moedas em trânsito estiverem abaixo do limite mínimo ("dust threshold"), o mecanismo HTLC não pode ser usado, pois a transação do estado do canal não seria minerada se transmitida. Em vez de utilizar o mecanismo HTLC, as moedas em trânsito são depositadas no "Miner's Fee" (Taxa do Minerador).
Neste esquema alternativo, Bob transfere o valor em trânsito para um segundo compartimento de taxas que ele compartilha com Carol, prometendo entregá-lo a ela se contar a Bob a senha secreta. Carol revela o segredo a Bob, e juntos movem o pagamento do compartimento de taxas para o lado de Carol. Bob então volta para Alice, conta a ela o segredo de Carol e, se tudo correr bem, Alice coopera com ele para retirar o valor em trânsito do compartimento de taxas e colocá-lo no lado de Bob da sequência.
Ao contrário do esquema HTLC descrito anteriormente, este esquema depende da confiança. Por exemplo, Carol poderia revelar a senha a Bob, que poderia deixar o pagamento no compartimento de taxas e ainda assim ir a Alice e entregar a senha em troca de seu pagamento.
As opções de Carol nesse cenário são limitadas: ou ela não faz nada e aceita a perda, ou ela encerra o canal com Bob. No entanto, encerrar o canal com Bob não a deixa totalmente compensada, pois o valor que ela deveria ter recebido é enviado para um minerador!
Apesar de parecer quebrado, esse esquema realmente funciona razoavelmente bem na prática. Bob não tem um incentivo real para não dar o dinheiro a Carol. Se ele não devolver, ele não ficará em uma situação melhor (o minerador ficará com os fundos extras, não ele) e provavelmente em uma situação pior (Carol provavelmente fechará o canal, já que Bob se mostrou não confiável). O dano que Bob pode causar parece limitado ao valor do pagamento mais o custo de estabelecer um novo canal relâmpago.
Por que isso é significativo O segredo sujo do Lightning é significativo porque revela como a fricção da Camada 1 (L1) vaza para a L2, forçando soluções complexas e mal compreendidas¹ para o protocolo L2. A solução alternativa neste caso alterou a natureza "sem confiança" dos pagamentos do Lightning: para pagamentos acima do limite de poeira, nem Alice, Bob, nem Carol podem perder dinheiro devido às ações de suas contrapartes. Para pagamentos abaixo do limite de poeira, Alice, Bob e Carol podem perder dinheiro sem culpa própria. É um modelo de segurança fundamentalmente diferente do que as pessoas entendiam.
Alguém poderia argumentar: "estamos falando apenas de pagamentos pequenos, então quem se importa?" Eu não concordo com esse argumento por duas razões:
-
O plano de escalonamento do Core, usando o blockchain como uma camada de liquidação com taxas elevadas, aumentará o limite para o que constitui "poeira". Poeira são saídas que não podem ser gastas economicamente porque a taxa on-chain para gastá-las é maior do que seu valor. Com taxas de $100, a maior parte do salário mensal de todo o mundo é "poeira".
-
Perder vários pagamentos pequenos em rápida sucessão (por exemplo, devido a um ataque de roteamento no LN) poderia resultar em uma perda significativa.
Imagine um futuro em que a maioria dos pagamentos ocorra na Lightning Network, e as taxas de transação na L1 sejam consistentemente superiores a $100. As saídas de poeira abaixo de $100 na mainchain não têm valor porque custa mais gastá-las do que valem.
Agora a Lightning Network enfrenta o problema de que até mesmo pagamentos de $50 não são "sem confiança". No caso em que $50 estão abaixo do limite de poeira (o que seria uma política razoável considerando que $50 seria economicamente impossível de gastar na L1), então os HTLCs não podem ser usados para proteger o pagamento de $50. Os clientes podem perder pagamentos de $50 sem culpa própria.
No caso em que os desenvolvedores tentam contornar alguma "brecha legal" definindo o limite de poeira como $1 para que os HTLCs ainda possam ser usados, o efeito ainda é uma perda de $50 para o cliente, pois a saída não será economicamente gasta! Os clientes ainda podem perder pagamentos de $50 sem culpa própria.
Alguém poderia argumentar "bem, os nós de roteamento podem perder fundos dos clientes e esses fundos podem ser significativos em um futuro com taxas altas, mas os nós de roteamento são pares, não empresas." Eu também não concordo com isso porque o objetivo principal do roteamento de pagamentos do Lightning é ganhar dinheiro em taxas de transação em troca de empréstimo de liquidez. Já hoje, os desenvolvedores do Lightning abandonaram a ideia de que todos os usuários roteariam pagamentos; agora é incentivado que usuários normais usem canais não divulgados e nunca roteiem.
Em um futuro com altas taxas, um hub tem controle custodial efetivo sobre o dinheiro de seus usuários. Um usuário não pode liquidar no blockchain para recuperar fundos de pagamentos não protegidos por HTLCs. Além disso, se o saldo do usuário estiver na mesma ordem de grandeza das taxas on-chain, o usuário também está preso ao hub. Não vale a pena escapar de um canal "ruim", pois isso custaria ao usuário todo o seu saldo. Hubs também podem bloquear os fundos do cliente indefinidamente, recusando-se a rotear pagamentos a menos que certas condições sejam atendidas (por exemplo, desembrulhar as informações de roteamento de cebola para fins de AML/KYC). A única escolha do usuário é liquidar no blockchain e perder todo o seu dinheiro — o que não é uma escolha real! Hubs também podem roubar seus usuários na forma de taxas exorbitantes. Novamente, o usuário está preso e não tem escolha a não ser pagar se quiser acessar seu dinheiro.
Hubs significativamente conectados na Lightning Network, em um futuro com taxas elevadas na camada base, deveriam ser regulamentados devido ao controle efetivo que possuem sobre os fundos de seus clientes.
Gostaria de propor a hipótese de que o seguinte princípio existe:
Pagamentos na Camada 2, para quantias abaixo do que é economicamente viável na Camada 1, não podem alcançar uma natureza "sem confiança".
A eficácia do Lightning depende da liberdade da blockchain subjacente, alinhando-se com as expectativas dos usuários.
Isso é apenas uma das muitas razões pelas quais um futuro em que a maioria das transações ocorre na Lightning Network e a blockchain possui taxas elevadas será muito diferente do que as pessoas esperam. Outras razões incluem:
-
O Lightning dimensiona transações, não usuários. O custo de operar um nó completo de validação ainda será alto.
-
A fricção na Camada 1 afeta a fungibilidade na Camada 2; as moedas têm um valor dependente da posição.
-
Liquidez: a maioria dos "estados de riqueza" não é alcançável por meio de transações na Lightning. Falhas em pagamentos são inevitáveis.
-
Roteamento é difícil se o grafo de rede for extenso: os hubs da Lightning tenderão a se centralizar para reduzir problemas de roteamento e liquidez.
-
A experiência típica do usuário ao executar uma carteira não custodial sempre será complicada: os usuários precisam estar online para receber dinheiro, contratar torres de vigilância para monitorar fraudes em canais, assinar serviços de roteamento de origem para enviar pagamentos e fazer backup dinâmico de seus estados de canal contra corrupção de dados.
-
Risco sistêmico: uma quantidade muito grande de moedas precisa ser bloqueada em canais da Lightning (carteiras quentes) para fornecer a liquidez necessária.
-
As taxas agregadas dos mineradores na Camada 1 não serão suficientes para garantir a segurança da blockchain quando a recompensa por bloco se esgotar.
Esse texto apontar que LN não é “sem confiança” para pequenos pagamentos e que os fundos dos clientes poderiam ser redirecionados para o mineradores sem culpa do cliente. A crença amplamente difundida, mas falsa, dentro da comunidade BTC era que todos os pagamentos Lightning eram “sem confiança” por design .
-
-
@ 4ba8e86d:89d32de4
2024-10-24 23:36:47OP_CAT é um opcode simples, mas poderoso, que combina dois valores de entrada em uma saída. Originalmente, ele foi desativado devido a preocupações com problemas de memória, mas as condições mudaram. OP_CAT é um opcode que lida com a concatenação de valores de entrada, unindo dois valores em um. Embora possa parecer simples à primeira vista, suas possibilidades são amplas e intrigantes.
Especificação
O opcode OP_CAT opera abrindo dois elementos da pilha, concatenando-os na ordem em que estão empilhados e empurrando o elemento resultante de volta para a pilha. Dada a pilha [x1, x2], onde x2 está no topo da pilha, o OP_CAT colocará x1 x2 na pilha, onde '' denota concatenação.
Implementação
cpp if (stack.size() < 2) return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION); valtype vch1 = stacktop(-2); valtype vch2 = stacktop(-1);
if (vch1.size() + vch2.size() > MAX_SCRIPT_ELEMENT_SIZE) return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
valtype vch3; vch3.reserve(vch1.size() + vch2.size()); vch3.insert(vch3.end(), vch1.begin(), vch1.end()); vch3.insert(vch3.end(), vch2.begin(), vch2.end());
stack.pop(); stack.pop(); stack.push_back(vch3);
Essa implementação é baseada na implementação do OP_CAT em elementos.
O valor de MAX_SCRIPT_ELEMENT_SIZE é 520 bytes.
Notas
O OP_CAT existia na base de código Bitcoin antes do commit "alterações diversas" 4bd188c que o desativou. A implementação original funcionava da seguinte forma:
cpp // (x1 x2 -- fora) if (stack.size() < 2) return false; valtype& vch1 = stacktop(-2); valtype& vch2 = stacktop(-1); vch1.insert(vch1.end(), vch2.begin(), vch2.end()); stack.pop_back(); if (stacktop(-1).size() > 5000) return false;
Essas informações detalhadas sobre a especificação e a implementação do OP_CAT esclarecem como ele funciona e como as operações são executadas.
OP_CAT não é uma novidade, sendo parte das instruções do Bitcoin Script em versões antigas. Foi desativado devido a preocupações de aumento exponencial de memória na pilha de elementos. No entanto, desde que foi desativado, um tamanho máximo de 512 bytes foi fornecido para elementos de pilha, e isso também é aplicado ativamente hoje no Tapscript, que é o Bitcoin Script na atualização Taproot. O problema daquela época realmente não se aplica aqui, pois um script que desejasse criar elementos acima desse limite seria simplesmente inválido.
OP_CAT possibilita novas opções de assinatura, assinaturas Lamport com segurança quântica, cofres Bitcoin e convênios/CTV que determinam as condições de saída. Isso abre portas para métodos de escalonamento , Confirmação instantânea de transações on-chain , Livre mercado de sidechains, como Ark, e simplifica a implementação de BitVM para contratos inteligentes.
Várias aplicações possíveis para o OP_CAT, como covenants, verificação de provas SPV, proteção contra gastos duplos em transações não confirmadas, tornar o BitVM mais eficiente, realizar aritmética com números grandes, criar vaults e assinaturas resistentes a computadores quânticos.
Para reintroduzir o OP_CAT, seria necessária uma atualização (soft fork) nas regras de consenso do Bitcoin, o que exige planejamento cuidadoso. No entanto, a proposta atual é gerenciável e não apresenta as preocupações anteriores devido às limitações estabelecidas.
O OP_CAT promete ser uma adição valiosa à linguagem de script do Bitcoin, proporcionando um leque de possibilidades interessantes para desenvolvedores e usuários. A reintrodução desse opcode parece promissora, oferecendo um equilíbrio entre esforço e casos de uso potenciais, e ainda há espaço para discussões sobre suas vantagens e desvantagens.
https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-October/022049.html
https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-October/022049.html
https://github.com/EthanHeilman/op_cat_draft/blob/main/cat.mediawiki
https://medium.com/blockstream/cat-and-schnorr-tricks-i-faf1b59bd298
https://gist.github.com/RobinLinus/9a69f5552be94d13170ec79bf34d5e85
-
@ 4ba8e86d:89d32de4
2024-10-24 23:30:46Com o Boltz, os usuários podem trocar perfeitamente seus bitcoins entre camadas, por exemplo. usar produtos financeiros avançados ou gerenciar a liquidez de seus canais relâmpago. Os Boltz Swaps não têm custódia, o que significa que os usuários podem sempre ter a certeza de ter controle total de seu bitcoin durante todo o fluxo de um swap.
Swap da Lightning Network (LN) para Bitcoin Onchain utilizando a plataforma Boltz.
Basta acessar o site Onion da Boltz:
http://boltzzzbnus4m7mta3cxmflnps4fp7dueu2tgurstbvrbt6xswzcocyd.onion/
Também é possível visitar o site oficial em:
https://boltz.exchange/
https://nostrcheck.me/media/public/nostrcheck.me_4413004608613998691706870605.webp
https://nostrcheck.me/media/public/nostrcheck.me_6400873373279640511706870649.webp
Primeiro, selecione qual tipo de Swap deseja realizar, por exemplo, você pode escolher LN para Bitcoin Onchain. Em seguida, insira o endereço Onchain de sua carteira. Após isso, basta efetuar o pagamento da fatura LN com o valor necessário e o Swap será concluído com sucesso!
Criar Atomic Swap. O pagamento inclui taxas de serviço de rede e boltz Enviar Mín .: 50.000 , Máx .: 1.000.0000
Para melhorar a resistência à censura e a privacidade, o Boltz não está disponível nas lojas de aplicativos, mas pode ser instalado como Progressive Web App (PWA) em todos os dispositivos Android e iOS, bem como em computadores desktop.
Como instalar o Boltz como App PWA.
Android.
-
Abra https://boltz.exchange/ em um navegador móvel como chorme ou Vanadium abra o menu do navegador e toque em "Instalar aplicativo": https://nostrcheck.me/media/public/nostrcheck.me_6529645890412951071706872223.webp
-
Confirme em "Install": https://nostrcheck.me/media/public/nostrcheck.me_1285765778020048231706872279.webp
-
Agora você encontra o Boltz como ícone do aplicativo na tela inicial, que pode ser usado como qualquer outro aplicativo.
iOS
-
Abra https://boltz.exchange/ em seu navegador móvel Safari e toque no botão de compartilhamento https://nostrcheck.me/media/public/nostrcheck.me_6654634165994432521706871151.webp
-
Toque em "Adicionar á tela incial ": https://nostrcheck.me/media/public/nostrcheck.me_4387192956979181391706871163.webp
-
Confirme tocando em "adicionar ": https://nostrcheck.me/media/public/nostrcheck.me_1403675023106875721706871174.webp
-
Agora você encontra o Boltz como ícone do aplicativo na tela inicial, que pode ser usado como qualquer outro aplicativo.
Desktop
- Aqui está um exemplo de como instalar o Boltz como aplicativo em um computador desktop Ubuntu usando Chromium: Abra https://boltz.exchange/ e clique no ícone de instalação que aparece automaticamente:
https://nostrcheck.me/media/public/nostrcheck.me_3169379622874819051706871546.webp
-
Confirme clicando em "Install": https://nostrcheck.me/media/public/nostrcheck.me_3547123478071766331706871554.webp
-
Agora você encontra o Boltz como ícone do aplicativo em sua coleção de aplicativos: https://nostrcheck.me/media/public/nostrcheck.me_3356870245715316401706871564.webp
Também pode executá-lo localmente:
Incentivamos nossos usuários técnicos a verificar o código e executar o aplicativo da web localmente a partir da fonte, seguindo as instruções abaixo.
Dependências.
Certifique-se de ter o Node.js LTS e NPM mais recente instalado. Recomendamos usar o nvm para gerenciar instalações do npm: nvm install --lts
Execução.
Clone o repositório, mude para a pasta do projeto e execute " npm install " para instalar todas as dependências. Em seguida, execute " npm run mainnet " e " npx serve dist " para iniciá-lo.
Abra: http://localhost:3000
no seu navegador e comece a trocar!
https://github.com/BoltzExchange/boltz-web-app#run
https://docs.boltz.exchange/
-
-
@ 4ba8e86d:89d32de4
2024-10-24 23:20:51VeraCrupt foi lançado em 2013 como um fork do projeto TrueCrypt descontinuado. Desde então, o VeraCrypt tem passado por diversas atualizações e melhorias de segurança, incluindo a correção de problemas identificados por auditorias de código do TrueCrypt. O VeraCrypt inclui implementações otimizadas de funções criptográficas de hash e cifras, o que aumenta o desempenho em CPUs modernas. O software permite criar e gerenciar volumes criptografados em computadores ou dispositivos de armazenamento externo, com suporte para vários algoritmos de criptografia e recursos adicionais, como proteção contra ataques de keylogger e ocultação de volumes , tem opção de segurança robusta para proteger seus dados.
Quando você cria um volume criptografado no VeraCrypt, o software cria um arquivo virtual que funciona como um disco rígido criptografado. Esse arquivo é montado como uma unidade lógica no seu sistema operacional e pode ser acessado como qualquer outro disco rígido.
Antes que você possa acessar o volume criptografado, você precisa fornecer a senha correta. A senha é usada para desbloquear o arquivo virtual criptografado e permitir que o sistema operacional acesse o conteúdo. O VeraCrypt suporta vários algoritmos de criptografia, incluindo AES, Serpent e Twofish, que podem ser selecionados pelo usuário ao criar o volume criptografado.
O VeraCrypt também oferece recursos adicionais de segurança, como proteção contra keyloggers, que podem registrar as teclas digitadas no teclado para capturar senhas. Ele faz isso fornecendo uma interface virtual para digitar senhas, o que impede que os keyloggers capturem a senha real. O VeraCrypt também permite ocultar volumes criptografados dentro de outros volumes criptografados, o que fornece uma camada adicional de segurança.
O veracrypt proteger informações confidenciais armazenadas em dispositivos de armazenamento, como discos rígidos, unidades flash USB e cartões de memória, contra acesso não autorizado. Se um usuário estiver executando o Tails a partir de uma unidade flash USB, e o disco rígido estiver criptografado com o VeraCrypt, o Tails não terá acesso ao conteúdo do disco rígido, a menos que o usuário monte o volume criptografado do VeraCrypt e forneça a senha correta.
No entanto, é importante lembrar que a criptografia do disco rígido por si só não garante a segurança completa do sistema. Os usuários também devem tomar outras medidas de segurança, como manter o sistema operacional e o software atualizados, usar senhas fortes e não compartilhá-las com ninguém, e tomar cuidado com o acesso físico ao computador ou dispositivo de armazenamento externo.
https://veracrypt.fr
https://github.com/veracrypt/VeraCrypt/
-
@ bb0174ae:75f7239a
2024-10-24 21:23:55What is Cyphermunk House? It is everything that is unprovided. It is the education that is never taught. It is the culture that is never commissioned. It is the space for the community that was never allowed to flourish because an equitable economy was never allowed to grow. It is a space to BE YOUR OWN BANK and a space to STAY HUMBLE.
Cyphermunk House is London’s Bitcoin beacon. Providing sanctuary from the mainstream; from the politics of division, the brainwashing of legacy media, the predictive programming of film, the ‘three-quarter reptiles’ of music, the ‘shock value, indignation and existential angst’ of modern art and the centuries long corruption and exploitation of central banking. It is counter culture in extremis. A hotspot of no fear. A 21st space where fiat pastimes are secondary and pleb living is primary.
What is bitcoin? Cross the threshold. How do you obtain it? Take a seat. Want to stack? Let’s begin. Dive into the mathematics of hope, the code of change and the magic of self-sovereignty. In here we educate, providing knowledge to match the student whether you are a stone-cold newb or a humble stacktivist. In return we learn that there are still so many who are yet to realise that money is broken, issuance matters and a bitcoin can be divided into things called sats. In other words, there is work to be done.
Work that is evolving like that which inspires us. Can we educate? Can we provide space for people from all walks of life? Can we provide the seeds for discussion, the platform for ideas and the spectacle that confronts the issues in our society? Can we get a former Minister of State to laser eye his image?
So far, we are meeting these challenges, with more newbs through our doors than we could ever imagine, lured in by the rabbit of an upended banknote and their own curiosity. What the hell is that? And what's going on inside this rabbit warren of a building a mile’s crow flight from the life supported heart of British financial might.
The ‘what’ is huge. Education. Culture. Freedom. And community. That same orange cocktail that bitcoin is pouring all over the world. Standing in direct opposition to the trends of indoctrination, centralisation and isolation that have pushed the group to the fringe and questioned the very idea that humans are social beings. In our world, meetups, conferences and real-world spaces are thriving. Education is pleb-led and free. And our culture is king.
I have witnessed the artistic offerings of this capital a lifetime over; dance on rooftops, songs beneath the river and Shakespeare performed by a man and a cast of sheep. In three short decades I have worked across music, theatre, film and art, and now find myself at the helm of Cyphermunk House. What is being created within these walls is more inspiring and exciting than anything the Tate has ever shown me, or the West End, or the Dome. This is the edge of the cultural moment. Lightning sharp and electric.
Because our culture does more than entertain. It informs. And transforms. And it is happening everywhere, simultaneously. And in this tiny postcode of West Central London, it is happening hard. We are 'Privacy Defenders'. We will expose 'The Ugly Reality of War Crimes' and we will declare that 'Coin Mixing is My Right' and yours too as we work towards a 'Humanity in Consensus'. Inspired? Come along and chuck it on the walls in the paradise paint of a world being built from the ground up. For this is the culture of code and it will not be put back in the box.
And yes the space is temporary, six more months perhaps, but its temporality is tangible forever, nostr makes it so. Our records permanent, our doors always open. Always sharing knowledge, wisdom and advice. While in these moments of tangibility, these blocks of time in meters of space, we will fire up the beacons and summon the zaps, for bitcoiners, artists, outcasts and dreamers to the temporal dance of rebellion that burns behind these doors.
“In the same way El Salvador felt way ahead of its time – a nation state adopting bitcoin as legal tender. This feels like it’s a cycle too early too. Surely, we shouldn’t have something this good till the 6th epoch." - Si, Bitcoin Events UK
And when we close our doors and move to pastures new, we will not forget the power we are finding - the power to redefine the rules. For this is how to use bitcoin and release the burden on the current system. It stands as a testament to the power of code that you can run an entity, without barriers, without red tape, without announcing your names or identity, where you create the rules.
And so we invite you to the Bitcoin Culture Festival at Tooting Market, The Dockside Vaults and Cyphermunk House, and an explosion of culture from the We Are 2140 collective. Together we will host a brand-new exhibition; the Culture of Code and stamp a sequence of blocks with so much creativity that no Londoner will miss it.
These are the signals of hope found in a civilisation mathematically backed by a money that extracts nothing from you. Embrace them. Support them - your fellow plebs and meetups. Network, connect and build. There is so much more to do and so much more to learn, but for now I've learnt this much - align your passions with bitcoin and every moment is a pill.
Onward plebs.
FIND OUT MORE
OUR PARTNERS / SPONSORS
-
@ 95a69326:6ac402e2
2024-10-24 20:09:01That is true for the rate of growth of addresses, of hashrate, and even of price.
None follow an exponential curve.
And that is fantastic news, because it’s a reality check on where we are today with Bitcoin adoption, and how to actually make it happen faster. Let us collectively break the culture that has formed around the S curve. The very idea that adoption is exponential.
It’s the hopium that keeps some going, waiting on the #OmegaCandle chanting NGU and hodling onto their Bitcoin like it’s their “precious”.
So much of Bitcoin’s narrative is centered around an imminent inflection point, a face-melting exponential curve. We will wake up one day (soon!), Bitcoin will be over 1m per coin, the Federal Reserve will be blown into pieces, and all Bitcoiners around the world will come together to sing Kumbaya.
Then one more year passes, then one more year passes, then one… Just one more! It’s around the corner guys! Just hold on to your Bitcoin, and everyone else can have fun staying poor.
Don’t get me wrong, Bitcoin is a marvellous savings technology. Once you see it, you understand it’s the best way to safeguard your financial future.
But this is not a game measured in weeks, or months. It’s a game measured in years, decades. And I am starting to believe that the reason so many Bitcoiners still have an unrealistic expectation of the short term adoption rate of Bitcoin, is exactly because so many still believe Bitcoin growth follows an exponential.
But that mentality is actually harming Bitcoin adoption. When you ground your belief system into an exponential, it also becomes very easy to believe the path is set. That you can sit back, and wait. That it’s “any day now”.
And you’re wrong! The path is not set, the path is still being written, and at the moment it’s being increasingly written by some suits at BlackRock. So extend your time horizon.
Stop believing hyper-Bitcoinisation is around the corner, and start asking yourself: what can I do to make Bitcoin adoption happen?
The truth is, if you want Bitcoin adoption, hodling Bitcoin won’t get you there. Spending it, and getting more people to use it will.
No, I’m not trying to psy-op you into selling your Bitcoin. And the idea that spreading Bitcoin promotes adoption is not just theory.
Let’s go over some data.
If you’re allergic to charts and data, maybe stop reading here, and ponder on the above question for a little while.
But if you’re not, take a look at this chart:
This is what it looks like when you chart the ratio of Bitcoin’s hashrate, price and number of addresses. Bitcoin is a beautiful combination of power laws.
We’re not making any predictions here. This is what is, and what has been since Bitcoin’s Genesis Block. It’s Bitcoin’s DNA. And what it tells us is that there is a known, quantifiable, symbiotic relationship between Bitcoin’s number of participants (\~addresses), Bitcoin’s security (hashrate) and Bitcoin’s price.
What else do we know?
Bitcoin’s address count (\~ participants) grows at a rate of x³, where x is time. That’s the growth rate of viruses, it’s the growth rate of social networks. Metcalfe’s Law says that the value of a network is approximatly equal to the square of its participants. And with Bitcoin that checks out. Bitcoin’s price grows at a rate of x⁶, which is x³ (participants) squared (again refer to Giovanni’s work for the in-depth data analysis).
That’s pretty solid data to say that:
Bitcoin’s price is not exponential The number of participants in the network has a quantifiable impact on its price So, Bitcoin growth follows a power law. And that’s fast! But compared to an exponential, that’s slooooow.
“But ETFs are here! NgU!! Scarcity!! Bitcoin will break all your models to the upside!!!”
It get’s tiring, and you know it.
Before you get all excited about ETFs buying up all the Bitcoin, leading to the mother of all supply squeezes and sending Bitcoin to the moon, realise this: the number of people owning Bitcoin has a bigger impact on price than supply and scarcity.
Sorry Stock2Flow fanatics, I’ll say that again. The number of people owning Bitcoin has a bigger impact on price than supply and scarcity.
And, to be fair, ETFs are bringing a lot of new network participants. But HODLING isn’t. And a lot of the Bitcoin that is going into the ETFs, is on a one way street to be hodled forever.
So going back to the big question: What can I do to accelerate Bitcoin adoption?
The answer is simple: get more people using Bitcoin.
Ok, that sounds obvious, and you already knew that. So this post was pointless.
But what is the pre-dominant narrative for getting more people to use Bitcoin today? It’s NgU, it’s scarcity, in other words, it’s all the wrong things. You won’t bring more network participants by buying up as much Bitcoin as you can to stash it away for the next 20 years.
Oh, and you won’t retire in 2 years for hodling that 0.1BTC either.
You’ll beat inflation, by a healthy margin, and you will get more purchasing power over time.
But the truth is, from Bitcoin’s adoption perspective, you’re a rent seeker.
You’re living off the work of those that are actually doing something to push Bitcoin’s adoption, ultimately having a real impact on its demand, and thus its price.
Who are they?
The educators teaching Bitcoin to new people. The meetup organisers bringing people together to talk about Bitcoin. * Those building circular economies. The protocol devs working on improvements to scale Bitcoin. The app devs working on making Bitcoin usable in every day life. The people spending Bitcoin on their everyday expenses. Those are the people pushing forward Bitcoin adoption.
Heck, even the wall street guy that orange pilled Larry Funk has done more for adoption than the perpetual holder waiting on the day he’ll be a citadel king.
I’ll end this rant here, and if there’s only one thing you remember from it let it be this:
Stop hodling Bitcoin to your death. Spend it, spread it, replace it. Support circular economies and Bitcoin educators, find local stores that accept it, get more people actually using the thing and you might just get to enjoy hyper-Bitcoinisation in your lifetime.
— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —
Bitcoin Power Law refs:
[Modelling Bitcoin Growth with Network Theory] https://bitposeidon.com/f/modeling-bitcoin-growth-with-network-theory…
[Intro to the Power Law] https://bitposeidon.com/f/simple-introduction-to-the-power-law-theory
-
@ 83794dfe:e46c6636
2024-10-24 20:08:28i can post a note from my desktop to Nostr using Comet @captv
iuihuhjhjhjk