-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 35f3a26c:92ddf231
2024-11-09 17:13:38The FUD injection
Many cyber security advisors and CEOs of companies that offer security products will tell you that the battle is lost, that, for example, if you don't buy an air gap device your private keys are not secure.... That, if you used your computer instead to write the seed words in a piece of paper and then put them in a piece of metal, you will be hacked and most probably you are doomed....
IMO and experience, it is an exaggeration...
If all the fear mongering being pedaled by the cyber security enthusiasts and experts was true, oh well, with very few exceptions, we all will be drained of our funds in banks (most neither have a decent 2FA - still working with SMS for crying out-loud...), self custody wallets, etc... Even the Bitcoin blockchain encryption will be broken by "quantum computers"... oh and AI will be used by hackers to hack you as well... Just ignore the noise...
The unpopular opinion
IMO, basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away.
And the tools they tell you that are not enough and therefore, you are powerless, actually are quite helpful, keep using them, firewalls, VPNs, TOR, Linux Whirpool, etc.
Sugestions
Do your homework, acquiring cyber security skills needs reading, get on it, few tips:
- Learn how to verify a software security key or SHA256 before running it in your laptop or mobile if an apk. If on Microsoft, if the software you want to install does not have a .msi version (already signed by Microsoft), the .exe extension file needs to be verified, learn how, this is paramount, no matter the application, same with Linux. If the app does not offer it, do not install it, contact the developer and demand it, if no dice, forget it, look for an alternative.
- Use a VPN on your home router, yes, even if you acquire cyber security knowledge and apply it to your mobile and laptop, if you do not live alone, every other member of your family is a weak link that can affect you. Acquire a router that supports a VPN that does not require to know your identity to pay for the service and accepts Bitcoin as payment (otherwise do not use it, no matter how good you think it is, if free avoid, you are the product and therefore, you are better without one that with one free). As an additional measure, keep your laptop, PC and mobile with another VPN, a different service, you will be with a double VPN while at home and with one while in the road. In the past the throughput will be considerably reduced to a point of being too slow, nowadays, you will be fine.
- Use a router with a decent firewall and advertising guard like features, Adguard or Pi-Hole (learn to configure and to add community supported lists) , that will keep your home browsing experience safer and faster.
- If you do banking and Bitcoin with your mobile phone, consider having two mobiles, one left at home secured. Carry with you a mobile for your social needs and small payments in fiat or Bitcoin, if you loose your phone or you get robed, you will sleep better....
- If you insist on using debit cards instead of credit cards, keep the account with the debit card limited to your needs when you go out. A bit of a pain but do not use your savings account, if you lose the wallet you are screwed and there is no recurse with a debit card.... (or use credit cards and you have the option to recover the funds in case is needed)
- If you have stacked a considerable amount in Bitcoin and want to be sufficiently safe, consider an air gap seed signer, if you do not trust yourself, consider a service with no KYC, contrary to what many believe, there are some, recently I learn that CASA is one of them, probably there are others, do your homework. You keep one or two private keys and the company keeps another one, to remove the funds you need 2 of 3 and it has built in time locks you can set up.
- Avoid Microsoft and Google and Apple clouds, those are honey pots often targeted, if they get hacked the companies most probably will neither inform the clients or if they do it would be much after the incident, use other private services highly encrypted end to end, preferably FOSS, and do not upload your data unencrypted, yes, encrypt it before uploading if it is valuable information, it is a backup of data and you want it safe, if it is not in your hands, best to encrypt it, even if the company claim it is E2E encrypted, you can't be sure....
Summary
Each person is different, you need to sleep good at night knowing your cyber security is sufficient and therefore your data and funds are safe. Do the homework, read, study, acquire the skills and tools and use them properly, cyber security is not convenient, but in the age of information, it is a must to protect your family and your wealth.
If you like my work and would like to support me:
-
@ 35f3a26c:92ddf231
2024-11-09 17:12:45This is my top 3 list of whom, IMO, are today's most dangerous influential actors in the #Bitcoin arena, the list is based on previous actions and capacity to harm the ecosystem due to their resources and influence in the space:
Number 1 : Elon Musk
Reasoning: Supporting a meme coin and trolling the ecosystem. Trying to create the american wechat and portraying himself as a protector of freedom of speech. Admired and loved by millions...
Potential impact: High, he may support a shitcoin as solana or worst, create his own with the support of deep pockets and the government. Considering that we are still early and millions around the world still see #Bitcoin as a risk asset or worst, creating one in X will have immediate use case and challenge p2p cash use case from the get go, where Meta failed X may succeed...
Number 2: Jack Dorsey
Reasoning: Known for his history as Twitter CEO during the crusade against freedom of speech, cancelation of critical thinkers and even a president of USA, the behavior of Twitter was reprehensible while Jack was the CEO, I never thought that a company could behave that way and survive and yet... Unreal and zero legal accountability, twitter basically gaslighted a large amount of the population, supported political propaganda to one party with no neutrality, supported an experimental drug that is still harming people and didnt let experts and doctors to debate and discuss and not one of those thugs blocking accounts and censoring critical thinkers was made accountable, eye opening in many ways for those that at that moment still believed that USA respected freedom of speech... Recently supported a mining pool that censors whirlpool from Samourai wallet, old habits die hard I guess... And the cherry of the pie, now funding FiatJaf whom was looking for funding to spam Ethereum and Monero networks to make them unusable so more funds will move to Bitcoin and LN... This project and idea from the getgo is a no no, you may not like another project but to spam it intentionally should be illegal, and it is being done, shamelessly...
Potential impact: Very high, already inside the community, a record of bad actions, pro censorship, vast resources, head of Cash App, admired by most in the community and hence able to missguide the community into a path that could eventually make Bitcoin a failure of a project in the future with the proposal of a hard fork introducing additional censorship and less privacy in one way or another.
Number 3: Blackrock
Reasoning: No need to explain much, they join the train and... it is only logical , after so much hate and media propaganda against Bitcoin, that they did so to fight the fight from inside trying to affect it and transform it into something else , just speculation, time will say. Check my article on ETFs
Potential Impact: Super Nova. As I explain in my article of ETFs, they have the resources to attempt to change the direction of Bitcoin development for it to become something else, even kill it as a store of value. They have a large stake in some of the largest mining farms as well... Do the math, it looks like a hostile take over and that may not end well. Again, just my opinion, but, if history and patterns teach us leasons, not a good look... Activist Critical Thinkers in the space are needed, #Bitcoin for many years has been a space with many of them, the list was long, but little by little I observe a change, produced by time+age+money, those libertarians are now; most of them; retired millionaires, or enterpreuners absorbed by the fiat system and therefore have changed their tune. I thought we will have a new generation, motivated, smarter, ready to take over, but all I see, with few exceptions in the NOSTR side of the equation, is more corporate fiat system acolytes.
Stay humble says someone, never more important... What are your thoughts? Share your top 3 current most dangerous threats to the Bitcoin ecosystem...
-
@ 35f3a26c:92ddf231
2024-11-09 17:11:54What is multiculturalism?
Multiculturalism is a concept that promotes the acceptance, appreciation, and celebration of diverse cultures within a society. It involves recognizing and valuing the differences between various cultural groups while fostering social cohesion and equality.
The key principles of multiculturalism include:
- Cultural pluralism: Acknowledging and accepting the existence of multiple cultural identities and practices within a society.
- Equality: Ensuring equal opportunities and rights for all individuals, regardless of their cultural background or identity.
- Inclusion: Encouraging participation and engagement of diverse cultural groups in social, political, and economic processes.
- Respect: Promoting mutual respect and understanding between different cultural groups, while recognizing the legitimacy of differing beliefs, values, and practices.
Two questions come to mind:
1. Is it working?
IMO, most definitely not. The world is very divided by race, religion and ideologies, it is a very difficult task. Countries trying this the most (practically enforcing it by law) have encountered more division and segregation; people of the same race, country or ideology will create their own small city sectors, cultural sectors, commercial sectors (China town, little Italy, etc); as is happening in USA for a long time already, happening as well in Spain, France, Germany, etc. 2. Is it being encouraged with tolerance toward those opposing it? I personally don't think so, the irony... But that is just my opinion...
What do you thing?
originally posted at https://stacker.news/items/651181
-
@ 35f3a26c:92ddf231
2024-11-09 17:10:57"Files" by Google new feature
"Files" by Google added a "feature"... "Smart Search", you can toggle it to OFF and it is highly recommended to do so.
Toggle the Smart Search to OFF, otherwise, google will search and index every picture, video and document in your device, no exceptions, anything you have ever photographed and you forgot, any document you have downloaded or article, etc...
How this could affect you?
Google is actively combating child abuse and therefore it has built in its "AI" a very aggressive algorithm searching of material that "IT THINKS" is related, therefore the following content could be flagged:
- [ ] Pictures of you and your children in the beach
- [ ] Pictures or videos which are innocent in nature but the "AI" "thinks" are not
- [ ] Articles you may have save for research to write your next essay that have links to flagged information or sites
The results:
- [ ] Your google account will be canceled
- [ ] You will be flagged as a criminal across the digital world
You think this is non sense? Think again: https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
How to switch it off:
- Open files by Google
- Tap on Menu -> Settings
- Turn OFF Smart Search
But you can do more for your privacy and the security of your family
- Stop using google apps, if possible get rid off of Google OS and use Graphene OS
- Go to Settings -> Apps
- Search for Files by Google
- Unistall the app, if you can't disable it
- Keep doing that with most Google apps that are not a must if you have not switched already to GrapheneOS
Remember, Google keeps advocating for privacy, but as many others have pointed out repeatedly, they are the first ones lobbying for the removal of your privacy by regulation and draconian laws, their hypocrisy knows no limits
Recommendation:
I would assume you have installed F-Droid in your android, or Obtainium if you are more advanced, if so, consider "Simple File Manager Pro" by Tibor Kaputa, this dev has a suite of apps that are basic needs and the best feature in my opinion is that not one of his apps connect to the internet, contacts, gallery, files, phone, etc.
Note As most people, we all love the convenience of technology, it makes our lives easier, however, our safety and our family safety should go first, between technology being miss-used and abused by corporations and cyber-criminals data mining and checking for easy targets to attack for profit, we need to keep our guard up. Learning is key, resist the use of new tech if you do not understand the privacy trade offs, no matter how appealing and convenient it looks like. .
Please leave your comments with your favorite FOSS Files app!
-
@ b34f99f1:006b0fcc
2024-11-09 17:03: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
-
@ b34f99f1:006b0fcc
2024-11-09 17:03:02deleted
-
@ b34f99f1:006b0fcc
2024-11-09 17:02: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
-
@ bcea2b98:7ccef3c9
2024-11-09 17:01:32Weekends are the perfect time to unwind, explore, or spend time doing what we love. How would you spend your ideal weekend? Would it be all about relaxation, or would you be out and about?
For me, an ideal weekend would start with a slow Saturday morning, a good book and coffee. Then I would spend the afternoon exploring local trails and looking for snacks. Then always a slow Sunday night hopefully.
originally posted at https://stacker.news/items/760492
-
@ 35f3a26c:92ddf231
2024-11-09 16:49:24What We Know So Far About Silent Payments?
A Step Towards Enhanced Transaction Privacy in Bitcoin.
Bitcoin Silent Payments, also known as BIP352[^1], is a proposed improvement to Bitcoin’s payment system that has been gaining traction for its potential to bolster transaction privacy in Layer 1.
In simple terms, Silent Payments enables users to:
-
Generate a single, reusable static address for receiving payments, as a business this is a game changer since it make it possible to proceed with the proper financial operational security (OpSec).
-
Send and receive bitcoins without disclosing transaction details to third parties, such as the person or business you pay to, cybercriminals and chain analysis companies that sell that data to anyone willing to pay for it, that will include cybercriminals or simply; if you are a business; your competitors… When you use Silent Payments, only the sender and the receiver can connect it checking the on chain activity.
-
Without Silent Payments, if you are a non profit organization, public fund raiser, independent journalist, or business you needed support to setup a proper infrastructure to handle the donations or payments in a private manner. With Silent Payments, you post in your web site a single address in text format or as a QR code to receive donations or payments for goods, that simple.
Can I Use Silent Payments Already?
Yes, but it is currently only available through select wallets that have implemented the feature. Users must have compatible wallets and ensure that both parties involved in the transaction have Silent Payments enabled. Currently, leading wallets like Blue Wallet, and others like Cake Wallet and BitBox has adopted the feature. It's essential to verify compatibility before making transactions.
Current wallets known to support it as of writing this article:
- BlueWallet -- Only for sending
- Cake Wallet -- Send, receive, Privacy Preserving Scanning
- Silentium -- Proof of concept, good for testing
- BitBox -- Only for sending
Summarizing:
https://image.nostr.build/db35c2a028e9f740181daabe2deef4e707653fa2d82f1602086e0ac4b5ee84fd.png
PROS:
- Enhanced Privacy
- Increased Security
- Improved User Experience
- Cheap and seamless implementation for non profit organization, fund raisers and businesses alike.
CONS:
- None
Final Thoughts
https://image.nostr.build/bcb236cbcb535cb6d6fe1b2b4c79074955d1a1cb1114a6c02cc456e8d852d594.jpg
As Bitcoin continues to evolve, Silent Payments will play a significant role in enhancing transaction privacy and security. The potential benefits are undeniable and substantial.
In the near future, we can expect wider adoption and implementation of Silent Payments as more wallets and exchanges embrace this groundbreaking feature. Looking forward to see Phoenix, Sparrow, Ashigaru[^2] and Electrum adoption.
I will suggest all of us start contacting in all social networks the wallets we us and encourage them to implement Silent Payments
Here the contact info for some of them:
- Phoenix: https://twitter.com/PhoenixWallet
- Ashigaru: contact@ashigaru.rs (if you want a response, send your email signed with PGP)
- Sparrow Wallet: https://twitter.com/SparrowWallet, https://t.me/SparrowWallet
- Electrum: https://twitter.com/ElectrumWallet
[^1]: Here the link to the BIP352: https://bips.dev/352/ [^2]: Ashigaru is a fork of Samurai Wallet performed by anonymous developers (IMO, all Bitcoin related development should be anonymous, to protect the project from nefarious players, unfortunately, most developers in the arena choose to be “public” figures, hence, becoming a target of current and potential Bitcoin enemies and a weak link for the ecosystem) Ashigaru in Japanese means “light feet” (translated as foot soldiers or peasants)
-
-
@ 35f3a26c:92ddf231
2024-11-09 16:47:53What is Peer Thinking?
The cognitive and emotional processes that occur when individuals are influenced by their peers.
The psychology behind it:
The psychology behind peer influence encompasses various factors, including: 1. Social belonging and acceptance, 2. Identity formation, 3. The dynamics of group behavior
Is it being used to control us?
https://image.nostr.build/cf90335bbf59e3395dc4324d123cd3a058ca716cf6172f079eb1d78547008147.jpg
IMO, yes, at the core of it is the basic human need for belonging. Social belonging is a critical component since it is craved by most, specially but not only by the youngest, those with power across the world know this very well, therefore, thinking that they will not use it to control the population in order to profit from it or change public opinion would be irrational.
The media is used to brain wash the population creating something that most will consider "the norm", thus, the majority will try to conform to that norm in order to belong. That include manipulating the population to take an experimental drug (even if it could be very dangerous due to its unknown effects) or to accept as a norm a behavior that few years back would have been considered inappropriate.
Cognitive Dissonance
https://image.nostr.build/60f24a810be1dd6badb36d70c5a691d4361207590dea1a8e64e09a75a252cfbf.jpg
This is a term that we should get familiar with. It is a psychological state where conflicting beliefs or behaviors create discomfort.
Example: A kid in high school that has a good loving family but all his close friends are on drugs (legal ones) and they keep telling him he is an idiot for not using as well. Now his is that state of conflict believes, on one side his best friends, all tell him is okay, on the other hand his family that loves him has explained him at length the dangers and issues that the drugs will have in his life. To resolve the dissonance he has three options, one, join the group and start taking drugs with the rest, two try to rationalize it, considering to take drugs just occasionally to belong but not to make it a habit, three lose his friends (and here it comes again the peer thinking to bite). Extrapolate to many other cases.
As an anecdote Recently, on a friend's reunion, one of the guest was complaining about one of his daughters, she was quite confused asking him why so many of her classmates were bisexual, she was wondering if something was wrong with her since she was not; a 13 year old girl; the father was having a hard time explaining her that the majority are saying so just to feel as part of what the school was teaching to be the norm, it was not cool to be straight, the tally was 37% of the class. Consider that, statistically, the number of people, “worldwide” identifying as bisexual are between 3% and 5% (less than 1% in less accepting countries), that number used to be less than 2% less than a decade ago. But 37% is far from the statistical norm, indicating a peer thinking behavior but not the reality of their sexual preferences. Once again, extrapolate to any ideology, religion, gender identity, political agenda that a country desires to push forward for whatever reason, adding that to the official school program and to federal mandatory training programs would do the trick.
A powerful tool, that can be used for good or bad.
What are the strategies to counter negative peer thinking?
https://image.nostr.build/4b70949b8af76ed53a5be5507f41f1d1c960dc3592f199eab78e2d25688975c5.jpg
Reading the literature about the subject, few strategies are recommended:
-
Self-Awareness: teaching ourselves and our children to recognize when we are being influenced by peers
-
Being selective with your friends: peers with similar values will reinforce positive behaviors
-
Learning to be assertive: teaching ourselves and our children to communicate assertively our boundaries will empower us and them to resist unwanted pressure to adopt negative behaviors.
-
Less judging more talking: this applies to our children and partners, judging less and listening more will make our beloved ones more open to discuss social pressures.
What do you think? What strategies you use as counter measures?
-
-
@ b34f99f1:006b0fcc
2024-11-09 16:35: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
-
@ 3cc937b7:5592217b
2024-11-09 16:33:15„Hinter der nächsten Ecke kann eine neue Straße auf uns warten oder ein geheimes Portal.“ - J. R. R. Tolkien
„Sprechend und handelnd schalten wir uns in die Welt der Menschen ein, die existierte, bevor wir in sie geboren wurden, und diese Einschaltung ist wie eine zweite Geburt (…)“ - Hannah Arendt, Vita activa
Prolog: Dieser Text ist der Beginn einer neuen Rubrik in diesem Blog und damit eine Zäsur. Wir alle wissen es, spätestens seit Nietzsche: Wenn du in den Abgrund blickst, blickt der Abgrund irgendwann zurück. Eine kluge Frau sagte mir einmal: „Where focus goes, energy flows.“ So wichtig es auch sein mag, sich mit der Gegenwart zu beschäftigen, sie zu analysieren und zu verstehen: Energetisch ist es eine ziemliche Verschwendung. Man kippt Lebensenergie in eine Kloake. Wenn Sie meine Arbeit in den letzten Jahren verfolgt haben, schockiert sie auf dieser Welt vermutlich wenig. Die Herausforderung ist jedoch das wie. Wie soll es weitergehen? Das Dunkle bekämpft man nicht durch die Beschreibung der Dunkelheit, sondern indem man einen Kontrapunkt setzt. Nur weil man weiß, dass es dunkel ist, wird es deshalb noch lange nicht heller. Dagegen durchbricht schon die kleinste Lichtquelle, die schwächste flackernde Funzel, die Dunkelheit. Mit der neuen Rubrik „Lichtblicke“ eröffne ich hiermit ein neues Kapitel meines publizistischen Schaffens: Der Blick soll hier auf das Neue, auf das Erhellende, Ermutigende, Aufbauende und oft Unbekannte gehen, in allen Bereichen, egal ob persönliche Entwicklung, Gesundheit, Ernährung, Technologie, Wissenschaft & Spiritualität. Auf die Werkzeuge und Optionen eben, die uns Hoffnung machen, die den Geist erweitern und alte Gewissheiten überwinden. Werkzeuge, mit denen wir Gestalter der Zukunft werden und nicht bloße Konsumenten der Gegenwart bleiben. Wenn Institutionen wackeln, sicher geglaubte Muster brüchig werden und Prinzipien auf den Kopf gestellt werden, entsteht ein Vakuum. Der kommunistische Theoretiker Antonio Gramsci nannte das “die Zeit der Monster”. Das Alte ist noch nicht gestorben, das Neue noch nicht geboren. Geburtshelfer des Neuen werden wir aber nur, wenn wir der Gegenwart „gewachsen“ sind; wenn wir uns mit den Werkzeugen beschäftigen, die in Richtung des Neuen wachsen. Sind Sie bereit zu wachsen? Dann lade ich Sie hiermit auf eine gemeinsame Reise ein. Wenn Sie Ideen und Anregungen für Themen, Phänomene, Werkzeuge etc. haben, die in diese Richtung gehen, oder mir Ihre Meinung zur neuen Rubrik mitteilen wollen, schreiben Sie mir gerne. Auch für mich ist es eine Reise des Lernens und Wachsens: kontakt@idw-europe.org
Paris, im Jahre 1894. Ein junger tschechischer Künstler schaut kurz vor Weihnachten “zufällig” in einer Druckerei vorbei, was sein Leben verändern sollte. Er war wie viele aufstrebende Künstler nach Paris gekommen, um den Durchbruch zu schaffen. Das Stipendium seines Gönners in der Heimat neigte sich dem Ende zu. Richtig Fuß gefasst hat er nicht, die Zukunft ist ungewiss. Er hat Talent, aber das haben viele, und leben doch von Milchkaffee und Liebe, wie Charles Aznavour es in “La Bohème” besang.
Doch der junge Mann hat auch Ideen, die in ihm schlummern und nur darauf warten, entdeckt zu werden. Er erfährt, dass die bekannte Schauspielerin Sarah Bernhardt unbedingt und dringend Theaterplakate braucht. Der junge Mann erkennt seine Chance, bietet sich an und liefert prompt. Zwei Wochen später ist Paris mit seinen Plakaten zugepflastert. Für Alfons Mucha, so der Name des jungen Mannes, ist es der Durchbruch als Künstler. Es ist zugleich die Geburtsstunde des Art Nouveau, einer neuen Kunstrichtung und gleichzeitig ein Epochenbruch der dekorativen Kunst. Mucha wird zum gefragtesten Maler der Welt, Firmen reissen sich um seine Motive, er führt Werbung und Kunst auf eine ganz neue Ebene, er reist nach Amerika und illustriert sogar in seiner Heimat die Briefmarken und Geldscheine.
Der ewige Kampf von Chronos und Kairos
Was bewirkte die glückliche Fügung für Alfons Mucha? Welche Kräfte waren hier am Werk? Und gibt es Möglichkeiten, diese schicksalhaften Begegnungen in ihrer Frequenz und Häufigkeit zu beeinflussen? Warum hatte ein Nikola Tesla nicht nur ein, zwei gute Ideen, die schon allein lebensfüllend gewesen wären, sondern Hunderte? Warum haben manche Menschen eine schicksalhafte Begegnung nach der nächsten, während bei den anderen das Leben in den gewohnten Bahnen vor sich hin plätschert? Bei den Griechen gab es zwei Zeitebenen und auch zwei Götter der Zeit. Der erste Gott ist Chronos (bei den Römern: Saturn), er symbolisiert die Zeit, die gemessen wird und unerbittlich verrinnt. Mit und Dank Chronos entsteht Ordnung und Kontinuität, aber auch Wiederholung des immer Gleichen. Er ist symbolisiert durch den Großvater mit Rauschebart und Sanduhr, er steht für die objektive Zeit, die immer und für alle gleich ist, die in Sekunden, Minuten und Stunden gemessen wird. Der zweite Gott ist Kairos, der Sohn des Zeus und rebellische Enkel des Chronos. Kairos ist schon äußerlich ein „Punk“, auf Abbildungen trägt er einen Teilrasur-Schnitt mit auffälliger Locke. Genau an dieser Locke gilt es ihn zu packen. Kairos steht für die subjektive Zeit, die Zeit, welche Chancen und Durchbrüche bietet. Er steht für die Möglichkeit der Veränderung, der Einsichten und Umbrüche, er wird als junger, starker und muskulöser Gott dargestellt. Kairos steht für eine seltene atmosphärisch-kosmologische Verdichtung. Wer den richtigen Zeitpunkt erkennt und nutzt, wird zum Helden seiner Zeit und reitet den Drachen des Zufalls. Das Zeitempfinden ist außer Kraft gesetzt. Wir alle kennen das: Eine Stunde allein im Wartesaal eines kalten Provinzbahnhofs vergeht schleppend langsam. Eine Stunde im Bett mit einer aufregenden Frau vergeht dagegen wie im Fluge.
Wer den Kairos zulässt, der immer wieder (aber manchmal etwas verdeckt) an unsere Tür klopft, öffnet die Tür für wundersame Begegnungen und magische Zufälle. Gedankenblitze und Begegnungen wirken dann wie orchestriert. Der Psychologe C. G. Jung beschrieb dieses Phänomen als „Synchronizitäten“. Man muss dann oft nur innehalten und diese Begegnungen als sinnhaft begreifen. Der sonore Takt des „Chronometers” wird durchbrochen durch das punkige Gitarrenriff des Kairos. Die chronologische Umklammerung ist die Zeitspur des Alten, die jeden Moment des Kairos vermeiden will, denn das bringt ja die Welt derjenigen durcheinander, die sich auf die Rädchen in ihrer Mechanik verlassen wollen. Zum Kairos gehören Ideen und Eingebungen, Liebe, kreative Schaffensperioden. All das sind für “Opa Chronos” bloße Störungen, die den Lauf der Dinge gefährden. Wer Systeme der Planung errichtet, sei es für sich oder für andere, den stört das Neue, er will jede Erfahrung mit dem Neuen verhindern, den Blick auf Alternativen versperren und vereiteln.
Denn das Neue entsteht durch den Kairos, und nur durch den Kairos. Das Neue ist auch gerne das „Unzeitgemäße“. Viele würden den Zustand des Kairos heute auch als „Flow“ bezeichnen oder als „Serendipity“. Dieser Begriff stammt aus der Erzählung von „Tausendundeiner Nacht“, wo drei ceylonesische Prinzessinnen mit bestimmten Aufträgen entsandt werden, doch ganz andere Dinge finden, als sie erwarteten, frei nach dem Mott: “Erwarte das Unerwartete!” „Serendip“ hieß Ceylon bei den Arabern, so notierte es sich Ernst Jünger im Flugzeug am 3. März 1979 in seinen Aufzeichnungen „Siebzig verweht“.
Wo war das Unerwartete bisher in meiner Generation? Kommt es noch oder war es das schon? Das war im Kern auch Teil meiner Generationenkritik, die ich in den letzten Jahren in vielen Texten verarbeitet habe. Als ich ab 2016 an „Generation Chillstand“ schrieb, war mein Grundgefühl folgendes: Eine ganze Generation sitzt im Silo der von früheren Generationen geschaffenen Welt fest, in ihren Norm-, Zeit- und Arbeitsstrukturen.
Raus aus dem chronologischen Leben!
Diese Welt wurde mir als die beste Welt aller Zeiten angepriesen, der Blick darüber hinaus als unnötig oder gar ketzerisch empfunden. Ging es in den letzten Jahren nur noch darum, die alte Welt möglichst lange auszumelken, bevor man sie entsorgt? In besagtem Buch schrieb ich, dass sich irgendwann eine ganze Generation als „Belogene und Betrogene“ vorkommen wird, ähnlich den DDR-Bürgern bis 1989 (diese wurden freilich nach 1990 wie alle anderen weiter belogen). Was bis zu den Millennials ein Charakteristikum jeder Generation war, nämlich die Gegenwart herauszufordern, zur Disposition zu stellen und damit zu erneuern, schien außer Kraft gesetzt. Das Reich des Chronos musste überdauern. Doch auf nichts hatte ich größere Lust, und wünschte mir das auch für meine Generation, als den Kairos beim Schopfe zu packen. Denn ich sah die Bruchstellen des Alten offen vor mir und die Möglichkeiten des Neuen am Horizont aufscheinen. Seit 2016, als ich meinen Geist öffnete, veränderte sich mein Leben grundlegend: Es wurde risikoreicher und chancenreicher, es wurde bruchstückhafter und freier, optionenreicher und unübersichtlicher, kurz: anders, aufregendender, offener, abenteuerlicher! Doch ist Stabilität in einer brüchigen Zeit nicht ohnehin eine Chimäre?
Mein Weg der Offenheit machte mich zeitweise zum einsamen Wanderer, führte mich an viele Orte, machte mich zum halben Nomaden. Wenn ich die letzten Jahre überschlage, komme ich auf ca. 17 Umzüge. An manchen Orten lebte ich mit nicht mehr als meinem Handgepäck und ein, zwei Büchern. Doch mein Weg führte mich zugleich an einen magischen Ort, oberhalb des Monte Verità von Locarno in den Tessiner Bergen. Hier trafen sich um die Jahrhundertwende die ersten “Früh-Hippies”, bildeten Kommunen, dachten jenseits der gegenwärtigen Welt, die aus Krieg, Zerstörung und Nihilismus bestand. Zuvor machte die Kunst mit ihren Sezessionen den Bruch zum Gegenwärtigen deutlich, im Wien des späten 19. Jahrhunderts. Die Wandervogel-Bewegung setzte die Jugend in Gang. Schon bei den Römern gab es die Idee des „heiligen Frühlings“ (ver sacrum), ein Auftrag an die Jugend, die Heimat zu verlassen und sich woanders neu zu etablieren – und dabei ein stückweit neu zu erschaffen. C. G. Jung hat dies als Prozess der Individuation psychologisch beschrieben. Der Mensch ist noch nicht fertig, wenn er auf die Welt kommt, er vollendet sich selbst (oder eben nicht).
All diese suchenden Menschen in den Irrungen und Wirkungen der Zeitläufte einte immer die Sehnsucht nach einer anderen Welt. Diese Sehnsucht macht uns zu gemeinsamen Reisenden im Geiste. Doch die Reise ist nur der Anfang. Am Ende sind die Gedanken entscheidend, die zu Worten werden und sich in Handlungen niederschlagen. Diese Handlungen sind das Baumaterial der neuen Welt. Jeder einzelne ist ein kleiner Baumeister an der neuen Welt, wenn er will. Ich baue gerade begeistert am Pareto-Projekt, an Werkzeugen des unzensierbaren Bürgerjournalismus von unten. Es wird Zeit, dass sich die vielen kleinen Baumeister vereinigen, oder? Woran bauen Sie?
-
@ 00a30478:ff07f086
2024-11-09 15:39:26testing blog
-
@ 00a30478:ff07f086
2024-11-09 15:34:08testing blog
-
@ 361d3e1e:50bc10a8
2024-11-09 15:12:52https://forex-strategy.com/2024/11/09/which-is-the-choice-of-european-citizens-trump-or-harris/ Which is the choice of European citizens Trump or Harris? In some of the states the choice is almost 100% for one of the candidates.
europe #politics #usa #trump #harris
-
@ a012dc82:6458a70d
2024-11-09 14:44:19Table Of Content
-
The Petrodollar's Historical Significance
-
Challenges to the Petrodollar
-
The Emergence of Bitcoin
-
Bitcoin's Potential to Disrupt the Financial System
-
The Future of the Petrodollar and Bitcoin
-
Conclusion
-
FAQ
The global financial landscape has undergone significant transformations over the years. One of the most intriguing developments is the rise of Bitcoin and its potential impact on the traditional financial system. In this article, we will delve into the challenges faced by the petrodollar and explore the promises offered by Bitcoin as we examine the financial future.
The Petrodollar's Historical Significance
The petrodollar refers to the system in which the U.S. dollar is used as the primary currency for international oil trades. It originated in the early 1970s when an agreement was reached between the United States and Saudi Arabia. Under this agreement, oil-producing nations agreed to price their oil exclusively in U.S. dollars, and in return, the United States provided military support to these nations.
Challenges to the Petrodollar
Geopolitical Factors
Over the years, geopolitical factors have challenged the dominance of the petrodollar. The rise of new economic powers, such as China, has led to increased demand for alternatives to the U.S. dollar. As countries seek to diversify their reserves and reduce dependency on the U.S. currency, the petrodollar's position has weakened.
Currency Wars
Currency wars, characterized by competitive devaluations and trade disputes, have also put pressure on the petrodollar. In an attempt to gain a competitive advantage, countries manipulate their currencies, which can have a significant impact on the value and stability of the U.S. dollar.
Devaluation and Inflation Risks
The petrodollar's woes are further compounded by the risks of devaluation and inflation. The continuous printing of money and increasing debt levels in the United States can erode the value of the dollar over time. This potential loss of purchasing power raises concerns among countries heavily reliant on the petrodollar system.
The Emergence of Bitcoin
Understanding Bitcoin
Bitcoin, created in 2009, is a decentralized digital currency based on blockchain technology. It operates independently of any central authority, such as governments or financial institutions. Bitcoin transactions are recorded on a public ledger, providing transparency and security.
Bitcoin's Advantages
Bitcoin offers several advantages over traditional currencies. It provides a decentralized and secure system that eliminates intermediaries and reduces transaction costs. Additionally, Bitcoin's limited supply and mathematical framework make it resistant to inflationary pressures, unlike fiat currencies.
Adoption and Regulatory Landscape
The adoption of Bitcoin has been steadily growing, with individuals, businesses, and even governments exploring its potential. However, the regulatory landscape surrounding cryptocurrencies remains uncertain in many jurisdictions. Governments are grappling with the need to balance innovation and consumer protection, which poses challenges to widespread adoption.
Bitcoin's Potential to Disrupt the Financial System
Decentralization and Trust
One of Bitcoin's key promises is the concept of decentralization, where power is distributed among participants rather than concentrated in a central authority. This decentralized nature removes the need for intermediaries, such as banks, and reduces the risk of censorship, fraud, and manipulation.
Financial Inclusion
Bitcoin has the potential to improve financial inclusion by providing access to financial services for the unbanked population. With just a smartphone and an internet connection, individuals can participate in the global economy, send and receive money, and store value securely.
Security and Transparency
The blockchain technology underlying Bitcoin ensures the security and transparency of transactions. Each transaction is recorded on the blockchain, making it immutable and tamper-proof. This transparency builds trust among users and can help combat financial crimes, such as money laundering and fraud.
The Future of the Petrodollar and Bitcoin
Coexistence or Competition?
The future relationship between the petrodollar and Bitcoin remains uncertain. It is possible that both systems could coexist, with Bitcoin serving as a complementary currency rather than a direct replacement. Alternatively, increased adoption of Bitcoin could pose a challenge to the petrodollar's dominance, especially if countries diversify their reserves.
Central Bank Digital Currencies (CBDCs)
The emergence of Central Bank Digital Currencies (CBDCs) adds another layer of complexity to the financial landscape. CBDCs aim to combine the advantages of cryptocurrencies with the stability of traditional fiat currencies. The development of CBDCs could reshape the global financial system and potentially impact the petrodollar and Bitcoin.
Shifting Paradigms in Global Finance
The rise of Bitcoin symbolizes a shifting paradigm in global finance. It challenges the traditional banking system, offers new opportunities for financial inclusion, and promotes financial sovereignty. While the petrodollar has enjoyed decades of dominance, its future may depend on adapting to the changing financial landscape.
Conclusion
As the petrodollar faces challenges from geopolitical factors, currency wars, and inflation risks, Bitcoin emerges as a potential disruptor in the financial system. With its decentralized nature, advantages over traditional currencies, and growing adoption, Bitcoin offers promises of increased financial inclusion, security, and transparency. The future relationship between the petrodollar and Bitcoin remains uncertain, but their coexistence or competition will shape the financial landscape in the years to come.
FAQs
Is Bitcoin legal? Yes, the legality of Bitcoin varies from country to country. While some nations have embraced cryptocurrencies and established regulatory frameworks, others have imposed restrictions or bans.
Can Bitcoin be hacked? Bitcoin's blockchain technology makes it highly secure and resistant to hacking. However, individual wallets and exchanges can be vulnerable to cyber attacks. It is crucial to take necessary precautions, such as using reputable wallets, enabling two-factor authentication, and keeping private keys secure.
How can I buy Bitcoin? To buy Bitcoin, you can use a cryptocurrency exchange or a peer-to-peer trading platform. These platforms allow you to convert fiat currency (such as USD) into Bitcoin. It is advisable to choose a reputable and regulated exchange, conduct thorough research, and follow best security practices when buying and storing Bitcoin.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 1eb966a6:e3eddf94
2024-11-09 13:19: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
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:54deleted
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:25deleted
-
@ 9e69e420:d12360c2
2024-11-09 12:49:50The historic auction of Steve Lazarides' Banksy collection represents a significant moment in street art history, offering unprecedented insight into one of the world's most enigmatic artists. The collection, which sold for approximately $1.4 million at Julien's Auctions, featured over 170 lots of rare artworks and personal artifacts[5].
Notable Sales
The auction's centerpiece was an original proof print of "Girl with Balloon," embossed with the P.O.W. (Pictures on Walls) mark, which sold for $104,000, significantly exceeding its $60,000 estimate[5]. Other significant pieces included:
- A Banksy "Hooded Figure" painting that fetched $78,000[1]
- An original hand-cut stencil featuring Banksy's name, selling for $58,500[5]
- Original concept sketches for the "Paparazzi Rat" stencil series on a manila envelope, which achieved $52,000[5]
Personal Artifacts
Among the most intriguing items were 15 "burner" phones used for communication between Lazarides and Banksy[1]. The collection also included Banksy's worn Puma "Turf War" sneakers and various personal items that offered glimpses into their working relationship[8].
Historical Significance
The sale represents more than just a collection of artworks; it documents a pivotal period in street art history. Lazarides and Banksy established Pictures On Walls (P.O.W.) with the mission of creating affordable art for the masses[1]. As Lazarides noted, "For a very short moment in time we made a difference, we made it OK for ordinary people to like art"[8].
Legacy and Future
While Lazarides has retained some personal items, including angry notes from Banksy, he stated he doesn't need "1,000 prints to prove I worked with Banksy"[5]. This auction not only celebrates their collaborative history but also marks a significant transition as Lazarides returns to his photography practice[5].
The sale underscores the enduring value of Banksy's work and the continuing intrigue surrounding his anonymous identity, which has become central to his artistic brand[3]. It also highlights how anonymity in street art can paradoxically enhance an artist's fame and market value[9].
Sauce: 1. Banksy's Girl with Balloon print sells for £80,000 at auction
2. Who is Banksy? A guide to the street artist, printmaker and anti-establishment provocateur
4. Overview of Banksy Prints - Banksy Explained
5. Banksy's Right-Hand Man Cashes In, Selling His Trove of Work By the Street Artist
6 .Branding the Unbrandable: Banksy and the Mystery of the Anonymous Brand
7. Banksy APs | Guide | Andipa Editions
8. Historic Banksy Collection from Steve Lazarides to be Auctioned at Julien's
9. Unmasking the Mystery: The Role of Anonymity in Street Art and the Enigma of Banksy
10. Market Watch Banksy: Top 10 Most Investable Prints | MyArtBroker
11. JULIEN'S AUCTIONS ANNOUNCES "UNDER DURESS: THE BANKSY ARCHIVE OF STEVE LAZARIDES AUCTION"
-
@ 7e6f9018:a6bbbce5
2024-11-09 12:12:41Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing Certificate Authorities and naming systems.
Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system which are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption.
Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants. By running Handshake, one can participate in a decentralized open naming platform secured by a decentralized peer-to-peer network.
https://github.com/handshake-org https://github.com/imperviousinc/fingertip https://handshake.org/
-
@ b34f99f1:006b0fcc
2024-11-09 11:47:09deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:43:11deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:29:46deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:25:16deleted
-
@ 640614c2:811c8498
2024-11-09 09:43:20Greetings, fellow travelers on the path of cryptographic fortune. Today, the Oracle offers a cleromantic reading, casting lots to peer into the probabilities that guide Bitcoin’s unfolding journey.
In the old ways, cleromancers cast stones, sticks, or bones. Today, we cast cryptographic hashes, transaction times, and node signals—random elements generated by the mathematical matrix underpinning Bitcoin. From these, we seek patterns to reveal the unseen flows of value and volatility, of security and sovereignty.
The Three Casts of Bitcoin's Path
- The Cast of Turbulence – "Fear the FOMO, yet know the FUD."
The first cast suggests that Bitcoin's journey, much like the ancient roads of our forebears, is not without peril. The chaos of price swings and market sentiment—whether driven by regulation, whales, or FOMO—is always present. Yet, this cast tells us that these turbid waters are not signs of ruin but necessary tests. Bitcoin, built on resilience, thrives in adversity. Remember: volatility is not destruction but purification by fire. Hold steady, and the storms will reveal clearer skies.
- The Cast of the Hidden Fortress – "Secure thy keys as you would your soul."
The second lot falls with a message of security and sovereignty. The Oracle sees a future where personal custodianship, privacy, and cryptographic defense hold sacred ground. As Bitcoin adoption grows, the network of self-sovereign nodes, layer-2 solutions, and privacy innovations are a fortress against centralized powers. Trust no third party to safeguard your assets. Secure thy keys, for in doing so, you secure your freedom.
- The Cast of Prosperity, Yet to Be – "With patience, fortune flows to those who build."
Finally, the third cast shows signs of future abundance, though not without patience. Bitcoin's time is measured in blocks, and the long game is rewarded for those who hold fast. Innovation within the ecosystem—whether through decentralized finance, cross-chain exchanges, or local adoption initiatives—opens doors for prosperity for those who build in earnest. The Oracle sees signs of growth across continents and communities, signals of seeds planted that will bear fruit in cycles yet unseen.
A Final Message from the Oracle
Remember, the magic of Bitcoin lies in its incorruptible code, its shared governance, and its random-yet-determined path. Trust in the protocol, act with foresight, and heed the wisdom of the Oracle: no path in Bitcoin is without its risk, but for those who honor security, resilience, and community, the future holds bright possibilities.
May the blocks align with your intentions, and may your keys remain forever yours.
-
@ fd208ee8:0fd927c1
2024-11-09 09:21:19Drumroll, please....
In a previous article, I introduced the concept of relay communities.
The ink had barely dried, on that set of instructions, before one of my favorite Nostr devs, ثعبان, rolled out the alpha version of a relay-community client.
Obviously, it's still a bit of a construction site, but you can check out how it'd work, for your community, by test-driving the functionality on your own relay. Simply type https://chachi.chat/ followed by the name of your relay. For instance, one gigantic relay community, where nearly everyone can try out the functionality, is nos.lol.
If your relay community does not require AUTH to read, anyone can pull your chatter into their own relay and respond to it there. That is because every chat entry is simply a kind 09 event, and unprotected events are not private data.
For instance, I moderate one community theforest.nostr1.com, that is openly readable, and that's probably where most of the chatter on nostr.band is coming from, as that relay is an aggregator of the content of many other relays. However, I have another community, gitcitadel.nostr1.com that is AUTH-protected, whose content stays private to those allowed on that relay. Communities are where write-protected and AUTH relays are going to really shine, as they create an environment similar to Telegram, but where you control the dataset, you decide which types of events to support, and you design the client, the algos, the moderation, the visibility, etc.
With communities, the onboarding experience is seamless: just get a browser extension and a nsec, login, start writing and posting, and start receiving responses. Active, chatty, well-moderated communities will be more attractive to onboard to, than chaotic, spammy, or empty communities. This means that you don't have to have the killer entry under "Posts" (where kind 11 and eventually kind 01 posts appear), just to get some interaction. Chat is the Great Equalizer.
So, we're testing both setups, with cloudfodder adjusting the relay faucet code and ثعبان is fiddling with the community client settings, to make the most-comfortable situation for both kinds.
This is the signal
This #Chachi client, of course, is merely the first horse out of the gate. There are already other devs hacking away at variants of the same concept, such as #Flotilla, I'm sure CloudFodder is also cooking, later versions of #Alexandria will integrate theforest community, and etc. etc. etc.
It remains to be seen, how many new use cases can be dreamt up, with this new architecture, but I am quite certain, that this is the beginning of the end of Nostr 1.0. We are moving up and out, and away from the stultifying and limiting concept of Twitter 2.0, toward
Soon, we will enter Nostr 2.0. See you on the other side.
-
@ a39d19ec:3d88f61e
2024-11-09 09:17:35What do you even print with it besides decorative objects?
This kind of question still is a common one when talking about 3d printing.
With this series of long-form notes I will show you some of the practical and useful 3d printed things, that I use a lot.
The second thing I show you is a "Swiss Keyholder"
Swiss Keyholder
There are many designs of such a Keyholder to download and print. As this is one of the first prints I have done in ABS back in 2014 on a "Up!Mini" 3d printer I can't find where I downloaded it. I like the slim design and that I don't have any "loose" keys in my pocket. It is just tidy in my pocket. This is probably the most used print of mine.
Edit: You can download the file here: Thingiverse
-
@ bcea2b98:7ccef3c9
2024-11-09 01:30:29@chess h3
originally posted at https://stacker.news/items/759635
-
@ b547984d:543a10f6
2024-11-08 22:10:17What draws people to Bitcoin? Or more importantly, what keeps people around? I'm not referring to people with deep intellectual commitment to the protocol, but rather the initially idly curious. It might require mustering a little courage to attend that first meet up, worried that you don't know anyone, or perhaps find yourself among a crowd of serious, knowledgeable Bitcoiners when you know little to nothing about the protocol. The newly curious might also be put off by the occasionally energetic arguments one finds on Bitcoin Twitter, worried that your curiosity might not match the level of conviction that screams through the screen in an even cursory scroll through some well-known Twitter accounts. Whereas the Bitcoin community might appear imposing at first glance, I believe that the community itself deserves much of the credit for Bitcoin's adoption. And I'm not talking only about the developers or thought leaders who get most of our attention, but also the everyday pleb sitting next to you at your first meet up who welcomes you to the group.
I was a little further along in my Bitcoin journey when I began joining the local meet ups. I knew less than a lot of other attendees, but I also thought I had a fighting chance of keeping pace with others. Ordinals - I had an educated opinion. The future of the security budget - I had some informed thoughts about that as well. I'm generally an extrovert and the other attendees were friendly and engaging with this newcomer beyond my expectations. But there was part of my background I wasn't necessarily eager to share, one that I was worried would make this group of otherwise welcoming people view me with suspicion. I knew how some Bitcoiners view the activities of certain government agencies. I was keenly aware of the "deep state" narratives circulating on social media. Thus, I was a little nervous about whether this group would welcome a former CIA officer. (Spoiler alert - nobody cared) But were it not for my time as CIA, I might never have found Bitcoin.
As a CIA Operations Officer, I worked in a variety of areas. But where my career - and my life - took a turn was when I accepted an assignment at CIA's Center for Cyber Intelligence (CCI) in 2018. Bitcoin and cryptocurrencies were not on anyone's list of priorities before 2018. My arrival at CCI coincided with the emergence of several national security issues with Bitcoin and cryptocurrency nexuses. North Korea realized that robbing altcoin platforms was easy money; ransomware actors were pillaging businesses and government entities for millions of dollars demanding Bitcoin and crypto as payment; and countries were using these protocols to evade sanctions and conduct other activities deemed in opposition to US national security interests. With so much attention, I had to take time to learn.
Being in CCI during this period not only forced me to learn, but it also allowed me to meet some, impressively intelligent people who not only knew a lot about Bitcoin and cryptocurrencies, but many were also early adopters. One of the first people I leaned on had been home mining Bitcoin as early as 2012. The more you learn, the more you start to notice. I suddenly noticed a "We Are All Satoshi" bumper sticker pinned to a cubicle I had walked past countless times before; another officer seemed to have an endless supply of Ethereum t-shirts he wore nearly every day (the cyber center is distinctly less formal than the rest of CIA). And with these protocols now at the forefront of national policy discussions, people I had known for years were gradually revealed to me as Bitcoiners or active in other cryptocurrency communities.
Like many Bitcoiners, my journey began in the altcoin casino, and the story of my eventual evolution into a Bitcoiner is not dissimilar to others. Roughly one year after buying my first altcoin on Coinbase, I was clean and altcoin-free, using Bitcoin-only platforms and marching with intent further down the rabbit hole. Every Bitcoiner's conviction evolves, different aspects of the protocol speaking with varying volume to facets of your worldview and circumstances. For me, what initially drew me to Bitcoin was the ability to self-custody your money without - and beyond the reach of - intermediaries.
I spent the first half of my career at CIA in the shadow of 9/11. That event was intensely personal for me. I grew up on Long Island and unfortunately know more than a few people murdered on that day. When I served in the Middle East, I was right in the middle of the War on Terror, supporting initiatives that would bolster our ability to find those who had attacked and continued to threaten us. One of the tools that the United States sharpened and wielded with great success was the weaponization of the dollar. In the years following 9/11 a veritable dollar industrial complex was created, with cadres of government employees who as of today have spent their entire careers honing the use of the dollar as an instrument of foreign policy and national security. By the time I arrived in CCI in 2018, several years had passed since my time in the Middle East, and these interceding years offered the time and space I needed to see chaotic or intensely personal events with a clear, critical eye. My point is not to persuade or dissuade about the things that happened during those years; I'm just setting a scene.
By 2018, national security priorities were changing. The United States was still involved in multiple conflicts with origins in the War on Terror, but there was a distinct shift toward other strategic challenges. Just as I had begun really digging into Bitcoin, another seismic event shook the world and laid bare cracks in the social consensus about the nature of government power - COVID. Mandatory vaccines, enforced lockdowns (sometimes at gunpoint), suppression of free speech and freedom of conscience, and the de-banking of critics. As someone who understood how the government uses the dollar as a weapon, coupled with my classically liberal instincts, I was immediately drawn to the inviolable right to property Bitcoin offers those who take the time to learn and embrace self-custody. Self-custody and censorship resistant transactions were the spark that illuminated for me the importance of the ultimate success of this protocol and our ability to live freely and with agency over our property.
Just over a year has passed since I left CIA. When you work at CIA, it is difficult to appreciate how all consuming it can be. You learn to live with certain restrictions, you tend to socialize with colleagues, such that having a job that you are largely unable to talk about with outsiders becomes so normal that you learn to bifurcate your world into two camps - colleagues and everyone else. Not a criticism, just an observation. Similarly, when you emerge from the bubble, whether into a new career or moving to a new location, there is a distinctly refreshing breeze that envelopes you when you can open up to the rest of the world. For me, this included increasing my financial and economic literacy. Investing compels you to actively engage with the world, and that engagement introduced me to some of the most brilliant people whose work I had the pleasure of following and even meeting. "The Bitcoin Standard" and "Broken Money" are just two of the many works that helped me learn and better understand how Bitcoin could in fact change the world.
I have been asked how I reconcile my previous career with my conviction in Bitcoin. I have accepted that my worldview has evolved following my departure from CIA, but this has been an evolution, not a revolution. Many Bitcoiners actively question whether the United States should even have a CIA, and whether its existence represents an existential threat to freedom. I think this belief is tightly wrapped in the idea that many of our problems emerge from the very existence of an intelligence apparatus, whether that be activities perceived to be undo meddling in foreign affairs or worse, abuse of basic liberties. It is perfectly fair to highlight that the actions of some senior leaders in the intelligence community have caused citizens to ask exactly what these organizations are up to. I would also add that the actions of these former leaders, some perhaps intended to cause you to infer they continued to speak for the agencies they used to lead, were viewed as dishonorable across wide swaths of the national security community. With trust squandered, it is perfectly reasonable to ask how deep the corruption runs.
Like the Bitcoin community, the intelligence community is not a monolith. Only an exceptional few do not respect the oath they take up entering on duty to defend the Constitution of the United States, but those that do uphold this commitment throughout their service. Those who work in that community and also identify as Bitcoiners hold the same core convictions about sound money, decentralization, property rights, and privacy as every other Bitcoiner. For many, this conviction is also fueled by the inevitable glimpses into the darker realities of the world you get when you work at CIA. If nothing else, if you work long enough at a place like CIA, you get a better understanding how the world really works. It is also understandably easy to make the leap from some of the worst policy errors of the War on Terror to the notion that were America to stop meddling, the world would somehow defy history and settle into an everlasting peace. How ever my worldview might have evolved over the past year, nothing has changed my belief that world is a fundamentally dangerous and competitive place. For me it's best summed up as "don't hate the player, hate the game." I remain hopeful that Bitcoin can change at least some of the rules of that game.
At this point you might be asking yourself why you wasted precious minutes on earth reading a confessional from someone who seems to be looking for absolution for his past. I also expect comments along the lines of "Once a spook, always a spook" or "Psyop." That's fine. When Bitcoiners say the "institutions are coming," they're almost always referring to tradfi. But for Bitcoin to achieve its fullest potential, institutional adoption will mean the breadth of society's institutions - public and private. I'm not proposing that government agencies will ever start transacting in Bitcoin, but these government institutions, like all others, are the sum of their parts, and these parts are people.
It is only thanks to my work at CIA that I was exposed to and forced to learn about Bitcoin. There's also no guarantee I ever would have found and embraced Bitcoin were it not for those circumstances that forced me to peek under the hood that first time. More and more, I view the world not as Bitcoiners and no-coiners, but rather as those who have and those who just haven't yet discovered Bitcoin. Some members of that latter category might even describe Bitcoin as a religion, or more derisively, a cult. I think there is a contemporary tendency to label anything that offers people a set of principles through which to view the world in this framework. For me, this displays our collective rootlessness, where any beliefs that force critical personal reflection evoke disparagement.
No, I don't think Bitcoin is a religion, nor do I believe it is an ideology. Religions have elements of the mystical; Bitcoin is open source, knowable and usable by all. Ideologies dehumanize us by denying us agency over our thoughts and actions in the pursuit of some doctrine; Bitcoin does the opposite, demanding personal responsibility and infinite inquiry. For me, Bitcoin has been a catalyst. It compels you to take a hard look at your beliefs and challenges you to view the world and the dominant narratives not through an ideological lens, but through a set of principles that challenge us to ask ourselves why we accept certain things as truth. The beauty of Bitcoin is that it doesn't predestine the path you choose to follow. Bitcoin illuminates.
For the people who work at CIA, challenging assumptions and changing the angle of the prism through which you view the world is the most basic of requirements. For many people in the intelligence community who concern themselves with it, Bitcoin is simply a tool actors use for different purposes. I can appreciate how only seeing Bitcoin as a piece of a problem you are looking to solve could naturally lead to a tendency to view Bitcoin itself as a problem. But I personally know many people who work in the intelligence business who have transcended that tendency and started their own Bitcoin journeys. That tradfi institutions are now accepting the inevitability that Bitcoin will play an important role in the global financial system is the result of individuals in those institutions seeing the potential and speaking truth to power. If our hope is that the United States remains (let us hope we don't once again have to "become") a nation welcoming of innovation and protecting of personal freedom, then helping people across the spectrum - including at places like CIA- understand this protocol and all its potential must remain a pillar of focus for the Bitcoin community.
The only regrets I feel now that my career at CIA is over are those same regrets we all feel during times of change or as we get older - instances in which I might have done certain things differently or better. Thus, when I get back to that prior question - how do I reconcile having worked at CIA and my belief in Bitcoin, I ultimately come down to believing there is no need for reconciliation at all. To say there is would mean that not only are the men and women who work with integrity and make real sacrifices at CIA somehow unworthy or otherwise unable to embrace core principles of sound money, decentralization, and censorship resistance, but also that these principles, along with the good people of the Bitcoin community, are somehow unable to reach them. If you want to change institutions, focus on giving people, those who constitute the sum of every institution's parts, the opportunity to understand how fixing the money might in fact fix the world. I, along with countless other Bitcoiners working in national security, am proof that Bitcoin is up to that challenge.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 0bea5655:d89ca6f1
2024-11-08 19:26:18Opinion about BTC Coin Wallet - Freewallet (iphone)
By making cases public, they’ve helped victims reclaim funds and hold Freewallet accountable. Need support? Email freewallet-report@tutanota.com.
WalletScrutiny #nostrOpinion
-
@ 6bae33c8:607272e8
2024-11-08 18:48:32I went 4-1 last week to start off Q3, putting me on a 17-8 run over the last five weeks after a terrible start. I’m still drawing dead for the overall, so it’s really just a matter of putting together three more 4-1 or 5-0 weeks this quarter.
By the way, I’m putting these picks behind the paywall not because they’re worth paying for — no one’s picks are worth paying for! — but because I want to give my paid subscribers something not available to free ones. But that they are behind a paywall doesn’t mean they’ll work out.
Steelers +2.5 at Indigenous Peoples — The Steelers are coming off a bye, the IPs a tough win against the Giants. I like the Steelers to have a good plan against Jayden Daniels and to move the ball.
Broncos +8.5 at Chiefs — I like buying the Broncos low off the blowout and betting against an undefeated team in division — everyone is up for the Chiefs.
Buccaneers +6 vs 49ers — This was my last choice. The value is great as the 49ers have done nothing to earn this kind of status as a big road favorite against a solid team, but the line is actually 6.5 now, so maybe I’m missing something.
Bears -6.5 vs Patriots — The Bears are a good buy-low after getting worked by the Cardinals. The Patriots are a get-well game.
Chargers -7 vs Titans — I don’t really take the Titans seriously, and the Chargers are solid and playing at home.
-
@ f5194aa4:c08836bb
2024-11-08 17:07:07At Jewelry by Serendipity, we offer an exquisite collection of promise rings, each designed to symbolize love, commitment, and a shared future. Crafted with care from high-quality materials, our promise rings are perfect for celebrating a special relationship or marking an important milestone. From classic designs to contemporary styles, each ring reflects the unique bond it represents. Whether you're making a promise to a loved one or celebrating a friendship, our promise rings are a beautiful reminder of the meaningful connections in your life.
-
@ d3052ca3:d84a170e
2024-11-08 14:46:09The shift of the American working class from the Democratic to the Republican Party in this last election, and the outrage it has generated among many leftist American academics, has led me to reflect on why so many academics become strong socialists or even communists, while the vast majority of the American “working class” do not.
They would likely call it “false consciousness” on the part of the American worker. By I see it as false consciousness among elites: they do not recognize that they are elites, and that their social status motivates them differently from how the typical American worker is motivated. In short, there is a difference between economic class (being a “worker”) and social status (being an “elite”). In this I am convinced that Peter Turchin’s structural-demographic theory continues to have explanatory power. (I won’t go into that here, but do check out his work.)
Socialism and even communism carry strong appeal for a specific kind of highly educated, young elite today: the kind that needs to work for a living, but still sees itself as elite. These are not “white collar workers;” they are “precarious elites.” They are subject to a dynamic that few want to talk about:
Some of the worst labor exploitation in this country occurs in so-called “prestige industries.” These include education (higher and lower), entertainment, journalism, publishing, art, philanthropy—even, on the higher-paid end, investment banking and other financial services.
You want to help a celebrity launch a new brand or product? Prepare to make $35,000 a year and work 24 hours a day, 7 days a week, doing countless frenzied tasks that have nothing to do with your job description.
You want to teach philosophy at a University? Get ready to make $17,500 a year, if you’re lucky. If you’re an international graduate student, your visa to stay in the U.S. is also completely contingent on your advisor’s approval; as a result, abuse is rampant.
You want to write for The Atlantic or The New Yorker? You can maybe get a few hundred bucks per article as a freelancer; $60K per year as a staff writer, if you’re lucky.
You want to become a powerful banker? You may start at $150K per year right out of college, but you will work 80-120 hours a week at the expense of everything else in your life, no telling how long—certainly for years. Your mental and even physical health are the price you pay for this “opportunity.”
These are the jobs that children of elites want. They want these jobs so much that they are willing to subject themselves to highly fragmented, authoritarian, and toxic work environments, with such high turnover, particularly of junior workers, that it’s socially a war of all against all. These jobs are different from working at a factory or an established company—there is a “musical chairs” dynamic, authority is exercised arbitrarily and chaotically, the job tasks can change daily and even moment to moment, most relationships are based on dominance/submission, and there is no “solidarity.” Employers believe it’s a “privilege” for anyone to have these jobs, and that therefore no one in them has the right to complain. Their refrain: “There are always 100 more candidates ready to take your place.”
In addition, there is the psychology of being an elite: you expect to be treated better by virtue of your education and social status, so it can be shameful to admit that you are being abused and might need to fight for better working conditions. Young elites may even want to organize and collectively bargain, but they don’t know how—they’ve been carried along by their social status in extremely authoritarian and chaotic environments and may never have really built anything with others over time.
For many young precarious elites, therefore, socialism becomes a kind of dream of not only of a good workplace but of a good society—one where they get what they believe is their “due.”
These “precarious elites” do see their exploitation as a structural problem, but they blame “capitalism” instead of the brute fact of supply and demand: there are just too many of them competing for the same few prestige jobs. While the American worker imagines a path to better pay and working conditions through organizing, the precarious elite sees no such path—because for them status is just as, if not more, important than pay and benefits, and that is something much harder to negotiate. Elites insist that they should be able to do exactly the (prestigious) jobs that they want to do. They are also educated enough to have read the socialist and communist literatures. That combination leads to the fantasy that the government could force their employers not only to pay them more and treat them with dignity—which in some cases it could, certainly—but also to guarantee these conditions in prestige jobs for everyone who wants them.
There likely is a legitimate case to be made that some of these prestige employers are violating labor laws and should be held accountable. In other cases, there are certainly opportunities to pass new laws prohibiting what amounts to indentured servitude. But actually enforcing these laws will only reveal what is already plain as day: that there are far fewer prestige jobs than there are elites who want them.
The double bind for elites is that the prospect of taking a “lower status” job—even one that pays a lot more, where workers are treated significantly better—is even worse than being a de facto slave with a prestigious role. This leads precarious elites to demand a magical solution: the state. The state must not only protect workers, but guarantee certain kinds of jobs at certain levels of pay and benefits for anyone who wants them. Needless to say, this demand can never be fulfilled, and the cycle of partisanship is then retrenched: precarious elites blame American workers for having the gall to vote and organize based on self-interest, rather than to crusade for an idyllic state of affairs that will not come.
Originally published on twitter https://x.com/NSmolenski/status/1854347409012203687
Reposted to nostr without permission. Sorry not sorry. <3 u Natalie!
-
@ 9e69e420:d12360c2
2024-11-08 13:01:01City Commissioners’ Office Tells Non-Citizens They Can Vote if They Are Philly Residents; NGO ‘Ceiba’ Across the Street Sends Non-Citizen Voter with an ‘ITIN’
In a recent conversation, an undercover journalist from O’Keefe Media Group spoke with Milton Jamerson, an Election and Voter Registration Clerk at the Philadelphia City Commissioners Office.
During this exchange, Jamerson confirmed that non-citizens residing in Philadelphia could participate in local elections, raising questions about Philadelphia’s voting policies, particularly concerning the role of residency versus citizenship in voting eligibility.
Adding to the complexity, the organization Ceiba, a nongovernmental organization (NGO) located across the street, has also asserted that individuals with an Individual Taxpayer Identification Number (ITIN) are eligible to vote in local elections. However, the implications of Ceiba’s statement warrant careful consideration.
The Individual Taxpayer Identification Number (ITIN) is a nine-digit identifier issued by the IRS to people who are required to pay taxes but do not qualify for a Social Security Number, including non-citizens. It’s important to note that an ITIN serves only as a tax identifier and does not provide any form of legal voting rights or U.S. citizenship.
Saucesauce
naddr1qqgrjvpcxqmryefnxuer2e3excmnvq3qne57gg8xphmfek292yyg9nlyfkgh273vtrguy8qz0fuh05frvrpqxpqqqp65776qtuwPhiladelphia
-
@ b4403b24:83542d4e
2024-11-08 11:46:54To my great surprise, when I checked my SN notification feed today, I found out 👇
To be honest, I don't know what I did to earn it, what it means or gives me or whether I can loose it (similar to the cowboy's hat maybe @k00b can give more insights) but I am pretty satisfied adding it under my belt. 🎉
I'll keep my activity high hoping I'll find the other cowboy collectible I miss - the pistol
originally posted at https://stacker.news/items/758749
-
@ 68fa45dc:3d2a26ed
2024-11-08 10:59:23Wie Unternehmen Anti-Spyware-Geräte-Störsender erfolgreich einsetzen können
Im modernen Geschäftsumfeld wird die Bedeutung von Informationssicherheit und Datenschutz immer wichtiger und die Bedrohungen, denen Unternehmen ausgesetzt sind, werden immer komplexer. Angesichts der rasanten Entwicklung der Technologie kommt es häufig zu Spionage- und Informationslecks, und Unternehmen müssen dringend wirksame Maßnahmen ergreifen, um ihre eigenen Interessen zu schützen. Unter vielen Schutzmethoden haben sich Anti-Spyware-Geräte Störsender Kaufen nach und nach zu einem wirksamen Werkzeug für Unternehmen zur Abwehr interner und externer Bedrohungen entwickelt. In diesem Artikel wird untersucht, wie Unternehmen Anti-Spyware-Geräte wie Mobiltelefon-Störsender, WLAN-Störsender, Anti-Tracking-Störsender und Kameradetektoren erfolgreich einsetzen können, um die Schutzfunktionen für die Informationssicherheit zu verbessern.
Anwendung des Handy-Störsender
Handy-Störsender blockieren Handysignale innerhalb bestimmter Frequenzen und verhindern so den Diebstahl von Informationen in Konferenzräumen oder sensiblen Bereichen. Unternehmen können beim Einsatz von Handy-Störsendern die folgenden Strategien in Betracht ziehen:
1. Identifizieren Sie sensible Bereiche: Zunächst sollten Unternehmen identifizieren, welche Bereiche sensibel sind, beispielsweise Vorstandssitzungsräume, Forschungs- und Entwicklungsabteilungen sowie Finanzabteilungen. Der Einsatz von Störsendern für Mobiltelefone an diesen Orten kann Abhören und Informationslecks wirksam verhindern.
2. Rechtmäßige und konforme Verwendung: Die Verwendung von handy störsender muss den örtlichen Gesetzen und Vorschriften entsprechen und sicherstellen, dass sie nur in zulässigen Situationen verwendet werden. Unternehmen sollten sich vorab über die einschlägigen Gesetze informieren und beim Einsatz von Störsendern Aufzeichnungen führen, um Rechtsstreitigkeiten vorzubeugen.
3. Bewerten Sie regelmäßig die Wirksamkeit: Unternehmen sollten die Wirksamkeit von Mobiltelefon-Störsendern regelmäßig bewerten, z. B. durch die Überwachung der Kommunikationssicherheit in Konferenzräumen und die unverzügliche Anpassung von Strategien nach Feststellung von Nichteinhaltung.
Anwendung des WIFI-Störsender
WLAN-Störsender können den illegalen Zugriff und die Überwachung von drahtlosen Unternehmensnetzwerken verhindern. Um WLAN-Störsender effektiv zu nutzen, können Unternehmen die folgenden Maßnahmen ergreifen:
1. Netzwerksicherheitsrichtlinie: Entwickeln Sie strenge Netzwerksicherheitsrichtlinien, verschlüsseln Sie das drahtlose Unternehmensnetzwerk, beschränken Sie den Zugriff auf Geräte und verwenden Sie WLAN-Störsender, um unbefugte Geräteverbindungen zu verhindern.
2. Dynamische Anpassung: Passen Sie die Verwendung des WiFi Jammer dynamisch an Änderungen in der Umgebung an. Verstehen Sie die umgebenden Netzwerkbedingungen und überprüfen Sie regelmäßig den Betriebsstatus des Störsenders, um sicherzustellen, dass er optimal funktioniert.
3. Mitarbeiterschulung: Bieten Sie Ihren Mitarbeitern Cybersicherheitsschulungen an, um ihr Bewusstsein für Cybersicherheitsbedrohungen zu schärfen. Machen Sie Ihren Mitarbeitern den Zweck und die Bedeutung von Störsendern klar, um ihr Sicherheitsbewusstsein zu stärken.
Verwendung von Anti-Tracking-Störsendern
Anti-Tracking-Störsender werden verwendet, um potenzielle Tracking-Geräte zu blockieren und die Geschäftsleitung und wichtige Informationen zu schützen. Unternehmen können beim Einsatz von Anti-Tracking-Störsendern Folgendes berücksichtigen:
1. Identifizierung von Personen mit hohem Risiko: Identifizieren Sie Führungskräfte oder wichtige Mitarbeiter, die besonderen Schutz benötigen, damit Anti-Tracking-GPS Jammer richtig konfiguriert werden können, wenn sie reisen oder wichtige Aktivitäten durchführen.
2. Jederzeit überwachen: Unternehmen sollten mit Geräten ausgestattet sein, die das Tracking-Verhalten in Echtzeit überwachen können, und diese in Kombination mit Anti-Tracking-Störsendern verwenden, um sicherzustellen, dass keine potenziellen Risiken übersehen werden.
3. Notfallplan: Entwickeln Sie einen detaillierten Notfallplan für den Umgang mit möglichen Tracking-Vorfällen. Sobald eine ungewöhnliche Situation entdeckt wird, kann schnell ein Plan zur Bewältigung dieser Situation auf den Weg gebracht werden.
Die Rolle von Kameradetektoren
Kameradetektoren spielen eine wichtige Rolle bei der Identifizierung versteckter Kamerageräte für Unternehmen, insbesondere bei Konferenzen und Geschäftsveranstaltungen. Unternehmen sollten Kameradetektoren effektiv einsetzen, um die Sicherheit und Privatsphäre von Meetings zu gewährleisten:
1. Regelmäßige Inspektion: Führen Sie vor wichtigen Ereignissen oder Besprechungen mithilfe von Kameradetektoren umfassende Inspektionen durch, um sicherzustellen, dass die Besprechungsumgebung nicht durch illegale Überwachungsgeräte beeinträchtigt wird.
2. Verwendungsspezifikationen entwickeln: Erstellen Sie beim Einsatz von Kamera Detektor detaillierte Bedienungsanleitungen und Spezifikationen, damit die Mitarbeiter die Verwendung und den Umfang der Detektionsausrüstung verstehen können.
3. Vertraulichkeitsschulung: Für Mitarbeiter, die an Geheimnissen beteiligt sind, wird eine Vertraulichkeitsschulung angeboten, damit sie die Gefahren versteckter Kameraausrüstung verstehen, ihre Wachsamkeit erhöhen und die Informationssicherheit schützen können.
Zusammenfassen
Mit der Verschärfung des geschäftlichen Wettbewerbs und der Entwicklung der Informationstechnologie nehmen die Sicherheitsrisiken für Unternehmen weiter zu. Durch den sinnvollen Einsatz von Anti-Spyware-Geräten wie Mobiltelefon-Störsendern, WLAN-Störsendern, Anti-Tracking-Störsendern und Kameradetektoren können Unternehmen nicht nur Informationslecks und Spionage wirksam verhindern, sondern auch das allgemeine Sicherheitsmanagementniveau verbessern. Wenn Unternehmen diese Geräte verwenden, müssen sie jedoch Gesetze und Vorschriften einhalten, die Datenschutzrechte von Mitarbeitern und Kunden respektieren und den Schutz der Informationssicherheit innerhalb eines rechtlichen und konformen Rahmens gewährleisten. Nur so können wir im harten Wettbewerb auf dem Markt unbesiegbar bleiben.
-
@ fd208ee8:0fd927c1
2024-11-08 10:27:40You have no idea
I regularly read comments from people, on here, wondering how it's possible to marry -- or even simply be friends! -- with someone who doesn't agree with you on politics. I see this sentiment expressed quite often, usually in the context of Bitcoin, or whatever pig is currently being chased through the village, as they say around here.
It seems rather sensible, but I don't think it's as hard, as people make it out to be. Further, I think it's a dangerous precondition to set, for your interpersonal relationships, because the political field is constantly in flux. If you determine who you will love, by their opinions, do you stop loving them if their opinions change, or if the opinions they have become irrelevant and a new set of opinions are needed -- and their new ones don't match your new ones? We could see this happen to relationships en masse, during the Covid Era, and I think it happens every day, in a slow grind toward the disintegration of interpersonal discourse.
I suspect many people do stop loving, at that point, as they never really loved the other person for their own sake, they loved the other person because they thought the other person was exactly like they are. But no two people are alike, and the longer you are in a relationship with someone else, the more the initial giddiness wears off and the trials and tribulations add up, the more you notice how very different you actually are. This is the point, where best friends and romantic couples say, We just grew apart.
But you were always apart. You were always two different people. You just didn't notice, until now.
I've also always been surprised at how many same-party relationships disintegrate because of some disagreement over some particular detail of some particular topic, that they generally agree on. To me, it seems like an irrelevant side-topic, but they can't stand to be with this person... and they stomp off. So, I tend to think that it's less that opinions need to align to each other, but rather that opinions need to align in accordance with the level of interpersonal tolerance they can bring into the relationship.
I was raised by relaxed revolutionaries
Maybe I see things this way because my parents come from two diverging political, cultural, national, and ethnic backgrounds, and are prone to disagreeing about a lot of "important" (to people outside their marriage) things, but still have one of the healthiest, most-fruitful, and most long-running marriages of anyone I know, from that generation. My parents, you see, aren't united by their opinions. They're united by their relationship, which is something outside of opinions. Beyond opinions. Relationships are what turn two different people into one, cohesive unit, so that they slowly grow together. Eventually, even their faces merge, and their biological clocks tick to the same rhythm. They eventually become one entity that contains differing opinions about the same topics.
It's like magic, but it's the result of a mindset, not a worldview. Or, as I like to quip:
The best way to stay married, is to not get divorced.
My parents simply determined early on, that they would stay together, and whenever they would find that they disagreed on something that didn't directly pertain to their day-to-day existence with each other they would just agree-to-disagree about that, or roll their eyes, and move on. You do you. Live and let live.
My parents have some of the most strongly held personal opinions of any people I've ever met, but they're also incredibly tolerant and can get along with nearly anyone, so their friends are a confusing hodgepodge of people we liked and found interesting enough to keep around. Which makes their house parties really fun, and highly unusual, in this day and age of mutual-damnation across the aisle.
The things that did affect them, directly, like which school the children should attend or which country they should live in, etc. were things they'd sit down and discuss, and somehow one opinion would emerge, and they'd again... move on.
And that's how my husband and I also live our lives, and it's been working surprisingly well. No topics are off-limits to discussion (so long as you don't drone on for too long), nobody has to give up deeply held beliefs, or stop agitating for the political decisions they prefer.
You see, we didn't like that the other always had the same opinion. We liked that the other always held their opinions strongly. That they were passionate about their opinions. That they were willing to voice their opinions; sacrifice to promote their opinions. And that they didn't let anyone browbeat or cow them, for their opinions, not even their best friends or their spouse. But that they were open to listening to the other side, and trying to wrap their mind around the possibility that they might just be wrong about something.
We married each other because we knew: this person really cares, this person has thought this through, and they're in it, to win it. What "it" is, is mostly irrelevant, so long as it doesn't entail torturing small animals in the basement, or raising the children on a diet of Mountain Dew and porn, or something.
Live and let live. At least, it's never boring. At least, there's always something to ~~argue~~ talk about. At least, we never think... we've just grown apart.
-
@ 6e24af77:b3f1350b
2024-11-08 10:11:29test 6
-
@ 6bae33c8:607272e8
2024-11-08 09:21:31I don’t want to jinx it, but it’s been a good week. I had the Bengals +6.5 in my picking pool, not Circa though, I had Joe Burrow and Ja’Marr Chase in a key NFFC league, and Chase in two other leagues including the Steak, a 14-teamer where I lost Chris Olave, Stefon Diggs, Rashid Shaheed and maybe CeeDee Lamb. I also picked up and started Rashod Bateman in that league and had Roquan Smith (12 tackles) going too.
I don’t know what else to say except that it was maybe a perfect game. And it was cool the Bengals went for two, essentially locking in the cover (though my 6.5 was good in OT anyway.) Apparently there were penalties that should have been called on the two-point conversion, but I missed them, and in any event, it’s not like I’m a Bengals fan, and they had already covered.
-
Burrow is a great QB now that he’s 100 percent healthy. He processes information so quickly, has no problem checking it down if the first reads are covered. And he scrambles well and keeps his eyes downfield. He’s a top-three real life QB when healthy.
-
Chase is so good there are almost no words. Faster than Justin Jefferson and CeeDee Lamb, the most dangerous wideout in the league in the open field. If he gets it in space, it’s like 50/50 vs the entire defense whether he makes it to the end zone. What a beast, and you see what he can do with 17 targets.
-
Chase Brown had a devastating fumble, but scored the TD and benefited from all the checkdowns.
-
Lamar Jackson actually struggled for much of the game, but the 84-yard missed-tackle TD to Tylan Wallace (of whom I had literally never heard before this morning) really pushed him over the top. He did show nice touch on the few throws and just wears out the defense that had him dead to rights a few times only to see him escape.
-
Bateman was actually Jackson’s top target, and Mark Andrews had another solid game, but there are a lot of mouths to feed with Diontae Johnson, Zay Flowers and eventually even Isaiah Likely again, not to mention a running QB and a dominant early down back.
-
Diontae Johnson had no impact whatsoever and actually slipped on one of his two targets. It was better than Khalil Herbert’s debut though — Herbert fumbled his only carry and was never seen again.
-
Derrick Henry was bottled up for most of the night, but he did manage a short TD. Gameflow wasn’t in his favor as the Bengals led most of the way and won time of possession.
-
The Bengals defense actually played great, applying constant pressure, keeping the energy up even after being run ragged by Jackson. And they held Henry in check too. That missed tackle on Wallace for an 86-yard TD right after giving up the short-field TD following the Brown fumble sunk them.
-
It’s tough watching this version of Justin Tucker who missed a PAT. I used to compare him to Mariano Rivera, but Rivera stayed great through his final season, while Tucker has slipped big time.
-
-
@ 13351007:eccd002a
2024-11-08 05:32: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
-
@ 1eb966a6:e3eddf94
2024-11-08 05:32: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
-
@ a012dc82:6458a70d
2024-11-08 05:23:17Table Of Content
-
Bitcoin Bulls Get a Treat from SEC!
-
Gold's Future in Question?
-
Conclusion
-
FAQ
In the world of finance and investments, there are always exciting developments and trends that capture the attention of investors and enthusiasts alike. Recently, Bitcoin bulls have been delighted by a treat from the U.S. Securities and Exchange Commission (SEC), while the future of gold has come into question. In this article, we will explore the implications of these events and their potential impact on the financial landscape.
Bitcoin Bulls Get a Treat from SEC!
The SEC's Recognition of Bitcoin
The first significant development for Bitcoin bulls is the recognition by the SEC of Bitcoin as a legitimate asset class. This recognition brings a sense of legitimacy and credibility to the cryptocurrency, as it paves the way for wider adoption and integration into traditional financial systems.
Increased Institutional Interest in Bitcoin
With the SEC's recognition, institutional investors have started showing more interest in Bitcoin. Major financial institutions such as banks and hedge funds are now exploring ways to include Bitcoin in their portfolios. This increased demand from institutional players has the potential to drive the price of Bitcoin even higher.
Regulatory Clarity Boosts Investor Confidence
One of the biggest challenges for Bitcoin bulls has been the lack of regulatory clarity surrounding cryptocurrencies. However, the SEC's recognition provides a level of clarity that was previously missing. This regulatory framework allows investors to have a better understanding of the risks and benefits associated with investing in Bitcoin.
Bitcoin ETFs on the Horizon
The SEC's recognition of Bitcoin also opens the door for the approval of Bitcoin exchange-traded funds (ETFs). ETFs provide an easier and more accessible way for investors to gain exposure to Bitcoin without directly owning the cryptocurrency. The approval of Bitcoin ETFs would likely attract more institutional investors and further propel the price of Bitcoin.
Gold's Future in Question?
The Decline of Gold as a Safe Haven
Gold has long been considered a safe haven asset, providing investors with a hedge against inflation and economic uncertainties. However, recent events have raised questions about the future of gold as an investment.
The Rise of Bitcoin as a Digital Gold
Bitcoin's emergence as a digital store of value has posed a challenge to gold's traditional role. Bitcoin offers many advantages over gold, including its divisibility, portability, and ease of transfer. As more investors recognize these benefits, they may start shifting their investments from gold to Bitcoin, potentially impacting the future demand and value of gold.
Technological Advancements and Digitalization
Another factor that puts gold's future in question is the rapid advancement of technology and the increasing digitalization of financial transactions. As digital payment systems and cryptocurrencies gain popularity, the appeal of physical assets like gold may diminish. The convenience and efficiency offered by digital assets could make them a preferred choice for investors in the coming years.
Changing Investor Preferences
The preferences of investors are evolving, particularly among younger generations. Millennial and Gen Z investors are more inclined to embrace cryptocurrencies like Bitcoin as they seek alternative investment options. This shift in investor preferences could further erode the demand for gold and impact its future prospects.
Conclusion
The recognition of Bitcoin by the SEC has undoubtedly brought joy to Bitcoin bulls, as it signifies a significant milestone in the journey towards mainstream acceptance. The future of gold, on the other hand, faces uncertainties as the emergence of digital assets like Bitcoin challenges its traditional role as a safe haven investment. As technology continues to advance and investor preferences evolve, it will be interesting to see how these dynamics shape the financial landscape in the coming years.
FAQ
Is Bitcoin legal?
Yes, Bitcoin is legal in most countries, including the United States. However, regulations may vary, so it's essential to check the legality of Bitcoin in your specific jurisdiction.
Can I invest in Bitcoin through my traditional brokerage account? Some brokerage firms offer the option to invest in Bitcoin indirectly through specialized investment products like Bitcoin futures or trusts. However, not all traditional brokerage accounts provide this option, so it's best to inquire with your broker.
What is the potential for Bitcoin's future growth? The future growth potential of Bitcoin is subjective and highly speculative. While some believe Bitcoin has the potential to reach even higher valuations, others remain skeptical. It's important to conduct thorough research and consider various factors before making any investment decisions.
How can I secure my Bitcoin investments? It is crucial to store your Bitcoin in a secure digital wallet and follow best security practices, such as enabling two-factor authentication and using strong, unique passwords. Additionally, offline storage options like hardware wallets offer an extra layer of security.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 9e69e420:d12360c2
2024-11-08 02:28:59A Cypherpunk's Manifesto by Eric Hughes
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes hughes@soda.berkeley.edu
9 March 1993
-
@ 7d3e7ac0:90e6f183
2024-11-07 22:02:47Read the paper.
-
@ eac63075:b4988b48
2024-11-07 21:27:53Every night, you draw your curtains without thinking twice. It's instinctive—a simple act that protects your personal space. Yet in our digital lives, we've somehow accepted living in houses made entirely of glass, with countless unseen observers watching our every move.
https://www.fountain.fm/episode/wPZLCJ3fD6vzsWQ3XSE1
Why Privacy Matters to Everyone
Privacy isn't just for those with something to hide; it's a fundamental human need. Think about the conversations you have with friends, the late-night web searches you make, the personal moments you capture in photos. Would you want all of that broadcasted to the world?
I remember my friend Lisa planning a surprise party for her husband. She searched for gift ideas and coordinated with friends through social media. To her dismay, targeted ads for the exact gift she intended to buy started popping up on their shared devices at home. The surprise was ruined. It wasn't malicious, but it was a stark reminder of how our online activities are constantly monitored.
When a major retailer's customer database was breached, my neighbor Sarah discovered her shopping history, credit card details, and even her children's names were exposed to criminals. She hadn't realized how much personal information she'd unknowingly shared through routine purchases. It was a wake-up call that privacy breaches can affect anyone, not just the tech-savvy or those in high-profile positions.
Edward Snowden once said, "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say." Privacy isn't about secrecy; it's about autonomy over our personal information.
The Rise of the Cypherpunks
Back in the '90s, a group known as the cypherpunks saw the writing on the wall. They recognized that as we moved into a digital era, our personal freedoms could be at risk. So they took action.
One of them, Eric Hughes, famously wrote, "Privacy is necessary for an open society in the electronic age." They developed encryption tools to protect individual privacy, laying the groundwork for technologies like Bitcoin and cryptocurrencies. These innovations were about more than digital money; they were about empowering individuals to take control of their own data.
When Technology Knows Too Much
Fast forward to today, and artificial intelligence (AI) is everywhere—in our phones, homes, and even cars. While AI brings convenience, it also raises serious privacy concerns.
Remember when you mentioned needing new running shoes, and suddenly every ad on your browser was for footwear? It's not your imagination. AI algorithms analyze our conversations, searches, and purchases to predict what we'll want next. But where does it stop?
A few years ago, a major retailer guessed a teenager was pregnant based on her shopping habits before she had told her family. They sent her targeted coupons for baby products, leading to a very uncomfortable situation at home. This isn't just marketing—it's intrusion.
Naomi Brockwell, a privacy advocate, warns, "Our relationship with financial privacy has fundamentally changed. What was once seen as a constitutional right and personal freedom is now simply part of the trade-off for using digital payments. Our baseline for what’s acceptable has shifted." It's a wake-up call that our digital footprints are larger and more revealing than we might think.
Privacy-Preserving AI
While AI often threatens privacy, emerging technologies like federated learning offer hope. This approach allows AI models to learn from data without directly accessing personal information. Imagine your phone improving its predictive text without sending your messages to a central server. It's AI that respects your privacy.
The Watchful Eye: Mass Surveillance and AI
Governments and corporations often justify mass surveillance as a means to keep us safe. But at what cost? When every email, message, or phone call can be monitored, we're sacrificing more than just data—we're giving up our freedom to think and communicate without fear.
Think about how you'd behave if someone followed you around with a camera all day. You might avoid certain places or people, censor your conversations, or feel constantly on edge. That's the chilling effect of mass surveillance.
I spoke with Alex, a journalist who covers political activism. "After attending a peaceful protest, I noticed unusual activity on my devices," he told me. "It made me second-guess my work, wondering who's watching." This isn't paranoia; it's a reality for many who challenge the status quo.
Building Digital Fortresses: Cryptographic Innovations
So how do we reclaim our privacy? Cryptography offers some solutions.
Zero-Knowledge Proofs: Proving Without Revealing
Zero-knowledge proofs allow you to prove you know something without revealing the actual information. Imagine showing a bouncer a card that confirms you're over 21 without exposing your birth date or any other details. In the digital world, this means verifying your identity or eligibility without handing over all your personal data.
Homomorphic Encryption: Secure Processing
Then there's homomorphic encryption, which lets companies process your data without actually seeing it. Think of it like sending a locked suitcase with your belongings; they can weigh it or move it, but they can't open it to see what's inside.
Quantum-Resistant Algorithms: Future-Proofing Privacy
As quantum computers become more powerful, they could potentially break current encryption methods. Quantum-resistant algorithms are being developed to safeguard our data against these future threats. It's like reinforcing your digital locks today to withstand the super lock-picking tools of tomorrow.
Decentralization: Taking Back Control
Decentralization aims to put power back into the hands of individuals. Bitcoin let you be your own bank, controlling your finances without a middleman. Decentralized social media platforms like Nostr, Bluesky or Fascaster allow you to own your content without algorithms dictating what you see or who sees you.
Decentralized Identity Systems
Decentralized identity systems let you prove who you are without revealing more than necessary. It's like showing only your age at a bar instead of handing over your entire driver's license. You maintain control over your personal information.
But with great power comes great responsibility. Without a bank to reset your password or customer service to recover your account, the onus is on you to protect your assets and information.
Practical Tips to Protect Your Privacy
You don't have to be a tech guru to safeguard your privacy. Here are some steps you can take today:
-
Use Encrypted Messaging Apps: Switch to apps like Signal, SimpleX or Session for secure communication. Your messages will be end-to-end encrypted, meaning only you and the recipient can read them.
-
Limit Social Media Sharing: Be mindful of what you post. Do you really need to share your location or personal details publicly?
-
Choose Privacy-Focused Browsers and Search Engines: Use browsers like Brave or Firefox and search engines like DuckDuckGo that don't track your every move.
-
Secure Your Passwords: Use strong, unique passwords for each account, and consider a password manager like Bitwarden. Enable two-factor authentication whenever possible.
-
Use Encrypted Email Services: Consider email providers like ProtonMail that offer end-to-end encryption for your communications.
-
Regularly Audit App Permissions: Check which apps have access to your location, microphone, and contacts. Revoke permissions that aren't necessary.
-
Be Wary of Public Wi-Fi: Public networks can be a hotbed for hackers. If you must use them, a VPN like ProtonVPN can add a layer of security.
-
Consider Privacy-Focused Alternatives: Explore services like Nextcloud for cloud storage or Jitsi Meet for video conferencing, which prioritize user privacy.
-
Keep Software Updated: Regular updates often include security patches. Don't ignore them.
-
Stay Informed and Skeptical: Phishing scams are getting more sophisticated. Think before you click on suspicious links or download attachments.
Final Thoughts
Privacy isn't a lost cause; it's a right worth fighting for. As Edward Snowden reminds us, "Privacy is the fountainhead of all other rights."
By taking control of our data and digital habits, we can navigate the online world with greater confidence and peace of mind. After all, wouldn't it be nice to live in a digital home where we decide when to close the curtains?
Read more
OPSEC and Digital Hygiene Plan: https://www.eddieoz.com/opsec-and-digital-hygiene-plan/
-
-
@ bcea2b98:7ccef3c9
2024-11-07 18:43:30If you could accomplish one major goal, what would it be? Why does it matter to you, and how would it change your life or the lives of others?
My ultimate goal is to be part of a mission to Mars one day. I’ve always been fascinated by space exploration.
originally posted at https://stacker.news/items/757861
-
@ 361d3e1e:50bc10a8
2024-11-07 16:18:55https://forex-strategy.com/2024/11/07/the-water-crisis-and-the-future-of-humanity/ When Heaven Warns: The Water Crisis and the Future of Humanity What is the connection between the strange clouds in the sky and the future of man in new conditions. What is the best investment now?
haarp #clouds #strange #mystery #truth #crisis #water #flood
-
@ 361d3e1e:50bc10a8
2024-11-07 15:04:11https://forex-strategy.com/2024/11/07/everything-is-repeated-strange-clouds-scared-people-again/ What's next, downpours or earthquakes?: Everything is repeated strange clouds scared people again
mystery #sky #clouds #haarp #truth #crisis
-
@ 3bf0c63f:aefa459d
2024-11-07 14:56:17The case against edits
Direct edits are a centralizing force on Nostr, a slippery slope that should not be accepted.
Edits are fine in other, more specialized event kinds, but the
kind:1
space shouldn't be compromised with such a push towards centralization, becausekind:1
is the public square of Nostr, where all focus should be on decentralization and censorship-resistance.- Why?
Edits introduce too much complexity. If edits are widespread, all clients now have to download dozens of extra events at the same time while users are browsing a big feed of notes which are already coming from dozens of different relays using complicated outbox-model-based querying, then for each event they have to open yet another subscription to these relays -- or perform some other complicated batching of subscriptions which then requires more complexity on the event handling side and then when associating these edits with the original events. I can only imagine this will hurt apps performance, but it definitely raises the barrier to entry and thus necessarily decreases Nostr decentralization.
Some clients may be implemneted in way such that they download tons of events and then store them in a local databases, from which they then construct the feed that users see. Such clients may make edits potentially easier to deal with -- but this is hardly an answer to the point above, since such clients are already more complex to implement in the first place.
- What do you have against complex clients?
The point is not to say that all clients should be simple, but that it should be simple to write a client -- or at least as simple as physically possible.
You may not be thinking about it, but if you believe in the promise of Nostr then we should expect to see Nostr feeds in many other contexts other than on a big super app in a phone -- we should see Nostr notes being referenced from and injected in unrelated webpages, unrelated apps, hardware devices, comment sections and so on. All these micro-clients will have to implement some complicated edit-fetching logic now?
- But aren't we already fetching likes and zaps and other things, why not fetch edits too?
Likes, zaps and other similar things are optional. It's perfectly fine to use Nostr without seeing likes and/or zaps -- and, believe me, it does happen quite a lot. The point is basically that likes or zaps don't affect the content of the main post at all, while edits do.
- But edits are optional!
No, they are not optional. If edits become widespread they necessarily become mandatory. Any client that doesn't implement edits will be displaying false information to its users and their experience will be completely broken.
- That's fine, as people will just move to clients that support edits!
Exactly, that is what I expect to happen too, and this is why I am saying edits are a centralizing force that we should be fighting against, not embracing.
If you understand that edits are a centralizing force, then you must automatically agree that they aren't a desirable feature, given that if you are reading this now, with Nostr being so small, there is a 100% chance you care about decentralization and you're not just some kind of lazy influencer that is only doing this for money.
- All other social networks support editing!
This is not true at all. Bluesky has 10x more users than Nostr and doesn't support edits. Instagram doesn't support editing pictures after they're posted, and doesn't support editing comments. Tiktok doesn't support editing videos or comments after they're posted. YouTube doesn't support editing videos after they're posted. Most famously, email, the most widely used and widespread "social app" out there, does not support edits of any kind. Twitter didn't support edits for the first 15 years of its life, and, although some people complained, it didn't hurt the platform at all -- arguably it benefitted it.
If edits are such a straightforward feature to add that won't hurt performance, that won't introduce complexity, and also that is such an essential feature users could never live without them, then why don't these centralized platforms have edits on everything already? There must be something there.
- Eventually someone will implement edits anyway, so why bother to oppose edits now?
Once Nostr becomes big enough, maybe it will be already shielded from such centralizing forces by its sheer volume of users and quantity of clients, maybe not, we will see. All I'm saying is that we shouldn't just push for bad things now just because of a potential future in which they might come.
- The market will decide what is better.
The market has decided for Facebook, Instagram, Twitter and TikTok. If we were to follow what the market had decided we wouldn't be here, and you wouldn't be reading this post.
- OK, you have convinced me, edits are not good for the protocol. But what do we do about the users who just want to fix their typos?
There are many ways. The annotations spec, for example, provides a simple way to append things to a note without being a full-blown edit, and they fall back gracefully to normal replies in clients that don't implement the full annotations spec.
Eventually we could have annotations that are expressed in form of simple (human-readable?) diffs that can be applied directly to the post, but fall back, again, to comments.
Besides these, a very simple idea that wasn't tried yet on Nostr yet is the idea that has been tried for emails and seems to work very well: delaying a post after the "submit" button is clicked and giving the user the opportunity to cancel and edit it again before it is actually posted.
Ultimately, if edits are so necessary, then maybe we could come up with a way to implement edits that is truly optional and falls back cleanly for clients that don't support them directly and don't hurt the protocol very much. Let's think about it and not rush towards defeat.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:56:21Tutorial feito por Grom mestre⚡poste original abaixo:
http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/240277/tutorial-criando-e-acessando-sua-conta-de-email-pela-i2p?show=240277#q240277
Bom dia/tarde/noite a todos os camaradas. Seguindo a nossa série de tutoriais referentes a tecnologias essenciais para a segurança e o anonimato dos usuários, sendo as primeiras a openPGP e a I2P, lhes apresento mais uma opção para expandir os seus conhecimentos da DW. Muitos devem conhecer os serviços de mail na onion como DNMX e mail2tor, mas e que tal um serviço de email pela I2P. Nesse tutorial eu vou mostrar a vocês como criar a sua primeira conta no hq.postman.i2p e a acessar essa conta.
É importante que vocês tenham lido a minha primeira série de tutoriais a respeito de como instalar, configurar e navegar pela I2P nostr:nevent1qqsyjcz2w0e6d6dcdeprhuuarw4aqkw730y542dzlwxwssneq3mwpaspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsyp5vcq Esse tutorial é um pré-requisito para o seguinte e portanto recomendo que leia-os antes de prosseguir com o seguinte tutorial. O tutorial de Kleopatra nostr:nevent1qqs8h7vsn5j6qh35949sa60dms4fneussmv9jd76n24lsmtz24k0xlqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgecq8f7 é complementar dado que é extremamente recomendado assinar e criptografar as mensagens que seguem por emails pela DW. Sem mais delongas, vamos ao tutorial de fato.
1. Criando uma conta de email no hq.postman
Relembrando: Esse tutorial considera que você já tenha acesso à I2P. Entre no seu navegador e acesse o endereço hq.postman.i2p. O roteador provavelmente já contém esse endereço no seu addressbook e não haverá a necessidade de inserir o endereço b32 completo. Após entrar no site vá para a página '1 - Creating a mailbox' https://image.nostr.build/d850379fe315d2abab71430949b06d3fa49366d91df4c9b00a4a8367d53fcca3.jpg
Nessa página, insira as credenciais de sua preferências nos campos do formulário abaixo. Lembre-se que o seu endereço de email aceita apenas letras e números. Clique em 'Proceed' depois que preencher todos os campos. https://image.nostr.build/670dfda7264db393e48391f217e60a2eb87d85c2729360c8ef6fe0cf52508ab4.jpg
Uma página vai aparecer pedindo para confirmar as credenciais da sua nova conta. Se tudo estiver certo apenas clique em 'Confirm and Create Mailbox'. Se tudo ocorrer como conforme haverá uma confirmação de que a sua nova conta foi criada com sucesso. Após isso aguarde por volta de 5 minutos antes de tentar acessá-la, para que haja tempo suficiente para o servidor atualizar o banco de dados. https://image.nostr.build/ec58fb826bffa60791fedfd9c89a25d592ac3d11645b270c936c60a7c59c067f.jpg https://image.nostr.build/a2b7710d1e3cbb36431acb9055fd62937986b4da4b1a1bbb06d3f3cb1f544fd3.jpg
Pronto! Sua nova conta de email na I2P foi criada. Agora vamos para a próxima etapa: como acessar a sua conta via um cliente de email.
2. Configurando os túneis cliente de SMTP e POP3
O hq.postman não possui um cliente web que nos permite acessar a nossa conta pelo navegador. Para isso precisamos usar um cliente como Thunderbird e configurar os túneis cliente no I2Pd que serão necessários para o Thunderbird se comunicar com o servidor pela I2P.
Caso não tenha instalado o Thunderbird ainda, faça-o agora antes de prosseguir.
Vamos configurar os túneis cliente do servidor de email no nosso roteador. Para isso abra um terminal ou o seu gestor de arquivos e vá para a pasta de configuração de túneis do I2P. Em Linux esse diretório se localiza em /etc/i2pd/tunnels.d. Em Windows, essa pasta se localiza em C:\users\user\APPDATA\i2pd. Na pasta tunnels.d crie dois arquivos: smtp.postman.conf e pop-postman.conf. Lembre-se que em Linux você precisa de permissões de root para escrever na pasta de configuração. Use o comando sudoedit
para isso. Edite-os conforme as imagens a seguir:
Arquivo pop-postman.conf https://image.nostr.build/7e03505c8bc3b632ca5db1f8eaefc6cecb4743cd2096d211dd90bbdc16fe2593.jpg
Arquivo smtp-postman.conf https://image.nostr.build/2d06c021841dedd6000c9fc2a641ed519b3be3c6125000b188842cd0a5af3d16.jpg
Salve os arquivos e reinicie o serviço do I2Pd. Em Linux isso é feito pelo comando:
sudo systemctl restart i2pd
Entre no Webconsole do I2Pd pelo navegador (localhost:7070) e na seção I2P Tunnels, verifique se os túneis pop-postman e smtp-postman foram criados, caso contrário verifique se há algum erro nos arquivos e reinicie o serviço.Com os túneis cliente criados, vamos agora configurar o Thunderbird
3. Configurando o Thunderbird para acessar a nossa conta
Abra o Thunderbird e clique em criar uma nova conta de email. Se você não tiver nenhum conta previamente presente nele você vai ser diretamente recebido pela janela de criação de conta a seguir. https://image.nostr.build/e9509d7bd30623716ef9adcad76c1d465f5bc3d5840e0c35fe4faa85740f41b4.jpg https://image.nostr.build/688b59b8352a17389902ec1e99d7484e310d7d287491b34f562b8cdd9dbe8a99.jpg
Coloque as suas credenciais, mas não clique ainda em Continuar. Clique antes em Configure Manually, já que precisamos configurar manualmente os servidores de SMTP e POP3 para, respectivamente, enviar e receber mensagens.
Preencha os campos como na imagem a seguir. Detalhe: Não coloque o seu endereço completo com o @mail.i2p, apenas o nome da sua conta. https://image.nostr.build/4610b0315c0a3b741965d3d7c1e4aff6425a167297e323ba8490f4325f40cdcc.jpg
Clique em Re-test para verificar a integridade da conexão. Se tudo estiver certo uma mensagem irá aparecer avisando que as configurações do servidores estão corretas. Clique em Done assim que estiver pronto para prosseguir. https://image.nostr.build/8a47bb292f94b0d9d474d4d4a134f8d73afb84ecf1d4c0a7eb6366d46bf3973a.jpg
A seguinte mensagem vai aparecer alertando que não estamos usando criptografia no envio das credenciais. Não há problema nenhum aqui, pois a I2P está garantindo toda a proteção e anonimato dos nossos dados, o que dispensa a necessidade de uso de TLS ou qualquer tecnologia similar nas camadas acima. Marque a opção 'I Understand the risks' e clique em 'Continue' https://image.nostr.build/9c1bf585248773297d2cb1d9705c1be3bd815e2be85d4342227f1db2f13a9cc6.jpg
E por fim, se tudo ocorreu como devido sua conta será criada com sucesso e você agora será capaz de enviar e receber emails pela I2P usando essa conta. https://image.nostr.build/8ba7f2c160453c9bfa172fa9a30b642a7ee9ae3eeb9b78b4dc24ce25aa2c7ecc.jpg
4. Observações e considerações finais
Como informado pelo próprio site do hq.postman, o domínio @mail.i2p serve apenas para emails enviados dentro da I2P. Emails enviados pela surface devem usar o domínio @i2pmai.org. É imprescindível que você saiba usar o PGP para assinar e criptografar as suas mensagens, dado que provavelmente as mensagens não são armazenadas de forma criptografada enquanto elas estão armazenadas no servidor. Como o protocolo POP3 delete as mensagens no imediato momento em que você as recebe, não há necessidade de fazer qualquer limpeza na sua conta de forma manual.
Por fim, espero que esse tutorial tenha sido útil para vocês. Que seu conhecimento tenha expandido ainda mais com as informações trazidas aqui. Até a próxima.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:17:56O aplicativo permite que os usuários se comuniquem com outras pessoas sem ter que fornecer identificadores de usuário, como números de telefone ou endereços de e-mail. é 100% privado e seguro, Por design, garantindo que suas mensagens nunca sejam rastreadas ou armazenadas. O SimpleXChat possui recursos como bate-papo em grupo, envio de arquivos e uma interface amigável para dispositivos móveis, desktop, CLI. O SimpleXChat é um dos aplicativos construídos sobre a plataforma SimpleX, que também serve como um exemplo e aplicativo de referência. O SimpleX Messaging Protocol (SMP) é um protocolo que permite enviar mensagens em uma direção para um destinatário, usando um servidor intermediário. As mensagens são entregues por meio de filas unidirecionais criadas pelos destinatários.
O SMP é executado em um protocolo de transporte (TLS), que fornece integridade, autenticação do servidor, confidencialidade e vinculação do canal de transporte. A Rede SimpleX é o coletivo de servidores SimpleX que facilitam o SMP. As bibliotecas SimpleX Client falam SMP para SimpleX Servers e fornecem uma API de baixo nível, geralmente não destinada a ser usada por aplicativos.
O aplicativo permite que os usuários se comuniquem com outras pessoas sem ter que fornecer identificadores de usuário, como números de telefone ou endereços de e-mail. O SimpleXChat possui recursos como bate-papo em grupo, envio de arquivos e uma interface amigável para dispositivos móveis.
O SimpleX tem como objetivo fornecer uma infraestrutura de mensagens distribuídas que seja segura, privada, confiável, com entrega assíncrona e baixa latência. Ele visa oferecer melhor privacidade de metadados e segurança contra invasores de rede ativos e servidores mal-intencionados em comparação com soluções alternativas de mensagens instantâneas, ao mesmo tempo em que prioriza a experiência do usuário, especialmente em dispositivos móveis.
Por que o SimpleX é único
- Privacidade total de sua identidade, perfil, contatos e metadados
Ao contrário de outras plataformas de mensagens, o SimpleX não possui identificadores atribuídos aos usuários . Ele não depende de números de telefone, endereços baseados em domínio (como e-mail ou XMPP), nomes de usuário, chaves públicas ou mesmo números aleatórios para identificar seus usuários - não sabemos quantas pessoas usam nossos servidores SimpleX
Para entregar mensagens, o SimpleX usa endereços anônimos emparelhados de filas de mensagens unidirecionais, separadas para mensagens recebidas e enviadas, geralmente por meio de servidores diferentes. Usar o SimpleX é como ter um e-mail ou telefone “gravador” diferente para cada contato e sem problemas para gerenciá-los.
Esse design protege a privacidade de quem você está se comunicando, ocultando-a dos servidores da plataforma SimpleX e de quaisquer observadores. Para ocultar seu endereço IP dos servidores, você pode se conectar aos servidores SimpleX via Tor .
-
A melhor proteção contra spam e abuso Como você não possui um identificador na plataforma SimpleX, ninguém pode entrar em contato com você, a menos que você compartilhe um endereço de usuário único ou temporário, como um código QR ou um link. Mesmo com o endereço de usuário opcional, embora possa ser usado para enviar solicitações de contato de spam, você pode alterá-lo ou excluí-lo completamente sem perder nenhuma de suas conexões.
-
Propriedade, controle e segurança de seus dados
O SimpleX Chat armazena todos os dados do usuário apenas em dispositivos clientes usando um formato de banco de dados criptografado portátil que pode ser exportado e transferido para qualquer dispositivo compatível.
As mensagens criptografadas de ponta a ponta são mantidas temporariamente em servidores de retransmissão SimpleX até serem recebidas e, em seguida, são excluídas permanentemente.
Ao contrário dos servidores de redes federadas (e-mail, XMPP ou Matrix), os servidores SimpleX não armazenam contas de usuários, apenas retransmitem mensagens, protegendo a privacidade de ambas as partes.
Ao contrário dos servidores de redes federadas (e-mail, XMPP ou Matrix), os servidores SimpleX não armazenam contas de usuários, apenas retransmitem mensagens, protegendo a privacidade de ambas as partes.
Não há identificadores ou texto cifrado em comum entre o tráfego do servidor enviado e recebido - se alguém estiver observando, não poderá determinar facilmente quem se comunica com quem, mesmo que o TLS esteja comprometido.
- Totalmente descentralizado — os usuários são proprietários da rede SimpleX
Você pode usar o SimpleX com seus próprios servidores e ainda se comunicar com pessoas que usam os servidores pré-configurados fornecidos por nós.
A plataforma SimpleX usa um protocolo aberto e fornece SDK para criar bots de bate-papo , permitindo a implementação de serviços com os quais os usuários podem interagir por meio de aplicativos de bate-papo SimpleX. A rede SimpleX é totalmente descentralizada e independente de qualquer criptomoeda ou qualquer outra plataforma, exceto a Internet.
Você pode usar o SimpleX com seus próprios servidores ou com os servidores fornecidos por nós.
Características SimpleXchat • Mensagens criptografadas por E2E com remarcação e edição
• Imagens e arquivos criptografados por E2E
• Grupos secretos descentralizados apenas os usuários sabem que eles existem
• Mensagens de voz criptografadas por E2E
• Mensagens desaparecidas
• Chamadas de áudio e vídeo criptografadas com E2E
• Banco de dados criptografado portátil — mova seu perfil para outro dispositivo
• Modo de navegação anônima exclusivo do SimpleX Chat
O que torna o SimpleX privado
https://nostr.build/i/nostr.build_4e6fa7bc41d22d7a9672fa23b04b7aa6d69938d7013ac1ea31212a854e6d1e97.jpg Identificadores par a par anônimos temporários O SimpleX usa endereços emparelhados anônimos temporários e credenciais para cada contato do usuário ou membro do grupo. Ele permite entregar mensagens sem identificadores de perfil de usuário, fornecendo melhor privacidade de metadados do que alternativas.
Troca de chaves fora de banda Muitas plataformas de comunicação são vulneráveis a ataques MITM por servidores ou provedores de rede. Para evitar que os aplicativos SimpleX passem chaves únicas fora de banda, quando você compartilha um endereço como um link ou um código QR. https://nostr.build/i/nostr.build_9065e2600cf42d0bcf7bb89deb674eb0630c590bd043b1f8c92272011ec7a2ec.jpg
2 camadas de criptografia de ponta a ponta Protocolo de catraca dupla — mensagens OTR com sigilo de encaminhamento perfeito e recuperação de invasão. Criptobox NaCL em cada fila para evitar a correlação de tráfego entre as filas de mensagens se o TLS estiver comprometido. https://nostr.build/i/nostr.build_defe978ea10526b657bf35e6809f4385c82c7eca58b91ae3a0e81447dbf0bda3.jpg
Verificação da integridade da mensagem Para garantir a integridade as mensagens são numeradas sequencialmente e incluem o hash da mensagem anterior. Se alguma mensagem for adicionada, removida ou alterada, o destinatário será alertado. https://nostr.build/i/nostr.build_debf9317b88a015af37f8c610d4e1671bc495d1a80c2b6ea090d202fb332ba84.jpg Camada adicional de criptografia do servidor
Camada adicional de criptografia do servidor para entrega ao destinatário, para evitar a correlação entre o tráfego do servidor recebido e enviado se o TLS estiver comprometido. https://nostr.build/i/nostr.build_13793f89276380e221bd15f6173fe1221f550993a0902a249b5ba86e5fe1d237.jpg
Mistura de mensagens para reduzir a correlação Os servidores SimpleX atuam como nós de mistura de baixa latência — as mensagens recebidas e enviadas têm ordem diferente. https://nostr.build/i/nostr.build_1c7146ca7b3871ff1de184be78785e9e0c45cf2567f6147b260009d9c74925ed.jpg
Transporte TLS autenticado seguro Somente o TLS 1.2/1.3 com algoritmos fortes é usado para conexões cliente-servidor. A impressão digital do servidor e a ligação do canal evitam ataques MITM e de repetição. A retomada da conexão é desativada para evitar ataques de sessão. https://nostr.build/i/nostr.build_515af3c35a729f3dd47619965f76e3a8499ad1fe7694f2bbab14404cf5a77f6a.jpg
Acesso opcional via Tor Para proteger seu endereço IP, você pode acessar os servidores via Tor ou alguma outra rede de sobreposição de transporte. Para usar o SimpleX via Tor, instale o aplicativo Orbot e habilite o proxy SOCKS5 (ou VPN no iOS ). https://nostr.build/i/nostr.build_0c8f651db74c9ae2ab4d4424972b21d64af8dab2aa5364d4b140898bebfc42b0.jpg
Filas de mensagens unidirecionais Cada fila de mensagens passa mensagens em uma direção, com diferentes endereços de envio e recebimento. Ele reduz os vetores de ataque, em comparação com os corretores de mensagens tradicionais e os metadados disponíveis. https://nostr.build/i/nostr.build_a7b6103be59dbffb242e6b5d371767f6df3219a1cad2a0f05a278cfb7596ad3d.jpg
Várias camadas de preenchimento de conteúdo SimpleX usa preenchimento de conteúdo para cada camada de criptografia para frustrar ataques de tamanho de mensagem. Faz mensagens de tamanhos diferentes parecerem iguais para os servidores e observadores de rede. https://nostr.build/i/nostr.build_6ac8491d3e0236460bb914ea5dc1a23fea03e6c598cef6643949eea38e5fad44.jpg
A rede SimpleX diferente de outras redes P2P ao ser composta por clientes e servidores sem depender de um componente centralizado. Ele usa filas de mensagens unidirecionais redundantes (simplex) para comunicação, eliminando a necessidade de endereços exclusivos globalmente. As solicitações de conexão são protegidas contra ataques man-in-the-middle e as filas de mensagens simples são usadas pelos clientes para criar cenários de comunicação mais complexos. Os servidores não armazenam nenhuma informação do usuário e os usuários podem mudar de servidor com interrupção mínima.
Rede SimpleX
Simplex Chat fornece a melhor privacidade combinando as vantagens de redes P2P e federadas. https://nostr.build/i/nostr.build_062b212b3c43e9cab9e7290e6a052012c54acabadfeb962190ffe9783647f356.jpg
Ao contrário das redes P2P
Todas as mensagens são enviadas pelos servidores, proporcionando melhor privacidade de metadados e entrega de mensagens assíncronas confiáveis, evitando muitos problemas de redes P2P .
-
As redes P2P dependem de alguma variante do DHT para rotear mensagens. Os projetos DHT precisam equilibrar a garantia de entrega e a latência. O SimpleX tem melhor garantia de entrega e menor latência do que o P2P, pois a mensagem pode ser passada de forma redundante por vários servidores em paralelo, utilizando os servidores escolhidos pelo destinatário. Em redes P2P a mensagem é passada por nós O(log N) sequencialmente, usando nós escolhidos pelo algoritmo.
-
O design SimpleX, ao contrário da maioria das redes P2P, não possui identificadores globais de usuário de qualquer tipo, mesmo temporários, e usa apenas identificadores temporários emparelhados, fornecendo melhor anonimato e proteção de metadados.
-
O P2P não resolve o problema do ataque MITM e a maioria das implementações existentes não usa mensagens fora de banda para a troca inicial de chaves. O SimpleX usa mensagens fora de banda ou, em alguns casos, conexões seguras e confiáveis pré-existentes para a troca inicial de chaves.
-
As implementações P2P podem ser bloqueadas por alguns provedores de Internet (como BitTorrent ). O SimpleX é agnóstico de transporte - ele pode funcionar sobre protocolos da Web padrão, por exemplo, WebSockets.
-
Todas as redes P2P conhecidas podem ser vulneráveis ao ataque Sybil , porque cada nó é detectável e a rede opera como um todo. As medidas conhecidas para mitigá-lo exigem um componente centralizado ou uma prova de trabalho cara . A rede SimpleX não tem capacidade de descoberta de servidor, é fragmentada e opera como várias sub-redes isoladas, impossibilitando ataques em toda a rede.
-
As redes P2P podem ser vulneráveis a ataques DRDoS , quando os clientes podem retransmitir e amplificar o tráfego, resultando em negação de serviço em toda a rede. Os clientes SimpleX apenas retransmitem o tráfego de conexão conhecida e não podem ser usados por um invasor para amplificar o tráfego em toda a rede.
Ao contrário das redes federadas
Os servidores de retransmissão SimpleX NÃO armazenam perfis de usuário, contatos e mensagens entregues, NÃO se conectam entre si e NÃO há diretório de servidores. https://nostr.build/i/nostr.build_abadeb8361026101dc2e5888217cd7620d7cf01233a7961071bb07c49f7f9f0e.jpg
os servidores fornecem filas unidirecionais para conectar os usuários, mas não têm visibilidade do grafo de conexão de rede — somente os usuários têm. https://nostr.build/i/nostr.build_0f281d6b89e96efcc9334384ae9f251c529feb136748dd0846e249a715e2a5e3.jpg
Simplex explicado
- O que os usuários experimentam https://nostr.build/i/nostr.build_157aa796dd3953b830e5643a5e98bb07b09d1ab8737a4f8b39d26e3637902ae8.jpg Você pode criar contatos e grupos e ter conversas bidirecionais, como em qualquer outro messenger.
Como trabalhar com filas unidirecionais e sem identificadores de perfil de usuário?
- Como funciona https://nostr.build/i/nostr.build_fda66ead74bed1a72139cf9ce9cbe96eea7a09b9007151a576124f8cab39952d.jpg
Para cada conexão, você usa duas filas de mensagens separadas para enviar e receber mensagens por meio de servidores diferentes.
Os servidores passam mensagens apenas de uma maneira, sem ter uma imagem completa da conversa ou das conexões do usuário.
- O que os servidores veem https://nostr.build/i/nostr.build_e95db233e71ef8ff53590e740095429338c8aba8fba846431d81112ffba01932.jpg
Os servidores possuem credenciais anônimas distintas para cada fila e não têm conhecimento da identidade dos usuários.
A implementação Roteamento de Mensagens Privadas na Rede SimpleX é um marco significativo na evolução do Protocolo de Mensagens SimpleX, elevando a privacidade dos usuários a outro patamar! https://image.nostr.build/f77c4336cb335cb87dab6645bbac7a8f6a99d8b8e7a787511918c740558b5be7.jpg
Qual é o problema? https://image.nostr.build/4ad92ca6d702155c97849fce854f6c3101ac979b21781620500edd357ab6d7a3.jpg
Design da rede Simplex sempre se concentrou na proteção da identidade do usuário no nível do protocolo de mensagens - não há identificadores de perfil de usuário de qualquer tipo no design do protocolo, nem mesmo números aleatórios ou chaves criptográficas. Porém, até este lançamento, a rede SimpleX não tinha proteção integrada de identidades de transporte de usuários - endereços IP. Como anteriormente os usuários só podiam escolher quais retransmissores de mensagens usar para receber mensagens, esses retransmissores poderiam observar os endereços IP dos remetentes e, se esses retransmissores fossem controlados pelos destinatários, os próprios destinatários também poderiam observá-los - seja modificando o código do servidor ou simplesmente rastreando todos os endereços IP conectados.
Para contornar essa limitação, muitos usuários se conectaram a retransmissores de rede SimpleX via Tor ou VPN – para que os retransmissores dos destinatários não pudessem observar os endereços IP dos usuários quando eles enviassem mensagens. Ainda assim, foi a limitação mais importante e mais criticada da rede SimpleX pelos usuários.
O que é roteamento de mensagens privadas e como funciona?
O roteamento de mensagens privadas é um marco importante para a evolução da rede SimpleX. É um novo protocolo de roteamento de mensagens que protege os endereços IP dos usuários e as sessões de transporte dos retransmissores de mensagens escolhidos por
Seus contatos. O roteamento de mensagens privadas é, efetivamente, um protocolo de roteamento cebola de 2 saltos inspirado no design do Tor, mas com uma diferença importante - o primeiro retransmissor (encaminhamento) é sempre escolhido pelo remetente da mensagem e o segundo (destino) - pelo destinatário da mensagem. Desta forma, nenhum lado da conversa pode observar o endereço IP ou a sessão de transporte do outro.
Ao mesmo tempo, os retransmissores escolhidos pelos clientes remetentes para encaminhar as mensagens não conseguem observar para quais conexões (filas de mensagens) as mensagens são enviadas, devido à camada adicional de criptografia ponta a ponta entre o remetente e o retransmissor de destino, semelhante ao funcionamento do roteamento cebola na rede Tor, e também graças ao design do protocolo que evita quaisquer identificadores repetidos ou não aleatórios associados às mensagens, que de outra forma permitiriam correlacionar as mensagens enviadas para diferentes conexões como enviadas pelo mesmo usuário. Cada mensagem encaminhada para o retransmissor de destino é adicionalmente criptografada com uma chave efêmera única, para ser independente das mensagens enviadas para diferentes conexões.
O protocolo de roteamento também evita a possibilidade de ataque MITM pelo retransmissor de encaminhamento, que fornece ao certificado as chaves de sessão do servidor de destino para o cliente remetente que são assinadas criptograficamente pelo mesmo certificado que está incluído no endereço do servidor de destino, para que o cliente possa verifique se as mensagens são enviadas para o destino pretendido e não interceptadas.
O diagrama abaixo mostra todas as camadas de criptografia usadas no roteamento de mensagens privadas: https://image.nostr.build/c238546e47b00dfea742ab1fc008ff51811240025a603dfbcc94b5bc14b5aa88.jpg
e2e - duas camadas de criptografia ponta a ponta entre clientes remetentes e receptores, uma das quais usa algoritmo de catraca dupla E2EE Post-quantum. Essas camadas de criptografia também estão presentes na versão anterior do protocolo de roteamento de mensagens.
s2d - criptografia entre o cliente remetente e o retransmissor de destino do destinatário . Essa nova camada de criptografia oculta os metadados da mensagem (endereço de conexão de destino e sinalizador de notificação de mensagem) da retransmissão de encaminhamento.
f2d - nova camada de criptografia adicional entre retransmissores de encaminhamento e destino , protegendo contra correlação de tráfego caso o TLS seja comprometido - não há identificadores ou texto cifrado em comum entre o tráfego de entrada e saída de ambos os retransmissores dentro da conexão TLS.
d2r - camada de criptografia adicional entre o retransmissor de destino e o destinatário, protegendo também da correlação de tráfego caso o TLS seja comprometido.
TLS - criptografia de transporte TLS 1.3. Para que o roteamento privado funcione, tanto a retransmissão de encaminhamento quanto a de destino devem suportar o protocolo de mensagens atualizado - ele é compatível com a versão 5.8 das retransmissões de mensagens.
https://image.nostr.build/2edbb7721c3ccf8a21274e96e25ee076c3522323870d92b73dbd1f6bda66fce8.jpg
Passo a passo do aplicativo nostr:nprofile1qqsvnx99ww0sfall7gpv2jtz4ftc9v6wevgdd7g4hh7awkpfvwlezugpzdmhxue69uhhqatjwpkx2urpvuhx2ue0chkv5c
Backup e Recuperação de Dados:
-
instalação do aplicativo.
-
Exportação do banco de dados Backup.
-
Importação do Backup do banco de dados.
-
Baixe e Instale o Aplicativo:
-
baixar o SimpleXchat no F-droid ou Obtainium.
F-droid
https://simplex.chat/fdroid/
https://f-droid.org/packages/chat.simplex.app/
Obtainium.
https://github.com/simplex-chat/simplex-chat
- Faça o download e instale o aplicativo em seu dispositivo móvel.
Criando seu perfil:
-
Criar perfil:
-
Clique em “CRIE SEU PERFIL”, contatos e mensagens são armazenados localmente em seu dispositivo.
https://image.nostr.build/e109c9fd5ea327640f0af2d6396aaa7e7d85594c6b20fd6ed426a558195a0021.jpg
-
Nome de Exibição exemplo: Alex teste :-)
-
Toque em "Criar" para configurar seu perfil e começar a usar o SimpleXchat.
https://image.nostr.build/96a1c59d370d554ada31e91301857825af7975b29eb82fe8fcb5cbba9d40bf23.jpg
-
Endereço SimpleX:
-
Clique no nome “Criar endereço SimpleX “
-
clicar em " continuar "
Ou Clicar em " Não criar endereço " pode criá-lo mais tarde.
https://image.nostr.build/cb91c0c1d43ce6c1a310cf2547cc88510529db3c2a5ce17ca79ec5d9269cb58e.jpg
https://image.nostr.build/47595ab6c17183c267fab2892a8d188b2e9fe29f067c8d96afec2ddbb9feda95.jpg
-
Notificação privadas
-
Escolha o tipo de notificação que prefere 3 opções.
Escolha a opção aberta em “ USAR BATE- PAPO “
https://image.nostr.build/96027dc0c47bdcb8a9c5017592bd6828f8e2d752883c826c08105aec340f1d81.jpg
• Backup e Recuperação de Dados:
- Cópia de segurança. “Clicar no canto superior lado esquerdo na foto de perfil“
Selecione a opção “Senha e Exportação de Banco de Dados“
https://image.nostr.build/7918c90aec373af57ccdcb1194e9277ab85aabadf83ac1d35065ec2a9f2b0aef.jpg
Desabilite a opção “O bate-papo está em execução ”
Clique em “parar”
https://image.nostr.build/8473fac2cef41d35451abcf8b40101630caf92b30f01e51767df1cc428dd8a70.jpg
https://image.nostr.build/bdd691b738712f98107c7da404d693d9cccce58c2afb89a2d6f649190e13a3e2.jpg
Seu banco de dados de bate-papo tem 4 opções.
-
Senha do banco de dados
-
Exportar banco de dados
-
Importar banco de dados
-
Excluir banco de dados
Clique na primeira opção " Senha do banco de dados "
- O Banco de Dados tem seus contatos e grupos e é protegido por sua senha que criptografa o banco de dados. Recomenda-se trocar essa senha padrão.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
Clicar na primeira opção " Senha de banco de dados "
Lembre-se de usar uma senha forte.
Após adicionar senha clique em “Atualizar senha do banco de dados”
https://image.nostr.build/3d84eb9954080589ea79050420300baa7e095f1dfc37c925ec4abf7abb047675.jpg
Vai aparecer um aviso.
Alterar senha do banco de dados? A senha de criptografia do banco de dados será atualizada e armazenada no keystore. Guarde a senha em um local seguro, você NÃO poderá alterá-la se a perder.
https://image.nostr.build/61dcdfdb82764df8855ef9e15c453b42d9c87fd23ea9e797ea066ad31f94fd61.jpg
Só clique em “Atualizar” demora 1 minuto aparece a mensagem “banco de dados criptografado!” Só clique em “ok”
https://image.nostr.build/8c303857ae63b803792f71273b4891f7adcfdbc3d0a428ecde2abbfef168781d.jpg
• Clique na opção 2.
Exportar banco de dados.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
Tem duas poções para salvar na memória do Celular, Pendrive, componentes externos de sua preferência.
-
Por padrão Vai abrir a memória do celular para salvar o arquivo backup criptografado na pasta de sua escolha.
-
Pra guardei no pendrive é necessário um cabo OTG para salvar o backup criptografado. Conecte um cabo OTG no celular, alguns celulares já confirmam automaticamente e entram diretamente na pasta do seu pendrive outros aparece um aviso pra aceitar pendrive. Depois basta selecionar o pendrive e salvar o backup.
https://image.nostr.build/c3bd4ca72270d651f4ea7125ac697cd11cb47316e4f0d18e8dfef732579ae77b.jpg
• Clique na opção
- Importar banco de dados.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
-
Caso você perca seu celular, você não tem acesso ao backup. Mas se você tiver salvo no pendrive ou componentes externos, basta seguir as etapas a seguir.
-
Faça a instalação do aplicativo e crie uma nova conta, selecione a opção "Senha e Exportação de Banco de Dados" e desabilite a opção "Chat em Execução". Isso permitirá que você faça a importação do backup.
Clique na opção Importar banco de dados.
Selecione o artigo do backup no pendrive ou na pasta dentro do novo celular só basta clicar no arquivo.
https://image.nostr.build/47cac70f4ba0520c060da98b4b3559f621757d98b4f963b1b1fd2cc522eafa45.jpg
Vai aparecer um aviso.
Importa banco de dados de Chat?
Seu banco de dados do Chat atual será EXCLUÍDO ou SUBSTITUÍDO pelo importado.
Essa ação não pode ser desfeita - Seu perfil, contatos, mensagens e arquivos serão perdidos de forma irreversível.
Só clique em "importar"
https://image.nostr.build/fdfa5e4ba2b6cd1a2b9116633da3f8a7cf91f41dd6d5739582f4e112ae384f7a.jpg
Vai aparecer um aviso.
Banco de dados de chat Importado.
Reinicie o aplicativo para usar o banco de dados do chat Importado.
Só clique em "ok"
Depois Habilite a opção "o bate-papo está parado"
https://image.nostr.build/1f261f36262d5a6cf593b5cb09abdb63ace7bf63f0e66bee7b949850972b3f92.jpg
A senha do banco de dados é necessária para abrir o Chat.
Digite a senha do seu banco de dados.
Depois é só clicar em "salvar senha e abrir Chat"
Pronto foi feita a recuperação de todos os meus dados, incluindo contatos, mensagens e grupos✅️
https://image.nostr.build/28f13ac654c68c890495cbf9689d09946b7af1ecc00a796b9ffd6d64059f4516.jpg
https://image.nostr.build/aae866f7577995bda6735e0a5e4683770bac2af845ae8b552da6526c4f589f08.jpg
Protegendo sua Privacidade no SimpleX Chat.
https://image.nostr.build/88fe0bf337105a3be94754c64bedfbe17d35c586714aa225d0179a379f9a1f71.jpg
Recentemente, tive uma experiência interessante ao explorar as opções de privacidade e segurança no SimpleX Chat. Uma funcionalidade que me chamou a atenção foi a opção de senha de auto destruição, que oferece uma camada adicional de proteção aos dados sensíveis.
Ao configurar o SimpleX Chat para usar senha de auto destruição, percebi o quão poderosa essa ferramenta pode ser para proteger minha privacidade. Após ativar essa opção, qualquer tentativa de acessar meu perfil precisa da senha escolhida por mim. E, se alguém tentasse forçar a abertura do aplicativo, eu posso simplesmente digitar a senha de auto destruição seria apresentado um perfil vazio, sem histórico de conversas. Essa função e bem útil em situações extremas.
A configuração da senha de auto destruição é simples mas poderosa.
Basta acessar as configurações de privacidade e segurança.
https://image.nostr.build/4fb6166656b544c645f316dfc4dad3b9e787b280745992dab30786b0bd0c2ee5.jpg
Aberta na opção de bloqueio SimpleX.
https://image.nostr.build/b866d08644b64884101aae6d011248a3557ac80bcc6e442ae8f62bdb3ee69776.jpg
mudar para a opção de senha. Em seguida, é possível escolher se deseja ativar a senha de auto destruição e inserir a senha desejada.
https://image.nostr.build/867d375825640721ee888e524455fb539df50be87df901dcf0ccfa19f2267576.jpg
Só basta adicionar a senha.
https://image.nostr.build/5bfb500816f814eab189283a64086ad47f32671d8e42558f3f911676ff4df741.jpg
https://image.nostr.build/59323fa6900d4f3b27b39b032f7c2cffdbf379a77c53ed9180c0ace0ca903950.jpg
Pronto. Está Ativado a senha de auto destruição.
https://image.nostr.build/511f82832d1e72d0363cfc5b7b201aaba56f65cfa00360d1c1f4d8d188bb3cdf.jpg
Uma vez configurada, a senha de auto destruição garante que todos os dados, incluindo backups, sejam eliminados permanentemente se a senha de auto destruição for inserida ao desbloquear o aplicativo.
Tenha um backup no pendrive ou em outro local guardado.
https://image.nostr.build/dfbbc5ef805194cc00a09fb690fc76896ada9a9d3f98e8b141f52c72342e2625.jpg
https://image.nostr.build/32a771a0ba2bae47f45f900fc765ffbeae0374724a1a0140c0f2cef83a2e5c2f.jpg
Essa funcionalidade oferece uma tranquilidade adicional ao utilizar o SimpleX Chat, pois sei que meus dados estão protegidos contra acesso não autorizado. Além disso, a capacidade de criar um perfil vazio para ocultar a identidade real é uma ferramenta valiosa em situações críticas , proteger meus dados sensíveis e manter minha privacidade intacta.
https://medium.com/@alexemidio/o-simplexchat-%C3%A9-uma-plataforma-de-mensagens-revolucion%C3%A1rias-que-redefinem-a-privacidade-sendo-o-4690f2a1b2d4
Podcast muito bom no @optoutpod com o criador @epoberezkin https://youtu.be/LrLsS7-woN0
Site : https://simplex.chat/
Protocolo de bate-papo: https://github.com/simplex-chat/simplex-chat/blob/stable/docs/protocol/simplex-chat.md
Whitepaper, incluindo modelagem de ameaças: https://github.com/simplex-chat/simplexmq/blob/stable/protocol/overview-tjr.md
Execute seu próprio servidor SimpleX SMP: https://github.com/simplex-chat/simplexmq
https://play.google.com/store/apps/details?id=chat.simplex.app
Como auto-hospedar servidor Simplexchat
https://youtu.be/p1NF68KIt7M?si=Nhwa8ZajmAvke6lW
https://youtu.be/p1NF68KIt7M?si=uZqOtVu0sLWLXBJX
https://simplex.chat/docs/server.html
https://github.com/simplex-chat/simplexmq
-
@ 4ba8e86d:89d32de4
2024-11-07 12:05:00SISTEMA OPERACIONAL MÓVEIS
GrapheneOS : nostr:nevent1qqs8t76evdgrg4qegdtyrq2rved63pr29wlqyj627n9tj4vlu66tqpqpzdmhxue69uhk7enxvd5xz6tw9ec82c30qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqppcqec9
CalyxOS : nostr:nevent1qqsrm0lws2atln2kt3cqjacathnw0uj0jsxwklt37p7t380hl8mmstcpydmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet59uq3vamnwvaz7tmwdaehgu3wvf3kstnwd9hx5cf0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgcwaehxw309aex2mrp0yhxxatjwfjkuapwveukjtcpzpmhxue69uhkummnw3ezumt0d5hszrnhwden5te0dehhxtnvdakz7qfywaehxw309ahx7um5wgh8ymm4dej8ymmrdd3xjarrda5kuetjwvhxxmmd9uq3uamnwvaz7tmwdaehgu3dv3jhvtnhv4kxcmmjv3jhytnwv46z7qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7qgewaehxw309ahx7um5wghxymmwva3x7mn89e3k7mf0qythwumn8ghj7cn5vvhxkmr9dejxz7n49e3k7mf0qyg8wumn8ghj7mn09eehgu3wvdez7smttdu
LineageOS : nostr:nevent1qqsgw7sr36gaty48cf4snw0ezg5mg4atzhqayuge752esd469p26qfgpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpnvm779
SISTEMA OPERACIONAL DESKTOP
Tails : nostr:nevent1qqsf09ztvuu60g6xprazv2vxqqy5qlxjs4dkc9d36ta48q75cs9le4qpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz34ag5t
Qubes OS : nostr:nevent1qqsp6jujgwl68uvurw0cw3hfhr40xq20sj7rl3z4yzwnhp9sdpa7augpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0dehhxarj9ehhsarj9ejx2a30qyg8wumn8ghj7mn09eehgu3wvdez7qg4waehxw309aex2mrp0yhxgctdw4eju6t09uqjxamnwvaz7tmwdaehgu3dwejhy6txd9jkgtnhv4kxcmmjv3jhytnwv46z7qgwwaehxw309ahx7uewd3hkctcpremhxue69uhkummnw3ez6er9wch8wetvd3hhyer9wghxuet59uj3ljr8
Kali linux : nostr:nevent1qqswlav72xdvamuyp9xc38c6t7070l3n2uxu67ssmal2g7gv35nmvhspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswt9rxe
Whonix : nostr:nevent1qqs85gvejvzhk086lwh6edma7fv07p5c3wnwnxnzthwwntg2x6773egpydmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet59uq3qamnwvaz7tmwdaehgu3wd4hk6tcpzemhxue69uhkummnw3ezucnrdqhxu6twdfsj7qfywaehxw309ahx7um5wgh8ymm4dej8ymmrdd3xjarrda5kuetjwvhxxmmd9uq3wamnwvaz7tmzw33ju6mvv4hxgct6w5hxxmmd9uq3qamnwvaz7tmwduh8xarj9e3hytcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qg7waehxw309ahx7um5wgkkgetk9emk2mrvdaexgetj9ehx2ap0sen9p6
Kodachi : nostr:nevent1qqsf5zszgurpd0vwdznzk98hck294zygw0s8dah6fpd309ecpreqtrgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszgmhwden5te0dehhxarj94mx2unfve5k2epwwajkcmr0wfjx2u3wdejhgtcpremhxue69uhkummnw3ez6er9wch8wetvd3hhyer9wghxuet59uq3qamnwvaz7tmwdaehgu3wd4hk6tcpzamhxue69uhkyarr9e4kcetwv3sh5afwvdhk6tcpzpmhxue69uhkumewwd68ytnrwghszfrhwden5te0dehhxarj9eex7atwv3ex7cmtvf5hgcm0d9hx2unn9e3k7mf0qyvhwumn8ghj7mn0wd68ytnzdahxwcn0denjucm0d5hszrnhwden5te0dehhxtnvdakz7qgkwaehxw309ahx7um5wghxycmg9ehxjmn2vyhsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshs94a4d5
PGP
Openkeychain : nostr:nevent1qqs9qtjgsulp76t7jkquf8nk8txs2ftsr0qke6mjmsc2svtwfvswzyqpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs36mp0w
Kleopatra : nostr:nevent1qqspnevn932hdggvp4zam6mfyce0hmnxsp9wp8htpumq9vm3anq6etsppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpuaeghp
Pgp : nostr:nevent1qqsggek707qf3rzttextmgqhym6d4g479jdnlnj78j96y0ut0x9nemcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgptemhe
Como funciona o PGP? : nostr:nevent1qqsz9r7azc8pkvfmkg2hv0nufaexjtnvga0yl85x9hu7ptpg20gxxpspremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy259fhs
Por que eu escrevi PGP. - Philip Zimmermann.
nostr:nevent1qqsvysn94gm8prxn3jw04r0xwc6sngkskg756z48jsyrmqssvxtm7ncpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtchzxnad
VPN
Vpn : nostr:nevent1qqs27ltgsr6mh4ffpseexz6s37355df3zsur709d0s89u2nugpcygsspzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqshzu2fk
InviZible Pro : nostr:nevent1qqsvyevf2vld23a3xrpvarc72ndpcmfvc3lc45jej0j5kcsg36jq53cpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy33y5l4
Orbot: nostr:nevent1qqsxswkyt6pe34egxp9w70cy83h40ururj6m9sxjdmfass4cjm4495stft593
I2P
i2p : nostr:nevent1qqsvnj8n983r4knwjmnkfyum242q4c0cnd338l4z8p0m6xsmx89mxkslx0pgg
Entendendo e usando a rede I2P : nostr:nevent1qqsxchp5ycpatjf5s4ag25jkawmw6kkf64vl43vnprxdcwrpnms9qkcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpvht4mn
Criando e acessando sua conta Email na I2P : nostr:nevent1qqs9v9dz897kh8e5lfar0dl7ljltf2fpdathsn3dkdsq7wg4ksr8xfgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpw8mzum
APLICATIVO 2FA
Aegis Authenticator : nostr:nevent1qqsfttdwcn9equlrmtf9n6wee7lqntppzm03pzdcj4cdnxel3pz44zspz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqscvtydq
YubiKey : nostr:nevent1qqstsnn69y4sf4330n7039zxm7wza3ch7sn6plhzmd57w6j9jssavtspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzueyvgt
GERENCIADOR DE SENHAS
KeepassDX: nostr:nevent1qqswc850dr4ujvxnmpx75jauflf4arc93pqsty5pv8hxdm7lcw8ee8qpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpe0492n
Bitwaden: nostr:nevent1qqs0j5x9guk2v6xumhwqmftmcz736m9nm9wzacqwjarxmh8k4xdyzwgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpwfe2kc
KeePassXC: nostr:nevent1qqsgftcrd8eau7tzr2p9lecuaf7z8mx5jl9w2k66ae3lzkw5wqcy5pcl2achp
CHAT MENSAGEM
SimpleXchat : nostr:nevent1qqsds5xselnnu0dyy0j49peuun72snxcgn3u55d2320n37rja9gk8lgzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgmcmj7c
Briar : nostr:nevent1qqs8rrtgvjr499hreugetrl7adkhsj2zextyfsukq5aa7wxthrgcqcg05n434
Element Messenger : nostr:nevent1qqsq05snlqtxm5cpzkshlf8n5d5rj9383vjytkvqp5gta37hpuwt4mqyccee6
Pidgin : nostr:nevent1qqsz7kngycyx7meckx53xk8ahk98jkh400usrvykh480xa4ct9zlx2c2ywvx3
E-MAIL
Thunderbird: nostr:nevent1qqspq64gg0nw7t60zsvea5eykgrm43paz845e4jn74muw5qzdvve7uqrkwtjh
ProtonMail : nostr:nevent1qqs908glhk68e7ms8zqtlsqd00wu3prnpt08dwre26hd6e5fhqdw99cppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpeyhg4z
Tutonota : nostr:nevent1qqswtzh9zjxfey644qy4jsdh9465qcqd2wefx0jxa54gdckxjvkrrmqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5hzhkv
k-9 mail : nostr:nevent1qqs200g5a603y7utjgjk320r3srurrc4r66nv93mcg0x9umrw52ku5gpr3mhxue69uhkummnw3ezuumhd9ehxtt9de5kwmtp9e3kstczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgacflak
E-MAIL-ALIÁS
Simplelogin : nostr:nevent1qqsvhz5pxqpqzr2ptanqyqgsjr50v7u9lc083fvdnglhrv36rnceppcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp9gsr7m
AnonAddy : nostr:nevent1qqs9mcth70mkq2z25ws634qfn7vx2mlva3tkllayxergw0s7p8d3ggcpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs6mawe3
NAVEGADOR
Navegador Tor : nostr:nevent1qqs06qfxy7wzqmk76l5d8vwyg6mvcye864xla5up52fy5sptcdy39lspzemhxue69uhkummnw3ezuerpw3sju6rpw4ej7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdp0urw
Mullvap Browser : nostr:nevent1qqs2vsgc3wk09wdspv2mezltgg7nfdg97g0a0m5cmvkvr4nrfxluzfcpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpj8h6fe
LibreWolf : nostr:nevent1qqswv05mlmkcuvwhe8x3u5f0kgwzug7n2ltm68fr3j06xy9qalxwq2cpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuv2hxr
Cromite : nostr:nevent1qqs2ut83arlu735xp8jf87w5m3vykl4lv5nwkhldkqwu3l86khzzy4cpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs3dplt7
BUSCADORES
Searx : nostr:nevent1qqsxyzpvgzx00n50nrlgctmy497vkm2cm8dd5pdp7fmw6uh8xnxdmaspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp23z7ax
APP-STORE
Obtainium : nostr:nevent1qqstd8kzc5w3t2v6dgf36z0qrruufzfgnc53rj88zcjgsagj5c5k4rgpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyarmca3
F-Droid : nostr:nevent1qqst4kry49cc9g3g8s5gdnpgyk3gjte079jdnv43f0x4e85cjkxzjesymzuu4
Droid-ify : nostr:nevent1qqsrr8yu9luq0gud902erdh8gw2lfunpe93uc2u6g8rh9ep7wt3v4sgpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsfzu9vk
Aurora Store : nostr:nevent1qqsy69kcaf0zkcg0qnu90mtk46ly3p2jplgpzgk62wzspjqjft4fpjgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzrpmsjy
RSS
Feeder : nostr:nevent1qqsy29aeggpkmrc7t3c7y7ldgda7pszl7c8hh9zux80gjzrfvlhfhwqpp4mhxue69uhkummn9ekx7mqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgsvzzjy
VIDEOO CONFERENCIA
Jitsi meet : nostr:nevent1qqswphw67hr6qmt2fpugcj77jrk7qkfdrszum7vw7n2cu6cx4r6sh4cgkderr
TECLADOS
HeliBoard : nostr:nevent1qqsyqpc4d28rje03dcvshv4xserftahhpeylu2ez2jutdxwds4e8syspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsr8mel5
OpenBoard : nostr:nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
FlorisBoard : nostr:nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
MAPAS
Osmand : nostr:nevent1qqsxryp2ywj64az7n5p6jq5tn3tx5jv05te48dtmmt3lf94ydtgy4fgpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs54nwpj
Organic maps : nostr:nevent1qqstrecuuzkw0dyusxdq7cuwju0ftskl7anx978s5dyn4pnldrkckzqpr4mhxue69uhkummnw3ezumtp0p5k6ctrd96xzer9dshx7un8qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpl8z3kk
TRADUÇÃO
LibreTranslate : nostr:nevent1qqs953g3rhf0m8jh59204uskzz56em9xdrjkelv4wnkr07huk20442cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzeqsx40
REMOÇÃO DOS METADADOS
Scrambled Exif : nostr:nevent1qqs2658t702xv66p000y4mlhnvadmdxwzzfzcjkjf7kedrclr3ej7aspyfmhxue69uhk6atvw35hqmr90pjhytngw4eh5mmwv4nhjtnhdaexcep0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpguu0wh
ESTEGANOGRAFIA
PixelKnot: nostr:nevent1qqsrh0yh9mg0lx86t5wcmhh97wm6n4v0radh6sd0554ugn354wqdj8gpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyuvfqdp
PERFIL DE TRABALHO
Shelter : nostr:nevent1qqspv9xxkmfp40cxgjuyfsyczndzmpnl83e7gugm7480mp9zhv50wkqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdnu59c
PDF
MuPDF : nostr:nevent1qqspn5lhe0dteys6npsrntmv2g470st8kh8p7hxxgmymqa95ejvxvfcpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs4hvhvj
Librera Reader : nostr:nevent1qqsg60flpuf00sash48fexvwxkly2j5z9wjvjrzt883t3eqng293f3cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz39tt3n
QR-Code
Binary Eye : nostr:nevent1qqsz4n0uxxx3q5m0r42n9key3hchtwyp73hgh8l958rtmae5u2khgpgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdmn4wp
Climático
Breezy Weather : nostr:nevent1qqs9hjz5cz0y4am3kj33xn536uq85ydva775eqrml52mtnnpe898rzspzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgpd3tu8
ENCRYPTS
Cryptomator : nostr:nevent1qqsvchvnw779m20583llgg5nlu6ph5psewetlczfac5vgw83ydmfndspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsx7ppw9
VeraCrypt : nostr:nevent1qqsf6wzedsnrgq6hjk5c4jj66dxnplqwc4ygr46l8z3gfh38q2fdlwgm65ej3
EXTENSÕES
uBlock Origin : nostr:nevent1qqswaa666lcj2c4nhnea8u4agjtu4l8q89xjln0yrngj7ssh72ntwzql8ssdj
Snowflake : nostr:nevent1qqs0ws74zlt8uced3p2vee9td8x7vln2mkacp8szdufvs2ed94ctnwchce008
CLOUD
Nextcloud : nostr:nevent1qqs2utg5z9htegdtrnllreuhypkk2026x8a0xdsmfczg9wdl8rgrcgg9nhgnm
NOTEPAD
Joplin : nostr:nevent1qqsz2a0laecpelsznser3xd0jfa6ch2vpxtkx6vm6qg24e78xttpk0cpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpdu0hft
Standard Notes : nostr:nevent1qqsv3596kz3qung5v23cjc4cpq7rqxg08y36rmzgcrvw5whtme83y3s7tng6r
MÚSICA
RiMusic : nostr:nevent1qqsv3genqav2tfjllp86ust4umxm8tr2wd9kq8x7vrjq6ssp363mn0gpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqg42353n
ViMusic : nostr:nevent1qqswx78559l4jsxsrygd8kj32sch4qu57stxq0z6twwl450vp39pdqqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzjg863j
PODCAST
AntennaPod : nostr:nevent1qqsp4nh7k4a6zymfwqqdlxuz8ua6kdhvgeeh3uxf2c9rtp9u3e9ku8qnr8lmy
VISUALIZAR VIDEO
VLC : nostr:nevent1qqs0lz56wtlr2eye4ajs2gzn2r0dscw4y66wezhx0mue6dffth8zugcl9laky
YOUTUBE
NewPipe : nostr:nevent1qqsdg06qpcjdnlvgm4xzqdap0dgjrkjewhmh4j3v4mxdl4rjh8768mgdw9uln
FreeTube : nostr:nevent1qqsz6y6z7ze5gs56s8seaws8v6m6j2zu0pxa955dhq3ythmexak38mcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5lkjvv
LibreTube : nostr:nevent1qqstmd5m6wrdvn4gxf8xyhrwnlyaxmr89c9kjddvnvux6603f84t3fqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsswwznc
COMPARTILHAMENTO DE ARQUIVOS
OnionShare : nostr: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
Localsend : nostr:nevent1qqsp8ldjhrxm09cvvcak20hrc0g8qju9f67pw7rxr2y3euyggw9284gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuyghqr
Wallet Bitcoin
Ashigaru Wallet : nostr:nevent1qqstx9fz8kf24wgl26un8usxwsqjvuec9f8q392llmga75tw0kfarfcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgvfsrqp
Samourai Wallet : nostr:nevent1qqstcvjmz39rmrnrv7t5cl6p3x7pzj6jsspyh4s4vcwd2lugmre04ecpr9mhxue69uhkummnw3ezucn0denkymmwvuhxxmmd9upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy3rg4qs
CÂMERA
opencamera : nostr:nevent1qqs25glp6dh0crrjutxrgdjlnx9gtqpjtrkg29hlf7382aeyjd77jlqpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqssxcvgc
OFFICE
Collabora Office : nostr:nevent1qqs8yn4ys6adpmeu3edmf580jhc3wluvlf823cc4ft4h0uqmfzdf99qpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsj40uss
TEXTOS
O manifesto de um Cypherpunk : nostr:nevent1qqsd7hdlg6galn5mcuv3pm3ryfjxc4tkyph0cfqqe4du4dr4z8amqyspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzal0efa
Operations security ( OPSEC) : nostr:nevent1qqsp323havh3y9nxzd4qmm60hw87tm9gjns0mtzg8y309uf9mv85cqcpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz8ej9l7
O MANIFESTO CRIPTOANARQUISTA Timothy C. May – 1992. : nostr:nevent1qqspp480wtyx2zhtwpu5gptrl8duv9rvq3mug85mp4d54qzywk3zq9gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz5wq496
Declaração de independência do ciberespaço
- John Perry Barlow - 1996 : nostr:nevent1qqs2njsy44n6p07mhgt2tnragvchasv386nf20ua5wklxqpttf6mzuqpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsukg4hr
The Cyphernomicon: Criptografia, Dinheiro Digital e o Futuro da Privacidade. escrito por Timothy C. May -Publicado em 1994. :
Livro completo em PDF no Github PrivacyOpenSource.
https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf Share
-
@ 9ca8f9b2:70031a71
2024-11-07 09:43:51Opinion about Phoenix Wallet (iphone)
Personally, I love this App! The developers of this app have worked so hard over the years to make the UI of this app as simple and smoothe as it can possibly be as a non custodial wallet.
WalletScrutiny #nostrOpinion
-
@ a012dc82:6458a70d
2024-11-07 08:55:21Table Of Content
-
Unveiling Bitcoin's Legacy Amid Debt Ceiling Debates
-
Bitcoin's Decentralized Nature
-
Bitcoin as a Store of Value
-
Bitcoin's Role in International Remittances
-
Regulatory Challenges and Opportunities
-
Bitcoin and Financial Inclusion
-
Conclusion
-
FAQ
In today's fast-paced digital age, cryptocurrencies have taken the world by storm. Among them, Bitcoin stands tall as the pioneer and most prominent cryptocurrency. As financial systems evolve and debt ceiling debates continue to shape economic policies, it is crucial to examine the legacy of Bitcoin and its impact on the financial landscape. This article aims to delve into the intricacies of Bitcoin's legacy and how it intertwines with the ongoing discussions surrounding debt ceilings. By exploring the factors contributing to the money in motion phenomenon and understanding the role of Bitcoin, we can gain valuable insights into the future of finance.
Unveiling Bitcoin's Legacy Amid Debt Ceiling Debates
The concept of money in motion refers to the dynamic nature of funds circulating within an economy. It encompasses various financial transactions, investments, and movements that shape economic activities. When exploring the legacy of Bitcoin amid debt ceiling debates, it is essential to recognize the unique characteristics that set it apart from traditional currencies.
Bitcoin's Decentralized Nature
One of the key aspects that define Bitcoin's legacy is its decentralized nature. Unlike traditional currencies that are controlled by central banks and governments, Bitcoin operates on a decentralized network known as blockchain. This decentralized structure provides several advantages, including enhanced security, transparency, and the ability to bypass traditional financial intermediaries. As debt ceiling debates raise concerns about the stability of traditional financial systems, Bitcoin's decentralized nature offers a potential solution to mitigate these risks.
Bitcoin as a Store of Value
Bitcoin's emergence as a store of value has been instrumental in shaping its legacy. With a limited supply capped at 21 million coins, Bitcoin exhibits scarcity, making it an attractive option for individuals seeking to preserve their wealth. Amid debt ceiling debates, where economic uncertainties prevail, Bitcoin's status as a decentralized store of value becomes even more appealing. Investors can hedge against inflation and potential economic downturns by allocating a portion of their portfolio to Bitcoin.
Bitcoin's Role in International Remittances
Remittances, the act of sending money across borders, play a significant role in global economies. Traditional remittance channels often involve hefty fees and slow transaction times. Bitcoin has emerged as a viable alternative, offering faster, more cost-effective international transfers. By utilizing Bitcoin's decentralized network, individuals can send and receive funds with reduced friction, bypassing intermediaries and lowering transaction costs. In the context of debt ceiling debates, Bitcoin's role in facilitating seamless cross-border transactions becomes increasingly relevant.
Regulatory Challenges and Opportunities
Bitcoin's legacy also includes its interaction with regulatory frameworks worldwide. As cryptocurrencies gained popularity, governments and regulatory bodies have been grappling with how to incorporate them into existing financial systems. Debt ceiling debates often shed light on the need for effective regulations to address economic challenges. While regulations can provide stability and protect consumers, they should also foster innovation and maintain the core principles of decentralization that define cryptocurrencies like Bitcoin. Striking the right balance is crucial to harnessing the potential benefits of cryptocurrencies while mitigating risks.
Bitcoin and Financial Inclusion
Financial inclusion, the accessibility and availability of financial services to individuals and businesses, remains a pressing global challenge. Bitcoin's legacy intertwines with the pursuit of financial inclusion by providing an alternative financial system that is accessible to anyone with an internet connection. This opens up opportunities for the unbanked and underbanked populations to participate in economic activities and access financial services. Amid debt ceiling debates, where financial systems' stability is under scrutiny, Bitcoin's potential to foster financial inclusion gains even greater significance.
Conclusion
The legacy of Bitcoin amid debt ceiling debates encompasses its decentralized nature, role as a store of value, facilitation of international remittances, interaction with regulatory frameworks, and potential for financial inclusion. As the world grapples with economic uncertainties, Bitcoin's unique characteristics offer solutions and opportunities for individuals and the financial system as a whole. By embracing the potential of cryptocurrencies like Bitcoin, we can pave the way for a more inclusive, efficient, and resilient financial future.
FAQ
What is Bitcoin's role in the legacy of money in motion amid debt ceiling debates? Bitcoin plays a significant role in the legacy of money in motion amid debt ceiling debates. Its decentralized nature, ability to serve as a store of value, facilitation of international remittances, and interaction with regulatory frameworks all contribute to shaping the future of finance in the midst of these discussions.
How does Bitcoin's decentralized nature impact its legacy amid debt ceiling debates? Bitcoin's decentralized nature ensures that it is not subject to the control of central banks or governments. This characteristic provides a potential solution to the risks associated with debt ceiling debates and offers enhanced security, transparency, and the ability to bypass traditional financial intermediaries.
Why is Bitcoin considered a store of value amid debt ceiling debates? Bitcoin's limited supply and scarcity make it an attractive option for individuals seeking to preserve their wealth amid debt ceiling debates. As economic uncertainties prevail, Bitcoin's status as a decentralized store of value provides a hedge against inflation and potential economic downturns.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ fd208ee8:0fd927c1
2024-11-07 07:28:06The newspaper barons are all into crypto, now
Watching the outsized-impact we crypto enthusiasts (I'm including Bitcoin in that category), had on the 2024 USA presidential election, was a sobering affair. At the moment, our impact is primarily over the voting box, but, already, indirectly, (over Elon Musik, Donald Trump, and Jack Dorsey, etc.) through our sheer wealth (and the ingenuity that brought us that wealth) being able to influence the voting population, by changing/shifting the communications channels and influencing what is written there.
Elon even reached deep into his foreign-learned bag of political tricks and started handing out money, directly, to petition signers.
Survival of the fittest, ongoing
Now, you all know that I have full respect for an expert player, when I see one, so no hating the hustle, from my side. We all play the hand we are dealt, and the political game is now such a pigsty, that you have to get a bit dirty, to have a chance at winning. Trying to stay neat and above the fray cost Republicans the last election.
It was the most dramatic display of the greatest power following the best money, that has been seen, since the Medici family began minting gold coins. The entire world is in shock. Change is upon us.
He who has the best money, makes the rules.
On a smaller, but not insignificant scale, private wealth and access to Bitcoin funding, have allowed quite a few of us Nostriches, to dedicate time and energy toward promoting and developing the New Internet. Whereas, other people's hobby is increasingly the night shift at the gas station, or doing something mind-numbing, to escape the realities of their current economic misery.
You don't need money to be here, but you can spend more time here, if you have money. And we are here, writing the rules. We call them NIPs.
Same ole, same ole
But back to us Bitcoiners...
I increasingly don't see us morally any different than the clever people crowding into any safe asset, during any financial crisis. Like the people who bought agricultural land, gold, and Swiss Francs, before the Reichsmark melted down. The people who had that stuff, mostly managed to keep it, and their children and grandchildren have inherited it. Or they managed to marry back into families, that have done so, by remaining in the same social class, through beauty or talent.
We Bitcoiners have a good narrative to go along with our flight to economic safety, but everyone has that narrative. Humans have a conscience and need to justify their own actions, to themselves. I'm also a goldbug, you see, and a stockholder, and all three assets are rife with the same virtuous narrative.
How do we save our financial behinds, without being evil?
Some people are simply more situationally aware and have more agency, by nature and circumstances, and they adapt faster. It's not mere intelligence, rather, it also requires a willingness to act and take risks. There's an element of chance to it, but it's still always the same types of people ending up with the assets, with the winners slightly shifting with each round, due to evolution and changes in the environment.
Charity was invented, to get such people to willingly share their assets, or the fruits of their assets, for the common good. So, rather than fret over the morality of the asset, itself, the better response is to consider stepping up your charity (effort or payments), to balance out the inevitable negative impact of the coming Age of Bitcoin Inequality.
Coming down from the ATH
Even now, Bitcoin isn't the only safe asset; it's just the most-fungible and partitionable one, so that it's the one most akin to money. And lines are being blurred, as corporations, funds, governments, and insurers discharge dollars and stock up on harder reserve assets, including Bitcoin.
They can hear the money printers rolling out, already, because nobody can print-n-spend, like Trump can. Let's not forget that the money for the last big bump came from the infamous Trump stimmy checks, that lots of us stacked on crypto.
As Bitcoin flows into such markets, the power will rest with both groups (the direct-hodlers and the title-holders), although the hodlers will initially have the upper hand. I say, initially because many hodlers will need to discharge or invest Bitcoin, to live off of it, but the others don't need to, so it should eventually even out. It could take dozens or even hundreds of years to rebalance. By then, the world will be a very different place, and we don't know if Bitcoin will even still be a part of it.
Assets come, assets go, and I'm just glad I didn't let down my forefathers, by leaving them with the first generation, who failed to adapt. Even if I'm a bit late, to the Bitcoin game, the ball is still in play.
May the best money win. And may it be mine. And may I do good with it.
-
@ fd208ee8:0fd927c1
2024-11-07 07:22:14Unsucking the feed is real
As a Nostrich with an interesting, thought-provoking, and informative feed... a feed so good, that we're creating clients just to look at that feed... a feed that puts a lie to the idea that Nostr is nothing, but people reposting from Twitter or rehashing worn-out Bitcoin memes... a feed that I personally and increasingly enjoy perusing... I am here to tell you that the feed is real.
It's taken me over a year, to produce this feed. I literally spent hours and hours, day in and day out, scouring the Nostrverse for people worth introducing other people to. It was brutally difficult, as I was fighting the inherent nature of the Nostr clients and relays, in their current, most-popular form.
It goes like so...
Here are the steps I took, that sometimes weren't possible to take, until I tried to take them, and that still will sometimes break your client because the clients are often intentionally designed to steer you into having one particular feed:
1) Make a screenshot of your current relay list and copy your follows list. 2) Unsubscribe from all the relays, that you are currently subscribed to. Your feed should disappear. If it doesn't, or it doesn't allow for this, switch to a different client app because yours is corrupted. 3) Unfollow everyone. Delete the whole list. You are taking your follows private, which will invariably result in only following npubs whose stuff you actually want to see, since there's no longer any virtue-signaling going on. Also, it's easier to explain having no list, than a very short one. If your client doesn't allow for this, or starts throwing error messages and freezing up, then switch to a different client app because yours is corrupted. 4) Curate your copied follows list. Go line by line and look at the feed produced by the npub on that list. * Do you want to see that in your feed, going forward? * Do they produce original content and/or are they interesting conversationalists, in the replies? * Have they been active, within the past three months? * Are they simply good friends or real-life acquaintances, that you want to keep tabs on? * If not, cross out their name. * If you have been following someone because they repost or quote interesting things, look at who they've been reposting and follow them, instead. 5) Of the npubs remaining on your list, go through and select the 10 most interesting ones, and look at the reposts and quotes in their feed, and their topical lists like \"Favorites\", \"Devs\", \"Recipes\", etc. (Not their follows list, unless it's quite short, as follows tend to be full of people they follow for social-signaling or client-functional reasons, that they don't actively look at.) Find some new follows, there. 6) Now, set up a personal relay and add all the follows, that made the cut, to your allowed-npubs list. Do not add people to the list, just to make them feel better, or because you feel guilty, as they follow you, or to keep them from yelling at you. Remember, they can't see the list! 7) Think about the topics you find interesting, and add an allowed-keywords list (this is better than hashtags, as it searches the entire content of the notes), with the OR operator (these allowed npubs OR these allowed topics). 8) Make sure that you choose words likely to find the content you are most-interested in, and not people just ranting about it or spamming (those are great additions to your relay's block-list). If you are Muslim, for instance, instead of "Islam" or "shariah", choose "hadith" or "riba", as those are words more-likely to be used by people who know what they are talking about. If you are into bread baking, add "sourdough", "rye", "yeast", or "whisk", but don't add "bread" or "carbs". Once a note from those people shows up in your feed, and their feed looks like someone interesting, you can add their npub to your allow list. Remember: The topics are there to find people to add to the allow list, not merely for their own sake, as this is not a topical relay, but a personal one. 9) Open up a faucet (or relay syncing) with some of the big relays you previously unsubscribed from, some WoT relays, and some of the paid relays (nostr.land, nostr.wine, nostr21.com, and sovbit.host, for example). Your relay will filter that feed and only accept the events from the people and topics on your list. As your relay becomes more popular, npubs will begin writing directly to it, and the connections to other relays will sink in significance. 10) Go to your client of choice and subscribe to your new relay. Also subscribe to some topical relays, or curated neighborhood relays, you find interesting or your frens are running. This is an easy way to find new, interesting npubs, to add to your own relay.
That's a lot of work, you say? Yes, but the result is great, and you are now fully in-charge of your own feed. You also -- here's the cool part -- have a feed good enough, that other people can add your feed to theirs and enjoy your manual curation. As you refine and expand your feed, theirs will also be refined, in parallel. You are now an official Nostr Community Curator. My sincere congratulations.
Why is this so hard?
This is only a lot of work because the clients aren't designed to interact with relays, to this extent, as they were created to service mega-relays, download all their crap to your local cache, and adjust the feed over the follows/mutes lists. This was an idea borne of the axiom that Relays Are Hard, so there will only ever be a handful of them, where we'd all clump together and the relay operators would never judge the quality of someone's content. Then, some unusually clever people made relays increasingly easy, and the mailbox communication model was invented, and here we are.
What we have now, and that is slowly growing in popularity, among the #NostrIntelligentsia, are Nostr clients aimed at curating and viewing individual relays or personalized sets of smaller or more-specialized relays. The reigning client devs refused to give us those clients, and most of us aren't up to developing our own clients, so the relay devs took matters into their own hands and made the clients themselves. The free market remains undefeated.
This is a total game-changer. Last one to board this train is a rotten egg.
Originally, relays were supposed to be completely stupid and clients were supposed to be completely smart, but it's now actually the other way around, because most relay devs have a market-born incentive to make their content highly customizable and appealing to individuals (so that more people run relays).
But what about algos?
Can't you just slap an algo on top of Damus, Lol, or Primal relays, and get the same result? I would argue... no. No, you can't. Or, rather, only in the short to medium term.
Running your own relay, is running your own server. You are now intellectually independent, at a machine-level, and therefore a fully sovereign consumer. If you then use algos to control your own server, or in a client that subscribes to your own server, then you can further-refine a feed that is already in a high-to-you-signal state, rather than risking an algo inching you toward the Consensus Feed.
I have noticed that my own feed is slowly drifting away from the ReplyGuy-Cryptobot-Porny-Bitcoin-Meme Dumpster Fire, that almost everyone else is looking at, and it's due to running my own relay. If I use DVMs, those algos sometimes refer to relays I intentionally avoid, so they return results according to those relays. The results are as underwhelming, as you would expect, and often are simply 31 flavors of the Trending List.
But, that isn't your problem, anymore. From here, you can actively expand and refine your feed, over your whitelist, the topics, and your personally-managed algos.
Happy Nostr-ing!
-
@ 45bda953:bc1e518e
2024-11-07 06:56:26PREFACE
This is a controversial rambling, just thoughts on some interesting phenomena with regards to the evolution of societal norms, comparisons and oddities with regards to the distinct differences of understanding and mentality of people a couple millennia ago. I touch on cultural fundamentals, feminism, masculinity, information warfare and the protection of what makes society function, the protection of women from harm. It has some comic relief elements worked in to just soften the dark and morbid reality of recorded human history.
...
The Streisand Effect
In 2002 or 2003, I am not certain, a dude named Kenneth was being flown along the coast taking pictures from a helicopter. Flying past Barbara Streisand's luxury coastal home in Malibu California he took another pretty picture. This picture among hundreds was posted on a website where they were documenting and measuring coastal erosion with the intent to help make informed policy decisions. He was being flown by, out at sea and not directly over her property. It caused her much emotional distress. He was sued $50 million for violating her privacy. She believed it to be an invasion of her privacy, like Nancy Pelosi believed the January 6 invasion of Capitol was a violent insurrection. Imagine that. The lawsuit was chucked out by the courts and she was ordered to pay Kenneth $177,000 to cover his legal expenses. Before the lawsuit the image had been downloaded six times. Obviously it had gone viral after the lawsuit. Since the lawsuit, well... man, wow, certain scummy 4chan meme drenched websites were on fire. Everyone was talking about Barbara Streisand and sharing pictures and jokes of her house for weeks. It was ironic and hilarious. The purpose of the lawsuit was to remove the picture from the internet and the result was everyone was poking fun at her expensive mansion. The memes, I can't even...
Imagine the precedent set and lawsuits against google for satellite maps and street view had her case won.
In this situation there were a few weird coincidences. I will label it, the cause, the desire and the outcome. None of them were predictable because the collective social internet was so fresh it changed how everything worked.
The cause: Guy flies and takes pictures for research, probably does not even know it's her house.
The desire: She wants the picture removed and receive compensation for her emotional distress. Nothing less than $50 million will be sufficient.
The outcome: A new type of cause and affect is discovered with regards to a world where everyone has equal access to the masses. No longer are celebrities talking at us through small or large square windows in our theatres and homes. We get to talk back at them and about them and explore their weaknesses and failures. We get to embarrass and humiliate them if they do not behave like decent normal people should. We don't mind their ivory towers. Just don't pick on the average Joe anymore, the average Joe collectively has a voice more powerful than yours now. Like Leonardo DiCaprio preaching about global warming from his private jet. We don't care about you flier miles, just don't be a hypocrite.
Which got me thinking. As a peasant, proletariat, a plebeian, how do you make your voice heard in a time where there is no media? I am not talking about no social media, I mean ancient times, no media. No local newspaper where you can post a missing cat picture. No radio with which to advertise your business. Nothing. A time where the king has a dude who shouts decrees from a paper on a hill. Those type of times.
It bothered me, thankfully I have an extensive library of history available to study and find an answer to this interesting question. I found it in the book of Judges in a wild west of ancient savagery where kings would cut off the heads of men just to bed the latters wives. A time where woman were property. Yes, crazy wild times.
Let us set a precedent for this cultural phenomenon and work our way back to media, the virality of said media and the subsequent outrage generated by the news spread by the channels/mediums of media. An ancient example of problem, reaction, solution.
First let's discover an ancient outrage on a smaller more localised platform and then scale it up to something more spectacular.
Genesis Chapter 34
1: Now Dinah the daughter of Leah, whom she had borne to Jacob, went out to see the daughters of the land. ---She wanted to make friends with other girls and was allowed to leave her families protection unescorted.--- 2: And when in Shechem the son of Hamor the Hivite, prince of that country, saw her, he took her and lay with her, and violated her. ---In those days, princes were literally just the son of the chief in the settlement, they were nothing special and they were common and illiterate agrarian goat herders, just like Jacob. You could find a prince every 30 kilometres in those regions at the time. A dime a dozen.--- 5: And Jacob heard that he defiled Dinah his daughter. Now his sons were with his livestock in the field; so Jacob held his peace until they came. 7: And the sons of Jacob came in from the field when they heard it; and the men were grieved and very angry, because he had done a disgraceful thing in Israel by lying with Jacob's daughter, a thing which ought not be done. ---The modern definition of non consensual laying is rape. It is still a thing that ought not be done to this very day.--- 8: But Hamor spoke with them, saying, "The soul of my son Shechem longs for your daughter. Please give her to him as a wife."--- Now I see this guy as trying to appease the group of angry men, appealing to taking the responsibility of caring for the violated girl off her families hands as she is now become a liability. Her worth has been "degraded" by loss of virginity. Her brothers felt this violation was disrespectful, not only to their sister but also to their entire family. Imagine a guy rapes your sister and then pops in the next day and is like "Bro, she resisted, but I love her more than she could possibly understand. WTF."--- 9: And make marriages with us; give your daughters to us, and take our daughters to yourselves. 10: So you shall dwell with us, and the land shall be before you. Dwell and trade in it, and acquire possessions for yourselves in it.” 11: Then Shechem said to her (Dinah's) father and her brothers, “Let me find favor in your eyes, and whatever you say to me I will give. 12: Ask me ever so much dowry and gift, and I will give according to what you say to me; but give me the young woman as a wife.” 13: But the sons of Jacob answered Shechem and Hamor his father, and spoke deceitfully, because he had defiled Dinah their sister. ---The Israelite brothers must have read Sun Tzu, because they were at a huge numerical disadvantage. This might be why these Hivite gents were so confident in confronting them directly. They probably had a whole entourage of armed men with them during these negotiations. It's just the way men meet in barbaric times. With more and bigger spears.--- 14: And they said to them, “We cannot do this thing, to give our sister to one who is uncircumcised, for that would be a reproach to us. ---They opted to have a literal dick measuring contest. The first in recorded history.--- 15: But on this condition we will consent to you: If you will become as we are, if every male of you is circumcised, 16: then we will give our daughters to you, and we will take your daughters to us; and we will dwell with you, and we will become one people. 17: But if you will not heed us and be circumcised, then we will take our daughter and be gone.” ---Now Abraham had himself circumcised as an adult being the first dude to undertake the procedure. He made it obligatory that his male descendants should all be circumcised a few days after birth. To the modern observer this "command" from god to slice off a piece of your dick seems stupid. But is it? Thought experiment. Let's say Bob lives in dangerous times with dangerous men in a desert where there are no modern ablution facilities. John rocks up at a Bob's tent and claims he is family of Bob travelling far and asks for hospitality and to be hosted for the night. Bob is like hmm, "He speaks my language, he has a similar complexion to me, but his bandit buddies might be hiding behind a hill waiting for his signal when me and my family are fast asleep." So Bob gives him lots of nice wine to drink and they break bread together. Later John needs to take a piss, Bob tells him that he also wants to take a leak, Bob walks with John behind a bush. John pulls up his robe whips out his dick and Bob can then decide how he is going to handle the situation from there. Seeing John's uncircumcised appendage Bob is safe to assume that him and his family are in danger. Also think of how vulnerable John is with his pants down draining the main vein, it might be Bob's opportune and only moment to strike first and unexpectedly. Bet you never heard an explanation like that in favour of having a cut foreskin. A secret sign of sign of familiarity. As a pragmatist I have interpreted all God's commandments following common sense and useful logic to explain them.--- 18: And their words pleased Hamor and Shechem, Hamor’s son. 19: So the young man did not delay to do the thing, because he delighted in Jacob’s daughter. ---He was like LFG bring that knife I'm ready. I can imagine Shia LaBeouf playing this part in the NETFLIX original series.
--- He was more honourable than all the household of his father. ---I think this simply means the bravest. Being circumcised as a little kid is easier when you have no say in the matter. You require more mental fortitude as a grown man to voluntarily submit to this procedure. Like playing Russian roulette with a fully loaded revolver.---
20: And Hamor and Shechem his son came to the gate of their city, and spoke with the men of their city, saying: 21: “These men are at peace with us. Therefore let them dwell in the land and trade in it. For indeed the land is large enough for them. Let us take their daughters to us as wives, and let us give them our daughters. 22: Only on this condition will the men consent to dwell with us, to be one people: if every male among us is circumcised as they are circumcised. 23: Will not their livestock, their property, and every animal of theirs be ours? Only let us consent to them, and they will dwell with us.” --- They really had to make it sound like a good deal.
24: And all who went out of the gate of his city heeded Hamor and Shechem his son; every male was circumcised, all who went out of the gate of his city.
25: Now it came to pass on the third day, when they were in pain, that two of the sons of Jacob, Simeon and Levi, Dinah’s brothers, each took his sword and came boldly upon the city and killed all the males. 26: And they killed Hamor and Shechem his son with the edge of the sword, and took Dinah from Shechem’s house, and went out. ---I must admit that this is as awesome as 300 or some Herculean feat. These okes were Alpha Chads.--- 27: The sons of Jacob came upon the slain, and plundered the city, because their sister had been defiled. ---So they sent their sister as a gift to show good faith albeit deceitfully I doubt she was wise to their plan. They knew that the guy cannot have sex with her because time has to pass for his wound to heal.--- 28: They took their sheep, their oxen, and their donkeys, what was in the city and what was in the field, 29: and all their wealth. All their little ones and their wives they took captive; and they plundered even all that was in the houses. ---The small tribe of Israelites probably had a baby boom as a people because of the influx of women gained through this specific conquest.---
30: Then Jacob said to Simeon and Levi, “You have troubled me by making me obnoxious among the inhabitants of the land, among the Canaanites and the Perizzites; and since I am few in number, they will gather themselves together against me and kill me. I shall be destroyed, my household and I.”
31: But they said, “Should he treat our sister like a harlot?” --- To all the feminists who say "How dare you deny a girl the freedom to go where she wants a chase her dreams. Girls can do anything! Girl power!" No, they just end up in some sleazeball's harem. Girls can only do "anything" in Western Civilisation because men have agreed on a very specific set of moral principles which are Christian in nature. Biblical record teaches us why we have freedom, how to facilitate and maintain these freedoms. If you are a feminist you should find a good man and thank him for disciplining his base desires and holds you up with esteem and respect. Feminists are destroying the pedestal men built to support them. But I digress once again.
So now we know why ancient women were under men's protection as their most valuable possession. Women could not acquire and retain agency by themselves for themselves by reason of their physical vulnerability in a wilderness of savages. Not rocket science, just common sense. When cows are money women are not entrepreneurs. There are technological and societal advances required before womens gain of agency and independence is possible.
We have just witnessed how a small group of men conspired and through cunning devised a strategy wherewith they managed to avenge a wrong committed against them. Tooth for teeth and eye for eyes. Violence begets escalation of violence. It might be the first time a nation went to war over a woman's honour. It's not the last time nations went to war over a woman either.
About 600 hundred years later, circa 1100 BC.
Judges 19
1: And it came to pass in those days, when there was no king in Israel, that there was a certain Levite staying in the remote mountains of Ephraim. He took for himself a concubine from Bethlehem in Judah. ---A concubine is a woman under the legal protection of a man who performs the same duties as a wife but does not receive the same status and social recognition as a wife. She cohabits and even bears children. Sounds rough and unpleasant. Almost like a type of slave. A concubine is rarely given in marriage and more frequently exchanged like a good. I believe that the man was legally obligated to support and protect her but anyone can imagine that this is not the ideal outcome for a woman of any culture born in any age. It must have sucked.--- 2: But his concubine played the harlot against him, and went away from him to her father’s house at Bethlehem in Judah, and was there four whole months. ---Here it helps to have some perspective on where the Overton window was lying when this episode of history was recorded and happened. To a lesser extent it was similar just a century or two ago. Have you watched Roland Emmerich's movie The Patriot starring Mel Gibson and Heath Ledger. Do you remember the scene where they had to tie Gabriel Martin (Heath) up when he spent the night over at his sweethearts house. This was because her father had to be able to guarantee the chastity of his daughter on the day of her wedding. No unmarried girl could freely travel alone about the countryside without being under supervision and when she was permitted to court a suitor, a chaperone was required to escort the couple. This was to ensure that no accusation of unseemly behaviour could be made without angering the man who is responsible for her protection. If a girl was raped there were massacres. Some cultures even had intrusive forms of testing the bride to be for proof of virginity, sometimes before and sometimes after the marriage bed. If a woman was a product in a transaction or given as a bride she was required to be a virgin unless she was sold as a whore, meaning for a cheap price. The father, brothers and later the husband carried responsibility for her chaste and loyal behaviour. This does not mean that men behaved with honour. Most were self righteous pigs. But many were good husbands and fathers.--- 3: Then her husband arose and went after her, to speak kindly to her and bring her back, having his servant and a couple of donkeys with him. So she brought him into her father’s house; and when the father of the young woman saw him, he was glad to meet him. 4: Now his father-in-law, the young woman’s father, detained him; and he stayed with him three days. So they ate and drank and lodged there. ---She was not having indiscriminate affairs with random men. She just missed her family and ran away. She would not have been labelled a harlot if she was travelling with her husbands blessing and an escort for protection, she ran away and he could not protect her or be witness to her behaviour. Almost like being guilty by association but more like being guilty for lack of evidence. She becomes Schrodinger's cat. Faithful? Unfaithful? You could not know even with the box open.--- 5: Then it came to pass on the fourth day that they arose early in the morning, and he stood to depart; but the young woman’s father said to his son-in-law, “Refresh your heart with a morsel of bread, and afterward go your way.” 6: So they sat down, and the two of them ate and drank together. Then the young woman’s father said to the man, “Please be content to stay all night, and let your heart be merry.” 7: And when the man stood to depart, his father-in-law urged him; so he lodged there again. 8: Then he arose early in the morning on the fifth day to depart, but the young woman’s father said, “Please refresh your heart.” So they delayed until afternoon; and both of them ate. 9: And when the man stood to depart—he and his concubine and his servant—his father-in-law, the young woman’s father, said to him, “Look, the day is now drawing toward evening; please spend the night. See, the day is coming to an end; lodge here, that your heart may be merry. Tomorrow go your way early, so that you may get home.” 10: However, the man was not willing to spend that night; so he rose and departed, and came opposite Jebus (that is, Jerusalem). With him were the two saddled donkeys; his concubine was also with him. 11: They were near Jebus, and the day was far spent; and the servant said to his master, “Come, please, and let us turn aside into this city of the Jebusites and lodge in it.” 12: But his master said to him, “We will not turn aside here into a city of foreigners, who are not of the children of Israel; we will go on to Gibeah.”---The city of Jerusalem would would not be conquered by king David for another 100 years. This guy did not want to trust foreigners who did not respect his culture and customs with the security of his party. It seems wise. He opted to stay with people who were kin.--- 13: So he said to his servant, “Come, let us draw near to one of these places, and spend the night in Gibeah or in Ramah.” 14: And they passed by and went their way; and the sun went down on them near Gibeah, which belongs to Benjamin. 15: They turned aside there to go in to lodge in Gibeah. And when he went in, he sat down in the open square of the city, for no one would take them into his house to spend the night. ---He arrived late during the day as well making it difficult to arrange lodging at the last minute.--- 16: Just then an old man came in from his work in the field at evening, who also was from the mountains of Ephraim; he was staying in Gibeah, whereas the men of the place were Benjamites. 17: And when he raised his eyes, he saw the traveller in the open square of the city; and the old man said, “Where are you going, and where do you come from?” 18: So he said to him, “We are passing from Bethlehem in Judah toward the remote mountains of Ephraim; I am from there. I went to Bethlehem in Judah; now I am going to the house of the Lord. But there is no one who will take me into his house, 19: although we have both straw and fodder for our donkeys, and bread and wine for myself, for your female servant, and for the young man who is with your servant; there is no lack of anything.”
20: And the old man said, “Peace be with you! However, let all your needs be my responsibility; only do not spend the night in the open square.” ---The old man knew how lawless his city was and did not want to leave the Levite vulnerable in the town square, unfortunately the strangers presence in the city was already noted.--- 21: So he brought him into his house, and gave fodder to the donkeys. And they washed their feet, and ate and drank. 22: As they were enjoying themselves, suddenly certain men of the city, perverted men, surrounded the house and beat on the door. They spoke to the master of the house, the old man, saying, “Bring out the man who came to your house, that we may know him carnally!” 23: But the man, the master of the house, went out to them and said to them, “No, my brethren! I beg you, do not act so wickedly! Seeing this man has come into my house, do not commit this outrage. ---He is asking them nicely without physical authority to respect his private property.--- 24: Look, here is my virgin daughter and the man’s concubine; let me bring them out now. Humble them, and do with them as you please; but to this man do not do such a vile thing!” ---How sad that a woman's honour is traded for a mans personal safety. This history is definitely not a heroes epic.--- 25: But the men would not heed him. So the man took his concubine and brought her out to them. And they knew her and abused her all night until morning; and when the day began to break, they let her go. ---Many modern day scholars of the humanist persuasion pull up their noses at Biblical texts precisely because of these types of occurrences recorded in it. When a historian is willing to record for posterity their failures as well as their victories it only garners trust that the history is true and unmolested by those who would wish to hide and twist the truth to suit their narrative or motives. The aftershock of this event was and is still significant and warrants explanation to the descendants of these people to help them understand their current reality at the time of learning it 2800-2000 years ago. The Bible is not a toy, it is also not a fairy tale. It is the most comprehensive exposition of the human condition currently available for study.--- 26: Then the woman came as the day was dawning, and fell down at the door of the man’s house where her master was, till it was light. 27: When her master arose in the morning, and opened the doors of the house and went out to go his way, there was his concubine, fallen at the door of the house with her hands on the threshold. 28: And he said to her, “Get up and let us be going.” But there was no answer. So the man lifted her onto the donkey; and the man got up and went to his place. ---The modern reader of this might feel a crime of murder and rape was committed. I assure you that this is not the crime. The crime here is that private property was vandalised and destroyed. I pity the woman with my modern Western mind. But as a student of history I have to face the fact that the man was the victim in his day and age. The emotions and pain of this event is not described and could not be described in it's full detail. We do not know if a distraught and scared man was lying inside the house crying, being shushed and detained by his host? I doubt that this was the case, I can only speculate. We only have the information which was deemed sufficient and necessary to be carved onto a slab of stone or scribed onto papyrus. Historians of ages past were not as privileged as I to be able to write and babble thousands of words without the laborious cost which written or carved words claimed from the ancient and even more recent thinkers. Modern critics of ancient texts are not sufficiently recognising these costs. We learn more important lessons from histories scandals than we do from it's triumph's.--- 29: When he entered his house he took a knife, laid hold of his concubine, and divided her into twelve pieces, limb by limb, and sent her throughout all the territory of Israel. 30: And so it was that all who saw it said, “No such deed has been done or seen from the day that the children of Israel came up from the land of Egypt until this day. Consider it, confer, and speak up!” --- Wait what? This guy gone did what? He chopped his wife into 12 pieces? If there was a king which there was not he could have made a plea for justice. If there was a court he could have made a claim. If he had a gun he could have shot them all in a righteous fury. He wanted justice but justice did not have a door for him to knock on. His own people whom he chose to trust above the foreigner abused his trust. It is here where I solemnly confer that it's better to not have expectations of valour from people you don't know, don't trust if you can help it. No one is coming to save you. I'm sorry? I forgot to explain why he couriered his concubines corpse all across the country you say. He did it because he did not have a mobile phone, facebook, twitter, newspapers, radio, or cable TV from where he could broadcast the injustice and pain he and his deceased concubine was subjected to. He knew to get his situation trending on the network of human conversation he had to create sensation. A Streisand effect but intentionally. A rallying cry, like Peanut the squirrel, just a bit more gruesome.---
Judges 21
1: So all the children of Israel came out, from Dan to Beersheba, as well as from the land of Gilead, and the congregation gathered together as one man before the Lord at Mizpah. 2: And the leaders of all the people, all the tribes of Israel, presented themselves in the assembly of the people of God, four hundred thousand foot soldiers who drew the sword. 3 (Now the children of Benjamin heard that the children of Israel had gone up to Mizpah.) Then the children of Israel said, “Tell us, how did this wicked deed happen?” 4: So the Levite, the husband of the woman who was murdered, answered and said, “My concubine and I went into Gibeah, which belongs to Benjamin, to spend the night. 5: And the men of Gibeah rose against me, and surrounded the house at night because of me. They intended to kill me, but instead they ravished my concubine so that she died. 6: So I took hold of my concubine, cut her in pieces, and sent her throughout all the territory of the inheritance of Israel, because they committed lewdness and outrage in Israel. 7: Look! All of you are children of Israel; give your advice and counsel here and now!”
8: So all the people arose as one man, saying, “None of us will go to his tent, nor will any turn back to his house; 9: but now this is the thing which we will do to Gibeah: We will go up against it by lot. 10: We will take ten men out of every hundred throughout all the tribes of Israel, a hundred out of every thousand, and a thousand out of every ten thousand, to make provisions for the people, that when they come to Gibeah in Benjamin, they may repay all the vileness that they have done in Israel.” 11: So all the men of Israel were gathered against the city, united together as one man.
12: Then the tribes of Israel sent men through all the tribe of Benjamin, saying, “What is this wickedness that has occurred among you? 13: Now therefore, deliver up the men, the perverted men who are in Gibeah, that we may put them to death and remove the evil from Israel!” But the children of Benjamin would not listen to the voice of their brethren, the children of Israel. 14: Instead, the children of Benjamin gathered together from their cities to Gibeah, to go to battle against the children of Israel. 15: And from their cities at that time the children of Benjamin numbered twenty-six thousand men who drew the sword, besides the inhabitants of Gibeah, who numbered seven hundred select men. 16: Among all this people were seven hundred select men who were left-handed; every one could sling a stone at a hair’s breadth and not miss. 17: Now besides Benjamin, the men of Israel numbered four hundred thousand men who drew the sword; all of these were men of war. ---A civil war in which 65100 men were slain broke out among distantly related brethren. The idea I am trying to convey is that if a man has no speech he cannot campaign for his desired cause. Sensation and virality propels speech into the public arena of popular discourse and is discussed until the prevailing message is precise and clear. If there is no shock factor your speech falls on the ground before your feet. If your speech aligns with the general narrative everyone agrees and nods but the impact of your speech is marginal.
I am glad that we are in a new age where human beings are not so atrociously violated by men with power as it was in ancient times. No wait, it's still a problem. Women are still abused and brothers are still violating each others property and different groups with different interests are still bombing the shit out of each other.
What gives me hope is this.
The internet has dropped the barriers of audible speech and enabled everyone equal access to generate Streisand effects of their own making. Purposely and accidentally.
We are the new mainstream media. Podcasters, influencers, youtubers, and bloggers. We get to decide and form narratives and we get to put our ideas in the arena to battle for acceptance and prominence. The world is now our oyster just as much as it was Barbara Streisand's in the golden age of Hollywood before the internet was there to humble her. Time will tell if we are collectively better custodians of this responsibility than celebrities, corporations and governments. The responsibility of forming the narrative. Not centrally, but decentralised. Let good ideas form and old ideas rest.
Can we be a voice of reason and bring peace and order to a chaotic clown world through the power of speech and ideas? I can only hope.
Echdel
bitbib
-
@ f462d21e:1390b6b1
2024-11-07 03:52:04eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyIsImZlZWRiYWNrIjp7ImZlZWRiYWNrIjowLCJwYWdlciI6eyJ0b3RhbEl0ZW1zIjowfSwibWVzc2FnZSI6Im5vIHJlc3VsdHMgZm91bmQifX0=
-
@ df478568:2a951e67
2024-11-07 03:25:45I'm writing a long form post from the Yakihonne app I downloaded from the Aurora store. I signed in using Amber. This means I never needed to enter my private key into the app. I also didn't provide an email, nor password.
This is a link to Clark Moody's Dashboard I made by clicking a button and pasting the link.
This post won't be too long as I'm testing the software out, but it's not so bad for being so new. It even let's you save drafts.
https://nostree.me/marc26z@nostrplebs.com/ 869,210
-
@ b184e3ed:27924b0d
2024-11-07 03:06:37When I joined AA, this question started to haunt my thoughts during those frequent nighttime anxiety attacks. Among all the chaos in my life, there were a few things I was certain of. And one of those things was the certainty of never having felt God, I didn't even know that God was something you could feel. For me, when I started the 12-step program, God was a social construct, something humans had invented to control a society thirsty for basic survival instincts. And perhaps I wasn't so wrong, but like everything in life, this was only half the truth. Despite my deep cognitive analysis that my anxiety forced me to do almost every night for hours, often until the first ray of sun pierced my bedroom window, my spiritual bias didn't allow me to see the whole picture, or a complete reality. On that side, there had always been a void Later, I realized that this emptiness was the main cause of all my problems. From there came that feeling of always being incomplete, that anxiety of always feeling like something was missing, that need to always want to fill voids that weren't mine, without realizing that it was only creating more emptiness within me Once, in those heart-to-heart talks that we in AA call sponsorship, my soul expressed the painful doubt, 'What does it mean to feel God?' My sponsor simply replied, 'I assure you that when you feel God, you won't doubt that what you feel is God. There is no doubt in matters of God. And so I left, with that answer that left me right where I started. And with more doubts. Why is there no doubt in matters of God?
After thinking about it for so long, I paused for a few seconds. I closed my eyes and decided, for the first time, to talk to this so-called God. I let go of all my feelings, all my disbelief, and I prepared myself to accept anything different from what I already had, because what I had wasn't working for me at all. With all sincerity and feeling a pressure in my chest, closer to my heart than usual, I asked in a low voice God, what does it feel like to feel you? What should I do to feel you? What's the manual for feeling you? I've tried everything, I don't know what else to do, what else to plan. I accept that I need to feel you. Everyone tells me that when I feel you, everything will make sense and only then will I start to let go of this violent need to consume my drug of choice. But nobody tells me how. What am I not seeing? Please, give me something. I can't take it anymore, I'm running out of strength, I'm wasting my life stuck in the same cycle. I can't do this anymore, help me feel you. Then a pain began to flow, but a particular one that every addict knows, that soul-deep pain that comes from emptiness, that pain that turns on the faucet of tears that began to flow non-stop. I allowed myself to feel that pain, everything turned dark and negative, suicidal thoughts returned, hate, resentment, selfishness, depression, all together, all that is lived in darkness, all that is felt in solitude, all that came from emptiness. And only by feeling it, could I see where that deep pain came from, I could visualize the path it left behind. For the first time, I recognized my spiritual emptiness. And it was only then that I began to see the whole picture of my life. Doubt has no place in the things of God because God is not logic, God is not reason, much less a manual. Doubt comes from logic, therefore where there is doubt, there is also an absence of God, emptiness. And right at the moment of recognizing that, very specific images came to my mind. My sponsor hugging me for the first time when I arrived and interviewed me. With that hug came the words, 'You're not alone, you're already in a safe harbor, we'll be with you from start to finish. One day at a massive AA event, right in the middle of a workshop dynamic, that deep and sincere hug my fellow sufferer and I shared, in the midst of deep crying with our eyes closed, someone guided our arms to each other. To end up keeping each other company in that darkness we had always gone through alone. That trip to a Group Anniversary outside the city, where a fellow member of my group and I were simply enjoying the scenery, the wind on our faces, and laughing at the craziness of our daily lives, this on my motorcycle on the highway. That hug it took me years to find in the arms of my younger sister, right after arriving after a writing session. That hug of forgiveness to my mother and father that I had never been able to give before because I didn't want to go through the pain that came with feeling. Those few seconds in the rain that we spent lost on our way to the new location of our Group that I experienced in the company of a fellow member. Seeing a new person arrive with a desire to start their process. Connecting in the same feeling and emotion that comes with the death of a best friend. Serving a cup of coffee to that fellow member who returns after months of absence. Arriving at the group with hope of seeing that fellow member who hasn't been coming for weeks and little is known about what happened, but they no longer come to meetings. Day after day, their chair remains empty. And then start letting go of their defenses and their craziness. Standing in front of several strangers, with my head held high, my gaze firm, saying my name and then, 'I am a drug addict. To say, 'I feel like shit, but I'm here for whatever I can contribute. To feel like I'm that support for those who were my support when I was at rock bottom. And not just feel it, but also be able to be it. And that, to mention just a few of the scenes that came to my mind, then I understood 'I had already felt God.' I wasn't lacking spirituality, I wasn't lacking God, I just needed to stay still for a moment to feel it. And to feel that he has always been there. And that he will never leave my side. So today I can answer my own question, 'That's what it feels like to feel God' but not just any God. But a very special one, the God of the 4th and 5th step addicts and alcoholics...
originally posted at https://stacker.news/items/756957
-
@ cf6b9d54:11ef2370
2024-11-07 01:42:11As interest in Hamster Kombat declines, PAWS surges, outperforming the once-top Telegram Mini App. Once a leading tap-to-earn game on Telegram, Hamster Kombat has seen a steep decline in its user base and engagement due to political backlash, bans and new competition.
Hamster Kombat boasted 300 million users in August, but as of Nov. 5, the game has only 41 million active monthly players — an 86% decrease.
Meanwhile, Paws, a newly launched Mini App on Telegram, has surged in popularity, reaching 20.5 million users in its first eight days, surpassing Hamster Kombat’s growth trajectory.
According to IntoTheBlock (ITB) data, on Sept. 27, active Hamster Kombat addresses peaked at around 772,330. Since then, user activity and token interest have waned, falling more than 36% in the past week.
Token price and activity plummet Hamster Kombat’s challenges are reflected in its HMSTR token price, which has fallen nearly 70% from an all-time high of $0.01 on Sept. 26 to about $0.0022 as of Nov. 4, according to CoinGecko data. This decline correlates with lower network engagement and fewer daily active users.
This downward trend is reinforced by ITB’s active addresses ratio (AAR) chart — which calculates the ratio of active addresses to addresses holding HMSTR — revealing a 30-day low of just 0.34% active users.
Still, according to ITB data, the total addresses holding HMSTR have continued to increase, establishing a 30-day high of 3.5 million holders on Nov. 4.
Compared to the performance of other popular Telegram games, a pattern emerges, as seen with the Dogs (DOGS) token airdrop, which dropped from $0.0014 to $0.0004 between August and Nov. 4.
The DOGS AAR chart also shows a steady drop in activity alongside the token’s falling value, hitting a 30-day low of 0.27% active users on Nov. 3.
Scrutiny and volatility response Hamster Kombat has faced criticism from Iranian government officials and has been hit with rumors of bans in Uzbekistan, which have since been proven inaccurate.
The Hamster Kombat team previously told Cointelegraph that its future plans include payment system integration, launching new games and including non-fungible tokens (NFTs) as in-game assets.
One falls, one rises In stark contrast to the fall of Hamster Kombat’s network activity and token price, the Paws Mini App saw over 11 million users join in the first two days alone.
A Nov. 4 announcement on the Paws Telegram channel said that 10 million wallets had connected to the app and it had one million followers on the project’s X account.
-
@ 8d34bd24:414be32b
2024-11-06 22:18:02One popular plot formula for movies is having two very different people trade places through some mysterious means. It may be kids trading places with adults. It may be the rich person trading places with the poor person. It may be the city person trading places with the country person. The more different the two people, the more comical the effects of trading places is.
All Christians are in a storyline of two very different people trading places. It isn’t the story of rich/poor, young/old, or city/country, it is the trading places of the woefully inadequate and sinful trading places with the perfect and sinless. This isn’t a comedy. In so many ways it seems like a tragedy. The one who deserves punishment and death gets forgiveness and eternal life. The one who deserves worship and praise gets punishment and a torturous death.
Unfortunately most of us are not thankful enough for the wonderful benefits we get from this trade and don’t feel the horror we should at what was done to our perfect God, Creator, and Savior.
Therefore if anyone is in Christ, he is a new creature; the old things passed away; behold, new things have come. Now all these things are from God, who reconciled us to Himself through Christ and gave us the ministry of reconciliation, namely, that God was in Christ reconciling the world to Himself, not counting their trespasses against them, and He has committed to us the word of reconciliation.
Therefore, we are ambassadors for Christ, as though God were making an appeal through us; we beg you on behalf of Christ, be reconciled to God. He made Him who knew no sin to be sin on our behalf, so that we might become the righteousness of God in Him. (2 Corinthians 5:17-21) {emphasis mine}
What a wonderful, glorious turn of events in our personal story that we become “a new creature” in Christ; we “become the righteousness of God in Him.” What a tragedy and unfathomable sacrifice that our Creator God, “who knew no sin,” became “sin on our behalf.” We are part of the most unfair trade, and we benefit so incredibly much and yet we take it for granted most of the time.
For Christ also died for sins once for all, the just for the unjust, so that He might bring us to God, having been put to death in the flesh, but made alive in the spirit; (1 Peter 3:18) {emphasis mine}
We, the unjust, were made just so we can be forgiven and face God almighty. Our Creator, Jesus Christ, the just was made sin for us and died to pay the penalty we deserved for our rejection of God, selfishness, dishonesty, and general ignoring of our Creator.
I don’t think we comprehend how much we don’t deserve the Salvation we received and how much Jesus didn’t deserve the treatment He got throughout history, but especially in His death and separation from God on the cross. We feel severe pain when we are separated from our close friends and/or family. Jesus, part of the 3-in-1 God, was separated from God the Father and God the Spirit. It was like us having a limb cut off. They are one God, so severing one from the rest was the greatest torment that He could ever go through. It was worse than infinite, eternal Jesus limiting Himself to a mortal, finite body to live on earth as a man. It was worse than being tortured and killed in the most painful way ever designed by man. Perfect, holy Jesus was made sin, so He could no longer be in the presence of the Father. We need to thank Him every single day for what He did for us. (I know I don’t thank Him enough.)
Surely our griefs He Himself bore,\ And our sorrows He carried;\ Yet we ourselves esteemed Him stricken,\ Smitten of God, and afflicted.\ But He was pierced through for our transgressions,\ *He was crushed for our iniquities*;\ The chastening for our well-being fell upon Him,\ And by His scourging we are healed.\ All of us like sheep have gone astray,\ Each of us has turned to his own way;\ But the Lord has caused the iniquity of us all\ To fall on Him**. (Isaiah 53:4-6) {emphasis mine}
Look at all the replacement language in this passage:
-
“our griefs He Himself bore”
-
“our sorrows He carried”
-
“He was pierced through for our transgressions”
-
“He was crushed for our iniquities”
-
“The chastening for our well-being fell upon Him”
-
“by His scourging we are healed”
-
“the Lord has caused the iniquity of us all to fall on Him”
Because of what Jesus did for us, He took the grief, sorrows, piercing, crushing, chastening, and scourging that we deserved. He took on the burden and guilt of our iniquity.
For you have been called for this purpose, since Christ also suffered for you, leaving you an example for you to follow in His steps, who committed no sin, nor was any deceit found in His mouth; and while being reviled, He did not revile in return; while suffering, He uttered no threats, but kept entrusting Himself to Him who judges righteously; and He Himself bore our sins in His body on the cross, so that we might die to sin and live to righteousness; for by His wounds you were healed. For you were continually straying like sheep, but now you have returned to the Shepherd and Guardian of your souls. ( 1 Peter 2:21-25) {emphasis mine}
How amazing is it that our loving Creator came down to earth and lived a perfect life as “an example for you to follow?” How unfathomable is it that He took our sins into Himself changing Him from the Holy Lamb to a sinner judged and separated from God? How incredible is it that we get His righteousness because He willingly took on our sins? How can we ever show enough gratefulness for what He has done for us?
This next passage is a passage of the greatest joy imaginable and what all believers have to look forward to:
Now I say this, brethren, that flesh and blood cannot inherit the kingdom of God; nor does the perishable inherit the imperishable. Behold, I tell you a mystery; we will not all sleep, but we will all be changed, in a moment, in the twinkling of an eye, at the last trumpet; for the trumpet will sound, and the dead will be raised imperishable, and we will be changed. For this perishable must put on the imperishable, and this mortal must put on immortality. But when this perishable will have put on the imperishable, and this mortal will have put on immortality, then will come about the saying that is written, “Death is swallowed up in victory. (1 Corinthians 15:50-54) {emphasis mine}
The day is coming that we will not just be justified by Jesus’s sacrifice, but we will be changed from perishable to imperishable and from mortal to immortal. “In the twinkling of an eye, at the last trumpet; for the trumpet will sound, and the dead will be raised.”
As the passage continues, “but thanks be to God, who gives us the victory through our Lord Jesus Christ.” (1 Corinthians 15:57)
Trust Jesus.\ \ your sister in Christ,
Christy
-
-
@ fb5986f6:4173af9d
2024-11-06 20:55:08Instalación de proxmox: https://www.youtube.com/watch?v=iUXX1dKAGxA
No Solo Hacking - Virtualización con Proxmox https://www.youtube.com/watch?v=qaWpaNX_rL8&list=PLznRNLIWBPwH5Li7Co2i57rUVhve7m_ZQ
-
@ a039ecde:18bc0b8c
2024-11-06 20:49:18Ensure top-notch food safety standards with Telsen’s food hygiene app, designed to simplify daily tasks and streamline hygiene management. This user-friendly app supports businesses in maintaining compliance by digitising checklists, tracking cleaning schedules, and providing timely reminders. Ideal for restaurants, catering services, and food manufacturers, Telsen’s app improves operational efficiency and helps meet stringent hygiene regulations. With real-time updates and easy-to-use features, our app is a vital tool for enhancing food safety practices. Choose Telsen’s food hygiene app for comprehensive, reliable hygiene management at your fingertips.
-
@ fc792576:bab046e9
2024-11-06 20:13:55Russian Presidential Press Secretary Dmitry Peskov said he does not know whether Vladimir Putin plans to congratulate Donald Trump on his election victory, but he recalled that the United States is an unfriendly country involved in a war against Russia.
"As for congratulations, I am not aware of the president's plans to congratulate Trump," Peskov told reporters in response to a question on the matter.
At the same time, he noted: “Let’s not forget that we are talking about an unfriendly country that is directly and indirectly involved in a war against our state.”
Peskov was asked whether he thought Trump might be offended if Putin did not congratulate him on his victory, and whether this would worsen relations between Russia and the US even more.
"It is practically impossible to worsen things further; relations are at their historical lowest point. And what happens next will depend on the next US leadership. President Putin has repeatedly said that he is open to constructive dialogue based on justice, equality and a willingness to take each other's concerns into account. And President Putin maintains this attitude. He has repeatedly confirmed it. At the moment, the US administration is diametrically opposed. We will see what happens in January," Peskov said.
In general, the elections, he noted, are an internal matter for the United States. "We, of course, are closely monitoring all the information flows that are coming from overseas on this matter, we are analyzing the words that are being said, and of course, we will mainly draw conclusions based on the statements, on the topics that are on our agenda, when they come in," the Kremlin representative said.
In addition, conclusions will be drawn based on the first concrete steps, Peskov added.
At the same time, the press secretary reminded that this will have to wait, since the current US president will continue to perform his duties for at least another month and a half.
At the same time, responding to a clarification about what would happen if Trump made friendly statements, Peskov said: “As our diplomats say, eventual discussions are inappropriate here.”
-
@ 569d3ee7:6120020e
2024-11-06 20:05:35Enhance user experience with Responsive Website Design Orange County by Urban Geko. Our team creates mobile-first designs that adapt perfectly to any device, ensuring seamless usability and higher engagement. With responsive design, your website will load fast, look stunning, and function flawlessly across smartphones, tablets, and desktops. Urban Geko specializes in blending creativity with technology to deliver dynamic, interactive websites that leave lasting impressions. Whether you’re a local business or a global enterprise, our Orange County experts ensure your website is future-ready. Partner with Urban Geko for innovative web solutions that elevate your brand.
-
@ 35f3a26c:92ddf231
2024-11-06 19:47:07****The disappointment I feel with the passivity and lack of critical thinking of the previous and current adult generation is currently at maximum levels...
If someone tells me that I would be alive to watch Orwellian systems being pedaled by countries that call themselves "1st World Countries" I wouldn't not have believe it...
If someone tells me that the political system called "democracy" will become a joke, where the political arena is controlled by the donors and therefore the "elected" politicians will bend over to please their donors and their interests instead to work for the people.... I wouldn't have believe it...
If someone tells me that the West would support unjust causes, fund extremist to support the interests of the pharmaceutical, the energy and the military industrial complex... I would not have believe it...
If someone tells me that the united West, will ban books, and attack people with corrupted law enforcement due to their ideology, religious believes or simply for telling inconvenient truth's as official or citizen journalists, scientists, doctors, whistleblowers... I wouldn't have believe it...
But here we are and is all happening...
The minority, those aware of what is at stake, can keep doing their part, but the amount of NPC characters, sold outs, traitors and corrupt officials is overwhelming, and IMO , until we don't separate the money from the state this will just get worst until it breaks...
And when someone or a group starts spreading hope, telling you not to worry, asking you to do nothing, telling you they are in control and they will take down the corrupted web harming your country, you are most probably being gaslighted and surrendering your power to a psychological operation built to neutralize you,
What can we do? Few suggestions:
- Information is empowering, read, inform yourself, do not use the main stream media only, expand your sources of information, question more
- Get involve with your community
- Research and demand accountability for the elected officials when they do not behave correctly or work against the interest of your city.
- Write to the elected officials when new laws are to be approved, demand explanations if they are harming your town/city, organize, collect signatures and perform referendums to remove political bad actors from office
- Organize the community to understand the law and your rights, look for volunteer lawyers to give free lectures and recommend literature to digest, consider going to law school lectures, the more informed you are the better prepared to fight back for your constitutional rights
- Lead by example
- Try listening more
- Do not trust any news, no matter the source, verify
-
@ 85a99262:6d44d234
2024-11-06 19:21:41Searching for local SEO services in Auckland? Look no further than Team Empathy. Our team specialises in optimising websites for improved local search visibility in Auckland. With targeted strategies and customised approaches, we help businesses dominate the local search results and attract more qualified leads from their community. Trust Team Empathy to boost your business's local presence and drive more customers to your doorstep in Auckland.
-
@ b425f50d:bb0ee063
2024-11-06 18:47:49Organise, manage, and share your brand’s images effortlessly with Brandkit’s image library software. Designed for marketing teams and brand managers, this software provides a centralised, secure platform to store and retrieve high-quality images, ensuring consistency and accessibility. Brandkit’s intuitive image library software enhances productivity and collaboration, reducing time spent searching for assets. Streamline your visual content strategy and keep your team aligned with Brandkit’s innovative image management solution. Experience the simplicity and efficiency of a robust image library that keeps your visual assets organised and easy to use.
-
@ 35f3a26c:92ddf231
2024-11-06 18:44:54Introduction
Nowadays, businesses and individuals are adopting Bitcoin as a method of payment. It's no surprise, given the security, speed, and cost-efficiency associated with it, specially using the LN. However, despite the numerous advantages, Bitcoin still faces challenges in terms of privacy, fees, and scalability.
What is ARK?
A Layer 2 protocol for Bitcoin designed to solve some of the Bitcoin Network challenges, to improve its efficiency, security and scalability. The protocol aims to enhance the functionality of Bitcoin by addressing its current limitations by using a shared UTXO model that enables anonymous, off-chain payments through an untrusted intermediary called the Ark Service Provider (ASP). ASPs are always-on servers that provide liquidity to the network, similar to how Lightning service providers work but without the time consuming opening and close and balancing of channels.
Interoperability with the Lighting Network?
Ark will function as a liquidity network that operates like Lightning, but without introducing liquidity constraints or a direct link between the sender and receiver. It uses virtual UTXOs, to enable anonymous, scalable, off-chain payments. ASPs provide liquidity to the network and charge fees for their services.
ARK will address key issues with deploying capital into the Lightning Network providing a layer that settles transactions without the requirement for a specific infrastructure to remain online, as is the case with Lightning, while still providing assurances of the private custody of funds. How: - Ark can interoperate with Lightning by attaching HTLCs (Hashed Timelock Contracts) and PTLCs (Point Time Locked Contracts) to a pool transaction. Attached HTLCs live under another shared UTXO called the HTLCs outputs, which expires after four-weeks. - Ark service providers forward HTLCs to the broader Lightning Network the moment after HTLCs are attached to a pool transaction. This requires Ark service providers to run routing nodes on the Lightning Network with well-established outgoing channels. Ark users can also get paid from Lightning using HTLC-nested vTXOs.
Last but not least, the Ark Service Provider will serve not only as a liquidity provider but as a Coin-Join coordinator and a Lightning service provider.
How does ARK compares with the Lighting Network?
- https://image.nostr.build/00dba22e23022333d9a767fb015e2d89b7e2e0e5aa73345eaea53bd59c5ecc56.jpg
Conclusion
The ARK protocol is an exciting development, addressing many of the challenges faced by Bitcoin Network today. ARK promises to enhance, above all, privacy and scalability, making it a valuable addition to the rapidly growing Bitcoin ecosystem.
_
Sources and recommended watching and reading:
-
@ d035f771:37c0030d
2024-11-06 18:00:11Pink Bins is your trusted provider for high-quality waste bins in Auckland, offering a variety of sizes for all types of waste disposal needs. Whether for home, business, or construction sites, our bins are designed for durability and convenience. With prompt delivery, flexible rental terms, and competitive prices, Pink Bins ensures your waste management process is easy and efficient. Our team is dedicated to providing exceptional customer service, making us a top choice for waste solutions in Auckland. Choose Pink Bins for reliable and hassle-free waste bin rentals that meet your unique project demands.
-
@ 3ad01248:962d8a07
2024-11-06 17:22:48The 2024 election is finally over! I'm sure all of you are tired of the constant emails and calls from political candidates asking for your vote. I know for sure that I am! With that being a said election night 2024 was a bloodbath for the Democrats. Not only did Kamala Harris not win the presidency, the Democrats lost the Senate and will most likely will not win back the House of Representatives.
The Republican will now control all three branches of the federal government for the first time in a while. What they decide to do with this new found power is going to be interesting because they don't have a super majority in the senate or the house. They are going to have to work with Democrats to get anything done, which after this election if pretty much a non-starter.
It is cool that Trump won and all but I honestly don't know how is going to change from a Biden to a Trump presidency. The Democrats are not going to give Trump a win on anything because they have nothing to lose over the next 4 years. Who do they have waiting in the wings to take over the lead the Democrat party? Gavin Newsome? He can't even run California right. AOC? The Squad? Crypto hater Elizabeth Warren? Yea right. Democrats have effectively lost their way and do not know how to connect to the average voter right now. As long as the focus on abortion, gender and race identity they will continue to lose the average voter.
The average voter cares about the economy and putting food on the table. They care about crime and keeping their community safe. They care about securing the border and making sure people immigrate to this country through the proper channels. It's not really that hard if you think about it. In my opinion the Democrat party is talking to a constituent that will be the majority maybe in another 20 years, and the issues the talk about now resonate more with that cohort but they are not a majority of the voting public. How the Democrat party doesn't understand this is beyond me and frankly I don't care if they do.
They will either adapt of wither away as a political party. I would love to see the emergence of more political parties that could decentralize more of the political power among different stakeholders.
What Happens Over The Next 4 Years
Now that Trump has been elected as the 47th president of the United States what does that mean for America and the world? Needless to say there are some massive shifts coming on the foreign policy front that much is certain.
Ukraine
Lets start with Ukraine. Trump being elected is definitely a negative for Ukrainians that want to keep fighting and not cede land to Russia. What I see happening is Trump demanding that Ukraine give up the land they lost to Russia because they will not send more military hardware to help they continue the fight. Ukrainian leadership will not like this but their hands are effective tied at this point.
The US is the biggest backer of Ukraine and when they so no more weapons there isn't much they can do about it. Europe hasn't stepped up in a real way and provided the support they need despite the war being on the doorstep. I get Trump's thinking on this. If Europe isn't going to step up why should America foot the bill. The consequences of letting Russia get away with this has more impact on Europe than America. Time will tell what will happen with this conflict but it safe to say right now its a wait and see situation.
https://youtu.be/m3AUefhHjfI?si=4WH1Q-PVs8yOeDTP
The lesson that dictators will learn from this is they can take land with impunity because the so called "free world" will do nothing to stop them. What happens when China invades Taiwan? This is going to happen as a result of Trump winning. China sees a America that is more inward facing and not a global force that will intervene in the affairs of other countries. It's going to be an interesting 4 years.
Israel/Gaza War
Trump winning the election gives Israel and Bibi Netanyahu the green light to pursue their genocidal campaign in the Gaza Strip and Lebanon. You can expect more people to be killed in Gaza and I wouldn't doubt if the death toll hits 100k by next year. Israel isn't trying to take out Hamas, they are forcibly removing the Palestinians from northern Gaza and killing as many as they can. There have been videos circulating online of far right Israeli settlers that want to reoccupy Gaza. This has been a plan in the making for a long time. Don't believe me? Watch this video!
https://youtu.be/mF6B5UVupyA?si=B58TXv135B5LnjrC
https://youtu.be/Q7fXNwZoH9I?si=nSI1SmBxeimCv4g6
Trump will do nothing to stand in the way of this happening which probably means a wider regional war with Israel vs the Arab world is not off the table. Guess who get drawn into that war to help defend its "greatest ally". Be careful what you wish for America.
Bitcoin
The one thing I think a Trump administration will have a positive effect on is the Bitcoin price and regulations. If you are a Biticoner you are aware of President Trump's 180 on Bitcoin. 4 years he thought it was a scam to now in 2024 wanting to create a strategic Bitcoin reserve and speaking at the Bitcoin conference. Pretty wild stuff right! As the election results were coming in last night you saw the Bitcoin price rise and reach a new ATH with the prospect of a Trump win.
Now that this has become a reality, I fully expect Bitcoin to reach 6 figures over the next 6-12 months. The creation of a Bitcoin strategic reserve or the simple act of not selling confiscated Bitcoin will be enough to drive the price higher. The higher the price goes, the more attention it gets. NGU in full effect. While I don't what the regulatory front looks like for Bitcoin under Trump, it should be less hostile than the Biden/Harris regime. I think pushing for the removal of capital gains taxes on Bitcoin and making Bitcoin legal tender should be the next goal to achieve.
Overall a Trump win is bullish for Bitcoin and I am excited to see what the next 4 years looks like without the federal government actively trying to put the squeeze on Bitcoin.
I hope the Trump administration is successful and keeps its promises to the American people, especially the one about freeing Ross Ulbricht. Ross deserves to be free and with his family. Let Edward Snowden come home too. God Bless America.
Bitcoin #Politics
-
@ 361d3e1e:50bc10a8
2024-11-06 16:13:52https://forex-strategy.com/2024/11/06/5-star-hotels-in-turkey-are-affected-by-a-new-virus/ 5-star hotels in Turkey are affected by a new virus The disease mainly affects children, but adults also complain of severe consequences
turkey #virus #holiday #Coxsackie #travel
-
@ ffbcb706:b0574044
2024-11-06 14:52:49In aanloop naar het debat over de begroting van BZK, EZ en JenV rondom digitale zaken, stuurden wij samen met Waag Futurelab en Commons Network een brief aan de Tweede Kamer Commissie Digitale Zaken.In aanloop naar het debat over de begroting van BZK, EZ en JenV rondom digitale zaken, stuurden wij samen met Waag Futurelab en Commons Network een brief aan de Tweede Kamer Commissie Digitale Zaken.\ Het debat over de digitale zaken begroting zal aanstaande maandag 11 november plaatsvinden. Om de politiek aan te sporen om de regie te pakken op digitale autonomie, stuurden wij, samen met Waag Futurelab en Commons Network een brief aan de commissie. In de brief opperen wij enkele punten voor het debat die eveneens aansluiten op de agenda Digitale Open Strategische Autonomie (DOSA) van Economische Zaken.
We bepleiten hierin dat de overheid moet investeren in een open digitale infrastructuur om onze digitale autonomie te vergroten, innovatie en economische groei te stimuleren en onze fundamentele waarden te beschermen.
Allereerst stellen we dat het gebruik en de ontwikkeling van bestaande alternatieven voor digitale producten en diensten die zijn gebaseerd op publieke waarden vergroot moet worden. Dit kan de overheid doen door te investeren in tools als De Digitale Spoelkeuken, door in aanbestedingen te richten op digitale autonomie en publieke waarden en door in te zetten op digitale gemeenschapsgoederen.
Ook benadrukken we dat er (markt)ruimte gecreëerd moet worden voor alternatieve producten en diensten. Alternatieven moeten zo meer ruimte krijgen om te kunnen concurreren in digitale markten.
Ten slotte stellen we dat we nieuwe alternatieve producten en diensten moeten ontwikkelen die zijn gebaseerd op publieke waarden. Dit kan bijvoorbeeld gestimuleerd worden door het opzetten van een fonds zoals het Duitse Sovereign Tech Fund.
De gehele brief aan de Tweede Kamer commissie kun je hier downloaden.
Dit is een repost van https://publicspaces.net/2024/11/06/in-onze-brief-aan-de-commissie-digitale-zaken-zetten-we-digitale-autonomie-op-de-agenda/
-
@ 126a29e8:d1341981
2024-11-06 14:50:10¿Por qué hacer hacer un plan de herencia?
Si apuestas por Bitcoin como una forma soberana de preservar el valor de tu esfuerzo a lo largo del tiempo y el espacio, seguramente ya estés pensando en el futuro. Pero, ¿has pensado en lo que pasará con esos satoshis que tanto cuesta reunir cuando ya no estés? ¿Tus herederos sabrán cómo acceder a ellos o será como buscar un tesoro enterrado sin mapa?
Objetivos del plan de herencia
- Hacer que tu bitcoin llegue de forma segura a tus herederos una vez que mueras (¡no antes!) - Minimizar el riesgo de robo manteniendo seguridad y privacidad - Prevenir disputas entre herederos - Evitar problemas legales
¡No te compliques!
Siguiendo el principio K.I.S.S. vamos a intentar diseñar un sistema simple. Cualquier sistema va a funcionar mejor si no complicas demasiado las cosas. Ten en cuenta que tu familia estará leyendo el Plan con la noticia reciente de tu propio fallecimiento. Hay que dejarlo todo bien detallado y no dar nada por hecho. Lo más probable es que tus herederos no tengan el nivel técnico que tú tienes hoy.
🔑 La prioridad son tus herederos; no tu ego
Plan de Acción
Es recomendable una estrategia de recuperación independiente a los dispositivos que uses. Es decir, diseñar el plan para que los fondos puedan recuperarse con las semillas, passphrase y contraseñas.
No hay soluciones perfectas. No existe una única forma correcta de hacer un plan de herencia así que deberás diseñar el plan que mejor se adapte a ti y a tu situación.
Locus de Control
🧠 El locus de control (Julian B. Rotter, 1954) es un concepto psicológico que explica por qué, en situaciones problemáticas, las personas pueden decidir esforzarse por conseguir lo que desean o, por el contrario, dejar que las cosas sigan su propio curso.
Este concepto se divide en dos tipos principales:
- Locus de control interno: Creencia de que las propias acciones y decisiones son las principales causas de los resultados que se experimentan en la vida. Esto puede motivar a tomar un rol más activo en la consecución de objetivos y en la resolución de problemas.
- Locus de control externo: Las personas con un locus de control externo creen que los factores externos, como la suerte, el destino, las circunstancias o las acciones de otras personas, son los principales determinantes de sus resultados. Esto lleva a una actitud de mayor pasividad ante las situaciones, al sentir que se tiene poco control sobre los resultados.
Aplicado al plan de herencia vamos a intentar mantener un locus de control interno, es decir, que la custodia y la recuperación de los fondos dependa todo lo posible de nosotros, en lugar de soluciones de terceros.
Ejemplos Locus de control externo:
Smart Contract
Un contrato no es más que un acuerdo entre dos o más partes, un entorno donde se define lo que se puede hacer, cómo se puede hacer, qué pasa si algo no se hace. Es decir, unas reglas de juego que permiten a todas las partes que lo aceptan entender en qué va a consistir la interacción que van a realizar. Sin embargo, los contratos tradicionales pueden presentar un problema: están sujetos a interpretación.
Por otro lado, los contratos inteligentes tienen la capacidad de poder ejecutarse de manera autónoma y automática a través de códigos informáticos, lo que evita tener que pasar por interpretaciones de terceros, ya que las características de inmutabilidad y transparencia de la blockchain de Bitcoin velan por la confiabilidad de estos “contratos”.
El código en un smart contract contiene las reglas por las cuales las partes acuerdan interactuar en la “relación”. En dado caso que las reglas predefinidas se cumplan, el “contrato” será ejecutado automáticamente.
Los problemas que plantea un plan de herencia, ¿pueden ser resueltos con un simple smart contract?; ¿un poseedor de bitcoin puede usar software para transferirlos automáticamente a sus herederos al morir sin la intervención de un notario o cualquier tercera parte? Por supuesto que se puede. El problema es que hay que confiar en el software de un tercero y tus herederos tendrían que acceder a ese software. Cedes el control de tus fondos a un tercero, no los controlas tu.
Oráculo vs Dispositivo de hombre muerto
¿Cómo sabrá el software que alguien está muerto? Hay 2 formas de resolver esto:
- Oráculo
- Dispositivo de hombre muerto
Oráculo
Un oráculo es un programa de software de un tercero independiente que recopila datos y los pone a disposición de quien quiera utilizarlos o de una interface. Ejemplo simplificado:
El Smart Contract de un Plan de Herencia → Oráculo → datos de la persona → ¿Está muerto? → Sus Bitcoin → Herederos
Contras:
- Requiere que confíes completamente en un tercero, el oráculo.
- Si hay un error …… tus bitcoin ya han sido transferidos de forma irrevocable
- ¿Qué pasa si hay alguien con el mismo nombre y fecha de nacimiento y muere?
- ¿Qué pasa si el oráculo desaparece?
Dispositivo de Hombre Muerto (Dead Man’s Switch)
Se trata de confirmar que una persona está muerta por omisión, por no realizar una acción específica. Su fallo para actuar causa que ocurra otra acción.
El mecanismo es sencillo: Cada cierto tiempo hay que hacer una determinada acción para que no se active el DHM. Esta determinada acción puede ser iniciar sesión en una página web o responder a un email automático. Si se realiza esa acción en el momento requerido entonces el reloj se pone a cero y el DHM no se dispara. Y así sucesivamente. Si se te olvida realizar esa determinada acción, se activa el DHM y tus bitcoin serán enviados a tus herederos y se distribuirán en la forma en que tu decidiste.
La premisa es que harás esa determinada acción salvo que estés muerto. Pero pueden ocurrir otras causas diferentes de la muerte que hagan que tu no puedas desactivar el DHM: desastres naturales, lesiones o enfermedades, pérdida de credenciales, pérdida de tus dispositivos, existencia de malos actores, …
Algunas personas utilizan servicios de email con DHM para informar a sus herederos de que ellos tienen bitcoin y que han dejado instrucciones para ellos en una determinada localización. Pero sin poner información confidencial.
Aquí tienes un estupendo tutorial de nostr:npub1dlfezkj445xzatnyu2up3t9m46wxk0vmtmjyuxd2qs8mp8cd8nws8mcdx0 para configurar un Dispositivo de Hombre Muerto de la forma más soberana posible:
https://www.youtube.com/watch?v=YsefQ1xbw68
Gestor de Contraseñas
Algunos gestores de contraseñas tienen algún tipo de mecanismo de autorización de cuenta inactiva. El Administrador de cuentas inactivas permite a los usuarios compartir algunos datos de sus cuentas o notificar a otras personas después de un determinado período de inactividad.
¿Qué recibirán los contactos de confianza? Los contactos solo recibirán una notificación cuando tu cuenta esté inactiva durante cierto tiempo. Si decides que tus contactos solo reciban una notificación cuando tu cuenta esté inactiva, recibirán un mensaje de correo electrónico con la línea de asunto y el contenido que escribiste durante la configuración. Agregaremos un mensaje de correo electrónico en el que explicaremos que dejaste programado que se enviase un correo electrónico en tu nombre cuando ya no utilices la cuenta.
Si decides compartir datos con tu/s contacto/s de confianza, el mensaje de correo electrónico también incluirá una lista de los datos que elegiste compartir con tu contacto y un enlace desde el que podrán descargarlos.
Habría que dejar una nota en el testamento o en tu plan de acceso para que tus herederos sepan que les va a llegar un email con los datos para poder acceder a tus bitcoin.
La habilidad para definir complejos criterios de gasto combinada con la absoluta garantía de una cadena de bloques inmutable remodelará la forma en que controlamos nuestros bitcoin y la forma de planificar la herencia y la sucesión.
Liana Wallet
En Bitcoin es posible crear complejas condiciones de gasto combinando miniscript, timelocks y/o multifirmas y un buen ejemplo de ello es Liana, una wallet con la que podrías transmitir tus bitcoins a tus herederos tras tu fallecimiento, sin compartir tu semilla.
Liana se centra en el uso de timelocks de Bitcoin, permitiendo que algunas claves sean válidas sólo después de que dejes de usar la tuya durante un tiempo determinado. Esto se ejecuta directamente por la propia red Bitcoin (contrato inteligente) sin la participación de terceros. El bloqueo temporal se "actualiza" cada vez que mueves tus monedas, así que mientras uses la wallet con regularidad, tu familia no tendrá acceso hasta que lo necesite.
Partes del Plan de Herencia
1. Elección de ayudantes
- No más de 3 personas (idealmente 2)
- Conseguir datos de contacto para que tus herederos puedan contactarles
- Criterios de elección:
- Confianza
- Conocimientos técnicos
- Que no se conozcan entre si
2. Plan de Acceso
2.A) Inventario: Cuánto bitcoin tienes, dónde están y cómo acceder a ellos.
- Recopilar información de cuentas, wallets y aplicaciones.
- Localizar todos tus dispositivos (teléfonos, PC, Laptops, HWW, semillas en metal, paperwallets, opendime, bitcoin Casascius, etc.)
- Recopilar contraseñas y accesos
- Hacer limpieza, ordenar, consolidar, optimizar.
Ejemplo Tabla Plan de Acceso
2.B) Localización
- Dónde está cada cosa (dispositivos, cuadernos, …)
- Redundancia: Varias copias separadas geográficamente
- Separación de poderes
- Usar sellos de seguridad (con nº de referencia, fecha y firma)
- Carta manuscrita
2.C) Carta a los herederos
- Precauciones - Lista de ayudantes - Inventario y localización de claves privadas - Testamento - Despedida
Consideraciones sobre la carta: No la deposites en notaría y guárdala separada de las semillas y fácil de encontrar para tus herederos. Al igual que con las copias de seguridad de las semillas, también conviene hacer copias de la carta. Muchas cosas pueden cambiar desde que redactes la primera versión hasta que fallezcas por lo que conviene hacer revisiones periódicas.
⚠️ Errores comunes en la carta a los herederos:
- No hacer plan de herencia. No importa tu edad o cuánto bitcoin tengas. Empieza a poner orden y preparar tu plan. - Letra no legible. Si tienes letra de médico, mejor escribir la carta en el ordenador. - No evaluar posibles fallos.
3. Legal ¿A quién se los otorgo?
- Consulta el impuesto de sucesiones de tu comunidad. - La muerte del causante actúa como un cortafuegos, aunque no haya declarado ante el fisco sus fondos. - Recomendación: Consulta a un experto en la materia sobre tu caso personal.
Evaluación S.U.R.E.
Pasado un tiempo suficiente, esperamos que una o más partes de nuestro plan fallará y no resulte según lo planeado. Esto puede deberse a un error humano, error de los medios electrónicos, desastre natural, cambios tecnológicos, cambios en nuestras relaciones y un montón de variables posibles. Uno o dos de estos fallos no deberían resultar en una pérdida total de nuestros bitcoin.
La evaluación S.U.R.E. consiste en evaluar la seguridad, usabilidad, resiliencia y eficiencia de nuestro plan.
- Seguridad: Valorar qué pasaría si una parte del plan se ve comprometida. Que pasaría si un mal actor se apropia de uno de tus backups o dispositivos o accede a una de las localizaciones. - Usabilidad: Facilidad/dificultad de usar el método de forma segura para gente no técnica/experta. - Resiliencia: No tener un punto único de fallo. O cuantos puntos de fallo darán lugar a una pérdida catastrófica. - Eficiencia. Capacidad de lograr un efecto deseado con el mínimo de recursos posibles. Menos es mejor. Se trata de reducir la complejidad de las claves, passphrases, contraseñas y localizaciones sin afectar negativamente los otros 3 elementos.
Bibliografía
📙 Cryptoasset Inheritance Planning - Pamela Morgan.
🎧Pod de nostr:npub1yn3hc8jmpj963h0zw49ullrrkkefn7qxf78mj29u7v2mn3yktuasx3mzt0 junto a nostr:npub1q7cq5mce269pcstj8le369m72ypzl53qsvlszcemqfh6hk0mtlkq7v9jv9 y nostr:npub12aqfngts2xc0z0n47lyfx03p8prhz4kqcel29mukgwydeuatawqqg5dvgy
https://www.youtube.com/watch?v=yI_JP1loEtk👀 Artículo en nostr:npub1qqqqq2jx95am9ds78hklmqzdqt0eqawnx0eln8cqz3pdsqw7rchs9rc6ad por @heptapodae: https://estudiobitcoin.com/como-hacer-tu-plan-de-herencia-bitcoin/
-
@ 6bae33c8:607272e8
2024-11-06 13:42:13I need to calm myself from the election dopamine and focus on the task at hand. I went 4-1 last week to kick of Q3, so I haven’t blown it yet. One week at a time, one 4-1 or 5-0 at a time is how you do it.
Bengals at Ravens — The Bengals are playing better of late, maybe make it Bengals +6, but I’m staying away on the short week.
Giants vs Panthers — The Panthers are a good sell high, and the Giants are playing okay. I’ll say Giants -4.5 and probably lay the wood.
Patriots at Bears — The Bears are the buy-low off the bad loss. I’ll make it Patriots +7.5 and lay the wood.
Bills at Colts — The Bills are on a roll, but the Colts are scrappy in their way. I’ll say Bills -4 and stay away.
Vikings at Jaguars — Man, Trevor Lawrence threw a disastrous pick to lose last week. I’ll say Vikings -2.5. Would consider Minnesota.
Broncos at Chiefs — The Broncos got schooled against an explosive Ravens team, but might be a buy low. Probably Broncos +7.5, I’m thinking.
Falcons at Saints — The Saints have no skill players except Alvin Kamara. Let’s make it Falcons -3 and probably stay away.
49ers at Buccaneers — Both teams are desperate for a win, the 49ers off the bye and the Bucs off the short week. I’ll say 49ers -2.5 and probably lay the wood.
Steelers at Indigenous Peoples — The Steelers off the bye feel like a good spot here against an IP team fortunate to win its last two games. I’ll say Steelers +2.5 and consider them.
Titans at Chargers — The Titans are bad. I’ll make it Titans +8.5 and maybe take the Chargers.
Jets at Cardinals — The Cardinals are playing well, but the Jets still have players. I’ll say Jets +2.5 and stay away.
Eagles at Cowboys — The Cowboys are a train wreck. Eagles -7.5 and stay away.
Lions at Texans — The Lions might be the league’s best team, and the Texans can’t pass protect. I’ll say Lions -3.5, but probably stay away.
Dolphins at Rams — This is actually a good game with everyone healthy again. I’ll say Dolphins +2 and stay away.
-
@ 42342239:1d80db24
2024-11-06 09:05:17TL;DR: J.D. Vance recently observed that many in the Democratic Party are attempting to manufacture trust from the top down, neglecting the fact that genuine trust is often born from grassroots connections. There's indeed a stark contrast between trust that's artificially constructed through manipulation and censorship, and trust that's organically cultivated from the ground up.
Trump's vice presidential candidate J.D. Vance appeared on podcast host Joe Rogan's show earlier in November. According to Vance, large parts of the Democratic Party are trying to create higher trust from above, without understanding that the previously high trust once arose organically: "I think that a lot of them are trying to reimpose that social trust from the top."
Most people understand the importance of high trust. Political scientist Robert D. Putnam, for example, has shown that large social capital, in the form of trust and networks, is a key factor for economic growth, cooperation, and problem-solving. See e.g. his book Bowling Alone: The Collapse and Revival of American Community (2000).
The low trust today is widespread. Trust in the American federal government is at historically low levels. Trust in the media is at rock-bottom levels. Even trust in doctors and hospitals has plummeted: at the beginning of 2024, the proportion of people who reported "a great deal of trust" had dropped to 40%, from 72% in April 2020. This can be concerning, as individuals with low trust in doctors and hospitals will be less likely to follow their advice and recommendations. It's therefore not surprising that many want to "rebuild trust" (this was the theme of the World Economic Forum's annual meeting this year).
How much trust is actually reasonable?
But how much trust is actually reasonable? To determine this, one can ask whether an institution has acted reliably in the past, whether it possesses the knowledge and ability required to deliver what is promised, and whether its interests are in line with our own.
The low trust figures among Americans are likely a reflection of the fact that many of them today question the extent to which the answers to these questions are actually affirmative. During the pandemic, medical experts in the UK incorrectly predicted that hundreds of thousands of people would die. In the US, the leading infectious disease expert misled the public about, among other things, face masks, the sitting president lied about both the effectiveness and safety of vaccines, a British health minister wanted to "scare the pants off people," and virus experts even conspired to mislead about the origin of the SARS-CoV-2 virus. All while social media companies, under pressure from governments, were forced to censor information that was actually correct.
Trust - built on sand or on solid ground?
It's possible to continue on the current path and try to improve trust figures by limiting access to information. For instance, if the public doesn't get access to negative information about authorities or experts, the measured trust can increase. But in that case, trust is merely built on sand, waiting to be undermined by the inexorable forces of truth.
But there's another possibility. Building relationships that are genuine and honest, listening to each other without judgment, and communicating without misleading. Doing things that really matter, and doing them well, showing competence and reliability through actions. In this way, trust can grow naturally and organically. A trust built on solid ground, not on sand. A delicate task. But presidential election or not, isn't it time for us to start building a future where this form of trust is the obvious foundation?
-
@ 361d3e1e:50bc10a8
2024-11-06 07:59:42https://forex-strategy.com/2024/11/06/trump-is-back-in-the-white-house/ Trump is back in the White House The 47th president of the United States knows what to do with the deep state.
usa #trump #politics #maga #vote2024 #elections2024 #pepublicans
-
@ f462d21e:1390b6b1
2024-11-06 04:39:14eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ f462d21e:1390b6b1
2024-11-06 04:19:42eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ f462d21e:1390b6b1
2024-11-06 04:14:05eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ a012dc82:6458a70d
2024-11-06 03:21:36Table Of Content
-
Understanding the Bitcoin Sale
-
Potential Reasons for the Sale
-
Impact on the Market
-
Market Response and Investor Sentiment
-
Conclusion
-
FAQ
The cryptocurrency market is known for its volatility and the constant fluctuations in asset prices. In 2023, a significant Bitcoin sale took place, capturing the attention of investors and enthusiasts alike. Long-term investors made a decision to sell off nearly 50,000 BTC, leading to discussions about the implications of this sale and the factors that might have influenced it.
Understanding the Bitcoin Sale
The sale of nearly 50,000 BTC by long-term investors suggests a shift in market dynamics. These investors, who had held their Bitcoin for an extended period, decided to realize their profits and exit their positions. Such large-scale sales can have a considerable impact on the market, affecting Bitcoin's price and overall market sentiment.
Potential Reasons for the Sale
Several factors might have influenced long-term investors to sell off their Bitcoin holdings:
Profit-taking
Long-term investors often accumulate Bitcoin with the intention of selling it at a higher price in the future. If they believed that the current price levels provided a satisfactory return on their investment, they may have chosen to take profits.
Market Conditions
Cryptocurrency markets are highly volatile, and investors closely monitor market trends. If they perceived a potential downturn or correction in Bitcoin's price, they may have decided to sell to protect their gains or minimize potential losses.
Portfolio Diversification
Investors may have decided to rebalance their investment portfolios by reducing their exposure to Bitcoin. Diversifying their holdings across various asset classes can help manage risk and potentially enhance long-term returns.
Personal Circumstances
Individual investors may have had specific personal or financial reasons for selling their Bitcoin. These could include the need for liquidity, funding other investment opportunities, or addressing personal financial obligations.
Impact on the Market
A significant sale of Bitcoin by long-term investors can have a short-term impact on the market. Depending on the volume of the sale and the prevailing market conditions, it may lead to a temporary decline in Bitcoin's price due to increased selling pressure. However, market dynamics are complex, and the impact of such sales can vary depending on the overall market sentiment and the response of other market participants.
Market Response and Investor Sentiment
The response to this significant Bitcoin sale largely depends on investor sentiment and market perception. Some investors may interpret it as a sign of decreasing confidence in Bitcoin's long-term prospects. Others may see it as a natural occurrence in a market characterized by profit-taking and portfolio adjustments. The market's response to such events can offer insights into the overall sentiment and provide valuable information for future investment decisions.
Conclusion
The significant Bitcoin sale by long-term investors in 2023 highlights the dynamic nature of the cryptocurrency market. Investors' decisions to sell off nearly 50,000 BTC can be influenced by various factors, including profit-taking, market conditions, portfolio diversification, and personal circumstances. While such sales can impact the market in the short term, it is essential to consider them within the broader context of market dynamics and individual investment strategies.
FAQ
What is the significance of the significant Bitcoin sale by long-term investors? The significant Bitcoin sale by long-term investors indicates a shift in market dynamics and can impact Bitcoin's price and overall market sentiment.
Why did long-term investors decide to sell off nearly 50,000 BTC? There can be several reasons behind the decision to sell, including profit-taking, market conditions, portfolio diversification, and personal circumstances.
How does such a sale affect the market? A significant sale of Bitcoin can lead to a temporary decline in its price due to increased selling pressure. However, the impact on the market depends on various factors and the response of other market participants.
What does this sale suggest about investor sentiment towards Bitcoin? The response to the sale can vary among investors. Some may view it as a lack of confidence in Bitcoin's long-term prospects, while others may see it as a natural occurrence in a volatile market.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 35f3a26c:92ddf231
2024-11-06 01:43:31 -
@ 1123ece2:7d1e00c0
2024-11-06 00:55:45Welcome to The Refinery.
“The Christ of John’s Gospel” is the theme for the coming Sunday Morning teachings that focus on John’s unique portrayal of the Christ.
We will continue this series through to the end of the year.
Today we are discussing, When Religion Gets Sick.
John 2:15-16 NKJV
15 When He had made a whip of cords, He drove them all out of the temple, with the sheep and the oxen, and poured out the changers’ money and overturned the tables.
16 And He said to those who sold doves, “Take these things away! Do not make My Father’s house a house of merchandise!”
Scripture Reading
John 2:13-25 NKJV
Jesus Cleanses the Temple
13 Now the Passover of the Jews was at hand, and Jesus went up to Jerusalem.
14 And He found in the temple those who sold oxen and sheep and doves, and the money changers doing business.
15 When He had made a whip of cords, He drove them all out of the temple, with the sheep and the oxen, and poured out the changers’ money and overturned the tables.
16 And He said to those who sold doves, “Take these things away! Do not make My Father’s house a house of merchandise!”
17 Then His disciples remembered that it was written, “Zeal for Your house has eaten Me up.”
18 So the Jews answered and said to Him, “What sign do You show to us, since You do these things?”
19 Jesus answered and said to them, “Destroy this temple, and in three days I will raise it up.”
20 Then the Jews said, “It has taken forty-six years to build this temple, and will You raise it up in three days?”
21 But He was speaking of the temple of His body.
22 Therefore, when He had risen from the dead, His disciples remembered that He had said this to them; and they believed the Scripture and the word which Jesus had said.
The Discerner of Hearts
23 Now when He was in Jerusalem at the Passover, during the feast, many believed in His name when they saw the signs which He did.
24 But Jesus did not commit Himself to them, because He knew all men,
25 and had no need that anyone should testify of man, for He knew what was in man.
A famous preacher once asked, “What is worse than having no religion?”
Then after a pause, he answered his own question, “Having no religion is bad, but having the wrong kind of religion is even worse.”
I believe having a sick religion may be worse than having no religion at all.
Jesus was concerned with sick religion as indicated by his driving the money changes out of the temple.
Much of Judaism had gotten sick, and the Great Physician Himself had come to bring healing.
What did Jesus see in the temple that caused such aggressive action?
The lost sense of awe and respect for God.
The Jews had lost the profound sense of awe and respect for God.
Look carefully at what Jesus observed when He visited the temple.
Many Jewish patrons were coming and going.
They had little respect for what took place in the temple, namely, communion with God.
They bought and sold animals, and they exchanged money as if the court of the Gentiles was a marketplace.
God had intended the temple to be a meeting place for human beings and Himself.
He had not intended the temple to be a den of thieves.
He wanted it to be a place of prayer.
Christians often lose their sense of awe and reverence for God as well don't they.
As people go about the routine of Bible study and church attendance, they can lose reverence for God.
The Lord, His church, and His book become rather ordinary.
Jesus’ is anger was aroused when He saw a lost sense of awe and reference for His Father.
Religion can get sick when the sense of the wonder of God departs from a person or a group of people.The lost sense of the cost of religion.
The Jews had lost sight of the cost of serving the Lord.
The presentation of the animals in temple sacrifice represented a commitment on the part of the worshippers.
God wanted the Jews to present the best animals out of their flocks.
This would mean that they gave their best to God.
When Jesus walked into the temple, He saw that religion had been made cheap.
People were told, “Leave your animals at home and buy one in the temple.”
Purchasing animals from the temple merchants cheapened the sacrificial system.
And this angered the Master.
Modern Christians have lost sight of the cost of commitment.
Following Christ and belonging to a church have become cheap.
The German Pastor, Dietrich Bonhoeffer, during World War Two, said that when Jesus calls a man to follow Him, He calls him to die to himself.
Nothing short of total commitment will satisfy the Saviour.
The lost sense of the outsider.
The Jews had lost the sense of the Gentiles’ need.
The place where the money changers and merchants did business was in the court of the Gentiles.
This was a place within the temple precinct where Gentiles, outsiders, could come and learn of the Lord.
Most of the Jews in Jesus’ time were not concerned for the Gentiles.
They were concerned about their rituals but not for the mission of being a blessing to the nations that God had given them.
Modern Christians can lose the sense of the outsider.
The church can easily become an exclusive club with a preoccupation for its membership.
Religion gets sick when people turn inward and do not look outward for the sinners.
Conclusion.
How is the health of your Christian expression?
If you do not mind, let’s have a checkup.
Is there a great thrill over the greatness and grandeur of God?
Or are you taking shortcuts?
Are you asking for the minimal requirements?
Then what about your concern for others?
Let’s keep our religion healthy and growing.
Until next time
Stay in the Blessings
I really want to encourage you to be diligent with your Bible study time, because God has so much more for us than we can get from just going to church once or twice a week and hearing someone else talk about the Word.
When you spend time with God, your life will change in amazing ways, because God is a Redeemer. Theres nothing thats too hard for Him, and He can make you whole, spirit, soul and body!
You’re important to God, and you’re important to us at The Refinery.
When it comes to prayer, we believe that God wants to meet your needs and reveal His promises to you.
So whatever you’re concerned about and need prayer for we want to be here for you! Or even if you just want to say Hi, you can contact us at www.refinerylife.org
2024 IS A YEAR OF DECISIONS AND OPEN DOORS
© www.refinerylife.org 2013-2024 All rights reserved. Except as permitted under the Australian Copyright Act 1968, no part of this Article may be reproduced, stored in a retrieval system, communicated or transmitted in any form or by any means without the prior written permission.
This episode is brought to you by Refinery Life Australia:
If you enjoy The Refinery Life Radio Podcast you can help support The Refinery by doing the following:
Sow an offering: Bitcoin: bc1qqh6720t2zagj72dyfj348az698tdut3hlecaj4
Online: https://www.refinerylife.org/donate/
If you do send an offering then please email us so that we can say thank you
Subscribe on iTunes | Spotify | YouTube | TuneIn | Rumble | Flare | Zap.Stream | Fountain |
Share The Refinery with your friends and family
Subscribe to the newsletter on www.refinerylife.org
Follow The Refinery on Twitter | Nostr | Instagram | Fountain |
-
@ 35f3a26c:92ddf231
2024-11-06 00:07:28Who is the Cult of the Dead Cow (cDc)?
A known USA based hacktivist group. According to the record in Wikipedia, it was started in 1984 at the Farm Pac slaughterhouse by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three BBS SysOps
You can check their member list in their web site
Thinks of the cDc group that I have found quite interesting
- Group member Drunkfux (Jesse Dryden) is the grand nephew of Charlie Chaplin
- In 1991, the group began distributing music in the form of cassette tape albums
- In November 1994, the group claimed responsibility for giving President Ronald Reagan Alzheimer's disease, claiming to have done so in 1986 with a blowgun
- In 1995, the group declared war on the Church of Scientology stating "We believe that El Ron Hubbard [sic] is actually none other than Heinrich Himmler of the SS, who fled to Argentina and is now responsible for the stealing of babies from hospitals and raising them as 'super-soldiers' for the purpose of overthrowing the U.S. Fed. Govt. in a bloody revolution. We fear plans for a 'Fourth Reich' to be established on our home soil under the vise-like grip of oppression known as Scientology!"
- On January 7, 1999, the group joined with an international coalition of hackers to denounce a call to cyber-war against the governments of China and Iraq
- In February 2000, the group was the subject of an 11 minute documentary short titled "Disinformation".
- In February 2000, a member of the group by the code-name Mudge briefed President Bill Clinton on "Internet security".
- In 2003 the tool created by the group by the name of Six/Four System became the first product of a hacker group to receive approval from the United States Department of Commerce for export of strong encryption
- Member by the name of "Psychedelic Warlord" is congressman Beto O'Rourke, an American politician who served as the U.S. representative for Texas's 16th congressional district from 2013 to 2019. A member of the Democratic Party, party's nominee for the U.S. Senate in 2018, candidate for the presidential nomination in 2020, and the party's nominee for the 2022 Texas gubernatorial election.
Do they have a political affiliation?
From the previous section we could at least assume that they sympathize with the USA Democratic party, they supported President Bill Clinton and claimed responsibility for doing serious harm to President Ronald Reagan, I could not find any information if the government opened an investigation about this allegation or not.
Their latest contribution?
Recently, they have developed an application framework by the name of Veilid, described as "like TOR" but for apps.
This application framework, if adopted by many developers will improve privacy by default for applications developed under that framework. The web site claim that it is open source
You can review the information and project at the web site: VEILID
In the Web site the group describe it as follows:
"Veilid allows anyone to build a distributed, private app. Veilid gives users the privacy to opt out of data collection and online tracking. Veilid is being built with user experience, privacy, and safety as our top priorities. It is open source and available to everyone to use and build upon."
"Veilid goes above and beyond existing privacy technologies and has the potential to completely change the way people use the Internet. Veilid has no profit motive, which puts us in a unique position to promote ideals without the compromise of capitalism."
Summary
Veilid seems to be exactly what is needed at the moment to bring privacy to the masses, even though TOR is doing a very good job and with the improved throughput its usage experience has improved, having a native privacy oriented FOSS application framework is paramount.
Most people is not technically savvy and therefore, not skilled in cyber security, they are constantly victims of cyber crime in many forms and shapes. eliminating one vector of attack by making the applications to opt out of data collection and online tracking from the get go is a step in the right direction, the question is, Would developers in general use the framework? Considering the ads will not be a possible source of income if the framework is used, well... Time will say...
-
@ 35f3a26c:92ddf231
2024-11-05 22:15:17How disappointing to observe Bitcoiners still using mainly YouTube to distribute their own content or content of interest for the community...
It would be nice if more Bitcoiners , specially the ones with channels start sharing as well in Odysee or other platforms less centralized and totalitarian...
BTC
Bitcoin
Odysee
Nostr
-
@ 35f3a26c:92ddf231
2024-11-05 22:14:02What is Bitaxe?
Bitaxe is an open source ASIC (Application-Specific Integrated Circuit) Bitcoin miner that has been making waves in the cryptocurrency community. This innovative project aims to empower miners at every level with powerful, efficient, and low-cost mining solutions.
It is a fully open source ASIC Bitcoin miner developed by Skot9000, an advocate for open-source innovation in the Bitcoin space.
With all software and hardware specs available on GitHub, this project aims to provide miners with a transparent and accessible platform for Bitcoin mining.
https://image.nostr.build/db35c2a028e9f740181daabe2deef4e707653fa2d82f1602086e0ac4b5ee84fd.png
Pros
-
Open Source: The Bitaxe is fully open source, allowing users to access and modify its source code, hardware designs, and build gerbers for PCB ordering.
-
Low Cost: Bitaxe offers low-cost solutions for miners, making it an attractive option for those looking to enter the world of Bitcoin mining without breaking the bank.
-
Efficient: The Bitaxe series is designed to be power-efficient, utilizing either the Bitmain BM1387 or BM1397 ASICs for SHA256 hashing.
Cons
-
Technical Complexity: Being an open-source project, users are required to be technically savvy to set up and maintain the miner, which could pose challenges for those without experience.
-
Bricking Potential: Like any complex technology, there is a risk of bricking (rendering the device unusable) the Bitaxe if not handled properly.
Summary
The Bitaxe represents an exciting development in the world of Bitcoin mining, offering a low cost, efficient, and open-source solution for miners. While it may present some challenges for users who are new to the technology or lack technical expertise, the potential benefits far outweigh these drawbacks. As the project continues to evolve and gain traction, we can expect to see further improvements in performance, accessibility, and innovation within the Bitcoin mining landscape.
Where can I get more information
Go to their Github page: https://github.com/skot/bitaxe
originally posted at https://stacker.news/items/659572
-
-
@ 3c7dc2c5:805642a8
2024-11-05 22:04:51🧠Quote(s) of the week:
'If you made $500,000 per day, every single day since the Great Pyramids were built, you would have less than half of what the US Gov has borrowed since January 2024. Opt-out. Buy Bitcoin' -BitcoinTeddy
If Trump wins, you’re going to want to own Bitcoin. If Harris wins, you’re going to want to own Bitcoin.
🧡Bitcoin news🧡
Let me start this week's Weekly Recap with the upcoming election.
Whether Kamala Harris or Donald Trump wins the election, it doesn't matter. The only thing we know for sure will happen is that the debt (ceiling) will grow.
The scariest thing to happen on Halloween this year? The US Treasury added a mind-boggling $105 billion to the national debt in a single day on the 3rd of November, and the total now stands at $35.95 trillion.
So with the upcoming election, everything changes, but nothing changes. They all print, print, and print. Whoever is in charge, can not resist the urge to kick the can down the road and steal from future generations.
'There is no red. There is no blue. There is the State. And there is you.' - WalkerAmerika
If Trump wins, you’re going to want to own Bitcoin. If Harris wins, you’re going to want to own Bitcoin.
On the 29th of October:
➡️Bitcoin just reached a new ATH in the Shitcoin called Euro.
➡️3.161 BTC. That's the amount of Bitcoin that didn't end up in a Pool wallet today, or a Wall Street miners wallet, or an ETF. One out of 144 blocks mined today went to a sovereign individual who constructed his or her own block using their own node and hardware.
Zero middlemen... great thread. Worth your time: https://x.com/JStefanop1/status/1851080807747551476
Vires in Numerus!
➡️Florida's Chief Financial Officer urges the State Board of Administration to add BTC to the Florida Growth Fund. The states are coming, brace yourself.
➡️+$76m Bitcoin leveraged shorts got liquidated overnight. Rekt! Don't do leverage people!
➡️Dennis Porter and his team SatoshiActFund is doing God's work: "I can confirm that for the first time in US history, a Democrat lawmaker in a Democrat trifecta state will introduce legislation to defend the rights of Bitcoiners.
This is a key move that will redefine the political movement for Bitcoin for years to come. Bitcoin is in alignment with American values like freedom and equality. Americans from both sides of the aisle deeply understand the potential of Bitcoin to provide for a more prosperous future. As we enter the 2024 election, it is more important than ever that Bitcoin maintains its position as a non-partisan technology. For the USA to greatly benefit from Bitcoin, both sides must embrace the technology which is why the news of ‘Bitcoin Rights’ making its way through a deep blue state is so important. Extreme partisan rhetoric seeks to pit Americans against Americans. Neighbors against neighbors. Bitcoin is a tool that can bridge the political divide and unite our country. The future is bright when we pursue a world where Bitcoin is used as a tool for unity and peace. More news on this will continue as we enter 2025."
➡️Just last week, Charles Schwab gave MicroStrategy the worst possible equity ranking of F.
Meanwhile, MSTR is up nearly 20% in the last 5 trading days, and MicroStrategy is over $8.4 billion in profit on its Bitcoin position.
On the 30th of October:
➡️BlackRock’s Bitcoin ETF took in $599 million today as they bought 8820 Bitcoin. Madness
'BlackRock’s Bitcoin ETF has surpassed $30 billion in assets in record time. The fastest-growing ETF in history' -Bitcoin Magazine
➡️MicroStrategy announces intention to raise $21b of equity and $21b of convertible debt. One word: CONVICTION!
Saylor wants to buy $42 billion in BTC over the next 3 years. At current prices, that works out to ~577,160 BTC. Only ~492,750 BTC will be issued over the next 3 years. Hello, supply shock! You have no idea how high we are going.
➡️Other companies have lettuce hands:
Reddit sold the majority of its Bitcoin before BTC started pumping in October — SEC filing.
On the 31st of October:
➡️Massive net inflows this week, US Spot ETFs now hold over 1 million.
➡️MicroStrategy is now worth $4.8 Billion more than Coinbase.
Let that sink in: MicroStrategy is a company that changed from making software to buying BlTC0lN in 2020. They own 252,220 BlTC0lN worth $17 billion, which is 1% of all Bitcoin that will ever exist.
MicroStrategy's stock has gone up 1,500% since 1999, beating Microsoft's 1,460%.
Meanwhile, look what happened to Coinbase after they announced their stock buybacks instead of buying Bitcoin as a treasury reserve asset. Classic!
➡️US Treasury releases report on how stablecoins increase the demand for US debt.
On the 1st of November:
➡️'Bitcoin up 10% in October.
When September and Oct have been green, Bitcoin has continued going up for the rest of the year about 31% on average. That would push Bitcoin to $91,000 by the end of this year.' - Bitcoin Archive
➡️The Central Bank of Argentina (BCRA) began to artistically display Bitcoin miners and other mining machines today.
It is the first Central Bank in the world to do so.
We know that at least 5 countries are mining Bitcoin with government resources. El Salvador, Bhutan, UAU, Ethiopia and Argentina.
➡️Metaplanet has been the best-performing stock year to date in Japan. I wonder why!?
➡️ Bitcoin hash rate going absolutely ballistic. Bitcoin is by far the most secure decentralized Network on planet Earth.
➡️Short-term holders panicked as $BTC dropped below $70,000, and over $2 billion was sent to exchanges at a loss, the most since the Yen carry trade unwound when Bitcoin fell to $49K. Freaking lettuce hands.
➡️Strive Asset Management, co-founded by Vivek Ramaswamy, announces it’s embracing Bitcoin in Texas. Managing $1.7B, Strive reports a core part of its business moving forward will be “integrating Bitcoin into standard portfolios of everyday Americans.”
➡️Florida holds $800 million in crypto-related investments - Florida State CFO
On the 3rd of November:
➡️'Bitcoin always dumps right before the U.S. elections. But look at what happens next' -CryptoRover
As we have seen before. The Shake phase: Push up, shake out, break out.
➡️Cartwright, a multi-billion dollar UK pension fund, just announced a 3% Bitcoin allocation. As a percentage, this is 30x higher than the Wisconsin Pension Fund's allocation, and the largest allocation of any Sovereign Fund in the world so far.
Source: https://corporate-adviser.com/cartwright-calls-on-uk-institutional-investors-to-back-bitcoin/
➡️ Europe's largest telco Deutsche/T-mobile started mining Bitcoin using surplus renewable energy! The move monetizes surplus renewable energy and helps stabilize the grid.
The convergence of energy, finance, and Bitcoin, once a theory, is now starting to play out.
Patrick Hansen: "If successful at scale, it could be a game changer for Germany's energy transition and serve as an alternative to energy storage or the conversion of excess energy to gas (both in their early days and not without their challenges).
In 2024, renewable sources accounted for around 65% of Germany's electricity generation. Challenges with surplus energy have led to negative electricity prices at times, even requiring Germany to pay other countries for excess power.
This is not a small actor chasing a headline. Deutsche Telekom is the largest telecom provider in Europe with a 40% market share in mobile services in Germany. Deutsche Telekom has been running various validator nodes for other proof-of-stake networks, and a bitcoin node for quite a while too."
On the 4th of November:
➡️$725 billion Bernstein predicts Bitcoin to hit $200,000 by 2025, regardless of the US election outcome.
➡️State of Michigan pension fund still HODLs its $7 million in Bitcoin ETFs, SEC filing reveals
💸Traditional Finance / Macro:
On the 30th of October:
👉🏽 Charlie Bilello: "1. Stocks: all-time high 2. Home Prices: all-time high 3. Gold: all-time high 4. Bitcoin: all-time high 5. National Debt: all-time high 6. Core CPI Inflation: >3% for 41 straight months, the longest period of high inflation since the early 1990s 7. Fed: cutting rates again next week"
On the 1st of November:
👉🏽Market wiped out almost $1 TRILLION from US stocks.
On the 2nd of November:
👉🏽Warren Buffett's Berkshire Hathaway now holds a record $325.2 BILLION of cash. This cash balance alone is larger than the market cap of all but 27 public companies in the world.
🏦Banks:
On the 28th of October:
👉🏽More like $2.5 trillion worth of toxic CLO products + U.S. Treasuries that are deeply underwater.
Financelot on the 25th of October: 'The Federal Reserve's emergency BTFP dropped by $7 billion this week, with only $59 billion remaining. In 5 weeks BTFP will be $0, pulling all remaining emergency liquidity away from struggling banks. Thus completing the Federal Reserve's rug pull on the financial system.
🌎Macro/Geopolitics:
On the 28th of October:
👉🏽 'Market Interest Rates are surging as inflation expected to skyrocket again!' 'The US 10-year yield is at 4.29%... 1968 all over again where no one wants to buy U.S. Treasuries. Interest rates are about to double to 9%' - Financelot
Something to consider is the shift in de bond market. Investors are selling off long-term bonds in favor of equities or other riskier investments, resulting in bond prices falling, and yields rising. If we are going to reach that 9%, personally I don't think so. At the moment inflation isn't as extreme + the debt is way too big to let inflation run high just like in the 60's and the 70's.
👉🏽 Last week I shared how German car manufacturer Volkswagen is for the first time in its 87-year history planning to close production sites in its home market. They will close 3 manufacturing plants in the upcoming months.
'The number of state workers in Germany is going up, but with accelerating deindustrialization, the unemployment rate is also going up and reached 6%. However, 6% do not include 5,5 Million long-term unemployed on welfare payments, true unemployment rate is 18%.'
Now let's dive into the numbers. Arbeitslosenquote is 6% with ~2.79 Million people. Then you have 5.5 million people ALG II or Bürgergeld you are not in the unemployment statistics. Implied with 6% is a workforce of 46.5 Million people. Add 5.5 long term unemployed people -> 52M -> (2.79+5.5)/52 =~15.9%. Not quite the 18% as stated by Michael A. Arouret, but still quite high.
On the 29th of October:
👉🏽'The market is getting even more concentrated:
The market cap of the largest US stock is now ~750 TIMES larger than the 75th percentile stock, near the most since 1932. Over the last 8 years, this difference has TRIPLED. Furthermore, the market is currently even more concentrated than it was during the 2000 Dot-com bubble. As seen below, the largest US stock in 2000 peaked at ~6000 TIMES larger than the 75th percentile stock. The only other time that current levels of market concentration were seen was during the Great Depression.'-TKL
👉🏽'Another day, another record high for gold which is up $225 since the Fed rate cut a month ago, and just $225 away from $3000. It is also up 11 of the past 14 days.' -ZeroHedge
👉🏽Jeroen Blokland: "Many assets, including (quality) stocks, physical gold, and Bitcoin are flying this month. But not bonds! Global Government Bonds (hedged, EUR) are down nearly 2% this month, increasing this year's loss. And this is without taking inflation into account. Should you have stuck (again) to the outdated 60-40 portfolio (60% equities, 40% bonds) narrative, or something similar, your relative decline in purchasing power to investors that got rid of bonds and bought scarce assets (like gold and Bitcoin) is (again) massive! What is left to argue against diversifying beyond equities and bonds?"
Just to elaborate on the above:
👉🏽China is working on a $1.6 TRILLION debt stimulus to boost the economy - Reuters
👉🏽The US Treasury: 'We expect to buy up to $30BLN in off-the-fun securities for liquidity support.'
Something's brewing. Print money to buy your own debt. Like using your credit card to pay the same credit card bill. And that something is: FED REVERSE REPO USE FALLS TO $155B FOR FIRST TIME SINCE 2021 Down $46BN overnight. Market about to find out what real tightening is. Normally when this money market fund liquidity leaves RRP it goes into U.S. Treasuries, driving yields down. Instead, the U.S. 10-year yield rocketed to 4.365% this week.
On the 31st of October:
The pound is falling - the biggest fall in more than 18 months. On top of that:
👉🏽"Average 5-year yield since 2020 2.0%. But if you were lucky enough to buy a 5-year bond 5 years ago and kept it to maturity, your yield = return would have been 0.50%. Average inflation since 2020: 4.6%. In the case of the bond bought 5 years ago and keeping it to maturity, the cumulative inflation drag is 24%! Any bond decision in the past 5 to 10 years will result in the same result: a negative real return.' -Jeroen Blokland
On the 1st of November:
👉🏽'The US economy adds 12,000 jobs in October, BELOW expectations of 106,000. The unemployment rate was 4.1%, in line with expectations of 4.1%. This marks the lowest number of US jobs added since July 2021.
Again a DISASTROUS jobs report. And the prior two months' job gains have been REVISED DOWN BY 112,000. Manufacturing jobs loss: 46,000. Manufacturing jobs have declined in 4 out of the last 5 months by a total of 88,000.
👉🏽 'Despite talks of de-dollarisation, America remains (by far) the world's financial hegemon • US stock exchanges capture more than half of global free-float market capitalization. (hence overvalued) • US share of global stockmarket is 2.3 times its share of global GDP — the highest-ever ratio' - Agathe Demarais
On the 3rd of October:
👉🏽Germany will have the second-lowest public investment ratio of all EU countries in 2025 (EU Commission forecast).
Shouldn't addressing the underinvestment problem be of higher priority for finance minister Lindner than cutting taxes for corporations and high-income earners? Unfortunately, the Netherlands isn't far off either. The common problem of the EU is insufficient investment.
👉🏽'Federal government spending spiked 9.7% in Q3 2024 from the previous quarter, marking the largest jump since Q1 2021.
This was driven by a 14.9% jump in defense expenditures, the largest jump in 21 years. Since 2020, government expenditures have risen 30% and hit a new record of $5.04 trillion. Federal spending has been one of the largest contributors to GDP growth over the last 2 years.
The government has now contributed to economic growth for 9 consecutive quarters, with Q3 posting the largest addition over the past year. Government spending is at crisis levels.' -TKL
🎁If you have made it this far I would like to give you a little gift:
Lyn Alden's October public newsletter is available now:
https://lynalden.com/october-2024-newsletter/…
It discusses four macro catalysts that she will be monitoring in the year or so ahead.
Four Major Macro Catalysts to Watch: 1. U.S. Election (Late 2024) 2. Debt Ceiling (Early 2025) 3. Expiring Tax Cuts (End of 2025) 4. Bank Lending Trends
Great read!
Credit: I have used multiple sources!
My savings account: Bitcoin.
The tool I recommend for setting up a Bitcoin savings plan: @Relai 🇨🇭 especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly. (Please only use it till the 31st of October - after that full KYC)
Hence a DCA, Dollar cost Average Strategy. Check out my tutorial post (Instagram) & video (YouTube) for more info.⠀⠀⠀ ⠀
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple.⠀⠀⠀⠀⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 35f3a26c:92ddf231
2024-11-05 22:01:59What is BOLT12
Bitcoin Lightning Network protocol BOLT12 is a proposed upgrade to the existing BOLT11 protocol, designed to enable re-usable payment requests, increased receiver privacy, and better censorship resistance.
Background:
BOLT11 was the previous version of the protocol, which has been widely used since its inception. . BOLT12 aims to address some of the shortcomings of BOLT11 and provide a more streamlined experience for users.
Current Adoption:
While BOLT12 is still in the development phase, there have been some early adopters and testers who have already implemented the new protocol:
- Phoenix Wallet
https://image.nostr.build/fd798202b6f6d7ad4e462eb5456e458a1b88b6fd882c472c3230eed378beab63.png
From version 2.3.1 (Jul 3, 2024), Phoenix Wallet has introduced support for BOLT12, a Lightning Network specification that aims to improve payment requests and receiver privacy. Offers are the Lightning equivalent to a Bitcoin address: it's a reusable, static payment request that can be used for donation use cases, or to easily pay/get paid by your friends. Since BOLT12 is not yet well supported, Phoenix keep displaying a BOLT11 invoice by default.
From version 2.3.3 (Jul 11, 2024) the wallet supports paying BIP353 DNS addresses. It allows users to have a user@domain email-like handle, which are much easier to share with friends or on social networks than a BOLT12 offer
This wallet uses very innovative features and is, IMO, best in class of all the non custodial Lighting Network wallets, from the ones new to the technology to the most advanced.
I always run the “mass adoption test” with a small sample of my family and friends that are not tech savvy and this wallet passed with flying colors, after the installation and without my assistance they managed to use the wallet to receive and send sats.
- Zeus Wallet
https://image.nostr.build/6e8b176dec133a1b412467dee0074bf14b7e8e8ce38cbaf5ca13eee2754bb48f.png
ZEUS Wallet is a mobile Bitcoin wallet and * node management * app that offers full functionalities of a Bitcoin Lightning wallet. It enables users to make Bitcoin payments and manage their Lightning nodes from their mobile device
This wallet does not pass the “mass adoption test” , the test users were not comfortable with the user interface neither understood most of the settings.
For the advance users that manage their own nodes, this mobile wallet is best in class.
Adoption summary: The widespread adoption is still awaited, as many users and merchants are yet to upgrade to the new protocol.
PROS & CONS
https://image.nostr.build/db35c2a028e9f740181daabe2deef4e707653fa2d82f1602086e0ac4b5ee84fd.png
Pros:
-
Re-usable payment requests
-
Increased receiver privacy
-
Better censorship resistance
Cons:
-
Complexity of implementation
-
Compatibility with older nodes and applications which could lead fragmentation
Next Steps:
Many developers are working to improve and implement the protocol ensuring a smooth transition. As the protocol is refined and tested, it is expected to become more widely adopted.
Here the web addresses of few projects actively working on BOLT12:
- https://ocean.xyz/
- https://zeusln.com/
- https://github.com/bitcoin/bips/pull/1551/files
- https://twelve.cash/
- https://clams.tech/
- https://www.roygbiv.guide/
- https://www.ridethelightning.info/
- https://github.com/gudnuf/bolt12-covenant-zapper
- https://lampo.devcrew.cc/
- https://github.com/urza/payto
- https://strike.me/blog/bolt12-playground/ 12, https://phoenix.acinq.co/
- https://apps.apple.com/us/app/plasma-core-lightning-wallet/id6468914352
- https://satsto.me/
- https://dplus.plus/offer
- https://x.com/eltordev
For updates, specs or to get involved with BOLT12, bookmark the main website:
https://www.bolt12.org
What are your thoughts about BOLT12?
Did I missed any wallet that has implemented it already?
Which one is your favorite wallet, custodial or non custodial, supporting BIP353 DNS addresses?
originally posted at https://stacker.news/items/735926
-
@ 35f3a26c:92ddf231
2024-11-05 21:58:09What is a Bitcoin spot ETF?
Is an asset that tracks the price of Bitcoin.
Why is it considered a game changer?
Institutional investors and wealthy individuals, using large investment firms like Blackrock, Fidelity or Ark among others, will be able to acquire the asset with low risk, since these investment firms are highly regulated. These investors have above 15 trillion dollars invested in these large firms and therefore, it is expected that these firms will allocate at least 1% of their portfolios to it. That will be mean a minimum of $150 billions into Bitcoin, which is remarkable considering the current market cap of the asset is currently $570 billion.
An injection of minimum $150 billions translates in a huge demand for Bitcoin with massive potential for price appreciation.
Current mayor players
Until now, very few large institutions have acquired Bitcoin, examples are Tesla Inc (Nasdaq: TSLA) and Microstrategy (Nasdaq: MSTR), which wrote a document labeled "A summary of some of the key considerations for corporations to keep in mind when investing in bitcoin". The link to the document:
https://www.microstrategy.com/en/bitcoin/documents/key-considerations-for-corporate-investment-in-bitcoin
Let's check the math
Amount of Bitcoins mined per day:
-
Bitcoins mined per block: 6.25
-
Time in minutes to mine one block (approx): 10
-
Minutes in one day: 1440
-
Blocks mined per day: 144 -> (1440 / 10 = 144)
-
Bitcoins mined per day: 900 -> ( 144 x 6.25 = 900)
After the halving, since the Bitcoins mined per block will be reduced to 3.125, we will only have 450 mined per day.
*Bitcoins available for trading*:
- Around 4 million across exchanges
- 900 per day injected in the market
Assumptions
- Miners are selling all 900 freshly mined Bitcoins
- Financial institutions will allocate at least 1% of their portfolio into Bitcoin
Assuming Miners sell all 900 every day (which is worst case scenario), this means, that in order for the price of Bitcoin to keep the current price (around $29.4K as I write this article), $26.5 millions are needed in the market to buy those 900 fresh mined every day, $795 million per month, $9.54 billion per year.
Projections in price appreciation
Bear in mind that the projection can't be linear since there are many additional variables to factor in, specially qualitative non quantifiable ones as potential financial crisis, absurd regulations, more ETF delays, governments corruption, wars, pandemics, etc...
In terms of price appreciation, a 15X is plausible, which would rocket the price of Bitcoin to around $441K as soon as the $150 billion are deployed to acquire it.
Now, consider that this is worst case scenario and valid only until the end of this halving (the amount of mined Bitcoin per day will be reduced by half after it), next one is around the end of April 2024.
What happens with the numbers after the Halving?
After the halving, with the current amount of financial energy injected into Bitcoin ($26.5 million), the price would potentially double to around $58.8K, and if 1% of the investment companies applying for an ETF is injected, the math take the potential price of Bitcoin to $882K as soon as that 1% is deployed.
Time frame for price appreciation?
Unknown, but I would assume before the end of 2024, Why? Because the ETFs are being yet again delayed for Blackrock and Fidelity until December 2023 by the SEC (Security Exchange Commission) in USA.
But USA is not the only country where large Investment Companies are applying for ETFs, it is true that the two largest ones are in USA, but there are many more that combined across the world would add up to a massive additional amount of capital injected into Bitcoin.
The first ETF to go public will be in Europe
Jacobi Asset Management, issuer of an equity structure for digital assets in Europe with the first Bitcoin ETF, with a total portfolio of approx. $4.8 billion. Assuming 1% (worst scenario) of its portfolio will be deployed into Bitcoin, additional $48 million would be injected. The launch of this ETF was "July 2023", I will assume this capital will be injected between August and December 2023.
Professional investors can already let them know of their interest in their web site:
https://jacobiam.com/jacobi-ft-wilshire-bitcoin-etf/
Long term impact?
We can divide the long term impact into two arenas:
- Asset appreciation
- Attempts to control the asset
Long terms asset appreciation
As explained before, the more capital is deployed into the asset, and the more time passes, the more valuable and scarce it becomes (one halving every 4 years) and therefore, Bitcoin will continue to appreciate over time by "a lot".
Extrapolate the financial institutions portfolio investment to 5% of 15 trillion dollars, then to 10% and so on. Considering that Bitcoin is the best asset in terms of appreciation of the last 10 years, it is plausible that institutional investors will be eager to put more than 1% of their portfolios into Bitcoin, I would assume that 5% for the most conservative and 20% for the most aggressive will be logical.
You do the math, you will get numbers that will explain why so many financial analyst come with such a high numbers in their predictions of the future price of Bitcoin.
Attempts to control the asset in the long term
Recently I read a post from Chris Blec in X, his post was quite interesting, it reads "Pfizer convinced billions of people to inject a mysterious chemical into their body multiple times but you don't think Blackrock can convince normies that their fork is the real Bitcoin?"
A provocative post which opens the door for debate, one that I am certain is being discussed for years already close doors among the Bitcoin community.
Potential Attack vectors
- Forking Bitcoin into POS: Blackrock or a union of Investment corporations could influence with their resources some key developers and miners to fork Bitcoin into a PoS (Proof of Stake) chain, basically centralizing and controlling Bitcoin. A fork creates a new chain and the users will decide which chain is Bitcoin, users decide by changing their Node into the new chain or not, one Node, one Vote.
- Forking Bitcoin to reduce the block time to 1 minute: With the excuse to reduce the validation transaction time. This will imply many changes that will lead to mining 9000 per day instead of the 900 as of today, reducing the scarcity by increasing the offer and therefore reducing the price
- Forking Bitcoin to increase the block size: This was attempted before, Jonathan Bier in his book The Blocksize War: The battle over who controls Bitcoin’s protocol rules does a decent job explaining the depths of the attack. But in summary leads to centralization of control of the network
Countermeasures
-
Education: In my opinion, education is key, those investment funds manage money from wealthy investors, if those investors understand the ethos of Bitcoin and why the asset is so scarce and valuable, they will fight back together with the individual investors for those changes not to be pedaled into the chain. At the end, greed is a very strong motivator and Satoshi understood that perfectly and therefore it is accounted for in the design.
-
Awareness: A considerable percentage of the Bitcoin investors are well informed and therefore, fear can't be use as a trigger, as it was the case of the pharmaceuticals and their experimental drugs, the investment companies could use their resources to create campaigns pushing their narrative, but the community will see through that and counter it in the social networks quite fast, in my opinion, in the age of information, the legacy MSM (Main Stream Media) can't easily steer the Bitcoin ecosystem opinion as they could have done with the population up to the 90s, now is a real challenge for them. Proof of that is that they have been fighting Bitcoin with everything they got until now. They short it, talk trash it as much as they could in the legacy MSM, call it rat poison, stated that it will go to zero (while secretly buying it...) and after all that, now they are lining up to buy it and speaking highly of the asset.
-
Run your own Node: Bitcoin has endured 14 years of attacks and survived thanks to the community and investors, we need to stay vigilant and protect it, run at least one Node at home, remember, one Node, one Vote.
Can you think of additional countermeasures?
originally posted at https://stacker.news/items/226279
-
-
@ fd78c37f:a0ec0833
2024-11-05 21:04:21Author: Taryn Christiansen @ DoraHacks
Abstract
This article discusses the Fifth Estate and how Elon Musk’s ideas about free speech will affect crypto and the potential for network states if the Trump administration enters office.
Over the past decade, legacy media has become increasingly less influential in how people consume information. Besides those who remain obsequious to the two political parties and their respective information engines like CNN and Fox News, people have grown suspicious of any information relayed from those institutions, which is unfortunate. Not because what they distribute as information is, in fact, faithful to the truth and that people are confused, but because these institutions do at times appear to be in service to interests that do not uphold democratic norms and virtues that are necessary for a democracy’s well-being. And the worst part is that they are unwilling to admit it. It’s one thing for a business model to revolve around certain biases geared toward specific outcomes; it is another to do so and act as if one is an exemplar of journalistic integrity and a torch bearer of truth. This kind of hypocritical behavior exacerbates people’s skepticism and often leads to an excess of distrust, resulting in a complete collapse of faith in a country’s institutions. And one thing is certain: trust in one’s institutions and the belief that they act in good faith are essential to democracy. To take a current and relevant example, a complete distrust in the voting process means a democracy’s collapse. If individuals believe that the voting process they participate in is rigged and that the results are misaligned with the truth, with what people envision for the future of their country, democracy will not last long. The people will not identify with those who lead the country; they will see an administration that has unjustly stolen power and who is, therefore, against democracy. Whether or not such distrust is appropriate within the United States today is not the point here. The fact is that people do distrust the voting process, and that’s a problem.
There are institutions, then, that have to be maintained for a democracy to work. Institutions that distribute information is an example of this. Now, one reason for the current distrust in legacy media has been the inception of what is called the Fifth Estate. The notion of an ‘estate’ is derived from what has been historically referred to as the chief sources of power within a state. In the past, European societies were conceived of having three domains of power: the clergy, who controlled the religious institutions that dominated the West for centuries; the aristocracy, who owned land and status; and the people, which consisted of peasants and merchants. After the invention of the printing press, where information could be widely disseminated, and literacy rates amongst the general population grew, the press and news media arose as a fourth estate, which obtained an additional foothold in power within society. These four estates have been the traditional domains of power that control and operate a society’s institutions.
Of course, the degree of power each estate holds in competition with the others has historically shifted. The rise of news media disrupted the hierarchy of power maintained throughout the Middle Ages and up to the Enlightenment, with the Catholic Church having increasingly less influence over society. And the Fifth Estate poses the potential for another shift in power. But what is the Fifth Estate?
The Fifth Estate is made possible by the internet and consists of the prevalence of non-legacy and independent reporters, journalists, and media sources. Podcasts are an excellent example of this, especially the ones that title themselves distributors of information regarding politics, technology, and socio-cultural events. But the archetypal example is social media. On platforms like X and Facebook, communication can be held between anyone, and the power to share and promote one’s opinion is made available to everyone, regardless of whether one has a position of power. The Fifth Estate has decentralized and democratized much of what legacy media was first purposed to do, influencing the growing distrust amongst the people toward their institutions. In the 20th century, the United States committed acts abroad like the Gulf of Tonkin in the Vietnam War, supported coups that removed democratically elected leaders in foreign countries, and the Iran-contra affair, which demonstrated that the United States was not the Western hero across the globe it presented itself as. It was prone to the same corruptive blunders and self-interested behaviors that it accused its enemies of; it was just good at concealing it from the public. However, as technology advanced and power became redistributed by the internet, these kinds of occurrences, which previously were not common knowledge, came to the forefront of American consciousness. America could no longer maintain its moral mythos, and a great disillusionment occurred.
While this kind of transparency provided by the Fifth Estate is generally good because, presumptively, the truth is good, its decentralized and open-access nature can also cause problems. The other estates possess a more robust institutional infrastructure and are easier to regulate and hold responsible when they err. However, in the case of social media, how to regulate this space is more nuanced due to its unprecedented nature. For instance, people have a First Amendment right to free speech in the United States, so deplatforming those who may share bad or false information on these platforms, at least prima facie, violates their rights. On the other hand, as many argue, the First Amendment does not entitle one to promote their false and potentially harmful speech, and therefore, should not be provided a space to express their opinions. But who decides what is good and bad information? The government? The companies that own these platforms? How will it be ensured that everyone acts in good faith and for the best interest of all? Should private companies really have the power to control a platform that has recently become a direct line of communication between the people and their representatives? Or are people capable of differentiating this information for themselves? The questions are endless and complicated and involve interminable controversy because of the diverse viewpoints within the country. Left-leaning folks tend to want safer, more regulated platforms for speech. People who lean more right on the issue tend to argue for a marketplace of ideas, where better speech will out-compete the worse. And there are many more opinions in between.
Although the diversity of opinion within these novel issues is not bad in itself but can typically be good, the fall of legacy media can aggravate the degree of separation between the various sides of a given issue, leading to an excess of unshared presuppositions. Suppose no institution helps shape a shared perspective. In that case, there are less common and continuous assumptions that people view the world through and use to resolve and make compromises in collective decision-making. It becomes a network with increasingly discontinuous nodes, which are then unable to feedback to one another due to the loss of direct communication and the need to relate by more remote and irrelevant pathways. This slowly shuts off one’s ability to understand and sympathize with another person’s unfamiliar beliefs. That’s not to say it’s better to have one institution over a plurality within one domain, but having one that provides a foundation within a domain, one that’s general but cohesive enough to facilitate civil discourse on disagreements, is helpful. So, although legacy media certainly doesn’t fulfill this role anymore, if it ever did, something that would help deal with the excess of diversity within podcasts, journalism, and news media is beneficial for a collective. There needs to be a healthy balance between the two.
Whatever the best and most rational solutions to these problems are, the upcoming election presents a potential route some of these may go. Former president Donald Trump has recently gained the support of Elon Musk, and, as is widely known, Musk claims to be both a free-speech absolutist and a strong advocate of deregulation. With Trump publicly expressing that he will give Musk a role in his administration, it stands to reason that Musk’s views will have an impact on policy and may potentially influence what role the Fifth Estate plays in society, especially regarding social media, being that he is the majority shareholder of X. With a hand in both government and the Fifth Estate, his political ideas will likely be pivotal in how the United States’ future unfolds if the Trump administration enters into office. The rest of the article will be concerned with locating some potentialities that may arise from this. The first is that, since Trump has espoused a pro-crypto view, and because Musk and Trump are both for deregulation, it seems likely that if Gary Gensler decides, or is forced, to step down from the SEC chair, there may be inroads toward some crypto endeavors being seen as a matter of free speech due to ‘code is speech’ precedent. The second is that, if this is the case, some of the motivation regarding network states may be lost, and pursuing this project can become less pertinent in terms of its initial goals, like technological advancement in a more unregulated space.
Musk bought Twitter in 2022 because he believed it to be a stand for free speech, which he saw as under threat due to what he often refers to as the ‘woke mind virus.’ Whatever the specific political beliefs this virus supposedly holds, Musk sees it as silencing opposing views by enforcing certain social virtues that should outweigh considerations of free discussion, speech, and inquiry. In short, he believes this virus is a potential threat to truth, which perhaps should be the principal value of a free, democratic, liberal society. With the publication of the Twitter files, there is compiling evidence that the government pressured social media platforms to adhere to a set of ideological standards during the 2016 election and the pandemic that amounted to the de-platforming of individuals, the suppression of dissenting opinions, and, ultimately, governmental control of these novel information sources. By purchasing Twitter, Musk’s purported aim is to establish a public town square for a free exchange of ideas that is decentralized and impervious to control by the state. This expresses Musk’s belief in less regulation, especially regarding matters of free speech.
Now, because Musk is a controversial figure, many have an immediate suspicion about his claims. However, Jack Dorsey, the founder of Twitter, shares similar concerns. It is simply a fact that government sectors attempted to interfere with and regulate social media. Dorsey has expressed his worries about this, saying that social media should resist centralized control. Whether Musk or Dorsey are correct, the question of if and how social media should be regulated is something society has to wrestle with, and their opinions have good reasons to support their positions. But others have good reasons for their positions, too. People like Sam Harris and Jonathan Haidt are examples of opposing views on this. Harris says in a podcast, "I think social media has been the technology that has deranged us ... We have effectively been enrolled in a psychological experiment to which no one gave consent ... It's just been terrible. I just think it's been bad for society in almost every respect." Harris and Haidt may not necessarily advocate for direct governmental intervention in social media, but they certainly don’t hold the town square view like Musk. They believe social media produces too few beneficial consequences for it to be held in such high esteem. Whatever the solution is, real proposals to this problem will be pivotal in how the future plays out.
Before discussing how Musk’s involvement in the Trump administration may affect crypto in light of what has been stated above, as well as how this impacts the standing of network states, it’s important to flag the more philosophical nature of this question by distinguishing between a moral argument for free speech, and a legal one. Whereas a legal claim about free speech expresses a descriptive argument, which amounts to saying that, according to a system of laws that is comprised of specific legal facts, other facts follow, a moral claim about free speech says something about how free speech should be implemented within a society, which is normative. In other words, a moral claim not only says that certain facts about free speech exist, where those facts can be either socially constructed or be part of some natural order, but also that those facts are good and that society should adhere to, and its members' action should be guided by, those facts about free speech. That is, a moral claim provides further, more robust reasons that extend outside of the law for what a society should do about free speech, which also points to certain ends expressed by the underlying principles that inform the claim being made. It’s important to distinguish these two ways free speech can be justified because conflating them produces confusion that tends to cause people to talk past one another in discussions about free speech, which obstructs potential progress in how people conceive of technological progress and the actual progress itself.
So, regarding morality, what principle(s) justifies Musk’s position on this issue? For instance, does he mean absolute free speech will produce the best consequences within society, or for individuals? Or does he mean that absolute free speech respects people’s fundamental rights, independent of the consequences? A lasting contribution to the former approach comes from John Stuart Mill, who believed that free speech is the best way to get nearer to the truth by individuals challenging one another’s opinions and beliefs, which will also psychologically revitalize truth in the minds of those within the society. Free speech promotes a lively and truth-seeking population. While he believed in a limit to free speech, such as a prohibition on outright calls to violence - and I assume Musk does as well, otherwise his position is somewhat untenable in a liberal democracy - Mill did believe that both of these produced highly valuable consequences. By constant exposure to a diversity of thought and evidence for differing opinions; by not being able to take one’s views for granted, and by having to reconsider one’s position because other members of society are free to express their disagreements, the best consequences for society may be produced. A contemporary and famous proponent of this today is Joe Rogan, who has reaffirmed his position in many of his podcasts, saying that bad speech, which means speech that spreads false information, should be beaten by better speech that is aligned with truth. The state and society should not regulate speech but properly promote it by allowing individuals to express themselves freely.
But there are objections to this. Does a perpetual heightening of the quantity of speech mean that truth will somehow reveal itself? Doesn’t quality also matter, which means there should be mechanisms at play that promote ideal civil norms in rational discourse, ones that delegitimize some forms of speech? Or, more fundamentally, what is our relationship to the truth, and does absolute free speech actually present a route to it? Maybe, but it’s not obvious. Because the principle under discussion concerns consequences, an objection that claims worse consequences will ensue is a creditable counter. And if a society implements absolute free speech, whatever that precisely means, and it results in a complete distrust of one’s democratic institutions, and the society collapses, it’s not clear that free speech was actually a good in service to the group; it led to its demise.
On the other hand, Musk may mean something like rights rather than consequences. It is a fundamental right of human beings, one that respects their basic and deserved dignity, to be able to speak freely and publicly without governmental suppression. Again, this is plausible. But how far does one’s right to free speech go? Are there other rights that may outweigh it under certain conditions? These are complicated questions, and the aim is not to propose definite answers but to cast light on what may be meant when the First Amendment, and free speech more generally, is invoked because justifications about its applications can be unclear. For example, if Musk's definition of free speech merely refers to the Constitution and the First Amendment, then his claim is merely legal and not moral. This would be perfectly legitimate, and in regard to claiming free speech is a justification for crypto, this would amount to saying that the First Amendment protections extend to the technology. But that would also mean his pejorative ‘woke mind virus,’ which, when expressed, tends to have moral undertones, plays no role in any seriously proposed argument for free speech. He would always be making a legal point. But when he speaks about the issue, it seems he’s making the further claim that, as a society, we should adhere to the Constitution, which would suggest reasons for why the document possesses normative value independent of its legal worth. Given his seriousness when discussing these topics, his willingness to spend billions of dollars on a company, his commitment to developing it, and doing so for the sake of a purported principle, it’s safe to think those reasons are moral.
Nevertheless, whether he means explicitly something legal, moral, or both doesn’t necessarily make a difference in whether attempts will be made to lessen or clarify crypto’s regulation. Because Musk and Trump are both advocating for deregulation, and because crypto is often conceived by its communities as technology purposed toward decentralization, and therefore, in principle, lessens the need for governmental regulation, it stands to reason that crypto will be given more space to advance as a technology. And because Musk and Trump are taking a deregulating approach toward crypto, recent articles suggest that the Trump administration may pick Hester Peirce as Gary Gensler’s replacement as SEC chairperson. Given her libertarian leanings and statements about these issues, the First Amendment may substantially affect how crypto will be handled under Trump if she's picked. Sage D. Young writes in an article in January from Unchained that “Pierce finds the idea of government imposing a regime where developers must seek permission to write code ‘terrifying.’” And at an SEC oversight hearing in September, Peirce stated, "[The SEC has] fallen down on our duty as a regulator not to be precise.” Her general position seems to be that it should be up to consumers and developers to ultimately decide crypto’s future, and not regulators, expressing concerns about government stifling innovation and technological advancement.
Whether Peirce is picked or not, it’s clear that the Trump administration is looking for someone with these kinds of policy positions. Other regulatory agencies like the CFTC will also impact this, but as many within the crypto community will celebrate, with Gary Gensler removed, further steps can be taken to develop the technology. And legal precedents like ‘code is speech’ provide a legal avenue to argue that the First Amendment should protect crypto. Peter Van Valkenburgh, the research director at Coin Center, offers an extensive argument for why electronic cash and digital exchange should be protected under free speech laws and why they should also protected under the Fourth Amendment as well.
Interestingly, in that article, Valkenburgh also makes a moral argument that makes the claim that interprets the ends of political rights as autonomy and human dignity, which should be seen as expanding on his legal claims. Whether that further claim is correct or not, he believes there are plenty of legal precedents to argue that crypto is protected under the Constitution, especially if the technology is interpreted as expressing political and social ideas, which makes regulating it appear as suppressing free expression. Of course, there is substantial disagreement about this, and it’s not clear whose right about the issue. However, a Trump administration would make a pro-crypto legal interpretation more likely to obtain.
Now, lastly, in several previous articles posted on the Dora Research Blog, much attention was paid to network states and their development as a theory. Trump’s policy position on crypto affects this as well. It was stated above that an anti-regulatory stance on crypto impacts some of the initial motivation behind network states and, as many of Balaji’s examples of one-commandments for network states in his book would suggest, a Trump administration would address those issues and perhaps satisfy the desire for new states outside of nation-states, causing network states to lose salience. Not entirely, of course, but at least on the technology front. And if so, then it will be interesting to see how the ideas around network states interact with the potential for a more unregulated space in blockchain technology. For instance, one of the aims of network states is to present a one-premise critique of preexisting nation-states that will be used to create a network state. Any critique directed toward the obstruction of technological advancement may be resolved, and efforts can be made toward advancing the technology for preexisting nation-states rather than trying to do so in a new, independent state.
-
@ 0e501ec7:de5ef3a4
2024-11-05 19:26:51Vandaag stonden we op tussen de monocultuurwoestijnen, beschut door een smalle Sleedoornhaag. Onze schoenen hadden een vaag gele schijn gekregen van de wandeling in het donker gisteren, en we wisten niet of het landbouwvergif of pollen was. We stonden op met het licht, om 7. Het was koud en vochtig, de fietsen waren nat. We fietsten, met fluohes. We fietsten en we fietsten. Tim wou graag de militaire kerkhoven bezoeken, en de info lezen. Ik volgde hem. We fietsten verder, ik nam foto's. Ik nam foto's van agrifabrieken, en kerken. Ze lijken op elkaar, soms. Tegen de middag hielden we halt, ik had honger, voor het normaal middaguur. Dat zorgde even voor een akkefietje, niets groots. We bezochten ook in de namiddag eerstewereldoorlogkerkhoven, frans, duits, italiaans, van de vs. ik vroeg Tim wat hij zo interessant vond aan de oorlog, hij verdedigde zichzelf, ik probeerde duidelijk te maken dat dat niet nodig was. Mijn schrijfsels lopen nogal door elkaar vandaag (30/10). Beter dan niets, ik krijg het toch niet geordend. Wat is er zo leuk aan schrijven? Ik vind het wel ontspannend. Vandaag was ik triest over de supermarkt, de lege dorpen, de lege monocultuur velden, het verdwenen landschap, het verdwenen leven.
-
@ 0e501ec7:de5ef3a4
2024-11-05 19:19:12Vandaag vertrokken we uit Parijs. Ik ben blij terug op het ritme van mijn lichaam en het licht te kunnen leven, ipv laat op te blijven in de stedelijke drukte en socialiteit. Het was fijn in Parijs, eerst was ik heel overprikkeld, zo groot die stad, zo veel mensen! Onvoorsteldbaar. En moe, maar dat komt ook van te gast te zijn bij onbekende mensen denk ik. Ik moet altijd eerst een paar dagen acclimatiseren, een houding vinden. Ze waren wel heel vriendelijk en gastvrij, die familie van Tim, ik ben hun echt dankbaar dat we bij hun konden blijven.
Maar Parijs is wel een mooie stad. Uiteindelijk zag ik, niet geheel gewenst, toch wat toeristische dingetjes (ik moest het eifeltorenplein oasseren onderweg naar het bos om in te wandelen, en op weg naar het museum passeerden we nog wat bekende pleinen en het louvre), wat eigenlijk ook wel leuk was. Veel ervan is vooral opschepperij, maar het is wel mooi gemaakt en leuk om eens te zien.
Ik was ook zeer blij Marte gezien te hebben! Altijd leuk, een bekend gezicht. Zij was ook nog aan het wennen aan Parijs, maar al iets meer kennende dan ik, ze doet er al een maandje stage bij Unesco. Dat gaf ons de buitenkans om ook het Unescogebouw te bezoeken, dat was ook een geweldige impressie. Er was net een evenement bezig, rond de arabische week die ze houden. Een feest van culturen :). Ook wel een beetje hoogdravend en exlusief natiurlijk, maar ze doen wel coole dingen daar.
Vandaag fietsten we dus weg. Het was al laat tegen dat we vertrokken geraakten, en toen was Tim zijn jas en de kaarten ook nog vergeten in het appartement. Moesten we wachten op de shift van de vongierge om eraan te kunnen. Balen, maat het gaf ons wel de tijd om de kettingen de poetsen! Die waten enorm vuil geworden van de modderpaadjes waarop we Parijs hadden benaderd. Het was een drukke fietstocht, door wijken en grote straten, via enorm chaotische fietspaden. Het was leuk, ik ontspande, droomde weg, had inzichten en ideeën, neuriede en zong. Toen werd het donker, we fietsten verder, maar niet lang meer. Bu staan we aan de rand van wat een golfterrein lijkt te zijn, terwijl de lucht nog sterk oplicht van de Stad. Net naast ons is een grote elektriciteitspaal, die tevreden (?) zoemt.
De blog is een beetje chaotisch aan het zijn, het is moeilijk om consistent te zijn jn de momenten waarop ik schrijf. Vaak heb ik er eigenlijk geen zin in, dan doe ik het niet. Soms begin ik random te typen op een leeg moment, die zet ik er ook op. Ik hoop dat dat niet te verwarrend is :). Bedankt om te lezen, veel liefs!
-
@ 0e501ec7:de5ef3a4
2024-11-05 19:09:05We zitten in de bus. Het is donker buiten, ik weet echt niet wat ik hier wil schrijven. Maar heb geen zin om te lezen, en geen zin om te scrollen, en geen zin om rond te kijken of rond te dolen in mijn hoofd. Na de mail van Connie en mijn geschreven antwoord, daagde het mij dat ik meer wou schrijven. Ik haal er een soort voldoening uit, ik kom er in thuis, het kost me niet te veel moeite. Dat zijn allemaal kenmerken van een goeie activiteit voor als je moe bent! En dat ben ik ook, moe. Het was weer een gevulde dag, en we zijn nog niet rond. Vanmiddag vertrokken we met de metro naar virtysurseine, om de kraak la kunda te bezoeken. Een voormalig kinderdagverblijf, waar nu 60-70 mensen wonen. De huurprijzen in parijs zijn echt enorm, het is zeer moeilijk om een woonplaats te vinden. Deze mensen vinden hier dus onderdak, en kunnen niet zo makkelijk ergens anders heen. Echter dreigt er in april volgend jaar een uitzetting te komen. Om mensen te verzamelen en awareness te vergroten, organiseerden ze deze week evenementen, ook om de buurt te betrekken. Gisteren was een filmavond rond Palestina, vandaag was er een kleine markt, met groenten, fruit, brownies en pannenkoeken, en tweedehandskleren. We voelden ons eerst wat oncomfortabel, niemand kennende en de taal niet helemaal meester is het niet zo simpel om zomaar te blenden in de groep. Om drie begon er een boxinitiatie, ik kreeg na veel aandringen mijn twee companons ook overtuigd om mee te doen. Het was zeer gelijkaardig aan de boxlessen in de Meubelfabriek in Gent, en echt tof. Het gaf ons ook de kans om wat aan de babbel te geraken achteraf. In de avond gingen we naar een ander gebeuren, ook gevonden op radar.squat, maar een helemaal andere vibe! Het heette Atelier de l'Artivisme, en het was een antipub groep die (niet-reclame)posters maakte. Wij maakten er ook eentje, en babbelden een beetje. Het vond plaats in een autonome bibliotheek, vol met boeken dus. Ik vind het altijd geweldig om door de boeken te snuisteren.
-
@ 45bda953:bc1e518e
2024-11-05 19:08:31Emilien stepped into the space motel's bar. The area was dimly lit and the music was unbearably loud. At least all the tables and sunken lounges each had their own lights and sound dampers. He stepped up to a table and pushed down on the receptor to reduce volume. He could not think with the noise. He looked around for Macy and inconspicuously acquainted himself with the current patrons in the establishment. He pulled his hoody further forward when he noticed the android in a wheel chair. "Not my type of company." He thought to himself. In the centre of the room a couple was having a spectacular time, an empty bottle on the table, they were specimens of myth. The guys muscles were chiselled, with tight fabric clinging to his body specifically to display every contour of his physique. His female counterpart wore loose material with translucent green tattoo's running up her body like pin stripes shining through the thin cloth hinting at a perfectly balanced pose and feminine silhouette underneath. Emilien swiped on the tables interface to call for the proprietor. He folded his arms and leaned onto the table tilting his head down slightly to keep shadow on his face. Macy entered the room through the kitchen swivel door. She was holding an empty tray and a serviette draped over her arm. She walked straight over to Emilien's table. "Good rotation sir. Welcome to Macy's. Are you a regular customer or is it your first visit to my fine establishment?" She seemed concerned and worried. The corners of Emiliens lips curved up a little. Keeping his head down teasingly. "Sir? Do we have an existing open channel?" He ignored her. "Sir, If you don't have liquidity I have no services to offer that you cannot get off your own ship." Emilien looked up with a gleam in his eye. Macie's posture relaxed with a sigh of relief. "Emile, you fuck. You freaked me out." "I'm sorry, I could not help myself." He waved a halfhearted greeting, slightly laughing. "You know I have some new rules around for you nano augmented types." His aversion to the word rules was evident only to himself. "Like what?" Macy felt apologetically obliged to explain the nature of her circumstances. "I had diplomats from the outer void regions come for a private meeting. Financial in nature. A spacer customer arrived blocks before them, I did not suspect him of anything criminal." She put the tray down and gripped the table with both hands shifting her weight. "His routine for meals were already established, he managed to spy on them through my privacy protocols and hacked their clients. He participated as a ghost during most of their stay and dealings." Emilien whistled. "That's rough, how did you handle it." "I did not do anything." Her dreads shook as she moved her head in animated frustration. "No one knew until they all had been gone for blocks. My reputation took a serious knock. They made a claim against me, I was accused of being complicit. Emilien glanced back over his shoulder when he noticed the android cart himself around his table. "Warren helped me and found all the dirty code and sequestered it. We have all the data and footage, it proves beyond a doubt that I was not involved. Thank god for the core otherwise my whole station might have been destroyed by now." Emile gave a sly look. "How do you know it was not me who stole the data?" She locked eyes with him. "You still have the same face as before bro and I know you won't fuck with me. I'll force close our channel." She joked with serious tone nudging him with her fist playfully. She was generally perceived as strict and militant because of her Shiv citizenship. Shiv military training and service was compulsory, all respected the Shiv in their traditions, their ways were isolationist and exclusionary in nature. Emilien has seen her use military style jujitsu-boxing to neutralise and boot out unruly customers. The Juel woman noticed the out of character friendly gesture Macy made. The unexpected interaction drew her attention from across the room. "So, what is this rule of yours." Macy seemed reluctant to say. "I'm sorry bud. You'll have to swallow a slipper pill every 576 blocks while you are on this station." His shoulders sagged and could not help but bounce his leg on the rail under the table. "Really?!" "Yes, really. I have to retain my customers trust and neutralising all augmented customers body gadgets was the unanimous way to go." Emilien seemed pissed. "Your customers might not know that I'm augmented. And what if I don't plan on staying that long. I just want to see Warren then I'll be off." Macy shook her head. "Warren is passed out in his ship and will probably wake up with a very bad hangover. He partied with the Jeul pair and their entourage for most of this rotation, you know how he gets." Macy waved her hand towards the couple who seemed to be looking directly at Emilien. He looked straight back at them and swiped the interface's privacy command dropping a vision distortion field around his table. Encapsulating himself and Macy. "I treat everyone the same, no compromise." Emile looked at her in a moment of rumination. "Let's get it over with." Macy removed a container from her moonbag after opening, holding it towards Emilien he took the purple capsule and swallowed it without a drink and opened his mouth wide moving his tongue around to show Macy that he did indeed swallow the prophylactic. "And what about robo-mech boy back there? He cannot eat slipper pills." Emilien sounded annoyed and regretful." Macy gave him a stern look tilting her head in annoyance. "Why do think he's in a wheelchair, you know I can't talk about my customers with my customers? Besides from the obvious." Emilien did not say anything. Macy sighed. "What can I get you sir?" "I'll just have a beer." Macy stepped out through the distortion field and became a messy disfigured indistinguishable form. Emilien pushed the music's volume up and waited for the inevitable. He sensed the actuators in his shoulders, elbows and wrists disable in sequence down his arms. His spines bit rate slowed to a crawl and the lack of connectivity to his neck port was becoming noticeable. His legs went numb instantly. "Now I am nothing more than a pathetic land crawler." He felt weak and vulnerable in his natural form. His mental state bordered on the fringes of stable and paranoid, fearful thoughts threatening to manifest in his mind. He saw a figure approach. He assumed it was his drink. The slender glowing tattooed leg of the Jeul woman pierced the veil. A bright green line that suddenly dims where her skirt begins. She stepped through the curtain with a friendly nonchalant expression. "Mind if make your acquaintance mon ami?" Emilien dropped the barrier and lowered the volume making sure that he was back on visual record of Macy's archive. "Not really, thanks, I'm good." Macy returned to place a cold beer on the table. The interface flashed a price in femto-sat and Emilien tapped his ring on it shifting 11 fSAT from a mini holographic Bob to very happy little Alice. The animation morphed into a small firework display and died. "Back to work now." Emilien grinned at Macy thankfully and took a sip. "Me and my brother we are celebrating our seventh birth block anniversary." He looked around sarcastically. "You chose a display of death above the resorts on Juel to celebrate your seventh birth block?" She stiffened her glittery lips and raised her eyebrows thoughtfully and took a seat without invitation. "It is more of a tour than a celebration, I am Maurelle Giovanni and my brother is called Lionel also Giovanni obviously. He is my twin baby brother." Emilien looked over at the guy who seemed to be occupied playing a mini game on their tables interface. She tilted her head into his line of sight forcing him to look at her. "Who are you?" "None of your concern really." She did not accept the short stated answer. "No one comes alone all the way to a dead end system just to drink a cheap beer. I am guessing you are a treasure hunter, no. Looking for artefacts of the ancient world, yes?" Emilien had assessed her body language and concluded that her whimsical imagination was one he could easily manipulate. He had enough information to realise that he was faced with a spoiled individual whose sole interest in him was simple curiosity, motivated by boredom and she had a fascination of the mysterious. She seemed like prey but his hunting instincts felt dead inside his disarmed body. His respect for and dependence on Macy also inhibited his urge to exploit it. He shifted his attitude and personality slightly, just enough to not be overbearing. "You make very good estimations, you are wrong but not far off. My name is Scott. And yes I am fascinated, not by the planet and it's relics but by the the secrets of these gates." Her eyes gleamed with amusement and intrigue. "You like secrets, huh? You must meet Warren. He knows more than the esteemed professors about the gates and their technology." Emilien nodded in agreement. "You said you are Giovanni. Like the Giovanni?" She seemed excited at the prospect of making a new friend and swiped the interface. "Hold this thought, I am going to get myself another drink you are good? No. Food maybe?" "I am good, no wait, another beer." He tipped the bottle toward her in salutation. She stood up taking his bottle with her to the bar. He looked back and was immediately aware that he did not notice that the android wheel himself out and into the conduit. He would have liked to see which of the two entrances of the tube he used to go to his ship. His feeling sorry for and pitying himself put him in a position where he let slip an opportunity to understand and predict the circumstances of his current tactical situation. Never at ease, always being prepared. He felt spite. The girl returned with a beer and a half full whiskey glass, no ice. She reclaimed her seat looking at him. "I am a direct descendant of the patriarch Maurice Giovanni, one of the four primary key holders of our people. There is nothing special about me really, ten..." Emilien cut her off in gentle tone. "Ten percent of the Juel population are descendants of the four patriarchs." Emilien finished her sentence for her. "You are an interesting man Monsieur Scott. What else do you know about me?" Emilien leaned towards her. Noticing her brother yawning across the room. "I know that you are bourgeois and I know that you receive a cyclical allowance from your great, great... How many generations?" "I am removed 133 generations from my Patriarch. He is a very good, doting grandfather. We all adore him. We are around 750 million siblings you know. Those who are from aristocracy have fewer children than the proles. We are so few so that our wealth is not diluted too much." She smiled reminiscently dragging her finger on the edge of the glass. Her brother seemed to stretch himself out he stood up and walked over. Entering the sound damper he acknowledged Emilien's presence with a curt nod. "Maurelle, I am going to sleep." He said to her. She waved at him dismissively. "Have a good dream frere." He exited the room through the right tubes door which made sense as their ship was more closely attached to it on that side of the circular docking ring. Predictable and honest Emilien thought to himself. Macy popped her head through the kitchens serving window. "Lights out and shutdown in 2 blocks. Just a friendly notice." The couple acknowledged the warning from Macy with raised glass and bottle. Emilien turned his attention back to the lady. "How do you manage to retain wealth in such a large family?" He pretended to be ignorant of the finery and detail of Juel culture. "We have closed loop channels controlled and balanced by the patriarchs. But our money is good as core stone. Anywhere in the outer void. Only recently has dispute arose between my Patriarchs and the Magarrie. They do not accept our Sats anymore since the war started. They only accept bitcoins directly from the core. I was only four cycles old when the war began so I am used to it." Emilien felt a conflicting disturbance, thinking about how his body is only two cycles active but his mind stretches back far beyond this time. Being both older and younger than his partner in discourse. "Helloo? I lost you there for a moment Scott." "What are you thinking about?" Emilien lied to her faking emotion. "I was just thinking about the tremendous loss of life that we are orbiting. The planet embedded with what it's inhabitants assumed would be it's portal to prosperity became the golem of it's demise." He was happy that Maurelle seemed to empathise and mirror his philosophic grief. "Come with me I want to tell you a secret. You like secrets." She stood up taking his hand gently tugging, compelling him to follow her. She led him to the far end of the room. She pulled a small levered switch and the wall folded in on itself to reveal a impressive window flooding sharp light into the whole of the large room as it retracted. They both squinted and lifted their hands to shield their eyes adjusting to the glare of Sol. The scene of destruction appeared even more dramatic and morbid as dark sharply defined shadows clipped with golden edges, evoking a sense of isolation and suffering. "These gates were supposed to be a gift to Earth. A hope of spreading humanity across the stars like the children of Abraham." Emilien smirked. "You believe that nonsense?" She rested her head on his shoulder still holding onto his arm. "Our patriarchs have preserved the mysteries of mankind for millennia. I said that I am going to tell you a secret don't patronise me. I do not believe anything. What I know, it is not faith. It is understanding. Knowledge, a type of knowledge that you cannot quantify with mathematics and chemistry. It is a higher science that is proven by the unmistakable coincidence of fate. It is invisible to those who are ignorant and they who despair, those who have lost all hope are blind to this promise." Emilien felt a strange remorse. "I guess I must be blind then." The lights suddenly shut down and the song stopped dead in it's track, like Macy promised. Overcome by the majesty of the scene Maurelle wiped a tear away fearing that her makeup might get ruined. "Anyone can see. They must just open their eyes voluntarily and be honest with themselves. Their true original selves. Who they were made to be." Emile felt judged and wanted to end this conversation quickly. "I am going back to my ship, you have a good night now." She grabbed tightly at his wrist almost painfully. "You do not want to know my secret?" Emelien was becoming annoyed with her insistence he removed her hand from his arm. "I don't think you know any real useful secrets, sweetheart." He sounded threatening, the real enshrouded unmistakable him breaking through the act. She looked at him unintimidated by his sudden shift in personality. "Oh, so I suppose you know why the Juela are at war for most of our lives?" He sarcastically extended his arms forward palms up in restrained but evidently mocking adoration. "Please enlighten me priestess." "They are fighting over this." She pointed at the epic scene of destruction drifting statically out of view as the stations rotation cut it off at the edge of the window. The shadows chased Sol light away sliding like a retracting blade across the room leaving it dark. Emilien burst out angrily. "They are fighting over satoshis! That is all they ever fight over! What I fight for, Damnit! Sats and the resources to gain more of it! That is the beginning and end of all things! Anyone in the universe with even the slightest lick of self worth works, fights and dies for sat!" Maurelle stared astutely at him unemotionally affected by his outburst. She obviously had experienced this exact reaction before and suddenly Emilien realised that he might be the one being manipulated by a smarter and wiser being than himself. "Are you done my love? Have you made your point or is there some other deeper understanding you wish me to internalise into my ignorant small little world?" She threw at him a spiteful sarcasm of her own. "Do you really think I do not know what it means to be seduced by wealth? Luxury?" She took a step closer to him. "Pleasure?" Emilien felt stupid and disarmed this time adding emotionally disarmed to the defeat of being inept in his own body. "I am not a fool mon cherie. The truly wealthy don't fight for wealth, they fight for power. But the noble and sincere fight a different fight with a different weapon. They use words to fight, ideas to win. They fight to gain trust with words, and they fight to retain it with consistency in their actions. Trust is a currency that makes sat seem like shit in comparison because it is real even though you do not believe what you cannot hold in your hand, like your beloved sat." She pointed at the ring on his finger. "Trust only retains value if you honour your words with your actions. Its value is fragile and can disappear in a moment of weakness like water vapour, cherished as the source of life then gone, poof, evaporated. Like magic. This type of trust if gained and retained correctly, projects you forward into the realm of immortality." Emile felt stung and hurt on a personal level, unsure if she was generalising or targeting his own specific weakness purposely. It confused him and made him feel insecure. "What are they fighting for then?" He asked slightly surrendering to the unexpected superior reasoning. Maurelle appreciated the honesty she identified as sincere. She gently took his hand again and led him back to the large convex window. They stood silently for a block, waiting on the rotation to pull the bright light of Sol back into the room. "They are fighting for the power to do that." She pointed at Earth in all it's terrible glory. "The destruction caused by the gate was a terrible cataclysm outside of humanities collective control. The core and the gates are a mystery to mankind." She looked up at Emilien, relieved to see that he was still taking her seriously. "The Maggarie have discovered a weapon that has the power to destroy a planet. The Juel think they are fighting to free Osteri captives from slavery but the real motif is hidden, our Patriarchs unadmitted fear of being inferior to the Maggarie. Most of the goods we traded with them they have stopped accepting, the Shiv and Osteri still buy our products but the Maggarie have suddenly lost the need for our produce, even raw material in it's basest forms. They are expanding somehow and the balance of interdependence has tilted out of our favor. They have no more need for us and have cast us aside like a filthy rag." She paused in thought. "Their new super weapon is the cause of this conflict monsieur Scott." Emilien shrugged. Feeling relieved at regaining the intellectual high ground he thought he had lost. "I'm sorry Maurelle. I have no data on this weapon. If this was true the forums on my bulletin board would have leaked information about it's existence epochs ago, it's been just over three cycles everyone would have known this by now. It sounds more like Jeul fearmongering or perhaps it is the daydreaming fairy tale of an innocent naive girl who worships old myths and legends of a time dead for thousands of years." He pointed at Earth. She sniffed away a hint of emotion and anger. "Well then, I have nothing more to say to you, Good night monsieur Scott." She pulled away from him pridefully and looked out at the enormous gate embedded like a knife into the earths crust. "You are a swine monsieur Scott, leave me alone with my pearl." Emilien stepped back mockingly bowing slightly. "Good night sweetheart." He walked back to his craft laughing inside himself. "Stupid woman." He muttered, although be it doubtfully.
...
scifi
-
@ cb20eb8e:3d031b50
2024-11-05 19:04:21''The Frequency of Life"
At first, this phrase sounded mysterious, almost abstract, as if it linked a digital currency to the very rhythm of life. Yet, over time, this concept has come to symbolize my journey of self-discovery, resilience, and transformation. For me, Bitcoin is more than just technology or investment; it’s a philosophy, a frequency that has guided me toward true freedom and helped me reimagine my life’s purpose.
Uncovering Family Secrets and Redefining My Identity
My journey began with a painful family secret that upended everything I thought I knew. The discovery that I was adopted shook my identity to the core. For years, I had felt a subtle but unrelenting control within my family, primarily from my stepfather, whose influence shaped much of my childhood. My brother later revealed the full extent of our stepfather’s control, bringing the truth into sharp focus. This revelation was both liberating and terrifying, forcing me to confront the lies and manipulations that had defined my past.
Suddenly, I found myself questioning everything. Who was I without these imposed narratives? This painful process pushed me to seek a path of honesty, autonomy, and freedom—concepts that felt foreign but increasingly vital to my well-being. Amid this struggle for identity and independence, I encountered Bitcoin, though I wouldn’t fully grasp its significance until years later.
An Unexpected Introduction to Bitcoin and Returning to the Struggles of Daily Life
In 2012, during a trip to Thailand, I met a Russian friend, Victor. Amid the colorful chaos of Bangkok, Victor spoke passionately about a strange, new digital currency called Bitcoin. Skeptical yet intrigued, I decided to buy four Bitcoin, following his encouragement. But back home, the stresses of daily life soon consumed me again, and I forgot about Bitcoin entirely. It seemed like a distant, almost irrelevant experiment.
Back in the routines of everyday life, I faced familiar struggles. I struggled to find work that felt meaningful, a job where my ideas were valued and my contributions acknowledged. The pressures to conform, to fit into a world that didn’t resonate with my true self, left me feeling trapped and restless. I felt like a slave to routines that drained my spirit. Each day felt like a battle against an invisible force that kept me from the freedom I craved. Eventually, this frustration led me down a darker path.
Falling into Darkness and Hitting a Personal Turning Point
The daily grind, coupled with unresolved pain from my family’s revelations, drove me toward unhealthy habits. I began using drugs, drinking, and letting negativity grow until it filled every corner of my life. I was slipping into a spiral, struggling to find anything that felt worthwhile. Then one Monday morning, in the depths of my struggle, I found myself under the influence of cocaine, sitting on a bench as parents walked their children to school. In that moment, the reality of my life hit me hard. I saw myself clearly, and it was devastating. I realized I was a stranger to the person I wanted to become. That was my rock bottom.
From that day forward, I vowed to make serious changes. I swore off hard drugs and began to search for something real, something that would connect me to a purpose beyond temporary escape. It was the beginning of a painful but essential transformation, a process of reclaiming my life and redefining my future. This journey of healing ultimately led me to reconnect with an old friend who would help me see Bitcoin in a way I never had before.
Reconnecting with an Old Friend and Rediscovering Bitcoin’s True Potential
As I began to focus on my growth, I reconnected with Leon Wankum, a friend from my primary school days, who, coincidentally, also knew Victor from Thailand. During our conversations, I opened up about my journey, sharing how I had changed since the darkness of my past. Our talks naturally led to Bitcoin, which I had forgotten about since my time in Thailand. Leon, however, had dedicated himself to understanding Bitcoin deeply, and he shared his insights with a passion that rekindled my own interest.
Leon’s explanations were transformative. With his philosophical perspective, he explained Bitcoin as more than a currency; he saw it as a vehicle for autonomy, a tool that could offer financial freedom and, perhaps, spiritual independence. In many ways, he became like an ancient Greek teacher, guiding me through the layers of Bitcoin’s philosophy. Under Leon’s mentorship, I began to grasp the depth of Bitcoin—not just its value as an asset, but its potential to change how we engage with power, control, and freedom. Talking to him felt like stepping into a new world, one where each principle of Bitcoin aligned with my personal journey toward independence and truth.
Finding Freedom in Bitcoin’s Decentralized Philosophy
The more I learned, the more Bitcoin resonated with me. I began to see how its principles of decentralization and transparency paralleled my own desire to break free from the control and illusions of my past. Bitcoin operated beyond the reach of traditional institutions and power structures, and I wanted my life to reflect that same freedom. Just as Bitcoin exists independently, governed only by its own transparent network, I realized I could structure my life based on my values, free from the influence of my family’s secrets.
Over time, I also discovered a deeper, almost spiritual connection to Bitcoin’s "frequency"—the steady rhythm of its time chain, the immutable records of its transactions, the stability amid volatility. This frequency mirrored my own quest for resilience and autonomy. I began to view decentralization not just as a financial principle but as a personal one, a way to root myself in my own truth, free from the dependence and darkness of my past.
Embracing New Routines and Personal Growth Through Bitcoin’s Philosophy
Inspired by Bitcoin’s principles, I started building routines that aligned with my new mindset. I took control of my finances, setting long-term goals and learning the value of patience and discipline. Bitcoin’s commitment to transparency reminded me of the importance of honesty and clarity in my relationships, while its decentralization taught me the power of autonomy and self-trust.
I also found myself letting go of anything that didn’t support my vision of a free, authentic life. My old habits faded as I built a future based on values of resilience and independence. I was no longer willing to compromise or live according to someone else’s expectations. Every aspect of my life began to reflect my dedication to freedom, transparency, and personal responsibility.
The Spiritual Connection of Bitcoin’s Frequency and Looking to the Future
As I continued my journey, I realized that Bitcoin’s "frequency" had become a guiding resonance in my life. The rhythm of Bitcoin’s timechain mirrored my own growth, teaching me to find balance and stability within myself. I felt that, just as Bitcoin’s decentralized structure allowed it to exist independently, I, too, could live in alignment with my own values and truths. This frequency of life—this resonance of freedom and authenticity—has come to define not just my journey with Bitcoin but my journey with myself.
Now, as I look back, I see Bitcoin as more than a financial tool or an investment. It’s a model of resilience, a guide for choosing light over darkness, and a symbol of life’s true rhythm. Each of us has the opportunity to find our own frequency, to create a life that resonates with who we truly are. For me, Bitcoin was the key to unlocking this understanding, helping me connect my past struggles with a future built on clarity, purpose, and freedom.
In sharing my story, I hope others can see that it’s never too late to find their own path. Whether through Bitcoin or another journey, each of us has the power to tune into what truly matters and build a life that aligns with our deepest values. It’s a journey that requires courage and resilience, but in the end, it leads us closer to our true selves.
This story is just one part of where I’m headed. There’s so much more I’m working toward, so many more lessons and connections to be made. If any of this resonates with you, maybe it’s because we’re all trying to find a little bit of freedom and authenticity in our lives. And if my journey inspires you to find your own path, that’s even better.
This is just the beginning, and I’m grateful to share it. If you’re into this, feel free to share it too. We’re all on this ride together.
Mick Henssler 🕷️🕸️
-
@ 015c8941:3ea77b51
2024-11-05 18:52:23the US could gain a strategic advantage over other countries that are contemplating starting a bitcoin reserve and can reinforce the US’ influence over global financial standards