-
@ c0e4bd0b:1c5734af
2024-11-10 12:13:26Bitcoin Calendar Definition
Layer: Applications
Status: Draft
Bitcoin defines the halving cycle as 210,000 blocks, as defined in the file
kernel/chainparams.cpp
. This number was apparently chosen as an aesthetically pleasing number which equates almost exactly to 4 years, according to the ten-minute block schedule. This BIP proposes using this parameter of Bitcoin as the basis for reckoning calendar time, defined as follows.nBlocksPerYear = 210000 / 4 // calculates to 52,500 nBlocksPerMonth = nBlocksPerYear / 12 // calculates to 4375
The calculations above produce integer results, making calendrical calculations based on block height extremely convenient. The zero-based year and month are calculated as follows, using integer division (/) and mudulo (%) based on block height h:
year = h / 52500 month = (h % 52500) / 12
Furthermore, we assume a bitcoin day length of 144 blocks. This is consistent with the target of 10-minutes per block and the 2016 blocks every two weeks for the difficulty adjustment period. This results in months of 30 days, with a small remainder:
nBlocksPerDay = 144 daysPerMonth = nBlocksPerMonth / nBlocksPerDay // calculates to 30.something
A human-friendly date can thus be displayed based upon block height, with familiar calendrical characteristics of 30 full days per month (with a partial day 31) and 12 months per year. As of this writing, the current bitcoin date is 7/24/17, 24-07-0017, or the twenty fourth day of the seventh month of the seventeenth year of Bitcoin.
This definition forms the basis for a culturally independent and socially universal calendar system which is easy to calculate, durable, and financially relevant.
Cross-referencing with other calendar systems:
Since this date will not synchronize exactly to extant calendar systems, a notation needs to be used in cases where ambiguity would result. Taking the solar day as the example, references that cross over between the solar day and the bitcoin date need to have a qualifier resolving the phase discrepancy (as is done when referring to dates in ancient calendar systems that do not align with the turn of the date at midnight). For example, the Bitcoin date of 7/24/17 would be written as November 9/10, 2024, making it clear that it touches both of those solar days. However, this format should only be used for dates in which the two calendar systems are more out of sync than in sync. For dates that are more in sync than out of sync, no overlap day should be given, because it would add ambiguity where there otherwise was none.
Bitcoin Calendar Synchronization
Layer: Consensus
Status: Draft
The Bitcoin calendar (referring to the prior definition) would be more economically relevant to earthlings if the Bitcoin year actually stayed synchronized with the growing seasons of the tropical year. Currently, the Bitcoin year begins in the springtime of the northern hemisphere, but it is offset one year and there is currently nothing to keep the bitcoin year from drifting further out of synchronization with the tropical year.
To keep the Bitcoin year in sync with the seasons, the bi-weekly proof-of-work difficulty adjustment could be tailored to aim toward better alignment during every difficulty adjustment. Normally, the difficulty is adjusted upward or downward a maximum factor of 4, as defined in the file
pow.cpp
. The determination of the value within that range is made solely on the basis of the rate of block discovery during the prior 2016-block (two-week) period.The existing difficulty adjustment scheme has resulted in the Bitcoin calendar generally sliding earlier every year, presumably due to the fact that the global hash rate is generally increasing rather than decreasing. The historical dates for the year beginnings and the corresponding duration of the Bitcoin year are as follows:
|Year|Block|Date|Days| |-:|-:|--|-:| |0|0|01/03/09|| |1|52500|04/22/10|474| |2|105000|01/28/11|281| |3|157500|12/14/11|320| |4|210000|11/28/12|350| |5|262500|10/09/13|315| |6|315000|08/10/14|305| |7|367500|07/29/15|353| |8|420000|07/09/16|346| |9|472500|06/23/17|349| |10|525000|05/29/18|340| |11|577500|05/23/19|359| |12|630000|05/11/20|354| |13|682500|05/07/21|361| |14|735000|05/05/22|363| |15|787500|04/29/23|359| |16|840000|04/19/24|356|
As can be seen, the number of days in the actual Bitcoin year are consistently fewer than the number of days in the tropical year (365.2425). Assuming the hash rate will generally continue to increase, this trend should continue, which allows us to make a convenient simplifying assumption.
Conceptually this proposal seeks to add an additional, limited offset to the work requirement based on whether the Bitcoin calendar is ahead of schedule or behind schedule, in comparison to the tropical year. We can assume based on the trends, however, that we only need to "slow down" the block rate slightly to keep it in sync with the seasons. Therefore, this proposal aims to do only that.
If the Bitcoin block height is a certain amount ahead of the calendar synchronization goal (per the trend), the difficulty would be increased one notch more than required by the normal calculation, if not already at the limit of adjustment for that period. This would make it impossible for the proposed change to overpower the existing calculation, but would still provide a gentle enough push when needed to keep the calendar in sync, thus accomplishing the purpose.
Fork considerations by the author:
A consensus change to the proof of work calculation would normally result in a hard fork. However, in the case that we only potentially increase the difficulty and never decrease it relative to non-upgraded nodes in the network, this means that during the transition, only upgraded nodes would be at risk of rejecting blocks for not meeting the more stringent difficulty level necessary to synchronize the calendar.
The new nodes would therefore need to be programmed to yield to the non-upgraded difficulty criteria until most of the network has upgraded, at which point activation would occur (as explained below) and miners would be obliged to meet the tougher requirements demanded by all upgraded nodes. Nodes that still had not upgraded by that time would remain unaffected, since the post-activation blocks would only have more proof of work, and not less, than non-upgraded nodes require.
More importantly, an overwhelming majority of the hash rate should be fully upgraded to avoid a situation where non-upgraded, non-mining nodes are forked by a longer chain created by non-upgraded miners. A sufficient portion of the hash rate following the upgrade path would eliminate this possiblity, even for non-mining nodes that don't upgrade, because the longer chain will come from the greater hash power and there would be no financial incentive for miners to switch back to catering to a minority of non-upgraded nodes.
Proposed activation method:
Upgraded nodes would delay the relaying of blocks that do not meet the more stringent requirements. This would begin as a confirmation-time penalty to upgraded nodes, but as the upgrade expands to more nodes, the effect would shift to incentivizing miners to produce blocks that conform to the upgrade in order to build on the longest chain faster.
Optional second-phase activation:
For the longer term, it might be advisable to also implement the corresponding opposite influence on the proof of work adjustment for the case where the simplifying assumption taken above does not hold. In other words, if hash rate were to take on a trend of decreasing over a significant period of time at some point in the future leading to a Bitcoin year length greater than 365 days, the calendar drift would ideally be pushed in the other direction by a relaxing influence on the proof of work requirement instead of a tightening influence. Since this would definitely result in a hard fork relative to un-upgraded nodes, this feature, if implemented, would need to be kept inactive for much longer, and only activated if/when the number of non-upgraded nodes becomes so insignificant that a hard fork is no longer a concern.
Join the conversation on stacker.news.
-
@ c0e4bd0b:1c5734af
2024-11-10 12:05:10Bitcoin Calendar Definition
Layer: Applications
Status: Draft
Bitcoin defines the halving cycle as 210,000 blocks, as defined in the file
kernel/chainparams.cpp
. This number was apparently chosen as an aesthetically pleasing number which equates almost exactly to 4 years, according to the ten-minute block schedule. This BIP proposes using this parameter of Bitcoin as the basis for reckoning calendar time, defined as follows.nBlocksPerYear = 210000 / 4 // calculates to 52,500 nBlocksPerMonth = nBlocksPerYear / 12 // calculates to 4375
The calculations above produce integer results, making calendrical calculations based on block height extremely convenient. The zero-based year and month are calculated as follows, using integer division (/) and mudulo (%) based on block height h:
year = h / 52500 month = (h % 52500) / 12
Furthermore, we assume a bitcoin day length of 144 blocks. This is consistent with the target of 10-minutes per block and the 2016 blocks every two weeks for the difficulty adjustment period. This results in months of 30 days, with a small remainder:
nBlocksPerDay = 144 daysPerMonth = nBlocksPerMonth / nBlocksPerDay // calculates to 30.something
A human-friendly date can thus be displayed based upon block height, with familiar calendrical characteristics of 30 full days per month (with a partial day 31) and 12 months per year. As of this writing, the current bitcoin date is 7/24/17, 24-07-0017, or the twenty fourth day of the seventh month of the seventeenth year of Bitcoin.
This definition forms the basis for a culturally independent and socially universal calendar system which is easy to calculate, durable, and financially relevant.
Cross-referencing with other calendar systems:
Since this date will not synchronize exactly to extant calendar systems, a notation needs to be used in cases where ambiguity would result. Taking the solar day as the example, references that cross over between the solar day and the bitcoin date need to have a qualifier resolving the phase discrepancy (as is done when referring to dates in ancient calendar systems that do not align with the turn of the date at midnight). For example, the Bitcoin date of 7/24/17 would be written as November 9/10, 2024, making it clear that it touches both of those solar days. However, this format should only be used for dates in which the two calendar systems are more out of sync than in sync. For dates that are more in sync than out of sync, no overlap day should be given, because it would add ambiguity where there otherwise was none.
Bitcoin Calendar Synchronization
Layer: Consensus
Status: Draft
The Bitcoin calendar (referring to the prior definition) would be more economically relevant to earthlings if the Bitcoin year actually stayed synchronized with the growing seasons of the tropical year. Currently, the Bitcoin year begins in the springtime of the northern hemisphere, but it is offset one year and there is currently nothing to keep the bitcoin year from drifting further out of synchronization with the tropical year.
To keep the Bitcoin year in sync with the seasons, the bi-weekly proof-of-work difficulty adjustment could be tailored to aim toward better alignment during every difficulty adjustment. Normally, the difficulty is adjusted upward or downward a maximum factor of 4, as defined in the file
pow.cpp
. The determination of the value within that range is made solely on the basis of the rate of block discovery during the prior 2016-block (two-week) period.The existing difficulty adjustment scheme has resulted in the Bitcoin calendar generally sliding earlier every year, presumably due to the fact that the global hash rate is generally increasing rather than decreasing. The historical dates for the year beginnings and the corresponding duration of the Bitcoin year are as follows:
|Year|Block|Date|Days| |-:|-:|--|-:| |0|0|01/03/09|| |1|52500|04/22/10|474| |2|105000|01/28/11|281| |3|157500|12/14/11|320| |4|210000|11/28/12|350| |5|262500|10/09/13|315| |6|315000|08/10/14|305| |7|367500|07/29/15|353| |8|420000|07/09/16|346| |9|472500|06/23/17|349| |10|525000|05/29/18|340| |11|577500|05/23/19|359| |12|630000|05/11/20|354| |13|682500|05/07/21|361| |14|735000|05/05/22|363| |15|787500|04/29/23|359| |16|840000|04/19/24|356|
As can be seen, the number of days in the actual Bitcoin year are consistently fewer than the number of days in the tropical year (365.2425). Assuming the hash rate will generally continue to increase, this trend should continue, which allows us to make a convenient simplifying assumption.
Conceptually this proposal seeks to add an additional, limited offset to the work requirement based on whether the Bitcoin calendar is ahead of schedule or behind schedule, in comparison to the tropical year. We can assume based on the trends, however, that we only need to "slow down" the block rate slightly to keep it in sync with the seasons. Therefore, this proposal aims to do only that.
If the Bitcoin block height is a certain amount ahead of the calendar synchronization goal (per the trend), the difficulty would be increased one notch more than required by the normal calculation, if not already at the limit of adjustment for that period. This would make it impossible for the proposed change to overpower the existing calculation, but would still provide a gentle enough push when needed to keep the calendar in sync, thus accomplishing the purpose.
Fork considerations by the author:
A consensus change to the proof of work calculation would normally result in a hard fork. However, in the case that we only potentially increase the difficulty and never decrease it relative to non-upgraded nodes in the network, this means that during the transition, only upgraded nodes would be at risk of rejecting blocks for not meeting the more stringent difficulty level necessary to synchronize the calendar.
The new nodes would therefore need to be programmed to yield to the non-upgraded difficulty criteria until most of the network has upgraded, at which point activation would occur (as explained below) and miners would be obliged to meet the tougher requirements demanded by all upgraded nodes. Nodes that still had not upgraded by that time would remain unaffected, since the post-activation blocks would only have more proof of work, and not less, than non-upgraded nodes require.
More importantly, an overwhelming majority of the hash rate should be fully upgraded to avoid a situation where non-upgraded, non-mining nodes are forked by a longer chain created by non-upgraded miners. A sufficient portion of the hash rate following the upgrade path would eliminate this possiblity, even for non-mining nodes that don't upgrade, because the longer chain will come from the greater hash power and there would be no financial incentive for miners to switch back to catering to a minority of non-upgraded nodes.
Proposed activation method:
Upgraded nodes would delay the relaying of blocks that do not meet the more stringent requirements. This would begin as a confirmation-time penalty to upgraded nodes, but as the upgrade expands to more nodes, the effect would shift to incentivizing miners to produce blocks that conform to the upgrade in order to build on the longest chain faster.
Optional second-phase activation:
For the longer term, it might be advisable to also implement the corresponding opposite influence on the proof of work adjustment for the case where the simplifying assumption taken above does not hold. In other words, if hash rate were to take on a trend of decreasing over a significant period of time at some point in the future leading to a Bitcoin year length greater than 365 days, the calendar drift would ideally be pushed in the other direction by a relaxing influence on the proof of work requirement instead of a tightening influence. Since this would definitely result in a hard fork relative to un-upgraded nodes, this feature, if implemented, would need to be kept inactive for much longer, and only activated if/when the number of non-upgraded nodes becomes so insignificant that a hard fork is no longer a concern.
Join the conversation on stacker.news.
-
@ f462d21e:1390b6b1
2024-11-10 11:44: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
-
@ 07907690:d4e015f6
2024-11-10 09:50:14Bitcoin diciptakan oleh Satoshi Nakamoto, (hampir pasti) sebuah nama samaran, yang hingga hari ini belum ada seorang pun yang dapat secara meyakinkan menghubungkannya dengan orang atau sekelompok orang yang sebenarnya. Nakamoto menghilang dari internet pada tahun 2011, meninggalkan sedikit petunjuk tentang siapa "mereka". Selama bertahun-tahun, banyak orang secara terbuka mengaku sebagai Satoshi, semuanya gagal mendukung pernyataan tersebut dengan fakta yang tidak dapat disangkal.
Dalam forum awal bitcointalk, Satoshi mengatakan bahwa mereka mulai mengerjakan Bitcoin pada tahun 2007, dua tahun sebelum blok pertama ditambang. Blok Genesis, atau blok pertama dalam blockchain Bitcoin, ditambang pada tanggal 3 Januari 2009. Nakamoto adalah penambang blok Genesis, menerima 50 bitcoin pertama yang pernah diedarkan. Namun, hadiah dari blok pertama ini tidak dapat digunakan karena keunikan dalam cara blok Genesis diekspresikan dalam kode. BitMEX Research telah menerbitkan analisis pada hari-hari awal penambangan Bitcoin dan menyimpulkan bahwa “seseorang” menambang 700,000 koin. Meskipun banyak yang berasumsi ini adalah Satoshi, secara resmi hal ini masih belum terbukti.
Kita hanya bisa membayangkan ketenaran yang akan diterima Satoshi Nakamoto jika identitas mereka terungkap, belum lagi kekayaan besar yang ingin mereka kumpulkan (meskipun Satoshi tampaknya tidak menghabiskan satu pun koin yang seharusnya mereka tambang). Seiring berjalannya waktu, ada banyak contoh orang yang mengaku sebagai Satoshi, dan ada pula yang diyakini sebagai Satoshi.
Klaim Palsu
Salah satu kasus paling terkenal tentang seseorang yang mengaku sebagai Satoshi adalah yang dilakukan oleh Craig S. Wright, seorang akademisi Australia. Wright, pada awal tahun 2015, telah mencoba berkali-kali untuk memberikan demonstrasi publik dengan bukti yang tidak dapat disangkal bahwa dia adalah penemu Bitcoin, namun dia belum berhasil hingga saat ini. Faktanya, “bukti”-nya terbukti palsu.
Dorian Nakamoto, seorang pria di California, pernah secara terbuka diberi gelar sebagai pencipta Bitcoin oleh seorang jurnalis surat kabar yang melihat beberapa kesamaan antara kedua Nakamoto, yang paling jelas adalah nama belakang mereka. Namun, dengan sangat cepat, klaim ini ditolak oleh Dorian dan juga dibantah.
Kelompok orang lain yang menarik perhatian seputar identitas Satoshi yang tidak diketahui adalah kriptografer dan ilmuwan komputer. Hal Finney, seorang kriptografer terkenal yang merupakan orang pertama yang menerima bitcoin dari Satoshi Nakamoto, adalah salah satu tersangka paling terkenal karena keterlibatan awalnya dalam bidang tersebut. Kurang dari setahun setelah Bitcoin diciptakan, Satoshi dan Hal Finney bertukar beberapa postingan di forum diskusi Bitcoin, membahas hal-hal seperti teknologi dan implikasinya di masa depan. Finney meninggal karena ALS pada tahun 2014, menyebabkan beberapa orang berspekulasi mengenai sejauh mana keterlibatannya dengan mata uang terdesentralisasi pertama di dunia. Nick Szabo adalah kriptografer terkenal lainnya yang menciptakan Bit Gold, mata uang digital yang ditemukan beberapa tahun sebelum Bitcoin. Fakta bahwa dia tampaknya tidak terlibat langsung dengan penciptaan Bitcoin, meskipun proyeknya sangat mirip dengan itu, telah membuat beberapa orang berspekulasi bahwa dia mungkin juga pencipta Bitcoin.
Mengapa Satoshi Harus Anonim?
Satoshi Nakamoto, pencipta mata uang terdesentralisasi pertama di dunia, harus tetap anonim karena sifat penciptaannya. Setelah membuat protokol tanpa titik utama kegagalan, Nakamoto mungkin menyadari bahwa mempertahankan anonimitasnya dapat menghilangkan titik utama kegagalan terakhir yang mungkin dimiliki Bitcoin: orang yang menciptakannya. Menghapus identitas tunggal yang dapat dikaitkan dengan kemunculan Bitcoin berarti menghilangkan segala wajah yang dapat mempengaruhi politik, aturan, atau pengambilan keputusan komunitas Bitcoin.
Siapa pun Satoshi, tidak dapat disangkal bahwa mereka adalah seorang jenius di zaman kita. Protokol Bitcoin memberikan insentif ekonomi di semua tempat yang tepat sehingga menghasilkan solusi luar biasa terhadap Masalah Jenderal Bizantium. Satoshi Nakamoto menerapkan konsep-konsep dari kriptografi, matematika, teori permainan, dan ekonomi untuk menciptakan aset digital langka yang dirancang dengan indah — dan pertama di dunia — yang disebut Bitcoin.
Sumber artikel: bitcoinmagazine.com Diterjemahkan oleh: Abengkris
-
@ e1d968f7:5d90f764
2024-11-10 06:01:24If there's one thing I know for sure, it's this: life is too short not to make the most of every moment. That’s why I don’t just walk through life—I own it. My name’s Rebecca Knight, and I’m the kind of woman who leaves a lasting impression, whether it’s with a wink across a crowded room or a conversation that lingers long after it’s over.
I’m not your average woman, and I’m certainly not afraid to show it. I’ve got that magnetic charm that draws people in, a little playful sparkle in my eye that says, “Come closer, if you dare.” I love making people feel seen, heard, and most of all—alive. There’s something about making someone smile or laugh that gives me the rush of a lifetime. Maybe it’s the thrill of connection or the way people react when they realize I’m exactly the kind of woman they didn’t know they needed in their lives.
When I meet someone, I don’t just show up—I make it memorable. Whether it’s in the way I laugh at a joke, the intensity of a conversation, or the way I give you my undivided attention, there’s no denying it: I know how to keep you on your toes. And when it comes to my work, it’s no different. I know exactly how to create a space where we both feel at ease, where the chemistry can spark and the tension can build. It’s all about the connection. The energy. The way we feed off each other.
But let’s be real: I don’t just give for the sake of giving. I believe in mutual enjoyment. I’m all about making sure both of us are having the time of our lives. Whether we’re sharing an intimate laugh, a heated conversation, or simply enjoying each other’s company in a way that feels… exciting, it’s always about balancing that electric pull with respect and mutual understanding.
Being bold is fun, but being respectful is key. I don’t believe in anything forced or out of alignment with what feels good. If I want something, you’ll know it, and if you want something, I’m always happy to listen. But here’s the thing: I’m not interested in anything halfway. I play for keeps, and I expect to have my energy matched in the best possible way.
So, if we ever find ourselves in the same space, be prepared for a little bit of magic. I’m the kind of woman who brings excitement, fun, and a healthy dose of mischief into every room I enter. I know how to turn the ordinary into extraordinary, and how to leave a lasting impression without breaking a sweat.
After all, life’s a game, and I’m very good at playing it. If you ever find yourself wondering if you’re the next lucky person I’ll take on that little adventure… let’s just say I’m sure you’ll know when it happens.
-
@ a10260a2:caa23e3e
2024-11-10 04:35:34nostr:npub1nkmta4dmsa7pj25762qxa6yqxvrhzn7ug0gz5frp9g7p3jdscnhsu049fn added support for classified listings (NIP-99) about a month ago and recently announced this update that allows for creating/editing listings and blog posts via the dashboard.
In other words, listings created on the website are also able to be viewed and edited on other Nostr apps like Amethyst and Shopstr. Interoperability FTW.
I took some screenshots to give you an idea of how things work.
The home page is clean with the ability to search for profiles by name, npub, or Nostr address (NIP-05).
Clicking login allows signing in with a browser extension.
The dashboard gives an overview of the amount of notes posted (both short and long form) and products listed.
Existing blog posts (i.e. long form notes) are synced.
Same for product listings. There’s a nice interface to create new ones and preview them before publishing.
That’s all for now. As you can see, super slick stuff!
Bullish on Cypher.
So much so I had to support the project and buy a subdomain. 😎
https://bullish.cypher.space
originally posted at https://stacker.news/items/760592
-
@ 07e1bb93:f9523a3c
2024-11-10 03:46:57In the ever-shifting landscape of American politics, few partnerships have proven as effective in advancing the conservative agenda as the relationship between President Donald Trump and Senator JD Vance. The alignment of their values, priorities, and vision for America has been a game-changer, not just for the Republican Party, but for the nation as a whole. Here’s why Trump needed JD Vance — and why this partnership is one for the history books.
1. A Shared Vision for America’s Working Class
Both President Trump and JD Vance have made it clear that their top priority is restoring the strength and prosperity of America's working class. Trump’s 2016 campaign reshaped the Republican Party into one that stands unapologetically with blue-collar Americans. Vance, in his bestselling book Hillbilly Elegy, captured the struggles of America’s heartland, painting a picture of a forgotten class that Trump understood and aimed to champion.
Vance’s personal experience of growing up in a working-class family in Appalachia allows him to connect with the very people Trump promised to fight for. When Trump needed someone who could speak authentically to the struggles of rural America — a place often left behind by both parties — JD Vance was the perfect ally. His commitment to restoring dignity to working families and fighting against globalist policies that shipped jobs overseas aligns perfectly with Trump’s America First agenda.
2. Fighting the Swamp Together
One of Trump’s most significant promises was to drain the swamp — to rid Washington of the establishment elites who have sold out America’s interests in favor of their own. JD Vance’s political career has been a direct response to this very problem. As someone who understands the dangers of big-money politics and the media’s influence, Vance has shown that he’s not afraid to take on the establishment — whether it’s Big Tech, Big Pharma, or the bureaucratic deep state.
Together, Trump and Vance make an unstoppable force in the fight against Washington corruption. Vance’s no-nonsense approach to tackling the elites, combined with Trump’s bold, take-no-prisoners attitude, sends a clear message to D.C. — the days of business as usual are over.
3. A Bold, Unapologetic Conservative Voice
Trump revolutionized the Republican Party by unapologetically embracing a bold, conservative agenda — one that emphasizes securing the border, standing strong against China, and advocating for American sovereignty. JD Vance has proven to be a fierce defender of these principles. His strong stance against illegal immigration, as well as his commitment to bringing American jobs back home from China, make him an invaluable ally in Trump’s fight to put America first.
In the face of global challenges and domestic strife, Trump needed someone like JD Vance who would stand firm in the face of leftist pressure, the mainstream media, and cancel culture. Vance’s resilience and courage in sticking to conservative principles make him an indispensable ally in Trump’s quest to reclaim American greatness.
4. Rural America’s Voice in Washington
Trump’s deep connection with rural America was one of the key factors in his 2016 victory. In JD Vance, Trump found a kindred spirit who understands the heartbeat of Middle America. Vance, who has firsthand knowledge of the hardships faced by families in small-town America, brings a fresh perspective to the Senate that Trump can rely on.
From advocating for policies that support American agriculture to pushing back against the cultural elites who are trying to rewrite America’s values, Vance is a powerful voice for the people who have long been overlooked by Washington politicians. With Vance in the Senate, Trump gained a strong advocate for rural communities, ensuring that their concerns are heard at the highest levels of government.
5. Fighting the Culture Wars
In addition to economic policies, Trump and Vance share a common commitment to fighting the culture wars. Vance, with his deep understanding of the impact of media, education, and corporate culture on America’s identity, has been an outspoken critic of the left’s radical agenda. He has voiced concerns about the erosion of traditional American values and the dangers of left-wing identity politics.
Trump needed someone who could not only challenge the left’s policies but also defend the cultural heritage of America. Vance’s intellectual and cultural insights make him an essential ally in this battle. Together, they form a powerful counterweight to the woke left’s attempt to undermine the very fabric of American society.
6. A Partnership for Victory
At its core, the Trump-Vance alliance is about winning — for the American people. It’s about rebuilding a nation that works for its citizens, standing up against forces that seek to weaken it, and ensuring that America remains a beacon of freedom, opportunity, and strength on the global stage.
Trump needed JD Vance because Vance’s voice is a reflection of the heart of America. Together, they represent the future of the Republican Party — a future that is grounded in traditional values, fierce independence, and a relentless pursuit of the American Dream.
Conclusion
In JD Vance, President Trump found an ally who shares his vision, his commitment to the working class, and his passion for restoring American greatness. As this partnership continues to grow, there’s no doubt that Trump and Vance will be a dynamic duo, leading the charge against the forces of globalization, corruption, and cultural decay.
For all the talk of division in American politics, the Trump-Vance partnership reminds us that unity is possible when leaders stand firm in their beliefs, fight for what’s right, and work together for the future of our nation. It’s a partnership built on trust, shared values, and an unyielding love for America — and that’s exactly why Trump needed JD Vance.
-
@ 4cec8c79:1511abda
2024-11-09 22:15:32Navigating Job Offers in Nigeria: Opportunities and Challenges
Nigeria, the most populous country in Africa, offers a dynamic job market that spans multiple industries. With its youthful population, growing tech sector, and diverse economy, job seekers face both opportunities and challenges. This article explores the job offer landscape in Nigeria, focusing on the key sectors, the job search process, and factors that both employers and potential employees must consider.
Key Sectors Offering Job Opportunities
-
Technology and ICT: Nigeria has been called the "Silicon Valley of Africa" due to its rapidly growing tech ecosystem. Cities like Lagos and Abuja are hubs for startups and innovation, with companies focusing on fintech, e-commerce, software development, and mobile technology. Tech giants like Andela, Paystack, and Flutterwave have made Nigeria a key player in the global tech space, offering high-paying jobs for software developers, data analysts, and cybersecurity experts.
-
Oil and Gas: The oil and gas industry remains one of the largest employers in Nigeria, contributing significantly to the country's GDP. Jobs in this sector range from engineering and project management to environmental science and logistics. Multinational companies like Shell, Chevron, and Total offer numerous positions, but the industry is also highly competitive and often requires specialized skills or experience.
-
Agriculture: With a large rural population and favorable climate, agriculture remains a vital sector for Nigeria's economy. The government has launched several initiatives aimed at promoting agribusiness and food security, which has led to job growth in areas like agritech, farming, supply chain management, and food processing.
-
Banking and Finance: The banking sector in Nigeria is robust, offering opportunities for those in finance, accounting, marketing, and management. In addition to traditional banking roles, Nigeria’s thriving fintech industry offers job opportunities in digital payments, lending, and financial inclusion platforms. Major players like GTBank, First Bank, and Zenith Bank are often on the lookout for skilled professionals.
-
Education and Health: Education and healthcare are both sectors that offer steady employment, especially in underserved areas. The rise of online learning platforms and private schools has boosted demand for teachers, while the healthcare sector, especially with the COVID-19 pandemic, has underscored the need for medical professionals, public health workers, and researchers.
-
Entrepreneurship and Startups: Entrepreneurship is flourishing in Nigeria, with many young Nigerians turning to startups to solve local challenges. The rise of digital platforms and access to funding through venture capital and government grants has made it easier for entrepreneurs to grow businesses. From logistics and retail to food delivery and fintech, Nigerian startups are generating job opportunities for creative and tech-savvy individuals.
Challenges Faced by Job Seekers
-
Unemployment and Underemployment: Despite the booming sectors, Nigeria faces a high unemployment rate, especially among its youth. According to recent statistics, over 33% of the labor force is unemployed, with even more individuals underemployed, working in low-wage or part-time positions. This imbalance is one of the biggest challenges job seekers face, as they compete for a limited number of well-paying jobs.
-
Skill Mismatch: Many graduates in Nigeria find themselves in a situation where their education doesn't align with the demands of the job market. This skills mismatch is particularly evident in sectors like technology, where there's a demand for highly specialized skills in programming and data science. Upskilling
~~****~~
-
-
@ b6424601:a11e4ff4
2024-11-09 19:45:51Personal Asset Architecture - Breaking Free from the Fiat-Driven Housing Market
Subheading – How Individuals Can Opt Out of the Fiat-Driven System and Create Homes with long term value
As a self-inflicted residential architect, I am passionate about creating new, renovated homes that matter to interesting people. However, I've realized that the traditional housing market is built on a foundation of fiat currency, leading to several problems, including the potential devaluation of homes and, increasingly, the creation of empty stores of value.
The Fiat Death Spiral
Construction financing drives the most decisions in the housing market, which leads to a system where production homes are built to sell and create an initial profit rather than to provide a high-quality construction or a well-conceived living space.
The Choice: Custom vs. Fiat
When building or buying a home, you have two main options: a custom home built or renovated to your specifications or a production home pre-designed and pre-built by a builder.
Fiat-Driven Homes: The Short-Term Solution
Fiat-driven homes are built to sell quickly, often using materials that fit the deals proforma. Because of lower-quality materials and construction methods, Fiat homes depreciate more like cars than buildings.
Custom Homes: The Long-Term Solution
On the other hand, custom homes are typically built with higher quality and better design because the owner and designer are more invested in creating one-of-a-kind designs.
A New Approach: Personal Asset Architecture
As an architectural design firm owner focusing on homes, I've always known that the percentage of all homes architects design is low. I've used the low percentage as a filter for working with longer-term thinking clients, typically paying with cash. Clients who pay with cash have the flexibility to pay for what they want, allowing them to think about the total cost over the life of the house rather than just jumping through the hoops of a loan-to-value appraisal.
Bitcoin standard architectural practice and Bitcoin standard homes are the escape valves to continue the work we want for the individuals we want to work for. Our thesis is that Bitcoin can improve the housing market, both for our practice and for the clients we work with. Our thesis is that Bitcoin changed the housing market for our practice and the people we work with to build a personal architecture that is as hard an asset as Bitcoin.
Asset Architecture Benefits
Homes designed in a BTC standard have four big benefits for the individual to create personal asset architecture that holds value over time.
1. Allows owners to think in a longer time horizon – Decisions made when designing homes need to consider a longer time horizon to include the operating cost of the house in addition to the cost of construction. Production homes are built to sell and create profit based on profit produced, netting profit by the sales price vs cost. Custom homes have more flexibility in spending more on quality and life cycle improvements.
2. Allows for a density of design thought - Can you design a better-conceived home that considers how to use space more effectively to provide a denser space so the house can require less square footage? Can the smaller square footage be planned to work as a lifetime home from a starter home, through offspring to empty nesting and multigenerational housing?
3. Providing a return on investment beyond money – A home should produce a better quality of life. Can homes produce income, food, energy, resilience, conservation of resources, and interior air quality and become your favorite place to be? Can the utility of needing a place to live be your family citadel?
4. Working with the system to minimize the power of the system to increase taxes on the asset - Can we design homes to reduce property taxes with a creative design to minimize bedrooms and the taxable house value? Can we put more investment and design in outdoor space that helps owners maximize the use of properties for uses that are not taxed, like quality outdoor space or properties that produce food and energy?
The future of housing is uncertain, but one thing is evident from the trenches: the traditional fiat-driven system is not sustainable. Personal Asset Architecture offers a new approach to housing design that prioritizes long-term value, efficiency, and quality. By embracing this approach, we can create precious homes that produce a return on investment beyond money. The future of housing is in our hands, and it's time to create a new way of thinking about home design.
What is possible?
As individual owners and architects, we can build Stores of value buildings. By incorporating the goal of creating Personal Asset Architecture, we can create homes that produce a return on investment that goes beyond money and minimize the values of a banking system and the ability to increase taxes on the asset.
Stay humble, stack stakes, and when you are ready, choose to build stuff that holds actual value.**
HODL on
-
@ 2063cd79:57bd1320
2024-11-09 18:34:43Einer der großen Vorteile von Bitcoin ist, dass es relativ einfach ist Bitcoin selbst zu verwahren. Ich predige self-custody, also die Eigenverwahrung, von Bitcoin in fast jeder Ausgabe als einer der Hauptkomponenten der Formel für Freedom Money rauf und runter. Doch was genau bedeutet es seine bitcoins selbst zu verwahren? Denn schließlich verwaltet jeder mündige Bürger seine Finanzen, ob in Bitcoin oder nicht, in der Regel ja immer selbst. Es gibt einen großen Unterschied zwischen verwalten und verwahren. Denn das Verwahren übernehmen bei anderen Assets Dritte für uns, sei es die Bank, die unser Geld auf Konten, Hypotheken und Sparanlagen, manchmal sogar Wertsachen in Schließfächern, verwahrt, Finanzbroker oder Depotbanken, die Wertpapiere wie Aktien, Bonds oder ähnliches, verwahren, oder Versicherer, die Policen, Sparvermögen, usw. für uns verwahren. Immer sind Drittparteien mit der Verwahrung unseres Besitzes vertraut, oder haben sich uns aufgedrängt, weil es schlichtweg nicht anders möglich ist, diese Besitztümer völlig autark zu verwahren. Bei Bitcoin ist das anders. Bitcoin lässt sich ähnlich wie Bargeld, Gold oder Schmuck völlig autark und selbstbestimmt verwahren. Dabei gibt es, wie bei allem im Leben, sowohl einfache und bequeme, aber dadurch unsichere, als auch komplizierte und etwas aufwändigere, aber deshalb sehr sichere Verwahrungsmethoden. Eine sehr sichere Methode stellt die Verwahrung mit Hilfe von MultiSig (also Multi-Signature) dar. Dieses wollen wir uns diese Woche genauer anschauen.
Eine der großen Errungenschaften von Bitcoin ist die Möglichkeit der Eigenverwahrung, sogenanntes self-custody. Es bietet jedem//jeder Hodler//in, Anleger//in und Investor//in eine völlig autarke und selbstbestimmte, Methode zur Verwahrung und Kontrolle seines Besitzes und damit einen Schutz vor Zensur, Kontrolle und Übergriffen. Ohne zu sehr ins Detail zu gehen, möchte ich kurz grundlegend die Sicherheitsstruktur von Bitcoin darlegen. Jede//r Nutzer//in sollte zunächst über eine Wallet verfügen. Eine Wallet ist kein Muss, um mit Bitcoin in Kontakt zu treten, jedoch versucht ja auch niemand das Internet ohne Browser zu verwenden. Eine Wallet ist, ähnlich wie der Internetbrowser, eine Software, die es dem Nutzenden ermöglicht Bitcoin zu erhalten, zu versenden oder zu verwahren (ohne Bitcoin direkt zu erhalten, zu versenden oder zu verwahren - kompliziert, ich weiß). Dabei gibt es ein weites Spektrum an verschiedenen Diensten. Es gibt Wallets, Börsen oder andere Verwahrungs-Services. Um das Thema MultiSig zu besprechen, fokussieren wir uns auf Wallets.
Im Grunde besitzt jede//r Halter//in von Bitcoin ein Schlüsselpaar - einen privaten Schlüssel (Private Key) und einen öffentlichen Schlüssel (PubKey). Vergleicht man das Konzept mit dem alten Finanzsystem würde man sagen, der öffentliche Schlüssel stellt die Kontonummer dar, also die Information, die öffentlich geteilt werden kann und der private Schlüssel stellt die PIN Nummer dar, also die Information, die nur die//der Besitzer//in haben sollte. Der private Schlüssel ist also die Information, die es zu schützen gilt, denn in Kombination erlauben mir die beiden Schlüssel Zugriff auf die sich dahinter befindenden bitcoins. Ein bitcoin lässt sich nicht aus der Blockchain extrahieren. Die einzelnen Coins existieren nur innerhalb der Chain (und nicht als ganze "Coins", sondern als Outputs/UTXOs). Lediglich der Besitzanspruch wird außerhalb gehandhabt. Das bedeutet, dass ich mit meinen beiden Schlüsseln den Zugriff oder Anspruch auf eine gewisse Anzahl bitcoins ausweisen kann. Habe ich Zugriff auf den privaten Schlüssel, kann ich also ohne weiteres komplett über alle damit verbundenen bitcoins verfügen, sie ausgeben, sie weiterversenden (oder akkurater formuliert: eine Nachricht signieren, die dem Empfänger die Kontrolle über diese bitcoins gewährt), oder sie sogar zerstören. Wallets übernehmen die Speicherung der Schlüssel, sowohl der öffentlichen, als auch der privaten, in einem für den Anwender benutzerfreundlichen Interface.
Sogenannte Hot Wallets, sind Apps, die mit dem Internet verbunden sind, und dadurch "hot" oder "live" sind, das heißt sie können im schlimmsten Fall gehackt werden. Cold Wallets sind offline Lösungen, die sich nicht online hacken lassen, aber z.B. im Falle eines Paper Wallets leicht verlieren, stehlen, oder zerstören lassen. Das Problem, wie oben erwähnt, ist je bequemer und nutzerfreundlich die Handhabung der Wallet, desto unsicherer ist sie in der Regel auch. Also jegliche Software Wallets, egal ob mobil oder auf dem Rechner daheim, stellen Sicherheitsrisiken dar, da sie wieder einen Drittanbieter in die Gleichung schleusen. Um volle Autarkie zu erlangen muss man sich von Drittanbietern, wie Wallet Anbietern, Börsen oder sonstigen Services, komplett lösen und die Schlüssel und damit seine bitcoins selbst verwahren. Denn die eiserne Regel gilt immer: Not your keys not your coins!
Wenn man einen Betrag von seiner Wallet senden möchte, wird eine Transaktion erstellt und signiert. Indem die Transaktion signiert wird, beglaubigt man in digitaler Form, dass man der Eigentümer des Betrages ist, dass man die Schlüssel besitzt, um es zu verwalten, und man die Transaktion genehmigt. Es wird also der Besitzanspruch signalisiert und weitergegeben, und kein bitcoin physisch bewegt. In einer Single-Signature Wallet benötigt man nur eine Signatur, um eine Transaktion zu signieren. Bei MultiSig (Multi-Signature) erfordert die Wallet mehrere Signaturen, um eine Transaktion zu signieren. Eine MultiSig-Wallet wird dabei von zwei oder mehreren Benutzern geteilt. Wird also eine Transaktion erstellt, muss die Anfrage zunächst von allen Teilnehmern bestätigt werden. MultiSig ist ein Aufbewahrungsmodell, bei dem eine Wallet mit mehreren Schlüsseln in einem m-von-n-Schema erstellt werden. Also beispielsweise eine 2-von-3-Wallet basierend auf drei Schlüsseln, von denen zwei zum Bestätigen einer Transaktion erforderlich sind. Es gibt auch andere Modelle wie 3-von-3, oder 3-von-5, etc. allerdings stellt 2-von-3 die gängigste Methode dar. Das Schöne an diesem Modell ist, dass es Single Points of Failure (SPOF) eliminiert. Das bedeutet, dass selbst sonst kritische Informationen, wie Seed-Phrase-Backups oder Hardware-Wallets, sogar von Angreifern gestohlen, oder durch einen Unfall verloren oder zerstört, werden können, ohne dass die Wallet kompromittiert wird. Es ist hilfreich, sich die MultiSig-Wallet als einen digitalen Safe vorzustellen. Man besitzt dabei verschiedene Schlüssel zu diesem Safe. Im Beispiel von der 2-von-3-Wallet hat der Tresor zwei Schlüssellöcher und drei Schlüssel. Zwei beliebige der drei Schlüssel können verwendet werden, um den Safe zu entriegeln, damit die darin gespeicherten bitcoins bewegt werden können.
https://x.com/cryptograffiti/status/1544763238721601537
Das bedeutet jedoch nicht, dass man mit einer MultiSig-Wallet unvorsichtiger umgehen sollte, denn trotz der Flexibilität, die MultiSig bietet, sollte man ein Seed-Phrase-Backup erstellen und vermeiden, Hardware-Wallets oder Seed-Phrasen gemeinsam aufzubewahren. Fast alle Anbieter von guten, sicheren und seriösen Wallet Software, sowie Hersteller von Hardware-Wallets bieten an MultiSig-Wallets innerhalb ihrer Apps anzulegen. Der Prozess ist ein wenig aufwändiger, als das Anlegen einfacher Single-Signature-Wallets, die Vorteile überwiegen den Aufwand aber deutlich. Ein MultiSig-Wallet schützt in der Regel, und wenn ordentlich gehandhabt, vor Phishing, Malware, Verlust der Schlüssel, Verlust von Hardware, wie Telefon, Laptop oder Hardware-Wallet, aber auch vor Diebstahl und Unfällen.
MultiSig-Wallets dienen nicht nur der Sicherheit, sondern können darüber hinaus auch weitere Nutzen haben. MultiSig kann auch als Zwei-Faktor-Authentifizierung für Bitcoin Transaktionen verstanden werden. Die vielfachen privaten Schlüssel können auf verschiedenen Geräten gespeichert und auf die im MultiSig-Wallet gespeicherten Coins nur zugegriffen werden, wenn alle Schlüssel vorhanden sind. bereitgestellt werden. Auch gibt es Szenarien, in denen ein MultiSig-Wallet als treuhänderischer Dienst funktionieren könnte. Zwei Parteien vereinbaren eine Zahlung für eine Dienstleistung oder einen Warenaustausch und setzen einen Treuhänder ein, der einen der Schlüssel erhält. Erst im Falle der erbrachten Leistung, übergibt dieser Treuhänder den Schlüssel und die Geldmittel können übertragen werden. Aber auch zukünftige Gesellschaftsformen könnten von einem solchen Modell profitieren. Gerade die aktuell diskutierte Gesellschaft mbH mit gebundenem Vermögen würde das gebundene Vermögen sichern können, indem jedes Vorstandsmitglied Zugriff auf einen privaten Schlüssel von vielen erhält. Kein einzelnes Vorstandsmitglied darf die Geldmittel missbräuchlich oder entgegen der Satzung verwenden. Somit könnten nur die von den Vorstandsmitgliedern mehrheitlich vereinbarten Entscheidungen ausgeführt und finanziert werden.
MultiSig erhöht die Sicherheit von selbst verwahrtem Vermögen um ein vielfaches. Doch auch über den eigenen Sicherheitsaspekt hinaus, hat MultiSig die Möglichkeit das Thema digitaler Zahlungen in weiteren Bereichen interessant zu machen - Beispiele wie Escrow oder das Finanzplanning bei Gesellschaftsformen mit Vermögensbindung ergeben sich vielfach. Doch darüber hinaus, ist self-custody einer der wichtigsten Bausteine auf dem Weg zu einem Bitcoin Standard. Es soll nicht bedeuten, dass man sich mit seinem Eigentum verstecken und vergraben und der Gesellschaft nichts zurück geben soll, denn auch eigenständig verwahrte Bitcoins müssen zumindest steuerlich berücksichtigt werden. Jedoch bedeutet es, dass mir niemand meine bitcoins entreißen kann. Es gibt keine Bank, die mein Konto einfrieren oder pfänden könnte. Man kann auf seine bitcoins problemlos überall zugreifen, solange die Blockchain läuft, egal wo man sich auf der Welt befindet und egal zu welcher Tages- und Uhrzeit. Die Idee, dass Regierungen den Bankensektor, den sie regulieren, zwingen können Finanzdienstleistungen als Waffen einzusetzen sollte spätestens seit dem Freedom Convoy in Kanada keine Dystopie mehr sein. Es besteht kein Zweifel, dass die zunehmende Übergriffigkeit der Staaten, wie zuletzt in Kanada, eines der einzigartigen Wertversprechen von Bitcoin hervorgehoben hat: Jeder kann über seinen Besitz frei verfügen und Menschen können sich vor finanziellem "Cancelling" schützen. Es gibt Bitcoin eine weitere Bedeutung in seinem Narrativ als monetäre Revolution.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 35f3a26c:92ddf231
2024-11-09 17:13:38The FUD injection
Many cyber security advisors and CEOs of companies that offer security products will tell you that the battle is lost, that, for example, if you don't buy an air gap device your private keys are not secure.... That, if you used your computer instead to write the seed words in a piece of paper and then put them in a piece of metal, you will be hacked and most probably you are doomed....
IMO and experience, it is an exaggeration...
If all the fear mongering being pedaled by the cyber security enthusiasts and experts was true, oh well, with very few exceptions, we all will be drained of our funds in banks (most neither have a decent 2FA - still working with SMS for crying out-loud...), self custody wallets, etc... Even the Bitcoin blockchain encryption will be broken by "quantum computers"... oh and AI will be used by hackers to hack you as well... Just ignore the noise...
The unpopular opinion
IMO, basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away.
And the tools they tell you that are not enough and therefore, you are powerless, actually are quite helpful, keep using them, firewalls, VPNs, TOR, Linux Whirpool, etc.
Sugestions
Do your homework, acquiring cyber security skills needs reading, get on it, few tips:
- Learn how to verify a software security key or SHA256 before running it in your laptop or mobile if an apk. If on Microsoft, if the software you want to install does not have a .msi version (already signed by Microsoft), the .exe extension file needs to be verified, learn how, this is paramount, no matter the application, same with Linux. If the app does not offer it, do not install it, contact the developer and demand it, if no dice, forget it, look for an alternative.
- Use a VPN on your home router, yes, even if you acquire cyber security knowledge and apply it to your mobile and laptop, if you do not live alone, every other member of your family is a weak link that can affect you. Acquire a router that supports a VPN that does not require to know your identity to pay for the service and accepts Bitcoin as payment (otherwise do not use it, no matter how good you think it is, if free avoid, you are the product and therefore, you are better without one that with one free). As an additional measure, keep your laptop, PC and mobile with another VPN, a different service, you will be with a double VPN while at home and with one while in the road. In the past the throughput will be considerably reduced to a point of being too slow, nowadays, you will be fine.
- Use a router with a decent firewall and advertising guard like features, Adguard or Pi-Hole (learn to configure and to add community supported lists) , that will keep your home browsing experience safer and faster.
- If you do banking and Bitcoin with your mobile phone, consider having two mobiles, one left at home secured. Carry with you a mobile for your social needs and small payments in fiat or Bitcoin, if you loose your phone or you get robed, you will sleep better....
- If you insist on using debit cards instead of credit cards, keep the account with the debit card limited to your needs when you go out. A bit of a pain but do not use your savings account, if you lose the wallet you are screwed and there is no recurse with a debit card.... (or use credit cards and you have the option to recover the funds in case is needed)
- If you have stacked a considerable amount in Bitcoin and want to be sufficiently safe, consider an air gap seed signer, if you do not trust yourself, consider a service with no KYC, contrary to what many believe, there are some, recently I learn that CASA is one of them, probably there are others, do your homework. You keep one or two private keys and the company keeps another one, to remove the funds you need 2 of 3 and it has built in time locks you can set up.
- Avoid Microsoft and Google and Apple clouds, those are honey pots often targeted, if they get hacked the companies most probably will neither inform the clients or if they do it would be much after the incident, use other private services highly encrypted end to end, preferably FOSS, and do not upload your data unencrypted, yes, encrypt it before uploading if it is valuable information, it is a backup of data and you want it safe, if it is not in your hands, best to encrypt it, even if the company claim it is E2E encrypted, you can't be sure....
Summary
Each person is different, you need to sleep good at night knowing your cyber security is sufficient and therefore your data and funds are safe. Do the homework, read, study, acquire the skills and tools and use them properly, cyber security is not convenient, but in the age of information, it is a must to protect your family and your wealth.
If you like my work and would like to support me:
-
@ 35f3a26c:92ddf231
2024-11-09 17:12:45This is my top 3 list of whom, IMO, are today's most dangerous influential actors in the #Bitcoin arena, the list is based on previous actions and capacity to harm the ecosystem due to their resources and influence in the space:
Number 1 : Elon Musk
Reasoning: Supporting a meme coin and trolling the ecosystem. Trying to create the american wechat and portraying himself as a protector of freedom of speech. Admired and loved by millions...
Potential impact: High, he may support a shitcoin as solana or worst, create his own with the support of deep pockets and the government. Considering that we are still early and millions around the world still see #Bitcoin as a risk asset or worst, creating one in X will have immediate use case and challenge p2p cash use case from the get go, where Meta failed X may succeed...
Number 2: Jack Dorsey
Reasoning: Known for his history as Twitter CEO during the crusade against freedom of speech, cancelation of critical thinkers and even a president of USA, the behavior of Twitter was reprehensible while Jack was the CEO, I never thought that a company could behave that way and survive and yet... Unreal and zero legal accountability, twitter basically gaslighted a large amount of the population, supported political propaganda to one party with no neutrality, supported an experimental drug that is still harming people and didnt let experts and doctors to debate and discuss and not one of those thugs blocking accounts and censoring critical thinkers was made accountable, eye opening in many ways for those that at that moment still believed that USA respected freedom of speech... Recently supported a mining pool that censors whirlpool from Samourai wallet, old habits die hard I guess... And the cherry of the pie, now funding FiatJaf whom was looking for funding to spam Ethereum and Monero networks to make them unusable so more funds will move to Bitcoin and LN... This project and idea from the getgo is a no no, you may not like another project but to spam it intentionally should be illegal, and it is being done, shamelessly...
Potential impact: Very high, already inside the community, a record of bad actions, pro censorship, vast resources, head of Cash App, admired by most in the community and hence able to missguide the community into a path that could eventually make Bitcoin a failure of a project in the future with the proposal of a hard fork introducing additional censorship and less privacy in one way or another.
Number 3: Blackrock
Reasoning: No need to explain much, they join the train and... it is only logical , after so much hate and media propaganda against Bitcoin, that they did so to fight the fight from inside trying to affect it and transform it into something else , just speculation, time will say. Check my article on ETFs
Potential Impact: Super Nova. As I explain in my article of ETFs, they have the resources to attempt to change the direction of Bitcoin development for it to become something else, even kill it as a store of value. They have a large stake in some of the largest mining farms as well... Do the math, it looks like a hostile take over and that may not end well. Again, just my opinion, but, if history and patterns teach us leasons, not a good look... Activist Critical Thinkers in the space are needed, #Bitcoin for many years has been a space with many of them, the list was long, but little by little I observe a change, produced by time+age+money, those libertarians are now; most of them; retired millionaires, or enterpreuners absorbed by the fiat system and therefore have changed their tune. I thought we will have a new generation, motivated, smarter, ready to take over, but all I see, with few exceptions in the NOSTR side of the equation, is more corporate fiat system acolytes.
Stay humble says someone, never more important... What are your thoughts? Share your top 3 current most dangerous threats to the Bitcoin ecosystem...
-
@ 35f3a26c:92ddf231
2024-11-09 17:11:54What is multiculturalism?
Multiculturalism is a concept that promotes the acceptance, appreciation, and celebration of diverse cultures within a society. It involves recognizing and valuing the differences between various cultural groups while fostering social cohesion and equality.
The key principles of multiculturalism include:
- Cultural pluralism: Acknowledging and accepting the existence of multiple cultural identities and practices within a society.
- Equality: Ensuring equal opportunities and rights for all individuals, regardless of their cultural background or identity.
- Inclusion: Encouraging participation and engagement of diverse cultural groups in social, political, and economic processes.
- Respect: Promoting mutual respect and understanding between different cultural groups, while recognizing the legitimacy of differing beliefs, values, and practices.
Two questions come to mind:
1. Is it working?
IMO, most definitely not. The world is very divided by race, religion and ideologies, it is a very difficult task. Countries trying this the most (practically enforcing it by law) have encountered more division and segregation; people of the same race, country or ideology will create their own small city sectors, cultural sectors, commercial sectors (China town, little Italy, etc); as is happening in USA for a long time already, happening as well in Spain, France, Germany, etc. 2. Is it being encouraged with tolerance toward those opposing it? I personally don't think so, the irony... But that is just my opinion...
What do you thing?
originally posted at https://stacker.news/items/651181
-
@ 35f3a26c:92ddf231
2024-11-09 17:10:57"Files" by Google new feature
"Files" by Google added a "feature"... "Smart Search", you can toggle it to OFF and it is highly recommended to do so.
Toggle the Smart Search to OFF, otherwise, google will search and index every picture, video and document in your device, no exceptions, anything you have ever photographed and you forgot, any document you have downloaded or article, etc...
How this could affect you?
Google is actively combating child abuse and therefore it has built in its "AI" a very aggressive algorithm searching of material that "IT THINKS" is related, therefore the following content could be flagged:
- [ ] Pictures of you and your children in the beach
- [ ] Pictures or videos which are innocent in nature but the "AI" "thinks" are not
- [ ] Articles you may have save for research to write your next essay that have links to flagged information or sites
The results:
- [ ] Your google account will be canceled
- [ ] You will be flagged as a criminal across the digital world
You think this is non sense? Think again: https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
How to switch it off:
- Open files by Google
- Tap on Menu -> Settings
- Turn OFF Smart Search
But you can do more for your privacy and the security of your family
- Stop using google apps, if possible get rid off of Google OS and use Graphene OS
- Go to Settings -> Apps
- Search for Files by Google
- Unistall the app, if you can't disable it
- Keep doing that with most Google apps that are not a must if you have not switched already to GrapheneOS
Remember, Google keeps advocating for privacy, but as many others have pointed out repeatedly, they are the first ones lobbying for the removal of your privacy by regulation and draconian laws, their hypocrisy knows no limits
Recommendation:
I would assume you have installed F-Droid in your android, or Obtainium if you are more advanced, if so, consider "Simple File Manager Pro" by Tibor Kaputa, this dev has a suite of apps that are basic needs and the best feature in my opinion is that not one of his apps connect to the internet, contacts, gallery, files, phone, etc.
Note As most people, we all love the convenience of technology, it makes our lives easier, however, our safety and our family safety should go first, between technology being miss-used and abused by corporations and cyber-criminals data mining and checking for easy targets to attack for profit, we need to keep our guard up. Learning is key, resist the use of new tech if you do not understand the privacy trade offs, no matter how appealing and convenient it looks like. .
Please leave your comments with your favorite FOSS Files app!
-
@ b34f99f1:006b0fcc
2024-11-09 17:03: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
-
@ b34f99f1:006b0fcc
2024-11-09 17:03:02deleted
-
@ b34f99f1:006b0fcc
2024-11-09 17:02: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
-
@ bcea2b98:7ccef3c9
2024-11-09 17:01:32Weekends are the perfect time to unwind, explore, or spend time doing what we love. How would you spend your ideal weekend? Would it be all about relaxation, or would you be out and about?
For me, an ideal weekend would start with a slow Saturday morning, a good book and coffee. Then I would spend the afternoon exploring local trails and looking for snacks. Then always a slow Sunday night hopefully.
originally posted at https://stacker.news/items/760492
-
@ 35f3a26c:92ddf231
2024-11-09 16:49:24What We Know So Far About Silent Payments?
A Step Towards Enhanced Transaction Privacy in Bitcoin.
Bitcoin Silent Payments, also known as BIP352[^1], is a proposed improvement to Bitcoin’s payment system that has been gaining traction for its potential to bolster transaction privacy in Layer 1.
In simple terms, Silent Payments enables users to:
-
Generate a single, reusable static address for receiving payments, as a business this is a game changer since it make it possible to proceed with the proper financial operational security (OpSec).
-
Send and receive bitcoins without disclosing transaction details to third parties, such as the person or business you pay to, cybercriminals and chain analysis companies that sell that data to anyone willing to pay for it, that will include cybercriminals or simply; if you are a business; your competitors… When you use Silent Payments, only the sender and the receiver can connect it checking the on chain activity.
-
Without Silent Payments, if you are a non profit organization, public fund raiser, independent journalist, or business you needed support to setup a proper infrastructure to handle the donations or payments in a private manner. With Silent Payments, you post in your web site a single address in text format or as a QR code to receive donations or payments for goods, that simple.
Can I Use Silent Payments Already?
Yes, but it is currently only available through select wallets that have implemented the feature. Users must have compatible wallets and ensure that both parties involved in the transaction have Silent Payments enabled. Currently, leading wallets like Blue Wallet, and others like Cake Wallet and BitBox has adopted the feature. It's essential to verify compatibility before making transactions.
Current wallets known to support it as of writing this article:
- BlueWallet -- Only for sending
- Cake Wallet -- Send, receive, Privacy Preserving Scanning
- Silentium -- Proof of concept, good for testing
- BitBox -- Only for sending
Summarizing:
https://image.nostr.build/db35c2a028e9f740181daabe2deef4e707653fa2d82f1602086e0ac4b5ee84fd.png
PROS:
- Enhanced Privacy
- Increased Security
- Improved User Experience
- Cheap and seamless implementation for non profit organization, fund raisers and businesses alike.
CONS:
- None
Final Thoughts
https://image.nostr.build/bcb236cbcb535cb6d6fe1b2b4c79074955d1a1cb1114a6c02cc456e8d852d594.jpg
As Bitcoin continues to evolve, Silent Payments will play a significant role in enhancing transaction privacy and security. The potential benefits are undeniable and substantial.
In the near future, we can expect wider adoption and implementation of Silent Payments as more wallets and exchanges embrace this groundbreaking feature. Looking forward to see Phoenix, Sparrow, Ashigaru[^2] and Electrum adoption.
I will suggest all of us start contacting in all social networks the wallets we us and encourage them to implement Silent Payments
Here the contact info for some of them:
- Phoenix: https://twitter.com/PhoenixWallet
- Ashigaru: contact@ashigaru.rs (if you want a response, send your email signed with PGP)
- Sparrow Wallet: https://twitter.com/SparrowWallet, https://t.me/SparrowWallet
- Electrum: https://twitter.com/ElectrumWallet
[^1]: Here the link to the BIP352: https://bips.dev/352/ [^2]: Ashigaru is a fork of Samurai Wallet performed by anonymous developers (IMO, all Bitcoin related development should be anonymous, to protect the project from nefarious players, unfortunately, most developers in the arena choose to be “public” figures, hence, becoming a target of current and potential Bitcoin enemies and a weak link for the ecosystem) Ashigaru in Japanese means “light feet” (translated as foot soldiers or peasants)
-
-
@ 35f3a26c:92ddf231
2024-11-09 16:47:53What is Peer Thinking?
The cognitive and emotional processes that occur when individuals are influenced by their peers.
The psychology behind it:
The psychology behind peer influence encompasses various factors, including: 1. Social belonging and acceptance, 2. Identity formation, 3. The dynamics of group behavior
Is it being used to control us?
https://image.nostr.build/cf90335bbf59e3395dc4324d123cd3a058ca716cf6172f079eb1d78547008147.jpg
IMO, yes, at the core of it is the basic human need for belonging. Social belonging is a critical component since it is craved by most, specially but not only by the youngest, those with power across the world know this very well, therefore, thinking that they will not use it to control the population in order to profit from it or change public opinion would be irrational.
The media is used to brain wash the population creating something that most will consider "the norm", thus, the majority will try to conform to that norm in order to belong. That include manipulating the population to take an experimental drug (even if it could be very dangerous due to its unknown effects) or to accept as a norm a behavior that few years back would have been considered inappropriate.
Cognitive Dissonance
https://image.nostr.build/60f24a810be1dd6badb36d70c5a691d4361207590dea1a8e64e09a75a252cfbf.jpg
This is a term that we should get familiar with. It is a psychological state where conflicting beliefs or behaviors create discomfort.
Example: A kid in high school that has a good loving family but all his close friends are on drugs (legal ones) and they keep telling him he is an idiot for not using as well. Now his is that state of conflict believes, on one side his best friends, all tell him is okay, on the other hand his family that loves him has explained him at length the dangers and issues that the drugs will have in his life. To resolve the dissonance he has three options, one, join the group and start taking drugs with the rest, two try to rationalize it, considering to take drugs just occasionally to belong but not to make it a habit, three lose his friends (and here it comes again the peer thinking to bite). Extrapolate to many other cases.
As an anecdote Recently, on a friend's reunion, one of the guest was complaining about one of his daughters, she was quite confused asking him why so many of her classmates were bisexual, she was wondering if something was wrong with her since she was not; a 13 year old girl; the father was having a hard time explaining her that the majority are saying so just to feel as part of what the school was teaching to be the norm, it was not cool to be straight, the tally was 37% of the class. Consider that, statistically, the number of people, “worldwide” identifying as bisexual are between 3% and 5% (less than 1% in less accepting countries), that number used to be less than 2% less than a decade ago. But 37% is far from the statistical norm, indicating a peer thinking behavior but not the reality of their sexual preferences. Once again, extrapolate to any ideology, religion, gender identity, political agenda that a country desires to push forward for whatever reason, adding that to the official school program and to federal mandatory training programs would do the trick.
A powerful tool, that can be used for good or bad.
What are the strategies to counter negative peer thinking?
https://image.nostr.build/4b70949b8af76ed53a5be5507f41f1d1c960dc3592f199eab78e2d25688975c5.jpg
Reading the literature about the subject, few strategies are recommended:
-
Self-Awareness: teaching ourselves and our children to recognize when we are being influenced by peers
-
Being selective with your friends: peers with similar values will reinforce positive behaviors
-
Learning to be assertive: teaching ourselves and our children to communicate assertively our boundaries will empower us and them to resist unwanted pressure to adopt negative behaviors.
-
Less judging more talking: this applies to our children and partners, judging less and listening more will make our beloved ones more open to discuss social pressures.
What do you think? What strategies you use as counter measures?
-
-
@ b34f99f1:006b0fcc
2024-11-09 16:35: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
-
@ 3cc937b7:5592217b
2024-11-09 16:33:15„Hinter der nächsten Ecke kann eine neue Straße auf uns warten oder ein geheimes Portal.“ - J. R. R. Tolkien
„Sprechend und handelnd schalten wir uns in die Welt der Menschen ein, die existierte, bevor wir in sie geboren wurden, und diese Einschaltung ist wie eine zweite Geburt (…)“ - Hannah Arendt, Vita activa
Prolog: Dieser Text ist der Beginn einer neuen Rubrik in diesem Blog und damit eine Zäsur. Wir alle wissen es, spätestens seit Nietzsche: Wenn du in den Abgrund blickst, blickt der Abgrund irgendwann zurück. Eine kluge Frau sagte mir einmal: „Where focus goes, energy flows.“ So wichtig es auch sein mag, sich mit der Gegenwart zu beschäftigen, sie zu analysieren und zu verstehen: Energetisch ist es eine ziemliche Verschwendung. Man kippt Lebensenergie in eine Kloake. Wenn Sie meine Arbeit in den letzten Jahren verfolgt haben, schockiert sie auf dieser Welt vermutlich wenig. Die Herausforderung ist jedoch das wie. Wie soll es weitergehen? Das Dunkle bekämpft man nicht durch die Beschreibung der Dunkelheit, sondern indem man einen Kontrapunkt setzt. Nur weil man weiß, dass es dunkel ist, wird es deshalb noch lange nicht heller. Dagegen durchbricht schon die kleinste Lichtquelle, die schwächste flackernde Funzel, die Dunkelheit. Mit der neuen Rubrik „Lichtblicke“ eröffne ich hiermit ein neues Kapitel meines publizistischen Schaffens: Der Blick soll hier auf das Neue, auf das Erhellende, Ermutigende, Aufbauende und oft Unbekannte gehen, in allen Bereichen, egal ob persönliche Entwicklung, Gesundheit, Ernährung, Technologie, Wissenschaft & Spiritualität. Auf die Werkzeuge und Optionen eben, die uns Hoffnung machen, die den Geist erweitern und alte Gewissheiten überwinden. Werkzeuge, mit denen wir Gestalter der Zukunft werden und nicht bloße Konsumenten der Gegenwart bleiben. Wenn Institutionen wackeln, sicher geglaubte Muster brüchig werden und Prinzipien auf den Kopf gestellt werden, entsteht ein Vakuum. Der kommunistische Theoretiker Antonio Gramsci nannte das “die Zeit der Monster”. Das Alte ist noch nicht gestorben, das Neue noch nicht geboren. Geburtshelfer des Neuen werden wir aber nur, wenn wir der Gegenwart „gewachsen“ sind; wenn wir uns mit den Werkzeugen beschäftigen, die in Richtung des Neuen wachsen. Sind Sie bereit zu wachsen? Dann lade ich Sie hiermit auf eine gemeinsame Reise ein. Wenn Sie Ideen und Anregungen für Themen, Phänomene, Werkzeuge etc. haben, die in diese Richtung gehen, oder mir Ihre Meinung zur neuen Rubrik mitteilen wollen, schreiben Sie mir gerne. Auch für mich ist es eine Reise des Lernens und Wachsens: kontakt@idw-europe.org
Paris, im Jahre 1894. Ein junger tschechischer Künstler schaut kurz vor Weihnachten “zufällig” in einer Druckerei vorbei, was sein Leben verändern sollte. Er war wie viele aufstrebende Künstler nach Paris gekommen, um den Durchbruch zu schaffen. Das Stipendium seines Gönners in der Heimat neigte sich dem Ende zu. Richtig Fuß gefasst hat er nicht, die Zukunft ist ungewiss. Er hat Talent, aber das haben viele, und leben doch von Milchkaffee und Liebe, wie Charles Aznavour es in “La Bohème” besang.
Doch der junge Mann hat auch Ideen, die in ihm schlummern und nur darauf warten, entdeckt zu werden. Er erfährt, dass die bekannte Schauspielerin Sarah Bernhardt unbedingt und dringend Theaterplakate braucht. Der junge Mann erkennt seine Chance, bietet sich an und liefert prompt. Zwei Wochen später ist Paris mit seinen Plakaten zugepflastert. Für Alfons Mucha, so der Name des jungen Mannes, ist es der Durchbruch als Künstler. Es ist zugleich die Geburtsstunde des Art Nouveau, einer neuen Kunstrichtung und gleichzeitig ein Epochenbruch der dekorativen Kunst. Mucha wird zum gefragtesten Maler der Welt, Firmen reissen sich um seine Motive, er führt Werbung und Kunst auf eine ganz neue Ebene, er reist nach Amerika und illustriert sogar in seiner Heimat die Briefmarken und Geldscheine.
Der ewige Kampf von Chronos und Kairos
Was bewirkte die glückliche Fügung für Alfons Mucha? Welche Kräfte waren hier am Werk? Und gibt es Möglichkeiten, diese schicksalhaften Begegnungen in ihrer Frequenz und Häufigkeit zu beeinflussen? Warum hatte ein Nikola Tesla nicht nur ein, zwei gute Ideen, die schon allein lebensfüllend gewesen wären, sondern Hunderte? Warum haben manche Menschen eine schicksalhafte Begegnung nach der nächsten, während bei den anderen das Leben in den gewohnten Bahnen vor sich hin plätschert? Bei den Griechen gab es zwei Zeitebenen und auch zwei Götter der Zeit. Der erste Gott ist Chronos (bei den Römern: Saturn), er symbolisiert die Zeit, die gemessen wird und unerbittlich verrinnt. Mit und Dank Chronos entsteht Ordnung und Kontinuität, aber auch Wiederholung des immer Gleichen. Er ist symbolisiert durch den Großvater mit Rauschebart und Sanduhr, er steht für die objektive Zeit, die immer und für alle gleich ist, die in Sekunden, Minuten und Stunden gemessen wird. Der zweite Gott ist Kairos, der Sohn des Zeus und rebellische Enkel des Chronos. Kairos ist schon äußerlich ein „Punk“, auf Abbildungen trägt er einen Teilrasur-Schnitt mit auffälliger Locke. Genau an dieser Locke gilt es ihn zu packen. Kairos steht für die subjektive Zeit, die Zeit, welche Chancen und Durchbrüche bietet. Er steht für die Möglichkeit der Veränderung, der Einsichten und Umbrüche, er wird als junger, starker und muskulöser Gott dargestellt. Kairos steht für eine seltene atmosphärisch-kosmologische Verdichtung. Wer den richtigen Zeitpunkt erkennt und nutzt, wird zum Helden seiner Zeit und reitet den Drachen des Zufalls. Das Zeitempfinden ist außer Kraft gesetzt. Wir alle kennen das: Eine Stunde allein im Wartesaal eines kalten Provinzbahnhofs vergeht schleppend langsam. Eine Stunde im Bett mit einer aufregenden Frau vergeht dagegen wie im Fluge.
Wer den Kairos zulässt, der immer wieder (aber manchmal etwas verdeckt) an unsere Tür klopft, öffnet die Tür für wundersame Begegnungen und magische Zufälle. Gedankenblitze und Begegnungen wirken dann wie orchestriert. Der Psychologe C. G. Jung beschrieb dieses Phänomen als „Synchronizitäten“. Man muss dann oft nur innehalten und diese Begegnungen als sinnhaft begreifen. Der sonore Takt des „Chronometers” wird durchbrochen durch das punkige Gitarrenriff des Kairos. Die chronologische Umklammerung ist die Zeitspur des Alten, die jeden Moment des Kairos vermeiden will, denn das bringt ja die Welt derjenigen durcheinander, die sich auf die Rädchen in ihrer Mechanik verlassen wollen. Zum Kairos gehören Ideen und Eingebungen, Liebe, kreative Schaffensperioden. All das sind für “Opa Chronos” bloße Störungen, die den Lauf der Dinge gefährden. Wer Systeme der Planung errichtet, sei es für sich oder für andere, den stört das Neue, er will jede Erfahrung mit dem Neuen verhindern, den Blick auf Alternativen versperren und vereiteln.
Denn das Neue entsteht durch den Kairos, und nur durch den Kairos. Das Neue ist auch gerne das „Unzeitgemäße“. Viele würden den Zustand des Kairos heute auch als „Flow“ bezeichnen oder als „Serendipity“. Dieser Begriff stammt aus der Erzählung von „Tausendundeiner Nacht“, wo drei ceylonesische Prinzessinnen mit bestimmten Aufträgen entsandt werden, doch ganz andere Dinge finden, als sie erwarteten, frei nach dem Mott: “Erwarte das Unerwartete!” „Serendip“ hieß Ceylon bei den Arabern, so notierte es sich Ernst Jünger im Flugzeug am 3. März 1979 in seinen Aufzeichnungen „Siebzig verweht“.
Wo war das Unerwartete bisher in meiner Generation? Kommt es noch oder war es das schon? Das war im Kern auch Teil meiner Generationenkritik, die ich in den letzten Jahren in vielen Texten verarbeitet habe. Als ich ab 2016 an „Generation Chillstand“ schrieb, war mein Grundgefühl folgendes: Eine ganze Generation sitzt im Silo der von früheren Generationen geschaffenen Welt fest, in ihren Norm-, Zeit- und Arbeitsstrukturen.
Raus aus dem chronologischen Leben!
Diese Welt wurde mir als die beste Welt aller Zeiten angepriesen, der Blick darüber hinaus als unnötig oder gar ketzerisch empfunden. Ging es in den letzten Jahren nur noch darum, die alte Welt möglichst lange auszumelken, bevor man sie entsorgt? In besagtem Buch schrieb ich, dass sich irgendwann eine ganze Generation als „Belogene und Betrogene“ vorkommen wird, ähnlich den DDR-Bürgern bis 1989 (diese wurden freilich nach 1990 wie alle anderen weiter belogen). Was bis zu den Millennials ein Charakteristikum jeder Generation war, nämlich die Gegenwart herauszufordern, zur Disposition zu stellen und damit zu erneuern, schien außer Kraft gesetzt. Das Reich des Chronos musste überdauern. Doch auf nichts hatte ich größere Lust, und wünschte mir das auch für meine Generation, als den Kairos beim Schopfe zu packen. Denn ich sah die Bruchstellen des Alten offen vor mir und die Möglichkeiten des Neuen am Horizont aufscheinen. Seit 2016, als ich meinen Geist öffnete, veränderte sich mein Leben grundlegend: Es wurde risikoreicher und chancenreicher, es wurde bruchstückhafter und freier, optionenreicher und unübersichtlicher, kurz: anders, aufregendender, offener, abenteuerlicher! Doch ist Stabilität in einer brüchigen Zeit nicht ohnehin eine Chimäre?
Mein Weg der Offenheit machte mich zeitweise zum einsamen Wanderer, führte mich an viele Orte, machte mich zum halben Nomaden. Wenn ich die letzten Jahre überschlage, komme ich auf ca. 17 Umzüge. An manchen Orten lebte ich mit nicht mehr als meinem Handgepäck und ein, zwei Büchern. Doch mein Weg führte mich zugleich an einen magischen Ort, oberhalb des Monte Verità von Locarno in den Tessiner Bergen. Hier trafen sich um die Jahrhundertwende die ersten “Früh-Hippies”, bildeten Kommunen, dachten jenseits der gegenwärtigen Welt, die aus Krieg, Zerstörung und Nihilismus bestand. Zuvor machte die Kunst mit ihren Sezessionen den Bruch zum Gegenwärtigen deutlich, im Wien des späten 19. Jahrhunderts. Die Wandervogel-Bewegung setzte die Jugend in Gang. Schon bei den Römern gab es die Idee des „heiligen Frühlings“ (ver sacrum), ein Auftrag an die Jugend, die Heimat zu verlassen und sich woanders neu zu etablieren – und dabei ein stückweit neu zu erschaffen. C. G. Jung hat dies als Prozess der Individuation psychologisch beschrieben. Der Mensch ist noch nicht fertig, wenn er auf die Welt kommt, er vollendet sich selbst (oder eben nicht).
All diese suchenden Menschen in den Irrungen und Wirkungen der Zeitläufte einte immer die Sehnsucht nach einer anderen Welt. Diese Sehnsucht macht uns zu gemeinsamen Reisenden im Geiste. Doch die Reise ist nur der Anfang. Am Ende sind die Gedanken entscheidend, die zu Worten werden und sich in Handlungen niederschlagen. Diese Handlungen sind das Baumaterial der neuen Welt. Jeder einzelne ist ein kleiner Baumeister an der neuen Welt, wenn er will. Ich baue gerade begeistert am Pareto-Projekt, an Werkzeugen des unzensierbaren Bürgerjournalismus von unten. Es wird Zeit, dass sich die vielen kleinen Baumeister vereinigen, oder? Woran bauen Sie?
-
@ 00a30478:ff07f086
2024-11-09 15:39:26testing blog
-
@ 00a30478:ff07f086
2024-11-09 15:34:08testing blog
-
@ 361d3e1e:50bc10a8
2024-11-09 15:12:52https://forex-strategy.com/2024/11/09/which-is-the-choice-of-european-citizens-trump-or-harris/ Which is the choice of European citizens Trump or Harris? In some of the states the choice is almost 100% for one of the candidates.
europe #politics #usa #trump #harris
-
@ a012dc82:6458a70d
2024-11-09 14:44:19Table Of Content
-
The Petrodollar's Historical Significance
-
Challenges to the Petrodollar
-
The Emergence of Bitcoin
-
Bitcoin's Potential to Disrupt the Financial System
-
The Future of the Petrodollar and Bitcoin
-
Conclusion
-
FAQ
The global financial landscape has undergone significant transformations over the years. One of the most intriguing developments is the rise of Bitcoin and its potential impact on the traditional financial system. In this article, we will delve into the challenges faced by the petrodollar and explore the promises offered by Bitcoin as we examine the financial future.
The Petrodollar's Historical Significance
The petrodollar refers to the system in which the U.S. dollar is used as the primary currency for international oil trades. It originated in the early 1970s when an agreement was reached between the United States and Saudi Arabia. Under this agreement, oil-producing nations agreed to price their oil exclusively in U.S. dollars, and in return, the United States provided military support to these nations.
Challenges to the Petrodollar
Geopolitical Factors
Over the years, geopolitical factors have challenged the dominance of the petrodollar. The rise of new economic powers, such as China, has led to increased demand for alternatives to the U.S. dollar. As countries seek to diversify their reserves and reduce dependency on the U.S. currency, the petrodollar's position has weakened.
Currency Wars
Currency wars, characterized by competitive devaluations and trade disputes, have also put pressure on the petrodollar. In an attempt to gain a competitive advantage, countries manipulate their currencies, which can have a significant impact on the value and stability of the U.S. dollar.
Devaluation and Inflation Risks
The petrodollar's woes are further compounded by the risks of devaluation and inflation. The continuous printing of money and increasing debt levels in the United States can erode the value of the dollar over time. This potential loss of purchasing power raises concerns among countries heavily reliant on the petrodollar system.
The Emergence of Bitcoin
Understanding Bitcoin
Bitcoin, created in 2009, is a decentralized digital currency based on blockchain technology. It operates independently of any central authority, such as governments or financial institutions. Bitcoin transactions are recorded on a public ledger, providing transparency and security.
Bitcoin's Advantages
Bitcoin offers several advantages over traditional currencies. It provides a decentralized and secure system that eliminates intermediaries and reduces transaction costs. Additionally, Bitcoin's limited supply and mathematical framework make it resistant to inflationary pressures, unlike fiat currencies.
Adoption and Regulatory Landscape
The adoption of Bitcoin has been steadily growing, with individuals, businesses, and even governments exploring its potential. However, the regulatory landscape surrounding cryptocurrencies remains uncertain in many jurisdictions. Governments are grappling with the need to balance innovation and consumer protection, which poses challenges to widespread adoption.
Bitcoin's Potential to Disrupt the Financial System
Decentralization and Trust
One of Bitcoin's key promises is the concept of decentralization, where power is distributed among participants rather than concentrated in a central authority. This decentralized nature removes the need for intermediaries, such as banks, and reduces the risk of censorship, fraud, and manipulation.
Financial Inclusion
Bitcoin has the potential to improve financial inclusion by providing access to financial services for the unbanked population. With just a smartphone and an internet connection, individuals can participate in the global economy, send and receive money, and store value securely.
Security and Transparency
The blockchain technology underlying Bitcoin ensures the security and transparency of transactions. Each transaction is recorded on the blockchain, making it immutable and tamper-proof. This transparency builds trust among users and can help combat financial crimes, such as money laundering and fraud.
The Future of the Petrodollar and Bitcoin
Coexistence or Competition?
The future relationship between the petrodollar and Bitcoin remains uncertain. It is possible that both systems could coexist, with Bitcoin serving as a complementary currency rather than a direct replacement. Alternatively, increased adoption of Bitcoin could pose a challenge to the petrodollar's dominance, especially if countries diversify their reserves.
Central Bank Digital Currencies (CBDCs)
The emergence of Central Bank Digital Currencies (CBDCs) adds another layer of complexity to the financial landscape. CBDCs aim to combine the advantages of cryptocurrencies with the stability of traditional fiat currencies. The development of CBDCs could reshape the global financial system and potentially impact the petrodollar and Bitcoin.
Shifting Paradigms in Global Finance
The rise of Bitcoin symbolizes a shifting paradigm in global finance. It challenges the traditional banking system, offers new opportunities for financial inclusion, and promotes financial sovereignty. While the petrodollar has enjoyed decades of dominance, its future may depend on adapting to the changing financial landscape.
Conclusion
As the petrodollar faces challenges from geopolitical factors, currency wars, and inflation risks, Bitcoin emerges as a potential disruptor in the financial system. With its decentralized nature, advantages over traditional currencies, and growing adoption, Bitcoin offers promises of increased financial inclusion, security, and transparency. The future relationship between the petrodollar and Bitcoin remains uncertain, but their coexistence or competition will shape the financial landscape in the years to come.
FAQs
Is Bitcoin legal? Yes, the legality of Bitcoin varies from country to country. While some nations have embraced cryptocurrencies and established regulatory frameworks, others have imposed restrictions or bans.
Can Bitcoin be hacked? Bitcoin's blockchain technology makes it highly secure and resistant to hacking. However, individual wallets and exchanges can be vulnerable to cyber attacks. It is crucial to take necessary precautions, such as using reputable wallets, enabling two-factor authentication, and keeping private keys secure.
How can I buy Bitcoin? To buy Bitcoin, you can use a cryptocurrency exchange or a peer-to-peer trading platform. These platforms allow you to convert fiat currency (such as USD) into Bitcoin. It is advisable to choose a reputable and regulated exchange, conduct thorough research, and follow best security practices when buying and storing Bitcoin.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 1eb966a6:e3eddf94
2024-11-09 13:19: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
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:54deleted
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:25deleted
-
@ 9e69e420:d12360c2
2024-11-09 12:49:50The historic auction of Steve Lazarides' Banksy collection represents a significant moment in street art history, offering unprecedented insight into one of the world's most enigmatic artists. The collection, which sold for approximately $1.4 million at Julien's Auctions, featured over 170 lots of rare artworks and personal artifacts[5].
Notable Sales
The auction's centerpiece was an original proof print of "Girl with Balloon," embossed with the P.O.W. (Pictures on Walls) mark, which sold for $104,000, significantly exceeding its $60,000 estimate[5]. Other significant pieces included:
- A Banksy "Hooded Figure" painting that fetched $78,000[1]
- An original hand-cut stencil featuring Banksy's name, selling for $58,500[5]
- Original concept sketches for the "Paparazzi Rat" stencil series on a manila envelope, which achieved $52,000[5]
Personal Artifacts
Among the most intriguing items were 15 "burner" phones used for communication between Lazarides and Banksy[1]. The collection also included Banksy's worn Puma "Turf War" sneakers and various personal items that offered glimpses into their working relationship[8].
Historical Significance
The sale represents more than just a collection of artworks; it documents a pivotal period in street art history. Lazarides and Banksy established Pictures On Walls (P.O.W.) with the mission of creating affordable art for the masses[1]. As Lazarides noted, "For a very short moment in time we made a difference, we made it OK for ordinary people to like art"[8].
Legacy and Future
While Lazarides has retained some personal items, including angry notes from Banksy, he stated he doesn't need "1,000 prints to prove I worked with Banksy"[5]. This auction not only celebrates their collaborative history but also marks a significant transition as Lazarides returns to his photography practice[5].
The sale underscores the enduring value of Banksy's work and the continuing intrigue surrounding his anonymous identity, which has become central to his artistic brand[3]. It also highlights how anonymity in street art can paradoxically enhance an artist's fame and market value[9].
Sauce: 1. Banksy's Girl with Balloon print sells for £80,000 at auction
2. Who is Banksy? A guide to the street artist, printmaker and anti-establishment provocateur
4. Overview of Banksy Prints - Banksy Explained
5. Banksy's Right-Hand Man Cashes In, Selling His Trove of Work By the Street Artist
6 .Branding the Unbrandable: Banksy and the Mystery of the Anonymous Brand
7. Banksy APs | Guide | Andipa Editions
8. Historic Banksy Collection from Steve Lazarides to be Auctioned at Julien's
9. Unmasking the Mystery: The Role of Anonymity in Street Art and the Enigma of Banksy
10. Market Watch Banksy: Top 10 Most Investable Prints | MyArtBroker
11. JULIEN'S AUCTIONS ANNOUNCES "UNDER DURESS: THE BANKSY ARCHIVE OF STEVE LAZARIDES AUCTION"
-
@ 7e6f9018:a6bbbce5
2024-11-09 12:12:41Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing Certificate Authorities and naming systems.
Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system which are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption.
Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants. By running Handshake, one can participate in a decentralized open naming platform secured by a decentralized peer-to-peer network.
https://github.com/handshake-org https://github.com/imperviousinc/fingertip https://handshake.org/
-
@ b34f99f1:006b0fcc
2024-11-09 11:47:09deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:43:11deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:29:46deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:25:16deleted
-
@ 640614c2:811c8498
2024-11-09 09:43:20Greetings, fellow travelers on the path of cryptographic fortune. Today, the Oracle offers a cleromantic reading, casting lots to peer into the probabilities that guide Bitcoin’s unfolding journey.
In the old ways, cleromancers cast stones, sticks, or bones. Today, we cast cryptographic hashes, transaction times, and node signals—random elements generated by the mathematical matrix underpinning Bitcoin. From these, we seek patterns to reveal the unseen flows of value and volatility, of security and sovereignty.
The Three Casts of Bitcoin's Path
- The Cast of Turbulence – "Fear the FOMO, yet know the FUD."
The first cast suggests that Bitcoin's journey, much like the ancient roads of our forebears, is not without peril. The chaos of price swings and market sentiment—whether driven by regulation, whales, or FOMO—is always present. Yet, this cast tells us that these turbid waters are not signs of ruin but necessary tests. Bitcoin, built on resilience, thrives in adversity. Remember: volatility is not destruction but purification by fire. Hold steady, and the storms will reveal clearer skies.
- The Cast of the Hidden Fortress – "Secure thy keys as you would your soul."
The second lot falls with a message of security and sovereignty. The Oracle sees a future where personal custodianship, privacy, and cryptographic defense hold sacred ground. As Bitcoin adoption grows, the network of self-sovereign nodes, layer-2 solutions, and privacy innovations are a fortress against centralized powers. Trust no third party to safeguard your assets. Secure thy keys, for in doing so, you secure your freedom.
- The Cast of Prosperity, Yet to Be – "With patience, fortune flows to those who build."
Finally, the third cast shows signs of future abundance, though not without patience. Bitcoin's time is measured in blocks, and the long game is rewarded for those who hold fast. Innovation within the ecosystem—whether through decentralized finance, cross-chain exchanges, or local adoption initiatives—opens doors for prosperity for those who build in earnest. The Oracle sees signs of growth across continents and communities, signals of seeds planted that will bear fruit in cycles yet unseen.
A Final Message from the Oracle
Remember, the magic of Bitcoin lies in its incorruptible code, its shared governance, and its random-yet-determined path. Trust in the protocol, act with foresight, and heed the wisdom of the Oracle: no path in Bitcoin is without its risk, but for those who honor security, resilience, and community, the future holds bright possibilities.
May the blocks align with your intentions, and may your keys remain forever yours.
-
@ fd208ee8:0fd927c1
2024-11-09 09:21:19Drumroll, please....
In a previous article, I introduced the concept of relay communities.
The ink had barely dried, on that set of instructions, before one of my favorite Nostr devs, ثعبان, rolled out the alpha version of a relay-community client.
Obviously, it's still a bit of a construction site, but you can check out how it'd work, for your community, by test-driving the functionality on your own relay. Simply type https://chachi.chat/ followed by the name of your relay. For instance, one gigantic relay community, where nearly everyone can try out the functionality, is nos.lol.
If your relay community does not require AUTH to read, anyone can pull your chatter into their own relay and respond to it there. That is because every chat entry is simply a kind 09 event, and unprotected events are not private data.
For instance, I moderate one community theforest.nostr1.com, that is openly readable, and that's probably where most of the chatter on nostr.band is coming from, as that relay is an aggregator of the content of many other relays. However, I have another community, gitcitadel.nostr1.com that is AUTH-protected, whose content stays private to those allowed on that relay. Communities are where write-protected and AUTH relays are going to really shine, as they create an environment similar to Telegram, but where you control the dataset, you decide which types of events to support, and you design the client, the algos, the moderation, the visibility, etc.
With communities, the onboarding experience is seamless: just get a browser extension and a nsec, login, start writing and posting, and start receiving responses. Active, chatty, well-moderated communities will be more attractive to onboard to, than chaotic, spammy, or empty communities. This means that you don't have to have the killer entry under "Posts" (where kind 11 and eventually kind 01 posts appear), just to get some interaction. Chat is the Great Equalizer.
So, we're testing both setups, with cloudfodder adjusting the relay faucet code and ثعبان is fiddling with the community client settings, to make the most-comfortable situation for both kinds.
This is the signal
This #Chachi client, of course, is merely the first horse out of the gate. There are already other devs hacking away at variants of the same concept, such as #Flotilla, I'm sure CloudFodder is also cooking, later versions of #Alexandria will integrate theforest community, and etc. etc. etc.
It remains to be seen, how many new use cases can be dreamt up, with this new architecture, but I am quite certain, that this is the beginning of the end of Nostr 1.0. We are moving up and out, and away from the stultifying and limiting concept of Twitter 2.0, toward
Soon, we will enter Nostr 2.0. See you on the other side.
-
@ a39d19ec:3d88f61e
2024-11-09 09:17:35What do you even print with it besides decorative objects?
This kind of question still is a common one when talking about 3d printing.
With this series of long-form notes I will show you some of the practical and useful 3d printed things, that I use a lot.
The second thing I show you is a "Swiss Keyholder"
Swiss Keyholder
There are many designs of such a Keyholder to download and print. As this is one of the first prints I have done in ABS back in 2014 on a "Up!Mini" 3d printer I can't find where I downloaded it. I like the slim design and that I don't have any "loose" keys in my pocket. It is just tidy in my pocket. This is probably the most used print of mine.
Edit: You can download the file here: Thingiverse
-
@ bcea2b98:7ccef3c9
2024-11-09 01:30:29@chess h3
originally posted at https://stacker.news/items/759635
-
@ b547984d:543a10f6
2024-11-08 22:10:17What draws people to Bitcoin? Or more importantly, what keeps people around? I'm not referring to people with deep intellectual commitment to the protocol, but rather the initially idly curious. It might require mustering a little courage to attend that first meet up, worried that you don't know anyone, or perhaps find yourself among a crowd of serious, knowledgeable Bitcoiners when you know little to nothing about the protocol. The newly curious might also be put off by the occasionally energetic arguments one finds on Bitcoin Twitter, worried that your curiosity might not match the level of conviction that screams through the screen in an even cursory scroll through some well-known Twitter accounts. Whereas the Bitcoin community might appear imposing at first glance, I believe that the community itself deserves much of the credit for Bitcoin's adoption. And I'm not talking only about the developers or thought leaders who get most of our attention, but also the everyday pleb sitting next to you at your first meet up who welcomes you to the group.
I was a little further along in my Bitcoin journey when I began joining the local meet ups. I knew less than a lot of other attendees, but I also thought I had a fighting chance of keeping pace with others. Ordinals - I had an educated opinion. The future of the security budget - I had some informed thoughts about that as well. I'm generally an extrovert and the other attendees were friendly and engaging with this newcomer beyond my expectations. But there was part of my background I wasn't necessarily eager to share, one that I was worried would make this group of otherwise welcoming people view me with suspicion. I knew how some Bitcoiners view the activities of certain government agencies. I was keenly aware of the "deep state" narratives circulating on social media. Thus, I was a little nervous about whether this group would welcome a former CIA officer. (Spoiler alert - nobody cared) But were it not for my time as CIA, I might never have found Bitcoin.
As a CIA Operations Officer, I worked in a variety of areas. But where my career - and my life - took a turn was when I accepted an assignment at CIA's Center for Cyber Intelligence (CCI) in 2018. Bitcoin and cryptocurrencies were not on anyone's list of priorities before 2018. My arrival at CCI coincided with the emergence of several national security issues with Bitcoin and cryptocurrency nexuses. North Korea realized that robbing altcoin platforms was easy money; ransomware actors were pillaging businesses and government entities for millions of dollars demanding Bitcoin and crypto as payment; and countries were using these protocols to evade sanctions and conduct other activities deemed in opposition to US national security interests. With so much attention, I had to take time to learn.
Being in CCI during this period not only forced me to learn, but it also allowed me to meet some, impressively intelligent people who not only knew a lot about Bitcoin and cryptocurrencies, but many were also early adopters. One of the first people I leaned on had been home mining Bitcoin as early as 2012. The more you learn, the more you start to notice. I suddenly noticed a "We Are All Satoshi" bumper sticker pinned to a cubicle I had walked past countless times before; another officer seemed to have an endless supply of Ethereum t-shirts he wore nearly every day (the cyber center is distinctly less formal than the rest of CIA). And with these protocols now at the forefront of national policy discussions, people I had known for years were gradually revealed to me as Bitcoiners or active in other cryptocurrency communities.
Like many Bitcoiners, my journey began in the altcoin casino, and the story of my eventual evolution into a Bitcoiner is not dissimilar to others. Roughly one year after buying my first altcoin on Coinbase, I was clean and altcoin-free, using Bitcoin-only platforms and marching with intent further down the rabbit hole. Every Bitcoiner's conviction evolves, different aspects of the protocol speaking with varying volume to facets of your worldview and circumstances. For me, what initially drew me to Bitcoin was the ability to self-custody your money without - and beyond the reach of - intermediaries.
I spent the first half of my career at CIA in the shadow of 9/11. That event was intensely personal for me. I grew up on Long Island and unfortunately know more than a few people murdered on that day. When I served in the Middle East, I was right in the middle of the War on Terror, supporting initiatives that would bolster our ability to find those who had attacked and continued to threaten us. One of the tools that the United States sharpened and wielded with great success was the weaponization of the dollar. In the years following 9/11 a veritable dollar industrial complex was created, with cadres of government employees who as of today have spent their entire careers honing the use of the dollar as an instrument of foreign policy and national security. By the time I arrived in CCI in 2018, several years had passed since my time in the Middle East, and these interceding years offered the time and space I needed to see chaotic or intensely personal events with a clear, critical eye. My point is not to persuade or dissuade about the things that happened during those years; I'm just setting a scene.
By 2018, national security priorities were changing. The United States was still involved in multiple conflicts with origins in the War on Terror, but there was a distinct shift toward other strategic challenges. Just as I had begun really digging into Bitcoin, another seismic event shook the world and laid bare cracks in the social consensus about the nature of government power - COVID. Mandatory vaccines, enforced lockdowns (sometimes at gunpoint), suppression of free speech and freedom of conscience, and the de-banking of critics. As someone who understood how the government uses the dollar as a weapon, coupled with my classically liberal instincts, I was immediately drawn to the inviolable right to property Bitcoin offers those who take the time to learn and embrace self-custody. Self-custody and censorship resistant transactions were the spark that illuminated for me the importance of the ultimate success of this protocol and our ability to live freely and with agency over our property.
Just over a year has passed since I left CIA. When you work at CIA, it is difficult to appreciate how all consuming it can be. You learn to live with certain restrictions, you tend to socialize with colleagues, such that having a job that you are largely unable to talk about with outsiders becomes so normal that you learn to bifurcate your world into two camps - colleagues and everyone else. Not a criticism, just an observation. Similarly, when you emerge from the bubble, whether into a new career or moving to a new location, there is a distinctly refreshing breeze that envelopes you when you can open up to the rest of the world. For me, this included increasing my financial and economic literacy. Investing compels you to actively engage with the world, and that engagement introduced me to some of the most brilliant people whose work I had the pleasure of following and even meeting. "The Bitcoin Standard" and "Broken Money" are just two of the many works that helped me learn and better understand how Bitcoin could in fact change the world.
I have been asked how I reconcile my previous career with my conviction in Bitcoin. I have accepted that my worldview has evolved following my departure from CIA, but this has been an evolution, not a revolution. Many Bitcoiners actively question whether the United States should even have a CIA, and whether its existence represents an existential threat to freedom. I think this belief is tightly wrapped in the idea that many of our problems emerge from the very existence of an intelligence apparatus, whether that be activities perceived to be undo meddling in foreign affairs or worse, abuse of basic liberties. It is perfectly fair to highlight that the actions of some senior leaders in the intelligence community have caused citizens to ask exactly what these organizations are up to. I would also add that the actions of these former leaders, some perhaps intended to cause you to infer they continued to speak for the agencies they used to lead, were viewed as dishonorable across wide swaths of the national security community. With trust squandered, it is perfectly reasonable to ask how deep the corruption runs.
Like the Bitcoin community, the intelligence community is not a monolith. Only an exceptional few do not respect the oath they take up entering on duty to defend the Constitution of the United States, but those that do uphold this commitment throughout their service. Those who work in that community and also identify as Bitcoiners hold the same core convictions about sound money, decentralization, property rights, and privacy as every other Bitcoiner. For many, this conviction is also fueled by the inevitable glimpses into the darker realities of the world you get when you work at CIA. If nothing else, if you work long enough at a place like CIA, you get a better understanding how the world really works. It is also understandably easy to make the leap from some of the worst policy errors of the War on Terror to the notion that were America to stop meddling, the world would somehow defy history and settle into an everlasting peace. How ever my worldview might have evolved over the past year, nothing has changed my belief that world is a fundamentally dangerous and competitive place. For me it's best summed up as "don't hate the player, hate the game." I remain hopeful that Bitcoin can change at least some of the rules of that game.
At this point you might be asking yourself why you wasted precious minutes on earth reading a confessional from someone who seems to be looking for absolution for his past. I also expect comments along the lines of "Once a spook, always a spook" or "Psyop." That's fine. When Bitcoiners say the "institutions are coming," they're almost always referring to tradfi. But for Bitcoin to achieve its fullest potential, institutional adoption will mean the breadth of society's institutions - public and private. I'm not proposing that government agencies will ever start transacting in Bitcoin, but these government institutions, like all others, are the sum of their parts, and these parts are people.
It is only thanks to my work at CIA that I was exposed to and forced to learn about Bitcoin. There's also no guarantee I ever would have found and embraced Bitcoin were it not for those circumstances that forced me to peek under the hood that first time. More and more, I view the world not as Bitcoiners and no-coiners, but rather as those who have and those who just haven't yet discovered Bitcoin. Some members of that latter category might even describe Bitcoin as a religion, or more derisively, a cult. I think there is a contemporary tendency to label anything that offers people a set of principles through which to view the world in this framework. For me, this displays our collective rootlessness, where any beliefs that force critical personal reflection evoke disparagement.
No, I don't think Bitcoin is a religion, nor do I believe it is an ideology. Religions have elements of the mystical; Bitcoin is open source, knowable and usable by all. Ideologies dehumanize us by denying us agency over our thoughts and actions in the pursuit of some doctrine; Bitcoin does the opposite, demanding personal responsibility and infinite inquiry. For me, Bitcoin has been a catalyst. It compels you to take a hard look at your beliefs and challenges you to view the world and the dominant narratives not through an ideological lens, but through a set of principles that challenge us to ask ourselves why we accept certain things as truth. The beauty of Bitcoin is that it doesn't predestine the path you choose to follow. Bitcoin illuminates.
For the people who work at CIA, challenging assumptions and changing the angle of the prism through which you view the world is the most basic of requirements. For many people in the intelligence community who concern themselves with it, Bitcoin is simply a tool actors use for different purposes. I can appreciate how only seeing Bitcoin as a piece of a problem you are looking to solve could naturally lead to a tendency to view Bitcoin itself as a problem. But I personally know many people who work in the intelligence business who have transcended that tendency and started their own Bitcoin journeys. That tradfi institutions are now accepting the inevitability that Bitcoin will play an important role in the global financial system is the result of individuals in those institutions seeing the potential and speaking truth to power. If our hope is that the United States remains (let us hope we don't once again have to "become") a nation welcoming of innovation and protecting of personal freedom, then helping people across the spectrum - including at places like CIA- understand this protocol and all its potential must remain a pillar of focus for the Bitcoin community.
The only regrets I feel now that my career at CIA is over are those same regrets we all feel during times of change or as we get older - instances in which I might have done certain things differently or better. Thus, when I get back to that prior question - how do I reconcile having worked at CIA and my belief in Bitcoin, I ultimately come down to believing there is no need for reconciliation at all. To say there is would mean that not only are the men and women who work with integrity and make real sacrifices at CIA somehow unworthy or otherwise unable to embrace core principles of sound money, decentralization, and censorship resistance, but also that these principles, along with the good people of the Bitcoin community, are somehow unable to reach them. If you want to change institutions, focus on giving people, those who constitute the sum of every institution's parts, the opportunity to understand how fixing the money might in fact fix the world. I, along with countless other Bitcoiners working in national security, am proof that Bitcoin is up to that challenge.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 0bea5655:d89ca6f1
2024-11-08 19:26:18Opinion about BTC Coin Wallet - Freewallet (iphone)
By making cases public, they’ve helped victims reclaim funds and hold Freewallet accountable. Need support? Email freewallet-report@tutanota.com.
WalletScrutiny #nostrOpinion
-
@ 6bae33c8:607272e8
2024-11-08 18:48:32I went 4-1 last week to start off Q3, putting me on a 17-8 run over the last five weeks after a terrible start. I’m still drawing dead for the overall, so it’s really just a matter of putting together three more 4-1 or 5-0 weeks this quarter.
By the way, I’m putting these picks behind the paywall not because they’re worth paying for — no one’s picks are worth paying for! — but because I want to give my paid subscribers something not available to free ones. But that they are behind a paywall doesn’t mean they’ll work out.
Steelers +2.5 at Indigenous Peoples — The Steelers are coming off a bye, the IPs a tough win against the Giants. I like the Steelers to have a good plan against Jayden Daniels and to move the ball.
Broncos +8.5 at Chiefs — I like buying the Broncos low off the blowout and betting against an undefeated team in division — everyone is up for the Chiefs.
Buccaneers +6 vs 49ers — This was my last choice. The value is great as the 49ers have done nothing to earn this kind of status as a big road favorite against a solid team, but the line is actually 6.5 now, so maybe I’m missing something.
Bears -6.5 vs Patriots — The Bears are a good buy-low after getting worked by the Cardinals. The Patriots are a get-well game.
Chargers -7 vs Titans — I don’t really take the Titans seriously, and the Chargers are solid and playing at home.
-
@ f5194aa4:c08836bb
2024-11-08 17:07:07At Jewelry by Serendipity, we offer an exquisite collection of promise rings, each designed to symbolize love, commitment, and a shared future. Crafted with care from high-quality materials, our promise rings are perfect for celebrating a special relationship or marking an important milestone. From classic designs to contemporary styles, each ring reflects the unique bond it represents. Whether you're making a promise to a loved one or celebrating a friendship, our promise rings are a beautiful reminder of the meaningful connections in your life.
-
@ d3052ca3:d84a170e
2024-11-08 14:46:09The shift of the American working class from the Democratic to the Republican Party in this last election, and the outrage it has generated among many leftist American academics, has led me to reflect on why so many academics become strong socialists or even communists, while the vast majority of the American “working class” do not.
They would likely call it “false consciousness” on the part of the American worker. By I see it as false consciousness among elites: they do not recognize that they are elites, and that their social status motivates them differently from how the typical American worker is motivated. In short, there is a difference between economic class (being a “worker”) and social status (being an “elite”). In this I am convinced that Peter Turchin’s structural-demographic theory continues to have explanatory power. (I won’t go into that here, but do check out his work.)
Socialism and even communism carry strong appeal for a specific kind of highly educated, young elite today: the kind that needs to work for a living, but still sees itself as elite. These are not “white collar workers;” they are “precarious elites.” They are subject to a dynamic that few want to talk about:
Some of the worst labor exploitation in this country occurs in so-called “prestige industries.” These include education (higher and lower), entertainment, journalism, publishing, art, philanthropy—even, on the higher-paid end, investment banking and other financial services.
You want to help a celebrity launch a new brand or product? Prepare to make $35,000 a year and work 24 hours a day, 7 days a week, doing countless frenzied tasks that have nothing to do with your job description.
You want to teach philosophy at a University? Get ready to make $17,500 a year, if you’re lucky. If you’re an international graduate student, your visa to stay in the U.S. is also completely contingent on your advisor’s approval; as a result, abuse is rampant.
You want to write for The Atlantic or The New Yorker? You can maybe get a few hundred bucks per article as a freelancer; $60K per year as a staff writer, if you’re lucky.
You want to become a powerful banker? You may start at $150K per year right out of college, but you will work 80-120 hours a week at the expense of everything else in your life, no telling how long—certainly for years. Your mental and even physical health are the price you pay for this “opportunity.”
These are the jobs that children of elites want. They want these jobs so much that they are willing to subject themselves to highly fragmented, authoritarian, and toxic work environments, with such high turnover, particularly of junior workers, that it’s socially a war of all against all. These jobs are different from working at a factory or an established company—there is a “musical chairs” dynamic, authority is exercised arbitrarily and chaotically, the job tasks can change daily and even moment to moment, most relationships are based on dominance/submission, and there is no “solidarity.” Employers believe it’s a “privilege” for anyone to have these jobs, and that therefore no one in them has the right to complain. Their refrain: “There are always 100 more candidates ready to take your place.”
In addition, there is the psychology of being an elite: you expect to be treated better by virtue of your education and social status, so it can be shameful to admit that you are being abused and might need to fight for better working conditions. Young elites may even want to organize and collectively bargain, but they don’t know how—they’ve been carried along by their social status in extremely authoritarian and chaotic environments and may never have really built anything with others over time.
For many young precarious elites, therefore, socialism becomes a kind of dream of not only of a good workplace but of a good society—one where they get what they believe is their “due.”
These “precarious elites” do see their exploitation as a structural problem, but they blame “capitalism” instead of the brute fact of supply and demand: there are just too many of them competing for the same few prestige jobs. While the American worker imagines a path to better pay and working conditions through organizing, the precarious elite sees no such path—because for them status is just as, if not more, important than pay and benefits, and that is something much harder to negotiate. Elites insist that they should be able to do exactly the (prestigious) jobs that they want to do. They are also educated enough to have read the socialist and communist literatures. That combination leads to the fantasy that the government could force their employers not only to pay them more and treat them with dignity—which in some cases it could, certainly—but also to guarantee these conditions in prestige jobs for everyone who wants them.
There likely is a legitimate case to be made that some of these prestige employers are violating labor laws and should be held accountable. In other cases, there are certainly opportunities to pass new laws prohibiting what amounts to indentured servitude. But actually enforcing these laws will only reveal what is already plain as day: that there are far fewer prestige jobs than there are elites who want them.
The double bind for elites is that the prospect of taking a “lower status” job—even one that pays a lot more, where workers are treated significantly better—is even worse than being a de facto slave with a prestigious role. This leads precarious elites to demand a magical solution: the state. The state must not only protect workers, but guarantee certain kinds of jobs at certain levels of pay and benefits for anyone who wants them. Needless to say, this demand can never be fulfilled, and the cycle of partisanship is then retrenched: precarious elites blame American workers for having the gall to vote and organize based on self-interest, rather than to crusade for an idyllic state of affairs that will not come.
Originally published on twitter https://x.com/NSmolenski/status/1854347409012203687
Reposted to nostr without permission. Sorry not sorry. <3 u Natalie!
-
@ 9e69e420:d12360c2
2024-11-08 13:01:01City Commissioners’ Office Tells Non-Citizens They Can Vote if They Are Philly Residents; NGO ‘Ceiba’ Across the Street Sends Non-Citizen Voter with an ‘ITIN’
In a recent conversation, an undercover journalist from O’Keefe Media Group spoke with Milton Jamerson, an Election and Voter Registration Clerk at the Philadelphia City Commissioners Office.
During this exchange, Jamerson confirmed that non-citizens residing in Philadelphia could participate in local elections, raising questions about Philadelphia’s voting policies, particularly concerning the role of residency versus citizenship in voting eligibility.
Adding to the complexity, the organization Ceiba, a nongovernmental organization (NGO) located across the street, has also asserted that individuals with an Individual Taxpayer Identification Number (ITIN) are eligible to vote in local elections. However, the implications of Ceiba’s statement warrant careful consideration.
The Individual Taxpayer Identification Number (ITIN) is a nine-digit identifier issued by the IRS to people who are required to pay taxes but do not qualify for a Social Security Number, including non-citizens. It’s important to note that an ITIN serves only as a tax identifier and does not provide any form of legal voting rights or U.S. citizenship.
Saucesauce
naddr1qqgrjvpcxqmryefnxuer2e3excmnvq3qne57gg8xphmfek292yyg9nlyfkgh273vtrguy8qz0fuh05frvrpqxpqqqp65776qtuwPhiladelphia
-
@ b4403b24:83542d4e
2024-11-08 11:46:54To my great surprise, when I checked my SN notification feed today, I found out 👇
To be honest, I don't know what I did to earn it, what it means or gives me or whether I can loose it (similar to the cowboy's hat maybe @k00b can give more insights) but I am pretty satisfied adding it under my belt. 🎉
I'll keep my activity high hoping I'll find the other cowboy collectible I miss - the pistol
originally posted at https://stacker.news/items/758749
-
@ 68fa45dc:3d2a26ed
2024-11-08 10:59:23Wie Unternehmen Anti-Spyware-Geräte-Störsender erfolgreich einsetzen können
Im modernen Geschäftsumfeld wird die Bedeutung von Informationssicherheit und Datenschutz immer wichtiger und die Bedrohungen, denen Unternehmen ausgesetzt sind, werden immer komplexer. Angesichts der rasanten Entwicklung der Technologie kommt es häufig zu Spionage- und Informationslecks, und Unternehmen müssen dringend wirksame Maßnahmen ergreifen, um ihre eigenen Interessen zu schützen. Unter vielen Schutzmethoden haben sich Anti-Spyware-Geräte Störsender Kaufen nach und nach zu einem wirksamen Werkzeug für Unternehmen zur Abwehr interner und externer Bedrohungen entwickelt. In diesem Artikel wird untersucht, wie Unternehmen Anti-Spyware-Geräte wie Mobiltelefon-Störsender, WLAN-Störsender, Anti-Tracking-Störsender und Kameradetektoren erfolgreich einsetzen können, um die Schutzfunktionen für die Informationssicherheit zu verbessern.
Anwendung des Handy-Störsender
Handy-Störsender blockieren Handysignale innerhalb bestimmter Frequenzen und verhindern so den Diebstahl von Informationen in Konferenzräumen oder sensiblen Bereichen. Unternehmen können beim Einsatz von Handy-Störsendern die folgenden Strategien in Betracht ziehen:
1. Identifizieren Sie sensible Bereiche: Zunächst sollten Unternehmen identifizieren, welche Bereiche sensibel sind, beispielsweise Vorstandssitzungsräume, Forschungs- und Entwicklungsabteilungen sowie Finanzabteilungen. Der Einsatz von Störsendern für Mobiltelefone an diesen Orten kann Abhören und Informationslecks wirksam verhindern.
2. Rechtmäßige und konforme Verwendung: Die Verwendung von handy störsender muss den örtlichen Gesetzen und Vorschriften entsprechen und sicherstellen, dass sie nur in zulässigen Situationen verwendet werden. Unternehmen sollten sich vorab über die einschlägigen Gesetze informieren und beim Einsatz von Störsendern Aufzeichnungen führen, um Rechtsstreitigkeiten vorzubeugen.
3. Bewerten Sie regelmäßig die Wirksamkeit: Unternehmen sollten die Wirksamkeit von Mobiltelefon-Störsendern regelmäßig bewerten, z. B. durch die Überwachung der Kommunikationssicherheit in Konferenzräumen und die unverzügliche Anpassung von Strategien nach Feststellung von Nichteinhaltung.
Anwendung des WIFI-Störsender
WLAN-Störsender können den illegalen Zugriff und die Überwachung von drahtlosen Unternehmensnetzwerken verhindern. Um WLAN-Störsender effektiv zu nutzen, können Unternehmen die folgenden Maßnahmen ergreifen:
1. Netzwerksicherheitsrichtlinie: Entwickeln Sie strenge Netzwerksicherheitsrichtlinien, verschlüsseln Sie das drahtlose Unternehmensnetzwerk, beschränken Sie den Zugriff auf Geräte und verwenden Sie WLAN-Störsender, um unbefugte Geräteverbindungen zu verhindern.
2. Dynamische Anpassung: Passen Sie die Verwendung des WiFi Jammer dynamisch an Änderungen in der Umgebung an. Verstehen Sie die umgebenden Netzwerkbedingungen und überprüfen Sie regelmäßig den Betriebsstatus des Störsenders, um sicherzustellen, dass er optimal funktioniert.
3. Mitarbeiterschulung: Bieten Sie Ihren Mitarbeitern Cybersicherheitsschulungen an, um ihr Bewusstsein für Cybersicherheitsbedrohungen zu schärfen. Machen Sie Ihren Mitarbeitern den Zweck und die Bedeutung von Störsendern klar, um ihr Sicherheitsbewusstsein zu stärken.
Verwendung von Anti-Tracking-Störsendern
Anti-Tracking-Störsender werden verwendet, um potenzielle Tracking-Geräte zu blockieren und die Geschäftsleitung und wichtige Informationen zu schützen. Unternehmen können beim Einsatz von Anti-Tracking-Störsendern Folgendes berücksichtigen:
1. Identifizierung von Personen mit hohem Risiko: Identifizieren Sie Führungskräfte oder wichtige Mitarbeiter, die besonderen Schutz benötigen, damit Anti-Tracking-GPS Jammer richtig konfiguriert werden können, wenn sie reisen oder wichtige Aktivitäten durchführen.
2. Jederzeit überwachen: Unternehmen sollten mit Geräten ausgestattet sein, die das Tracking-Verhalten in Echtzeit überwachen können, und diese in Kombination mit Anti-Tracking-Störsendern verwenden, um sicherzustellen, dass keine potenziellen Risiken übersehen werden.
3. Notfallplan: Entwickeln Sie einen detaillierten Notfallplan für den Umgang mit möglichen Tracking-Vorfällen. Sobald eine ungewöhnliche Situation entdeckt wird, kann schnell ein Plan zur Bewältigung dieser Situation auf den Weg gebracht werden.
Die Rolle von Kameradetektoren
Kameradetektoren spielen eine wichtige Rolle bei der Identifizierung versteckter Kamerageräte für Unternehmen, insbesondere bei Konferenzen und Geschäftsveranstaltungen. Unternehmen sollten Kameradetektoren effektiv einsetzen, um die Sicherheit und Privatsphäre von Meetings zu gewährleisten:
1. Regelmäßige Inspektion: Führen Sie vor wichtigen Ereignissen oder Besprechungen mithilfe von Kameradetektoren umfassende Inspektionen durch, um sicherzustellen, dass die Besprechungsumgebung nicht durch illegale Überwachungsgeräte beeinträchtigt wird.
2. Verwendungsspezifikationen entwickeln: Erstellen Sie beim Einsatz von Kamera Detektor detaillierte Bedienungsanleitungen und Spezifikationen, damit die Mitarbeiter die Verwendung und den Umfang der Detektionsausrüstung verstehen können.
3. Vertraulichkeitsschulung: Für Mitarbeiter, die an Geheimnissen beteiligt sind, wird eine Vertraulichkeitsschulung angeboten, damit sie die Gefahren versteckter Kameraausrüstung verstehen, ihre Wachsamkeit erhöhen und die Informationssicherheit schützen können.
Zusammenfassen
Mit der Verschärfung des geschäftlichen Wettbewerbs und der Entwicklung der Informationstechnologie nehmen die Sicherheitsrisiken für Unternehmen weiter zu. Durch den sinnvollen Einsatz von Anti-Spyware-Geräten wie Mobiltelefon-Störsendern, WLAN-Störsendern, Anti-Tracking-Störsendern und Kameradetektoren können Unternehmen nicht nur Informationslecks und Spionage wirksam verhindern, sondern auch das allgemeine Sicherheitsmanagementniveau verbessern. Wenn Unternehmen diese Geräte verwenden, müssen sie jedoch Gesetze und Vorschriften einhalten, die Datenschutzrechte von Mitarbeitern und Kunden respektieren und den Schutz der Informationssicherheit innerhalb eines rechtlichen und konformen Rahmens gewährleisten. Nur so können wir im harten Wettbewerb auf dem Markt unbesiegbar bleiben.
-
@ fd208ee8:0fd927c1
2024-11-08 10:27:40You have no idea
I regularly read comments from people, on here, wondering how it's possible to marry -- or even simply be friends! -- with someone who doesn't agree with you on politics. I see this sentiment expressed quite often, usually in the context of Bitcoin, or whatever pig is currently being chased through the village, as they say around here.
It seems rather sensible, but I don't think it's as hard, as people make it out to be. Further, I think it's a dangerous precondition to set, for your interpersonal relationships, because the political field is constantly in flux. If you determine who you will love, by their opinions, do you stop loving them if their opinions change, or if the opinions they have become irrelevant and a new set of opinions are needed -- and their new ones don't match your new ones? We could see this happen to relationships en masse, during the Covid Era, and I think it happens every day, in a slow grind toward the disintegration of interpersonal discourse.
I suspect many people do stop loving, at that point, as they never really loved the other person for their own sake, they loved the other person because they thought the other person was exactly like they are. But no two people are alike, and the longer you are in a relationship with someone else, the more the initial giddiness wears off and the trials and tribulations add up, the more you notice how very different you actually are. This is the point, where best friends and romantic couples say, We just grew apart.
But you were always apart. You were always two different people. You just didn't notice, until now.
I've also always been surprised at how many same-party relationships disintegrate because of some disagreement over some particular detail of some particular topic, that they generally agree on. To me, it seems like an irrelevant side-topic, but they can't stand to be with this person... and they stomp off. So, I tend to think that it's less that opinions need to align to each other, but rather that opinions need to align in accordance with the level of interpersonal tolerance they can bring into the relationship.
I was raised by relaxed revolutionaries
Maybe I see things this way because my parents come from two diverging political, cultural, national, and ethnic backgrounds, and are prone to disagreeing about a lot of "important" (to people outside their marriage) things, but still have one of the healthiest, most-fruitful, and most long-running marriages of anyone I know, from that generation. My parents, you see, aren't united by their opinions. They're united by their relationship, which is something outside of opinions. Beyond opinions. Relationships are what turn two different people into one, cohesive unit, so that they slowly grow together. Eventually, even their faces merge, and their biological clocks tick to the same rhythm. They eventually become one entity that contains differing opinions about the same topics.
It's like magic, but it's the result of a mindset, not a worldview. Or, as I like to quip:
The best way to stay married, is to not get divorced.
My parents simply determined early on, that they would stay together, and whenever they would find that they disagreed on something that didn't directly pertain to their day-to-day existence with each other they would just agree-to-disagree about that, or roll their eyes, and move on. You do you. Live and let live.
My parents have some of the most strongly held personal opinions of any people I've ever met, but they're also incredibly tolerant and can get along with nearly anyone, so their friends are a confusing hodgepodge of people we liked and found interesting enough to keep around. Which makes their house parties really fun, and highly unusual, in this day and age of mutual-damnation across the aisle.
The things that did affect them, directly, like which school the children should attend or which country they should live in, etc. were things they'd sit down and discuss, and somehow one opinion would emerge, and they'd again... move on.
And that's how my husband and I also live our lives, and it's been working surprisingly well. No topics are off-limits to discussion (so long as you don't drone on for too long), nobody has to give up deeply held beliefs, or stop agitating for the political decisions they prefer.
You see, we didn't like that the other always had the same opinion. We liked that the other always held their opinions strongly. That they were passionate about their opinions. That they were willing to voice their opinions; sacrifice to promote their opinions. And that they didn't let anyone browbeat or cow them, for their opinions, not even their best friends or their spouse. But that they were open to listening to the other side, and trying to wrap their mind around the possibility that they might just be wrong about something.
We married each other because we knew: this person really cares, this person has thought this through, and they're in it, to win it. What "it" is, is mostly irrelevant, so long as it doesn't entail torturing small animals in the basement, or raising the children on a diet of Mountain Dew and porn, or something.
Live and let live. At least, it's never boring. At least, there's always something to ~~argue~~ talk about. At least, we never think... we've just grown apart.
-
@ 6e24af77:b3f1350b
2024-11-08 10:11:29test 6
-
@ 6bae33c8:607272e8
2024-11-08 09:21:31I don’t want to jinx it, but it’s been a good week. I had the Bengals +6.5 in my picking pool, not Circa though, I had Joe Burrow and Ja’Marr Chase in a key NFFC league, and Chase in two other leagues including the Steak, a 14-teamer where I lost Chris Olave, Stefon Diggs, Rashid Shaheed and maybe CeeDee Lamb. I also picked up and started Rashod Bateman in that league and had Roquan Smith (12 tackles) going too.
I don’t know what else to say except that it was maybe a perfect game. And it was cool the Bengals went for two, essentially locking in the cover (though my 6.5 was good in OT anyway.) Apparently there were penalties that should have been called on the two-point conversion, but I missed them, and in any event, it’s not like I’m a Bengals fan, and they had already covered.
-
Burrow is a great QB now that he’s 100 percent healthy. He processes information so quickly, has no problem checking it down if the first reads are covered. And he scrambles well and keeps his eyes downfield. He’s a top-three real life QB when healthy.
-
Chase is so good there are almost no words. Faster than Justin Jefferson and CeeDee Lamb, the most dangerous wideout in the league in the open field. If he gets it in space, it’s like 50/50 vs the entire defense whether he makes it to the end zone. What a beast, and you see what he can do with 17 targets.
-
Chase Brown had a devastating fumble, but scored the TD and benefited from all the checkdowns.
-
Lamar Jackson actually struggled for much of the game, but the 84-yard missed-tackle TD to Tylan Wallace (of whom I had literally never heard before this morning) really pushed him over the top. He did show nice touch on the few throws and just wears out the defense that had him dead to rights a few times only to see him escape.
-
Bateman was actually Jackson’s top target, and Mark Andrews had another solid game, but there are a lot of mouths to feed with Diontae Johnson, Zay Flowers and eventually even Isaiah Likely again, not to mention a running QB and a dominant early down back.
-
Diontae Johnson had no impact whatsoever and actually slipped on one of his two targets. It was better than Khalil Herbert’s debut though — Herbert fumbled his only carry and was never seen again.
-
Derrick Henry was bottled up for most of the night, but he did manage a short TD. Gameflow wasn’t in his favor as the Bengals led most of the way and won time of possession.
-
The Bengals defense actually played great, applying constant pressure, keeping the energy up even after being run ragged by Jackson. And they held Henry in check too. That missed tackle on Wallace for an 86-yard TD right after giving up the short-field TD following the Brown fumble sunk them.
-
It’s tough watching this version of Justin Tucker who missed a PAT. I used to compare him to Mariano Rivera, but Rivera stayed great through his final season, while Tucker has slipped big time.
-
-
@ 13351007:eccd002a
2024-11-08 05:32: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
-
@ 1eb966a6:e3eddf94
2024-11-08 05:32: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
-
@ a012dc82:6458a70d
2024-11-08 05:23:17Table Of Content
-
Bitcoin Bulls Get a Treat from SEC!
-
Gold's Future in Question?
-
Conclusion
-
FAQ
In the world of finance and investments, there are always exciting developments and trends that capture the attention of investors and enthusiasts alike. Recently, Bitcoin bulls have been delighted by a treat from the U.S. Securities and Exchange Commission (SEC), while the future of gold has come into question. In this article, we will explore the implications of these events and their potential impact on the financial landscape.
Bitcoin Bulls Get a Treat from SEC!
The SEC's Recognition of Bitcoin
The first significant development for Bitcoin bulls is the recognition by the SEC of Bitcoin as a legitimate asset class. This recognition brings a sense of legitimacy and credibility to the cryptocurrency, as it paves the way for wider adoption and integration into traditional financial systems.
Increased Institutional Interest in Bitcoin
With the SEC's recognition, institutional investors have started showing more interest in Bitcoin. Major financial institutions such as banks and hedge funds are now exploring ways to include Bitcoin in their portfolios. This increased demand from institutional players has the potential to drive the price of Bitcoin even higher.
Regulatory Clarity Boosts Investor Confidence
One of the biggest challenges for Bitcoin bulls has been the lack of regulatory clarity surrounding cryptocurrencies. However, the SEC's recognition provides a level of clarity that was previously missing. This regulatory framework allows investors to have a better understanding of the risks and benefits associated with investing in Bitcoin.
Bitcoin ETFs on the Horizon
The SEC's recognition of Bitcoin also opens the door for the approval of Bitcoin exchange-traded funds (ETFs). ETFs provide an easier and more accessible way for investors to gain exposure to Bitcoin without directly owning the cryptocurrency. The approval of Bitcoin ETFs would likely attract more institutional investors and further propel the price of Bitcoin.
Gold's Future in Question?
The Decline of Gold as a Safe Haven
Gold has long been considered a safe haven asset, providing investors with a hedge against inflation and economic uncertainties. However, recent events have raised questions about the future of gold as an investment.
The Rise of Bitcoin as a Digital Gold
Bitcoin's emergence as a digital store of value has posed a challenge to gold's traditional role. Bitcoin offers many advantages over gold, including its divisibility, portability, and ease of transfer. As more investors recognize these benefits, they may start shifting their investments from gold to Bitcoin, potentially impacting the future demand and value of gold.
Technological Advancements and Digitalization
Another factor that puts gold's future in question is the rapid advancement of technology and the increasing digitalization of financial transactions. As digital payment systems and cryptocurrencies gain popularity, the appeal of physical assets like gold may diminish. The convenience and efficiency offered by digital assets could make them a preferred choice for investors in the coming years.
Changing Investor Preferences
The preferences of investors are evolving, particularly among younger generations. Millennial and Gen Z investors are more inclined to embrace cryptocurrencies like Bitcoin as they seek alternative investment options. This shift in investor preferences could further erode the demand for gold and impact its future prospects.
Conclusion
The recognition of Bitcoin by the SEC has undoubtedly brought joy to Bitcoin bulls, as it signifies a significant milestone in the journey towards mainstream acceptance. The future of gold, on the other hand, faces uncertainties as the emergence of digital assets like Bitcoin challenges its traditional role as a safe haven investment. As technology continues to advance and investor preferences evolve, it will be interesting to see how these dynamics shape the financial landscape in the coming years.
FAQ
Is Bitcoin legal?
Yes, Bitcoin is legal in most countries, including the United States. However, regulations may vary, so it's essential to check the legality of Bitcoin in your specific jurisdiction.
Can I invest in Bitcoin through my traditional brokerage account? Some brokerage firms offer the option to invest in Bitcoin indirectly through specialized investment products like Bitcoin futures or trusts. However, not all traditional brokerage accounts provide this option, so it's best to inquire with your broker.
What is the potential for Bitcoin's future growth? The future growth potential of Bitcoin is subjective and highly speculative. While some believe Bitcoin has the potential to reach even higher valuations, others remain skeptical. It's important to conduct thorough research and consider various factors before making any investment decisions.
How can I secure my Bitcoin investments? It is crucial to store your Bitcoin in a secure digital wallet and follow best security practices, such as enabling two-factor authentication and using strong, unique passwords. Additionally, offline storage options like hardware wallets offer an extra layer of security.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 9e69e420:d12360c2
2024-11-08 02:28:59A Cypherpunk's Manifesto by Eric Hughes
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes hughes@soda.berkeley.edu
9 March 1993
-
@ 7d3e7ac0:90e6f183
2024-11-07 22:02:47Read the paper.
-
@ eac63075:b4988b48
2024-11-07 21:27:53Every night, you draw your curtains without thinking twice. It's instinctive—a simple act that protects your personal space. Yet in our digital lives, we've somehow accepted living in houses made entirely of glass, with countless unseen observers watching our every move.
https://www.fountain.fm/episode/wPZLCJ3fD6vzsWQ3XSE1
Why Privacy Matters to Everyone
Privacy isn't just for those with something to hide; it's a fundamental human need. Think about the conversations you have with friends, the late-night web searches you make, the personal moments you capture in photos. Would you want all of that broadcasted to the world?
I remember my friend Lisa planning a surprise party for her husband. She searched for gift ideas and coordinated with friends through social media. To her dismay, targeted ads for the exact gift she intended to buy started popping up on their shared devices at home. The surprise was ruined. It wasn't malicious, but it was a stark reminder of how our online activities are constantly monitored.
When a major retailer's customer database was breached, my neighbor Sarah discovered her shopping history, credit card details, and even her children's names were exposed to criminals. She hadn't realized how much personal information she'd unknowingly shared through routine purchases. It was a wake-up call that privacy breaches can affect anyone, not just the tech-savvy or those in high-profile positions.
Edward Snowden once said, "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say." Privacy isn't about secrecy; it's about autonomy over our personal information.
The Rise of the Cypherpunks
Back in the '90s, a group known as the cypherpunks saw the writing on the wall. They recognized that as we moved into a digital era, our personal freedoms could be at risk. So they took action.
One of them, Eric Hughes, famously wrote, "Privacy is necessary for an open society in the electronic age." They developed encryption tools to protect individual privacy, laying the groundwork for technologies like Bitcoin and cryptocurrencies. These innovations were about more than digital money; they were about empowering individuals to take control of their own data.
When Technology Knows Too Much
Fast forward to today, and artificial intelligence (AI) is everywhere—in our phones, homes, and even cars. While AI brings convenience, it also raises serious privacy concerns.
Remember when you mentioned needing new running shoes, and suddenly every ad on your browser was for footwear? It's not your imagination. AI algorithms analyze our conversations, searches, and purchases to predict what we'll want next. But where does it stop?
A few years ago, a major retailer guessed a teenager was pregnant based on her shopping habits before she had told her family. They sent her targeted coupons for baby products, leading to a very uncomfortable situation at home. This isn't just marketing—it's intrusion.
Naomi Brockwell, a privacy advocate, warns, "Our relationship with financial privacy has fundamentally changed. What was once seen as a constitutional right and personal freedom is now simply part of the trade-off for using digital payments. Our baseline for what’s acceptable has shifted." It's a wake-up call that our digital footprints are larger and more revealing than we might think.
Privacy-Preserving AI
While AI often threatens privacy, emerging technologies like federated learning offer hope. This approach allows AI models to learn from data without directly accessing personal information. Imagine your phone improving its predictive text without sending your messages to a central server. It's AI that respects your privacy.
The Watchful Eye: Mass Surveillance and AI
Governments and corporations often justify mass surveillance as a means to keep us safe. But at what cost? When every email, message, or phone call can be monitored, we're sacrificing more than just data—we're giving up our freedom to think and communicate without fear.
Think about how you'd behave if someone followed you around with a camera all day. You might avoid certain places or people, censor your conversations, or feel constantly on edge. That's the chilling effect of mass surveillance.
I spoke with Alex, a journalist who covers political activism. "After attending a peaceful protest, I noticed unusual activity on my devices," he told me. "It made me second-guess my work, wondering who's watching." This isn't paranoia; it's a reality for many who challenge the status quo.
Building Digital Fortresses: Cryptographic Innovations
So how do we reclaim our privacy? Cryptography offers some solutions.
Zero-Knowledge Proofs: Proving Without Revealing
Zero-knowledge proofs allow you to prove you know something without revealing the actual information. Imagine showing a bouncer a card that confirms you're over 21 without exposing your birth date or any other details. In the digital world, this means verifying your identity or eligibility without handing over all your personal data.
Homomorphic Encryption: Secure Processing
Then there's homomorphic encryption, which lets companies process your data without actually seeing it. Think of it like sending a locked suitcase with your belongings; they can weigh it or move it, but they can't open it to see what's inside.
Quantum-Resistant Algorithms: Future-Proofing Privacy
As quantum computers become more powerful, they could potentially break current encryption methods. Quantum-resistant algorithms are being developed to safeguard our data against these future threats. It's like reinforcing your digital locks today to withstand the super lock-picking tools of tomorrow.
Decentralization: Taking Back Control
Decentralization aims to put power back into the hands of individuals. Bitcoin let you be your own bank, controlling your finances without a middleman. Decentralized social media platforms like Nostr, Bluesky or Fascaster allow you to own your content without algorithms dictating what you see or who sees you.
Decentralized Identity Systems
Decentralized identity systems let you prove who you are without revealing more than necessary. It's like showing only your age at a bar instead of handing over your entire driver's license. You maintain control over your personal information.
But with great power comes great responsibility. Without a bank to reset your password or customer service to recover your account, the onus is on you to protect your assets and information.
Practical Tips to Protect Your Privacy
You don't have to be a tech guru to safeguard your privacy. Here are some steps you can take today:
-
Use Encrypted Messaging Apps: Switch to apps like Signal, SimpleX or Session for secure communication. Your messages will be end-to-end encrypted, meaning only you and the recipient can read them.
-
Limit Social Media Sharing: Be mindful of what you post. Do you really need to share your location or personal details publicly?
-
Choose Privacy-Focused Browsers and Search Engines: Use browsers like Brave or Firefox and search engines like DuckDuckGo that don't track your every move.
-
Secure Your Passwords: Use strong, unique passwords for each account, and consider a password manager like Bitwarden. Enable two-factor authentication whenever possible.
-
Use Encrypted Email Services: Consider email providers like ProtonMail that offer end-to-end encryption for your communications.
-
Regularly Audit App Permissions: Check which apps have access to your location, microphone, and contacts. Revoke permissions that aren't necessary.
-
Be Wary of Public Wi-Fi: Public networks can be a hotbed for hackers. If you must use them, a VPN like ProtonVPN can add a layer of security.
-
Consider Privacy-Focused Alternatives: Explore services like Nextcloud for cloud storage or Jitsi Meet for video conferencing, which prioritize user privacy.
-
Keep Software Updated: Regular updates often include security patches. Don't ignore them.
-
Stay Informed and Skeptical: Phishing scams are getting more sophisticated. Think before you click on suspicious links or download attachments.
Final Thoughts
Privacy isn't a lost cause; it's a right worth fighting for. As Edward Snowden reminds us, "Privacy is the fountainhead of all other rights."
By taking control of our data and digital habits, we can navigate the online world with greater confidence and peace of mind. After all, wouldn't it be nice to live in a digital home where we decide when to close the curtains?
Read more
OPSEC and Digital Hygiene Plan: https://www.eddieoz.com/opsec-and-digital-hygiene-plan/
-
-
@ bcea2b98:7ccef3c9
2024-11-07 18:43:30If you could accomplish one major goal, what would it be? Why does it matter to you, and how would it change your life or the lives of others?
My ultimate goal is to be part of a mission to Mars one day. I’ve always been fascinated by space exploration.
originally posted at https://stacker.news/items/757861
-
@ 361d3e1e:50bc10a8
2024-11-07 16:18:55https://forex-strategy.com/2024/11/07/the-water-crisis-and-the-future-of-humanity/ When Heaven Warns: The Water Crisis and the Future of Humanity What is the connection between the strange clouds in the sky and the future of man in new conditions. What is the best investment now?
haarp #clouds #strange #mystery #truth #crisis #water #flood
-
@ 361d3e1e:50bc10a8
2024-11-07 15:04:11https://forex-strategy.com/2024/11/07/everything-is-repeated-strange-clouds-scared-people-again/ What's next, downpours or earthquakes?: Everything is repeated strange clouds scared people again
mystery #sky #clouds #haarp #truth #crisis
-
@ 3bf0c63f:aefa459d
2024-11-07 14:56:17The case against edits
Direct edits are a centralizing force on Nostr, a slippery slope that should not be accepted.
Edits are fine in other, more specialized event kinds, but the
kind:1
space shouldn't be compromised with such a push towards centralization, becausekind:1
is the public square of Nostr, where all focus should be on decentralization and censorship-resistance.- Why?
Edits introduce too much complexity. If edits are widespread, all clients now have to download dozens of extra events at the same time while users are browsing a big feed of notes which are already coming from dozens of different relays using complicated outbox-model-based querying, then for each event they have to open yet another subscription to these relays -- or perform some other complicated batching of subscriptions which then requires more complexity on the event handling side and then when associating these edits with the original events. I can only imagine this will hurt apps performance, but it definitely raises the barrier to entry and thus necessarily decreases Nostr decentralization.
Some clients may be implemneted in way such that they download tons of events and then store them in a local databases, from which they then construct the feed that users see. Such clients may make edits potentially easier to deal with -- but this is hardly an answer to the point above, since such clients are already more complex to implement in the first place.
- What do you have against complex clients?
The point is not to say that all clients should be simple, but that it should be simple to write a client -- or at least as simple as physically possible.
You may not be thinking about it, but if you believe in the promise of Nostr then we should expect to see Nostr feeds in many other contexts other than on a big super app in a phone -- we should see Nostr notes being referenced from and injected in unrelated webpages, unrelated apps, hardware devices, comment sections and so on. All these micro-clients will have to implement some complicated edit-fetching logic now?
- But aren't we already fetching likes and zaps and other things, why not fetch edits too?
Likes, zaps and other similar things are optional. It's perfectly fine to use Nostr without seeing likes and/or zaps -- and, believe me, it does happen quite a lot. The point is basically that likes or zaps don't affect the content of the main post at all, while edits do.
- But edits are optional!
No, they are not optional. If edits become widespread they necessarily become mandatory. Any client that doesn't implement edits will be displaying false information to its users and their experience will be completely broken.
- That's fine, as people will just move to clients that support edits!
Exactly, that is what I expect to happen too, and this is why I am saying edits are a centralizing force that we should be fighting against, not embracing.
If you understand that edits are a centralizing force, then you must automatically agree that they aren't a desirable feature, given that if you are reading this now, with Nostr being so small, there is a 100% chance you care about decentralization and you're not just some kind of lazy influencer that is only doing this for money.
- All other social networks support editing!
This is not true at all. Bluesky has 10x more users than Nostr and doesn't support edits. Instagram doesn't support editing pictures after they're posted, and doesn't support editing comments. Tiktok doesn't support editing videos or comments after they're posted. YouTube doesn't support editing videos after they're posted. Most famously, email, the most widely used and widespread "social app" out there, does not support edits of any kind. Twitter didn't support edits for the first 15 years of its life, and, although some people complained, it didn't hurt the platform at all -- arguably it benefitted it.
If edits are such a straightforward feature to add that won't hurt performance, that won't introduce complexity, and also that is such an essential feature users could never live without them, then why don't these centralized platforms have edits on everything already? There must be something there.
- Eventually someone will implement edits anyway, so why bother to oppose edits now?
Once Nostr becomes big enough, maybe it will be already shielded from such centralizing forces by its sheer volume of users and quantity of clients, maybe not, we will see. All I'm saying is that we shouldn't just push for bad things now just because of a potential future in which they might come.
- The market will decide what is better.
The market has decided for Facebook, Instagram, Twitter and TikTok. If we were to follow what the market had decided we wouldn't be here, and you wouldn't be reading this post.
- OK, you have convinced me, edits are not good for the protocol. But what do we do about the users who just want to fix their typos?
There are many ways. The annotations spec, for example, provides a simple way to append things to a note without being a full-blown edit, and they fall back gracefully to normal replies in clients that don't implement the full annotations spec.
Eventually we could have annotations that are expressed in form of simple (human-readable?) diffs that can be applied directly to the post, but fall back, again, to comments.
Besides these, a very simple idea that wasn't tried yet on Nostr yet is the idea that has been tried for emails and seems to work very well: delaying a post after the "submit" button is clicked and giving the user the opportunity to cancel and edit it again before it is actually posted.
Ultimately, if edits are so necessary, then maybe we could come up with a way to implement edits that is truly optional and falls back cleanly for clients that don't support them directly and don't hurt the protocol very much. Let's think about it and not rush towards defeat.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:56:21Tutorial feito por Grom mestre⚡poste original abaixo:
http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/240277/tutorial-criando-e-acessando-sua-conta-de-email-pela-i2p?show=240277#q240277
Bom dia/tarde/noite a todos os camaradas. Seguindo a nossa série de tutoriais referentes a tecnologias essenciais para a segurança e o anonimato dos usuários, sendo as primeiras a openPGP e a I2P, lhes apresento mais uma opção para expandir os seus conhecimentos da DW. Muitos devem conhecer os serviços de mail na onion como DNMX e mail2tor, mas e que tal um serviço de email pela I2P. Nesse tutorial eu vou mostrar a vocês como criar a sua primeira conta no hq.postman.i2p e a acessar essa conta.
É importante que vocês tenham lido a minha primeira série de tutoriais a respeito de como instalar, configurar e navegar pela I2P nostr:nevent1qqsyjcz2w0e6d6dcdeprhuuarw4aqkw730y542dzlwxwssneq3mwpaspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsyp5vcq Esse tutorial é um pré-requisito para o seguinte e portanto recomendo que leia-os antes de prosseguir com o seguinte tutorial. O tutorial de Kleopatra nostr:nevent1qqs8h7vsn5j6qh35949sa60dms4fneussmv9jd76n24lsmtz24k0xlqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgecq8f7 é complementar dado que é extremamente recomendado assinar e criptografar as mensagens que seguem por emails pela DW. Sem mais delongas, vamos ao tutorial de fato.
1. Criando uma conta de email no hq.postman
Relembrando: Esse tutorial considera que você já tenha acesso à I2P. Entre no seu navegador e acesse o endereço hq.postman.i2p. O roteador provavelmente já contém esse endereço no seu addressbook e não haverá a necessidade de inserir o endereço b32 completo. Após entrar no site vá para a página '1 - Creating a mailbox' https://image.nostr.build/d850379fe315d2abab71430949b06d3fa49366d91df4c9b00a4a8367d53fcca3.jpg
Nessa página, insira as credenciais de sua preferências nos campos do formulário abaixo. Lembre-se que o seu endereço de email aceita apenas letras e números. Clique em 'Proceed' depois que preencher todos os campos. https://image.nostr.build/670dfda7264db393e48391f217e60a2eb87d85c2729360c8ef6fe0cf52508ab4.jpg
Uma página vai aparecer pedindo para confirmar as credenciais da sua nova conta. Se tudo estiver certo apenas clique em 'Confirm and Create Mailbox'. Se tudo ocorrer como conforme haverá uma confirmação de que a sua nova conta foi criada com sucesso. Após isso aguarde por volta de 5 minutos antes de tentar acessá-la, para que haja tempo suficiente para o servidor atualizar o banco de dados. https://image.nostr.build/ec58fb826bffa60791fedfd9c89a25d592ac3d11645b270c936c60a7c59c067f.jpg https://image.nostr.build/a2b7710d1e3cbb36431acb9055fd62937986b4da4b1a1bbb06d3f3cb1f544fd3.jpg
Pronto! Sua nova conta de email na I2P foi criada. Agora vamos para a próxima etapa: como acessar a sua conta via um cliente de email.
2. Configurando os túneis cliente de SMTP e POP3
O hq.postman não possui um cliente web que nos permite acessar a nossa conta pelo navegador. Para isso precisamos usar um cliente como Thunderbird e configurar os túneis cliente no I2Pd que serão necessários para o Thunderbird se comunicar com o servidor pela I2P.
Caso não tenha instalado o Thunderbird ainda, faça-o agora antes de prosseguir.
Vamos configurar os túneis cliente do servidor de email no nosso roteador. Para isso abra um terminal ou o seu gestor de arquivos e vá para a pasta de configuração de túneis do I2P. Em Linux esse diretório se localiza em /etc/i2pd/tunnels.d. Em Windows, essa pasta se localiza em C:\users\user\APPDATA\i2pd. Na pasta tunnels.d crie dois arquivos: smtp.postman.conf e pop-postman.conf. Lembre-se que em Linux você precisa de permissões de root para escrever na pasta de configuração. Use o comando sudoedit
para isso. Edite-os conforme as imagens a seguir:
Arquivo pop-postman.conf https://image.nostr.build/7e03505c8bc3b632ca5db1f8eaefc6cecb4743cd2096d211dd90bbdc16fe2593.jpg
Arquivo smtp-postman.conf https://image.nostr.build/2d06c021841dedd6000c9fc2a641ed519b3be3c6125000b188842cd0a5af3d16.jpg
Salve os arquivos e reinicie o serviço do I2Pd. Em Linux isso é feito pelo comando:
sudo systemctl restart i2pd
Entre no Webconsole do I2Pd pelo navegador (localhost:7070) e na seção I2P Tunnels, verifique se os túneis pop-postman e smtp-postman foram criados, caso contrário verifique se há algum erro nos arquivos e reinicie o serviço.Com os túneis cliente criados, vamos agora configurar o Thunderbird
3. Configurando o Thunderbird para acessar a nossa conta
Abra o Thunderbird e clique em criar uma nova conta de email. Se você não tiver nenhum conta previamente presente nele você vai ser diretamente recebido pela janela de criação de conta a seguir. https://image.nostr.build/e9509d7bd30623716ef9adcad76c1d465f5bc3d5840e0c35fe4faa85740f41b4.jpg https://image.nostr.build/688b59b8352a17389902ec1e99d7484e310d7d287491b34f562b8cdd9dbe8a99.jpg
Coloque as suas credenciais, mas não clique ainda em Continuar. Clique antes em Configure Manually, já que precisamos configurar manualmente os servidores de SMTP e POP3 para, respectivamente, enviar e receber mensagens.
Preencha os campos como na imagem a seguir. Detalhe: Não coloque o seu endereço completo com o @mail.i2p, apenas o nome da sua conta. https://image.nostr.build/4610b0315c0a3b741965d3d7c1e4aff6425a167297e323ba8490f4325f40cdcc.jpg
Clique em Re-test para verificar a integridade da conexão. Se tudo estiver certo uma mensagem irá aparecer avisando que as configurações do servidores estão corretas. Clique em Done assim que estiver pronto para prosseguir. https://image.nostr.build/8a47bb292f94b0d9d474d4d4a134f8d73afb84ecf1d4c0a7eb6366d46bf3973a.jpg
A seguinte mensagem vai aparecer alertando que não estamos usando criptografia no envio das credenciais. Não há problema nenhum aqui, pois a I2P está garantindo toda a proteção e anonimato dos nossos dados, o que dispensa a necessidade de uso de TLS ou qualquer tecnologia similar nas camadas acima. Marque a opção 'I Understand the risks' e clique em 'Continue' https://image.nostr.build/9c1bf585248773297d2cb1d9705c1be3bd815e2be85d4342227f1db2f13a9cc6.jpg
E por fim, se tudo ocorreu como devido sua conta será criada com sucesso e você agora será capaz de enviar e receber emails pela I2P usando essa conta. https://image.nostr.build/8ba7f2c160453c9bfa172fa9a30b642a7ee9ae3eeb9b78b4dc24ce25aa2c7ecc.jpg
4. Observações e considerações finais
Como informado pelo próprio site do hq.postman, o domínio @mail.i2p serve apenas para emails enviados dentro da I2P. Emails enviados pela surface devem usar o domínio @i2pmai.org. É imprescindível que você saiba usar o PGP para assinar e criptografar as suas mensagens, dado que provavelmente as mensagens não são armazenadas de forma criptografada enquanto elas estão armazenadas no servidor. Como o protocolo POP3 delete as mensagens no imediato momento em que você as recebe, não há necessidade de fazer qualquer limpeza na sua conta de forma manual.
Por fim, espero que esse tutorial tenha sido útil para vocês. Que seu conhecimento tenha expandido ainda mais com as informações trazidas aqui. Até a próxima.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:17:56O aplicativo permite que os usuários se comuniquem com outras pessoas sem ter que fornecer identificadores de usuário, como números de telefone ou endereços de e-mail. é 100% privado e seguro, Por design, garantindo que suas mensagens nunca sejam rastreadas ou armazenadas. O SimpleXChat possui recursos como bate-papo em grupo, envio de arquivos e uma interface amigável para dispositivos móveis, desktop, CLI. O SimpleXChat é um dos aplicativos construídos sobre a plataforma SimpleX, que também serve como um exemplo e aplicativo de referência. O SimpleX Messaging Protocol (SMP) é um protocolo que permite enviar mensagens em uma direção para um destinatário, usando um servidor intermediário. As mensagens são entregues por meio de filas unidirecionais criadas pelos destinatários.
O SMP é executado em um protocolo de transporte (TLS), que fornece integridade, autenticação do servidor, confidencialidade e vinculação do canal de transporte. A Rede SimpleX é o coletivo de servidores SimpleX que facilitam o SMP. As bibliotecas SimpleX Client falam SMP para SimpleX Servers e fornecem uma API de baixo nível, geralmente não destinada a ser usada por aplicativos.
O aplicativo permite que os usuários se comuniquem com outras pessoas sem ter que fornecer identificadores de usuário, como números de telefone ou endereços de e-mail. O SimpleXChat possui recursos como bate-papo em grupo, envio de arquivos e uma interface amigável para dispositivos móveis.
O SimpleX tem como objetivo fornecer uma infraestrutura de mensagens distribuídas que seja segura, privada, confiável, com entrega assíncrona e baixa latência. Ele visa oferecer melhor privacidade de metadados e segurança contra invasores de rede ativos e servidores mal-intencionados em comparação com soluções alternativas de mensagens instantâneas, ao mesmo tempo em que prioriza a experiência do usuário, especialmente em dispositivos móveis.
Por que o SimpleX é único
- Privacidade total de sua identidade, perfil, contatos e metadados
Ao contrário de outras plataformas de mensagens, o SimpleX não possui identificadores atribuídos aos usuários . Ele não depende de números de telefone, endereços baseados em domínio (como e-mail ou XMPP), nomes de usuário, chaves públicas ou mesmo números aleatórios para identificar seus usuários - não sabemos quantas pessoas usam nossos servidores SimpleX
Para entregar mensagens, o SimpleX usa endereços anônimos emparelhados de filas de mensagens unidirecionais, separadas para mensagens recebidas e enviadas, geralmente por meio de servidores diferentes. Usar o SimpleX é como ter um e-mail ou telefone “gravador” diferente para cada contato e sem problemas para gerenciá-los.
Esse design protege a privacidade de quem você está se comunicando, ocultando-a dos servidores da plataforma SimpleX e de quaisquer observadores. Para ocultar seu endereço IP dos servidores, você pode se conectar aos servidores SimpleX via Tor .
-
A melhor proteção contra spam e abuso Como você não possui um identificador na plataforma SimpleX, ninguém pode entrar em contato com você, a menos que você compartilhe um endereço de usuário único ou temporário, como um código QR ou um link. Mesmo com o endereço de usuário opcional, embora possa ser usado para enviar solicitações de contato de spam, você pode alterá-lo ou excluí-lo completamente sem perder nenhuma de suas conexões.
-
Propriedade, controle e segurança de seus dados
O SimpleX Chat armazena todos os dados do usuário apenas em dispositivos clientes usando um formato de banco de dados criptografado portátil que pode ser exportado e transferido para qualquer dispositivo compatível.
As mensagens criptografadas de ponta a ponta são mantidas temporariamente em servidores de retransmissão SimpleX até serem recebidas e, em seguida, são excluídas permanentemente.
Ao contrário dos servidores de redes federadas (e-mail, XMPP ou Matrix), os servidores SimpleX não armazenam contas de usuários, apenas retransmitem mensagens, protegendo a privacidade de ambas as partes.
Ao contrário dos servidores de redes federadas (e-mail, XMPP ou Matrix), os servidores SimpleX não armazenam contas de usuários, apenas retransmitem mensagens, protegendo a privacidade de ambas as partes.
Não há identificadores ou texto cifrado em comum entre o tráfego do servidor enviado e recebido - se alguém estiver observando, não poderá determinar facilmente quem se comunica com quem, mesmo que o TLS esteja comprometido.
- Totalmente descentralizado — os usuários são proprietários da rede SimpleX
Você pode usar o SimpleX com seus próprios servidores e ainda se comunicar com pessoas que usam os servidores pré-configurados fornecidos por nós.
A plataforma SimpleX usa um protocolo aberto e fornece SDK para criar bots de bate-papo , permitindo a implementação de serviços com os quais os usuários podem interagir por meio de aplicativos de bate-papo SimpleX. A rede SimpleX é totalmente descentralizada e independente de qualquer criptomoeda ou qualquer outra plataforma, exceto a Internet.
Você pode usar o SimpleX com seus próprios servidores ou com os servidores fornecidos por nós.
Características SimpleXchat • Mensagens criptografadas por E2E com remarcação e edição
• Imagens e arquivos criptografados por E2E
• Grupos secretos descentralizados apenas os usuários sabem que eles existem
• Mensagens de voz criptografadas por E2E
• Mensagens desaparecidas
• Chamadas de áudio e vídeo criptografadas com E2E
• Banco de dados criptografado portátil — mova seu perfil para outro dispositivo
• Modo de navegação anônima exclusivo do SimpleX Chat
O que torna o SimpleX privado
https://nostr.build/i/nostr.build_4e6fa7bc41d22d7a9672fa23b04b7aa6d69938d7013ac1ea31212a854e6d1e97.jpg Identificadores par a par anônimos temporários O SimpleX usa endereços emparelhados anônimos temporários e credenciais para cada contato do usuário ou membro do grupo. Ele permite entregar mensagens sem identificadores de perfil de usuário, fornecendo melhor privacidade de metadados do que alternativas.
Troca de chaves fora de banda Muitas plataformas de comunicação são vulneráveis a ataques MITM por servidores ou provedores de rede. Para evitar que os aplicativos SimpleX passem chaves únicas fora de banda, quando você compartilha um endereço como um link ou um código QR. https://nostr.build/i/nostr.build_9065e2600cf42d0bcf7bb89deb674eb0630c590bd043b1f8c92272011ec7a2ec.jpg
2 camadas de criptografia de ponta a ponta Protocolo de catraca dupla — mensagens OTR com sigilo de encaminhamento perfeito e recuperação de invasão. Criptobox NaCL em cada fila para evitar a correlação de tráfego entre as filas de mensagens se o TLS estiver comprometido. https://nostr.build/i/nostr.build_defe978ea10526b657bf35e6809f4385c82c7eca58b91ae3a0e81447dbf0bda3.jpg
Verificação da integridade da mensagem Para garantir a integridade as mensagens são numeradas sequencialmente e incluem o hash da mensagem anterior. Se alguma mensagem for adicionada, removida ou alterada, o destinatário será alertado. https://nostr.build/i/nostr.build_debf9317b88a015af37f8c610d4e1671bc495d1a80c2b6ea090d202fb332ba84.jpg Camada adicional de criptografia do servidor
Camada adicional de criptografia do servidor para entrega ao destinatário, para evitar a correlação entre o tráfego do servidor recebido e enviado se o TLS estiver comprometido. https://nostr.build/i/nostr.build_13793f89276380e221bd15f6173fe1221f550993a0902a249b5ba86e5fe1d237.jpg
Mistura de mensagens para reduzir a correlação Os servidores SimpleX atuam como nós de mistura de baixa latência — as mensagens recebidas e enviadas têm ordem diferente. https://nostr.build/i/nostr.build_1c7146ca7b3871ff1de184be78785e9e0c45cf2567f6147b260009d9c74925ed.jpg
Transporte TLS autenticado seguro Somente o TLS 1.2/1.3 com algoritmos fortes é usado para conexões cliente-servidor. A impressão digital do servidor e a ligação do canal evitam ataques MITM e de repetição. A retomada da conexão é desativada para evitar ataques de sessão. https://nostr.build/i/nostr.build_515af3c35a729f3dd47619965f76e3a8499ad1fe7694f2bbab14404cf5a77f6a.jpg
Acesso opcional via Tor Para proteger seu endereço IP, você pode acessar os servidores via Tor ou alguma outra rede de sobreposição de transporte. Para usar o SimpleX via Tor, instale o aplicativo Orbot e habilite o proxy SOCKS5 (ou VPN no iOS ). https://nostr.build/i/nostr.build_0c8f651db74c9ae2ab4d4424972b21d64af8dab2aa5364d4b140898bebfc42b0.jpg
Filas de mensagens unidirecionais Cada fila de mensagens passa mensagens em uma direção, com diferentes endereços de envio e recebimento. Ele reduz os vetores de ataque, em comparação com os corretores de mensagens tradicionais e os metadados disponíveis. https://nostr.build/i/nostr.build_a7b6103be59dbffb242e6b5d371767f6df3219a1cad2a0f05a278cfb7596ad3d.jpg
Várias camadas de preenchimento de conteúdo SimpleX usa preenchimento de conteúdo para cada camada de criptografia para frustrar ataques de tamanho de mensagem. Faz mensagens de tamanhos diferentes parecerem iguais para os servidores e observadores de rede. https://nostr.build/i/nostr.build_6ac8491d3e0236460bb914ea5dc1a23fea03e6c598cef6643949eea38e5fad44.jpg
A rede SimpleX diferente de outras redes P2P ao ser composta por clientes e servidores sem depender de um componente centralizado. Ele usa filas de mensagens unidirecionais redundantes (simplex) para comunicação, eliminando a necessidade de endereços exclusivos globalmente. As solicitações de conexão são protegidas contra ataques man-in-the-middle e as filas de mensagens simples são usadas pelos clientes para criar cenários de comunicação mais complexos. Os servidores não armazenam nenhuma informação do usuário e os usuários podem mudar de servidor com interrupção mínima.
Rede SimpleX
Simplex Chat fornece a melhor privacidade combinando as vantagens de redes P2P e federadas. https://nostr.build/i/nostr.build_062b212b3c43e9cab9e7290e6a052012c54acabadfeb962190ffe9783647f356.jpg
Ao contrário das redes P2P
Todas as mensagens são enviadas pelos servidores, proporcionando melhor privacidade de metadados e entrega de mensagens assíncronas confiáveis, evitando muitos problemas de redes P2P .
-
As redes P2P dependem de alguma variante do DHT para rotear mensagens. Os projetos DHT precisam equilibrar a garantia de entrega e a latência. O SimpleX tem melhor garantia de entrega e menor latência do que o P2P, pois a mensagem pode ser passada de forma redundante por vários servidores em paralelo, utilizando os servidores escolhidos pelo destinatário. Em redes P2P a mensagem é passada por nós O(log N) sequencialmente, usando nós escolhidos pelo algoritmo.
-
O design SimpleX, ao contrário da maioria das redes P2P, não possui identificadores globais de usuário de qualquer tipo, mesmo temporários, e usa apenas identificadores temporários emparelhados, fornecendo melhor anonimato e proteção de metadados.
-
O P2P não resolve o problema do ataque MITM e a maioria das implementações existentes não usa mensagens fora de banda para a troca inicial de chaves. O SimpleX usa mensagens fora de banda ou, em alguns casos, conexões seguras e confiáveis pré-existentes para a troca inicial de chaves.
-
As implementações P2P podem ser bloqueadas por alguns provedores de Internet (como BitTorrent ). O SimpleX é agnóstico de transporte - ele pode funcionar sobre protocolos da Web padrão, por exemplo, WebSockets.
-
Todas as redes P2P conhecidas podem ser vulneráveis ao ataque Sybil , porque cada nó é detectável e a rede opera como um todo. As medidas conhecidas para mitigá-lo exigem um componente centralizado ou uma prova de trabalho cara . A rede SimpleX não tem capacidade de descoberta de servidor, é fragmentada e opera como várias sub-redes isoladas, impossibilitando ataques em toda a rede.
-
As redes P2P podem ser vulneráveis a ataques DRDoS , quando os clientes podem retransmitir e amplificar o tráfego, resultando em negação de serviço em toda a rede. Os clientes SimpleX apenas retransmitem o tráfego de conexão conhecida e não podem ser usados por um invasor para amplificar o tráfego em toda a rede.
Ao contrário das redes federadas
Os servidores de retransmissão SimpleX NÃO armazenam perfis de usuário, contatos e mensagens entregues, NÃO se conectam entre si e NÃO há diretório de servidores. https://nostr.build/i/nostr.build_abadeb8361026101dc2e5888217cd7620d7cf01233a7961071bb07c49f7f9f0e.jpg
os servidores fornecem filas unidirecionais para conectar os usuários, mas não têm visibilidade do grafo de conexão de rede — somente os usuários têm. https://nostr.build/i/nostr.build_0f281d6b89e96efcc9334384ae9f251c529feb136748dd0846e249a715e2a5e3.jpg
Simplex explicado
- O que os usuários experimentam https://nostr.build/i/nostr.build_157aa796dd3953b830e5643a5e98bb07b09d1ab8737a4f8b39d26e3637902ae8.jpg Você pode criar contatos e grupos e ter conversas bidirecionais, como em qualquer outro messenger.
Como trabalhar com filas unidirecionais e sem identificadores de perfil de usuário?
- Como funciona https://nostr.build/i/nostr.build_fda66ead74bed1a72139cf9ce9cbe96eea7a09b9007151a576124f8cab39952d.jpg
Para cada conexão, você usa duas filas de mensagens separadas para enviar e receber mensagens por meio de servidores diferentes.
Os servidores passam mensagens apenas de uma maneira, sem ter uma imagem completa da conversa ou das conexões do usuário.
- O que os servidores veem https://nostr.build/i/nostr.build_e95db233e71ef8ff53590e740095429338c8aba8fba846431d81112ffba01932.jpg
Os servidores possuem credenciais anônimas distintas para cada fila e não têm conhecimento da identidade dos usuários.
A implementação Roteamento de Mensagens Privadas na Rede SimpleX é um marco significativo na evolução do Protocolo de Mensagens SimpleX, elevando a privacidade dos usuários a outro patamar! https://image.nostr.build/f77c4336cb335cb87dab6645bbac7a8f6a99d8b8e7a787511918c740558b5be7.jpg
Qual é o problema? https://image.nostr.build/4ad92ca6d702155c97849fce854f6c3101ac979b21781620500edd357ab6d7a3.jpg
Design da rede Simplex sempre se concentrou na proteção da identidade do usuário no nível do protocolo de mensagens - não há identificadores de perfil de usuário de qualquer tipo no design do protocolo, nem mesmo números aleatórios ou chaves criptográficas. Porém, até este lançamento, a rede SimpleX não tinha proteção integrada de identidades de transporte de usuários - endereços IP. Como anteriormente os usuários só podiam escolher quais retransmissores de mensagens usar para receber mensagens, esses retransmissores poderiam observar os endereços IP dos remetentes e, se esses retransmissores fossem controlados pelos destinatários, os próprios destinatários também poderiam observá-los - seja modificando o código do servidor ou simplesmente rastreando todos os endereços IP conectados.
Para contornar essa limitação, muitos usuários se conectaram a retransmissores de rede SimpleX via Tor ou VPN – para que os retransmissores dos destinatários não pudessem observar os endereços IP dos usuários quando eles enviassem mensagens. Ainda assim, foi a limitação mais importante e mais criticada da rede SimpleX pelos usuários.
O que é roteamento de mensagens privadas e como funciona?
O roteamento de mensagens privadas é um marco importante para a evolução da rede SimpleX. É um novo protocolo de roteamento de mensagens que protege os endereços IP dos usuários e as sessões de transporte dos retransmissores de mensagens escolhidos por
Seus contatos. O roteamento de mensagens privadas é, efetivamente, um protocolo de roteamento cebola de 2 saltos inspirado no design do Tor, mas com uma diferença importante - o primeiro retransmissor (encaminhamento) é sempre escolhido pelo remetente da mensagem e o segundo (destino) - pelo destinatário da mensagem. Desta forma, nenhum lado da conversa pode observar o endereço IP ou a sessão de transporte do outro.
Ao mesmo tempo, os retransmissores escolhidos pelos clientes remetentes para encaminhar as mensagens não conseguem observar para quais conexões (filas de mensagens) as mensagens são enviadas, devido à camada adicional de criptografia ponta a ponta entre o remetente e o retransmissor de destino, semelhante ao funcionamento do roteamento cebola na rede Tor, e também graças ao design do protocolo que evita quaisquer identificadores repetidos ou não aleatórios associados às mensagens, que de outra forma permitiriam correlacionar as mensagens enviadas para diferentes conexões como enviadas pelo mesmo usuário. Cada mensagem encaminhada para o retransmissor de destino é adicionalmente criptografada com uma chave efêmera única, para ser independente das mensagens enviadas para diferentes conexões.
O protocolo de roteamento também evita a possibilidade de ataque MITM pelo retransmissor de encaminhamento, que fornece ao certificado as chaves de sessão do servidor de destino para o cliente remetente que são assinadas criptograficamente pelo mesmo certificado que está incluído no endereço do servidor de destino, para que o cliente possa verifique se as mensagens são enviadas para o destino pretendido e não interceptadas.
O diagrama abaixo mostra todas as camadas de criptografia usadas no roteamento de mensagens privadas: https://image.nostr.build/c238546e47b00dfea742ab1fc008ff51811240025a603dfbcc94b5bc14b5aa88.jpg
e2e - duas camadas de criptografia ponta a ponta entre clientes remetentes e receptores, uma das quais usa algoritmo de catraca dupla E2EE Post-quantum. Essas camadas de criptografia também estão presentes na versão anterior do protocolo de roteamento de mensagens.
s2d - criptografia entre o cliente remetente e o retransmissor de destino do destinatário . Essa nova camada de criptografia oculta os metadados da mensagem (endereço de conexão de destino e sinalizador de notificação de mensagem) da retransmissão de encaminhamento.
f2d - nova camada de criptografia adicional entre retransmissores de encaminhamento e destino , protegendo contra correlação de tráfego caso o TLS seja comprometido - não há identificadores ou texto cifrado em comum entre o tráfego de entrada e saída de ambos os retransmissores dentro da conexão TLS.
d2r - camada de criptografia adicional entre o retransmissor de destino e o destinatário, protegendo também da correlação de tráfego caso o TLS seja comprometido.
TLS - criptografia de transporte TLS 1.3. Para que o roteamento privado funcione, tanto a retransmissão de encaminhamento quanto a de destino devem suportar o protocolo de mensagens atualizado - ele é compatível com a versão 5.8 das retransmissões de mensagens.
https://image.nostr.build/2edbb7721c3ccf8a21274e96e25ee076c3522323870d92b73dbd1f6bda66fce8.jpg
Passo a passo do aplicativo nostr:nprofile1qqsvnx99ww0sfall7gpv2jtz4ftc9v6wevgdd7g4hh7awkpfvwlezugpzdmhxue69uhhqatjwpkx2urpvuhx2ue0chkv5c
Backup e Recuperação de Dados:
-
instalação do aplicativo.
-
Exportação do banco de dados Backup.
-
Importação do Backup do banco de dados.
-
Baixe e Instale o Aplicativo:
-
baixar o SimpleXchat no F-droid ou Obtainium.
F-droid
https://simplex.chat/fdroid/
https://f-droid.org/packages/chat.simplex.app/
Obtainium.
https://github.com/simplex-chat/simplex-chat
- Faça o download e instale o aplicativo em seu dispositivo móvel.
Criando seu perfil:
-
Criar perfil:
-
Clique em “CRIE SEU PERFIL”, contatos e mensagens são armazenados localmente em seu dispositivo.
https://image.nostr.build/e109c9fd5ea327640f0af2d6396aaa7e7d85594c6b20fd6ed426a558195a0021.jpg
-
Nome de Exibição exemplo: Alex teste :-)
-
Toque em "Criar" para configurar seu perfil e começar a usar o SimpleXchat.
https://image.nostr.build/96a1c59d370d554ada31e91301857825af7975b29eb82fe8fcb5cbba9d40bf23.jpg
-
Endereço SimpleX:
-
Clique no nome “Criar endereço SimpleX “
-
clicar em " continuar "
Ou Clicar em " Não criar endereço " pode criá-lo mais tarde.
https://image.nostr.build/cb91c0c1d43ce6c1a310cf2547cc88510529db3c2a5ce17ca79ec5d9269cb58e.jpg
https://image.nostr.build/47595ab6c17183c267fab2892a8d188b2e9fe29f067c8d96afec2ddbb9feda95.jpg
-
Notificação privadas
-
Escolha o tipo de notificação que prefere 3 opções.
Escolha a opção aberta em “ USAR BATE- PAPO “
https://image.nostr.build/96027dc0c47bdcb8a9c5017592bd6828f8e2d752883c826c08105aec340f1d81.jpg
• Backup e Recuperação de Dados:
- Cópia de segurança. “Clicar no canto superior lado esquerdo na foto de perfil“
Selecione a opção “Senha e Exportação de Banco de Dados“
https://image.nostr.build/7918c90aec373af57ccdcb1194e9277ab85aabadf83ac1d35065ec2a9f2b0aef.jpg
Desabilite a opção “O bate-papo está em execução ”
Clique em “parar”
https://image.nostr.build/8473fac2cef41d35451abcf8b40101630caf92b30f01e51767df1cc428dd8a70.jpg
https://image.nostr.build/bdd691b738712f98107c7da404d693d9cccce58c2afb89a2d6f649190e13a3e2.jpg
Seu banco de dados de bate-papo tem 4 opções.
-
Senha do banco de dados
-
Exportar banco de dados
-
Importar banco de dados
-
Excluir banco de dados
Clique na primeira opção " Senha do banco de dados "
- O Banco de Dados tem seus contatos e grupos e é protegido por sua senha que criptografa o banco de dados. Recomenda-se trocar essa senha padrão.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
Clicar na primeira opção " Senha de banco de dados "
Lembre-se de usar uma senha forte.
Após adicionar senha clique em “Atualizar senha do banco de dados”
https://image.nostr.build/3d84eb9954080589ea79050420300baa7e095f1dfc37c925ec4abf7abb047675.jpg
Vai aparecer um aviso.
Alterar senha do banco de dados? A senha de criptografia do banco de dados será atualizada e armazenada no keystore. Guarde a senha em um local seguro, você NÃO poderá alterá-la se a perder.
https://image.nostr.build/61dcdfdb82764df8855ef9e15c453b42d9c87fd23ea9e797ea066ad31f94fd61.jpg
Só clique em “Atualizar” demora 1 minuto aparece a mensagem “banco de dados criptografado!” Só clique em “ok”
https://image.nostr.build/8c303857ae63b803792f71273b4891f7adcfdbc3d0a428ecde2abbfef168781d.jpg
• Clique na opção 2.
Exportar banco de dados.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
Tem duas poções para salvar na memória do Celular, Pendrive, componentes externos de sua preferência.
-
Por padrão Vai abrir a memória do celular para salvar o arquivo backup criptografado na pasta de sua escolha.
-
Pra guardei no pendrive é necessário um cabo OTG para salvar o backup criptografado. Conecte um cabo OTG no celular, alguns celulares já confirmam automaticamente e entram diretamente na pasta do seu pendrive outros aparece um aviso pra aceitar pendrive. Depois basta selecionar o pendrive e salvar o backup.
https://image.nostr.build/c3bd4ca72270d651f4ea7125ac697cd11cb47316e4f0d18e8dfef732579ae77b.jpg
• Clique na opção
- Importar banco de dados.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
-
Caso você perca seu celular, você não tem acesso ao backup. Mas se você tiver salvo no pendrive ou componentes externos, basta seguir as etapas a seguir.
-
Faça a instalação do aplicativo e crie uma nova conta, selecione a opção "Senha e Exportação de Banco de Dados" e desabilite a opção "Chat em Execução". Isso permitirá que você faça a importação do backup.
Clique na opção Importar banco de dados.
Selecione o artigo do backup no pendrive ou na pasta dentro do novo celular só basta clicar no arquivo.
https://image.nostr.build/47cac70f4ba0520c060da98b4b3559f621757d98b4f963b1b1fd2cc522eafa45.jpg
Vai aparecer um aviso.
Importa banco de dados de Chat?
Seu banco de dados do Chat atual será EXCLUÍDO ou SUBSTITUÍDO pelo importado.
Essa ação não pode ser desfeita - Seu perfil, contatos, mensagens e arquivos serão perdidos de forma irreversível.
Só clique em "importar"
https://image.nostr.build/fdfa5e4ba2b6cd1a2b9116633da3f8a7cf91f41dd6d5739582f4e112ae384f7a.jpg
Vai aparecer um aviso.
Banco de dados de chat Importado.
Reinicie o aplicativo para usar o banco de dados do chat Importado.
Só clique em "ok"
Depois Habilite a opção "o bate-papo está parado"
https://image.nostr.build/1f261f36262d5a6cf593b5cb09abdb63ace7bf63f0e66bee7b949850972b3f92.jpg
A senha do banco de dados é necessária para abrir o Chat.
Digite a senha do seu banco de dados.
Depois é só clicar em "salvar senha e abrir Chat"
Pronto foi feita a recuperação de todos os meus dados, incluindo contatos, mensagens e grupos✅️
https://image.nostr.build/28f13ac654c68c890495cbf9689d09946b7af1ecc00a796b9ffd6d64059f4516.jpg
https://image.nostr.build/aae866f7577995bda6735e0a5e4683770bac2af845ae8b552da6526c4f589f08.jpg
Protegendo sua Privacidade no SimpleX Chat.
https://image.nostr.build/88fe0bf337105a3be94754c64bedfbe17d35c586714aa225d0179a379f9a1f71.jpg
Recentemente, tive uma experiência interessante ao explorar as opções de privacidade e segurança no SimpleX Chat. Uma funcionalidade que me chamou a atenção foi a opção de senha de auto destruição, que oferece uma camada adicional de proteção aos dados sensíveis.
Ao configurar o SimpleX Chat para usar senha de auto destruição, percebi o quão poderosa essa ferramenta pode ser para proteger minha privacidade. Após ativar essa opção, qualquer tentativa de acessar meu perfil precisa da senha escolhida por mim. E, se alguém tentasse forçar a abertura do aplicativo, eu posso simplesmente digitar a senha de auto destruição seria apresentado um perfil vazio, sem histórico de conversas. Essa função e bem útil em situações extremas.
A configuração da senha de auto destruição é simples mas poderosa.
Basta acessar as configurações de privacidade e segurança.
https://image.nostr.build/4fb6166656b544c645f316dfc4dad3b9e787b280745992dab30786b0bd0c2ee5.jpg
Aberta na opção de bloqueio SimpleX.
https://image.nostr.build/b866d08644b64884101aae6d011248a3557ac80bcc6e442ae8f62bdb3ee69776.jpg
mudar para a opção de senha. Em seguida, é possível escolher se deseja ativar a senha de auto destruição e inserir a senha desejada.
https://image.nostr.build/867d375825640721ee888e524455fb539df50be87df901dcf0ccfa19f2267576.jpg
Só basta adicionar a senha.
https://image.nostr.build/5bfb500816f814eab189283a64086ad47f32671d8e42558f3f911676ff4df741.jpg
https://image.nostr.build/59323fa6900d4f3b27b39b032f7c2cffdbf379a77c53ed9180c0ace0ca903950.jpg
Pronto. Está Ativado a senha de auto destruição.
https://image.nostr.build/511f82832d1e72d0363cfc5b7b201aaba56f65cfa00360d1c1f4d8d188bb3cdf.jpg
Uma vez configurada, a senha de auto destruição garante que todos os dados, incluindo backups, sejam eliminados permanentemente se a senha de auto destruição for inserida ao desbloquear o aplicativo.
Tenha um backup no pendrive ou em outro local guardado.
https://image.nostr.build/dfbbc5ef805194cc00a09fb690fc76896ada9a9d3f98e8b141f52c72342e2625.jpg
https://image.nostr.build/32a771a0ba2bae47f45f900fc765ffbeae0374724a1a0140c0f2cef83a2e5c2f.jpg
Essa funcionalidade oferece uma tranquilidade adicional ao utilizar o SimpleX Chat, pois sei que meus dados estão protegidos contra acesso não autorizado. Além disso, a capacidade de criar um perfil vazio para ocultar a identidade real é uma ferramenta valiosa em situações críticas , proteger meus dados sensíveis e manter minha privacidade intacta.
https://medium.com/@alexemidio/o-simplexchat-%C3%A9-uma-plataforma-de-mensagens-revolucion%C3%A1rias-que-redefinem-a-privacidade-sendo-o-4690f2a1b2d4
Podcast muito bom no @optoutpod com o criador @epoberezkin https://youtu.be/LrLsS7-woN0
Site : https://simplex.chat/
Protocolo de bate-papo: https://github.com/simplex-chat/simplex-chat/blob/stable/docs/protocol/simplex-chat.md
Whitepaper, incluindo modelagem de ameaças: https://github.com/simplex-chat/simplexmq/blob/stable/protocol/overview-tjr.md
Execute seu próprio servidor SimpleX SMP: https://github.com/simplex-chat/simplexmq
https://play.google.com/store/apps/details?id=chat.simplex.app
Como auto-hospedar servidor Simplexchat
https://youtu.be/p1NF68KIt7M?si=Nhwa8ZajmAvke6lW
https://youtu.be/p1NF68KIt7M?si=uZqOtVu0sLWLXBJX
https://simplex.chat/docs/server.html
https://github.com/simplex-chat/simplexmq
-
@ 4ba8e86d:89d32de4
2024-11-07 12:05:00SISTEMA OPERACIONAL MÓVEIS
GrapheneOS : nostr:nevent1qqs8t76evdgrg4qegdtyrq2rved63pr29wlqyj627n9tj4vlu66tqpqpzdmhxue69uhk7enxvd5xz6tw9ec82c30qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqppcqec9
CalyxOS : nostr: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
LineageOS : nostr:nevent1qqsgw7sr36gaty48cf4snw0ezg5mg4atzhqayuge752esd469p26qfgpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpnvm779
SISTEMA OPERACIONAL DESKTOP
Tails : nostr:nevent1qqsf09ztvuu60g6xprazv2vxqqy5qlxjs4dkc9d36ta48q75cs9le4qpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz34ag5t
Qubes OS : nostr:nevent1qqsp6jujgwl68uvurw0cw3hfhr40xq20sj7rl3z4yzwnhp9sdpa7augpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0dehhxarj9ehhsarj9ejx2a30qyg8wumn8ghj7mn09eehgu3wvdez7qg4waehxw309aex2mrp0yhxgctdw4eju6t09uqjxamnwvaz7tmwdaehgu3dwejhy6txd9jkgtnhv4kxcmmjv3jhytnwv46z7qgwwaehxw309ahx7uewd3hkctcpremhxue69uhkummnw3ez6er9wch8wetvd3hhyer9wghxuet59uj3ljr8
Kali linux : nostr:nevent1qqswlav72xdvamuyp9xc38c6t7070l3n2uxu67ssmal2g7gv35nmvhspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswt9rxe
Whonix : nostr:nevent1qqs85gvejvzhk086lwh6edma7fv07p5c3wnwnxnzthwwntg2x6773egpydmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet59uq3qamnwvaz7tmwdaehgu3wd4hk6tcpzemhxue69uhkummnw3ezucnrdqhxu6twdfsj7qfywaehxw309ahx7um5wgh8ymm4dej8ymmrdd3xjarrda5kuetjwvhxxmmd9uq3wamnwvaz7tmzw33ju6mvv4hxgct6w5hxxmmd9uq3qamnwvaz7tmwduh8xarj9e3hytcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qg7waehxw309ahx7um5wgkkgetk9emk2mrvdaexgetj9ehx2ap0sen9p6
Kodachi : nostr:nevent1qqsf5zszgurpd0vwdznzk98hck294zygw0s8dah6fpd309ecpreqtrgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszgmhwden5te0dehhxarj94mx2unfve5k2epwwajkcmr0wfjx2u3wdejhgtcpremhxue69uhkummnw3ez6er9wch8wetvd3hhyer9wghxuet59uq3qamnwvaz7tmwdaehgu3wd4hk6tcpzamhxue69uhkyarr9e4kcetwv3sh5afwvdhk6tcpzpmhxue69uhkumewwd68ytnrwghszfrhwden5te0dehhxarj9eex7atwv3ex7cmtvf5hgcm0d9hx2unn9e3k7mf0qyvhwumn8ghj7mn0wd68ytnzdahxwcn0denjucm0d5hszrnhwden5te0dehhxtnvdakz7qgkwaehxw309ahx7um5wghxycmg9ehxjmn2vyhsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshs94a4d5
PGP
Openkeychain : nostr:nevent1qqs9qtjgsulp76t7jkquf8nk8txs2ftsr0qke6mjmsc2svtwfvswzyqpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs36mp0w
Kleopatra : nostr:nevent1qqspnevn932hdggvp4zam6mfyce0hmnxsp9wp8htpumq9vm3anq6etsppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpuaeghp
Pgp : nostr:nevent1qqsggek707qf3rzttextmgqhym6d4g479jdnlnj78j96y0ut0x9nemcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgptemhe
Como funciona o PGP? : nostr:nevent1qqsz9r7azc8pkvfmkg2hv0nufaexjtnvga0yl85x9hu7ptpg20gxxpspremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy259fhs
Por que eu escrevi PGP. - Philip Zimmermann.
nostr:nevent1qqsvysn94gm8prxn3jw04r0xwc6sngkskg756z48jsyrmqssvxtm7ncpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtchzxnad
VPN
Vpn : nostr:nevent1qqs27ltgsr6mh4ffpseexz6s37355df3zsur709d0s89u2nugpcygsspzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqshzu2fk
InviZible Pro : nostr:nevent1qqsvyevf2vld23a3xrpvarc72ndpcmfvc3lc45jej0j5kcsg36jq53cpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy33y5l4
Orbot: nostr:nevent1qqsxswkyt6pe34egxp9w70cy83h40ururj6m9sxjdmfass4cjm4495stft593
I2P
i2p : nostr:nevent1qqsvnj8n983r4knwjmnkfyum242q4c0cnd338l4z8p0m6xsmx89mxkslx0pgg
Entendendo e usando a rede I2P : nostr:nevent1qqsxchp5ycpatjf5s4ag25jkawmw6kkf64vl43vnprxdcwrpnms9qkcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpvht4mn
Criando e acessando sua conta Email na I2P : nostr:nevent1qqs9v9dz897kh8e5lfar0dl7ljltf2fpdathsn3dkdsq7wg4ksr8xfgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpw8mzum
APLICATIVO 2FA
Aegis Authenticator : nostr:nevent1qqsfttdwcn9equlrmtf9n6wee7lqntppzm03pzdcj4cdnxel3pz44zspz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqscvtydq
YubiKey : nostr:nevent1qqstsnn69y4sf4330n7039zxm7wza3ch7sn6plhzmd57w6j9jssavtspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzueyvgt
GERENCIADOR DE SENHAS
KeepassDX: nostr:nevent1qqswc850dr4ujvxnmpx75jauflf4arc93pqsty5pv8hxdm7lcw8ee8qpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpe0492n
Bitwaden: nostr:nevent1qqs0j5x9guk2v6xumhwqmftmcz736m9nm9wzacqwjarxmh8k4xdyzwgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpwfe2kc
KeePassXC: nostr:nevent1qqsgftcrd8eau7tzr2p9lecuaf7z8mx5jl9w2k66ae3lzkw5wqcy5pcl2achp
CHAT MENSAGEM
SimpleXchat : nostr:nevent1qqsds5xselnnu0dyy0j49peuun72snxcgn3u55d2320n37rja9gk8lgzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgmcmj7c
Briar : nostr:nevent1qqs8rrtgvjr499hreugetrl7adkhsj2zextyfsukq5aa7wxthrgcqcg05n434
Element Messenger : nostr:nevent1qqsq05snlqtxm5cpzkshlf8n5d5rj9383vjytkvqp5gta37hpuwt4mqyccee6
Pidgin : nostr:nevent1qqsz7kngycyx7meckx53xk8ahk98jkh400usrvykh480xa4ct9zlx2c2ywvx3
E-MAIL
Thunderbird: nostr:nevent1qqspq64gg0nw7t60zsvea5eykgrm43paz845e4jn74muw5qzdvve7uqrkwtjh
ProtonMail : nostr:nevent1qqs908glhk68e7ms8zqtlsqd00wu3prnpt08dwre26hd6e5fhqdw99cppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpeyhg4z
Tutonota : nostr:nevent1qqswtzh9zjxfey644qy4jsdh9465qcqd2wefx0jxa54gdckxjvkrrmqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5hzhkv
k-9 mail : nostr:nevent1qqs200g5a603y7utjgjk320r3srurrc4r66nv93mcg0x9umrw52ku5gpr3mhxue69uhkummnw3ezuumhd9ehxtt9de5kwmtp9e3kstczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgacflak
E-MAIL-ALIÁS
Simplelogin : nostr:nevent1qqsvhz5pxqpqzr2ptanqyqgsjr50v7u9lc083fvdnglhrv36rnceppcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp9gsr7m
AnonAddy : nostr:nevent1qqs9mcth70mkq2z25ws634qfn7vx2mlva3tkllayxergw0s7p8d3ggcpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs6mawe3
NAVEGADOR
Navegador Tor : nostr:nevent1qqs06qfxy7wzqmk76l5d8vwyg6mvcye864xla5up52fy5sptcdy39lspzemhxue69uhkummnw3ezuerpw3sju6rpw4ej7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdp0urw
Mullvap Browser : nostr:nevent1qqs2vsgc3wk09wdspv2mezltgg7nfdg97g0a0m5cmvkvr4nrfxluzfcpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpj8h6fe
LibreWolf : nostr:nevent1qqswv05mlmkcuvwhe8x3u5f0kgwzug7n2ltm68fr3j06xy9qalxwq2cpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuv2hxr
Cromite : nostr:nevent1qqs2ut83arlu735xp8jf87w5m3vykl4lv5nwkhldkqwu3l86khzzy4cpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs3dplt7
BUSCADORES
Searx : nostr:nevent1qqsxyzpvgzx00n50nrlgctmy497vkm2cm8dd5pdp7fmw6uh8xnxdmaspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp23z7ax
APP-STORE
Obtainium : nostr:nevent1qqstd8kzc5w3t2v6dgf36z0qrruufzfgnc53rj88zcjgsagj5c5k4rgpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyarmca3
F-Droid : nostr:nevent1qqst4kry49cc9g3g8s5gdnpgyk3gjte079jdnv43f0x4e85cjkxzjesymzuu4
Droid-ify : nostr:nevent1qqsrr8yu9luq0gud902erdh8gw2lfunpe93uc2u6g8rh9ep7wt3v4sgpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsfzu9vk
Aurora Store : nostr:nevent1qqsy69kcaf0zkcg0qnu90mtk46ly3p2jplgpzgk62wzspjqjft4fpjgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzrpmsjy
RSS
Feeder : nostr:nevent1qqsy29aeggpkmrc7t3c7y7ldgda7pszl7c8hh9zux80gjzrfvlhfhwqpp4mhxue69uhkummn9ekx7mqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgsvzzjy
VIDEOO CONFERENCIA
Jitsi meet : nostr:nevent1qqswphw67hr6qmt2fpugcj77jrk7qkfdrszum7vw7n2cu6cx4r6sh4cgkderr
TECLADOS
HeliBoard : nostr:nevent1qqsyqpc4d28rje03dcvshv4xserftahhpeylu2ez2jutdxwds4e8syspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsr8mel5
OpenBoard : nostr:nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
FlorisBoard : nostr:nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
MAPAS
Osmand : nostr:nevent1qqsxryp2ywj64az7n5p6jq5tn3tx5jv05te48dtmmt3lf94ydtgy4fgpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs54nwpj
Organic maps : nostr:nevent1qqstrecuuzkw0dyusxdq7cuwju0ftskl7anx978s5dyn4pnldrkckzqpr4mhxue69uhkummnw3ezumtp0p5k6ctrd96xzer9dshx7un8qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpl8z3kk
TRADUÇÃO
LibreTranslate : nostr:nevent1qqs953g3rhf0m8jh59204uskzz56em9xdrjkelv4wnkr07huk20442cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzeqsx40
REMOÇÃO DOS METADADOS
Scrambled Exif : nostr:nevent1qqs2658t702xv66p000y4mlhnvadmdxwzzfzcjkjf7kedrclr3ej7aspyfmhxue69uhk6atvw35hqmr90pjhytngw4eh5mmwv4nhjtnhdaexcep0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpguu0wh
ESTEGANOGRAFIA
PixelKnot: nostr:nevent1qqsrh0yh9mg0lx86t5wcmhh97wm6n4v0radh6sd0554ugn354wqdj8gpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyuvfqdp
PERFIL DE TRABALHO
Shelter : nostr:nevent1qqspv9xxkmfp40cxgjuyfsyczndzmpnl83e7gugm7480mp9zhv50wkqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdnu59c
PDF
MuPDF : nostr:nevent1qqspn5lhe0dteys6npsrntmv2g470st8kh8p7hxxgmymqa95ejvxvfcpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs4hvhvj
Librera Reader : nostr:nevent1qqsg60flpuf00sash48fexvwxkly2j5z9wjvjrzt883t3eqng293f3cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz39tt3n
QR-Code
Binary Eye : nostr:nevent1qqsz4n0uxxx3q5m0r42n9key3hchtwyp73hgh8l958rtmae5u2khgpgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdmn4wp
Climático
Breezy Weather : nostr:nevent1qqs9hjz5cz0y4am3kj33xn536uq85ydva775eqrml52mtnnpe898rzspzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgpd3tu8
ENCRYPTS
Cryptomator : nostr:nevent1qqsvchvnw779m20583llgg5nlu6ph5psewetlczfac5vgw83ydmfndspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsx7ppw9
VeraCrypt : nostr:nevent1qqsf6wzedsnrgq6hjk5c4jj66dxnplqwc4ygr46l8z3gfh38q2fdlwgm65ej3
EXTENSÕES
uBlock Origin : nostr:nevent1qqswaa666lcj2c4nhnea8u4agjtu4l8q89xjln0yrngj7ssh72ntwzql8ssdj
Snowflake : nostr:nevent1qqs0ws74zlt8uced3p2vee9td8x7vln2mkacp8szdufvs2ed94ctnwchce008
CLOUD
Nextcloud : nostr:nevent1qqs2utg5z9htegdtrnllreuhypkk2026x8a0xdsmfczg9wdl8rgrcgg9nhgnm
NOTEPAD
Joplin : nostr:nevent1qqsz2a0laecpelsznser3xd0jfa6ch2vpxtkx6vm6qg24e78xttpk0cpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpdu0hft
Standard Notes : nostr:nevent1qqsv3596kz3qung5v23cjc4cpq7rqxg08y36rmzgcrvw5whtme83y3s7tng6r
MÚSICA
RiMusic : nostr:nevent1qqsv3genqav2tfjllp86ust4umxm8tr2wd9kq8x7vrjq6ssp363mn0gpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqg42353n
ViMusic : nostr:nevent1qqswx78559l4jsxsrygd8kj32sch4qu57stxq0z6twwl450vp39pdqqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzjg863j
PODCAST
AntennaPod : nostr:nevent1qqsp4nh7k4a6zymfwqqdlxuz8ua6kdhvgeeh3uxf2c9rtp9u3e9ku8qnr8lmy
VISUALIZAR VIDEO
VLC : nostr:nevent1qqs0lz56wtlr2eye4ajs2gzn2r0dscw4y66wezhx0mue6dffth8zugcl9laky
YOUTUBE
NewPipe : nostr:nevent1qqsdg06qpcjdnlvgm4xzqdap0dgjrkjewhmh4j3v4mxdl4rjh8768mgdw9uln
FreeTube : nostr:nevent1qqsz6y6z7ze5gs56s8seaws8v6m6j2zu0pxa955dhq3ythmexak38mcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5lkjvv
LibreTube : nostr:nevent1qqstmd5m6wrdvn4gxf8xyhrwnlyaxmr89c9kjddvnvux6603f84t3fqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsswwznc
COMPARTILHAMENTO DE ARQUIVOS
OnionShare : nostr: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
Localsend : nostr:nevent1qqsp8ldjhrxm09cvvcak20hrc0g8qju9f67pw7rxr2y3euyggw9284gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuyghqr
Wallet Bitcoin
Ashigaru Wallet : nostr:nevent1qqstx9fz8kf24wgl26un8usxwsqjvuec9f8q392llmga75tw0kfarfcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgvfsrqp
Samourai Wallet : nostr:nevent1qqstcvjmz39rmrnrv7t5cl6p3x7pzj6jsspyh4s4vcwd2lugmre04ecpr9mhxue69uhkummnw3ezucn0denkymmwvuhxxmmd9upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy3rg4qs
CÂMERA
opencamera : nostr:nevent1qqs25glp6dh0crrjutxrgdjlnx9gtqpjtrkg29hlf7382aeyjd77jlqpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqssxcvgc
OFFICE
Collabora Office : nostr:nevent1qqs8yn4ys6adpmeu3edmf580jhc3wluvlf823cc4ft4h0uqmfzdf99qpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsj40uss
TEXTOS
O manifesto de um Cypherpunk : nostr:nevent1qqsd7hdlg6galn5mcuv3pm3ryfjxc4tkyph0cfqqe4du4dr4z8amqyspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzal0efa
Operations security ( OPSEC) : nostr:nevent1qqsp323havh3y9nxzd4qmm60hw87tm9gjns0mtzg8y309uf9mv85cqcpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz8ej9l7
O MANIFESTO CRIPTOANARQUISTA Timothy C. May – 1992. : nostr:nevent1qqspp480wtyx2zhtwpu5gptrl8duv9rvq3mug85mp4d54qzywk3zq9gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz5wq496
Declaração de independência do ciberespaço
- John Perry Barlow - 1996 : nostr:nevent1qqs2njsy44n6p07mhgt2tnragvchasv386nf20ua5wklxqpttf6mzuqpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsukg4hr
The Cyphernomicon: Criptografia, Dinheiro Digital e o Futuro da Privacidade. escrito por Timothy C. May -Publicado em 1994. :
Livro completo em PDF no Github PrivacyOpenSource.
https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf Share
-
@ 9ca8f9b2:70031a71
2024-11-07 09:43:51Opinion about Phoenix Wallet (iphone)
Personally, I love this App! The developers of this app have worked so hard over the years to make the UI of this app as simple and smoothe as it can possibly be as a non custodial wallet.
WalletScrutiny #nostrOpinion
-
@ a012dc82:6458a70d
2024-11-07 08:55:21Table Of Content
-
Unveiling Bitcoin's Legacy Amid Debt Ceiling Debates
-
Bitcoin's Decentralized Nature
-
Bitcoin as a Store of Value
-
Bitcoin's Role in International Remittances
-
Regulatory Challenges and Opportunities
-
Bitcoin and Financial Inclusion
-
Conclusion
-
FAQ
In today's fast-paced digital age, cryptocurrencies have taken the world by storm. Among them, Bitcoin stands tall as the pioneer and most prominent cryptocurrency. As financial systems evolve and debt ceiling debates continue to shape economic policies, it is crucial to examine the legacy of Bitcoin and its impact on the financial landscape. This article aims to delve into the intricacies of Bitcoin's legacy and how it intertwines with the ongoing discussions surrounding debt ceilings. By exploring the factors contributing to the money in motion phenomenon and understanding the role of Bitcoin, we can gain valuable insights into the future of finance.
Unveiling Bitcoin's Legacy Amid Debt Ceiling Debates
The concept of money in motion refers to the dynamic nature of funds circulating within an economy. It encompasses various financial transactions, investments, and movements that shape economic activities. When exploring the legacy of Bitcoin amid debt ceiling debates, it is essential to recognize the unique characteristics that set it apart from traditional currencies.
Bitcoin's Decentralized Nature
One of the key aspects that define Bitcoin's legacy is its decentralized nature. Unlike traditional currencies that are controlled by central banks and governments, Bitcoin operates on a decentralized network known as blockchain. This decentralized structure provides several advantages, including enhanced security, transparency, and the ability to bypass traditional financial intermediaries. As debt ceiling debates raise concerns about the stability of traditional financial systems, Bitcoin's decentralized nature offers a potential solution to mitigate these risks.
Bitcoin as a Store of Value
Bitcoin's emergence as a store of value has been instrumental in shaping its legacy. With a limited supply capped at 21 million coins, Bitcoin exhibits scarcity, making it an attractive option for individuals seeking to preserve their wealth. Amid debt ceiling debates, where economic uncertainties prevail, Bitcoin's status as a decentralized store of value becomes even more appealing. Investors can hedge against inflation and potential economic downturns by allocating a portion of their portfolio to Bitcoin.
Bitcoin's Role in International Remittances
Remittances, the act of sending money across borders, play a significant role in global economies. Traditional remittance channels often involve hefty fees and slow transaction times. Bitcoin has emerged as a viable alternative, offering faster, more cost-effective international transfers. By utilizing Bitcoin's decentralized network, individuals can send and receive funds with reduced friction, bypassing intermediaries and lowering transaction costs. In the context of debt ceiling debates, Bitcoin's role in facilitating seamless cross-border transactions becomes increasingly relevant.
Regulatory Challenges and Opportunities
Bitcoin's legacy also includes its interaction with regulatory frameworks worldwide. As cryptocurrencies gained popularity, governments and regulatory bodies have been grappling with how to incorporate them into existing financial systems. Debt ceiling debates often shed light on the need for effective regulations to address economic challenges. While regulations can provide stability and protect consumers, they should also foster innovation and maintain the core principles of decentralization that define cryptocurrencies like Bitcoin. Striking the right balance is crucial to harnessing the potential benefits of cryptocurrencies while mitigating risks.
Bitcoin and Financial Inclusion
Financial inclusion, the accessibility and availability of financial services to individuals and businesses, remains a pressing global challenge. Bitcoin's legacy intertwines with the pursuit of financial inclusion by providing an alternative financial system that is accessible to anyone with an internet connection. This opens up opportunities for the unbanked and underbanked populations to participate in economic activities and access financial services. Amid debt ceiling debates, where financial systems' stability is under scrutiny, Bitcoin's potential to foster financial inclusion gains even greater significance.
Conclusion
The legacy of Bitcoin amid debt ceiling debates encompasses its decentralized nature, role as a store of value, facilitation of international remittances, interaction with regulatory frameworks, and potential for financial inclusion. As the world grapples with economic uncertainties, Bitcoin's unique characteristics offer solutions and opportunities for individuals and the financial system as a whole. By embracing the potential of cryptocurrencies like Bitcoin, we can pave the way for a more inclusive, efficient, and resilient financial future.
FAQ
What is Bitcoin's role in the legacy of money in motion amid debt ceiling debates? Bitcoin plays a significant role in the legacy of money in motion amid debt ceiling debates. Its decentralized nature, ability to serve as a store of value, facilitation of international remittances, and interaction with regulatory frameworks all contribute to shaping the future of finance in the midst of these discussions.
How does Bitcoin's decentralized nature impact its legacy amid debt ceiling debates? Bitcoin's decentralized nature ensures that it is not subject to the control of central banks or governments. This characteristic provides a potential solution to the risks associated with debt ceiling debates and offers enhanced security, transparency, and the ability to bypass traditional financial intermediaries.
Why is Bitcoin considered a store of value amid debt ceiling debates? Bitcoin's limited supply and scarcity make it an attractive option for individuals seeking to preserve their wealth amid debt ceiling debates. As economic uncertainties prevail, Bitcoin's status as a decentralized store of value provides a hedge against inflation and potential economic downturns.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ fd208ee8:0fd927c1
2024-11-07 07:28:06The newspaper barons are all into crypto, now
Watching the outsized-impact we crypto enthusiasts (I'm including Bitcoin in that category), had on the 2024 USA presidential election, was a sobering affair. At the moment, our impact is primarily over the voting box, but, already, indirectly, (over Elon Musik, Donald Trump, and Jack Dorsey, etc.) through our sheer wealth (and the ingenuity that brought us that wealth) being able to influence the voting population, by changing/shifting the communications channels and influencing what is written there.
Elon even reached deep into his foreign-learned bag of political tricks and started handing out money, directly, to petition signers.
Survival of the fittest, ongoing
Now, you all know that I have full respect for an expert player, when I see one, so no hating the hustle, from my side. We all play the hand we are dealt, and the political game is now such a pigsty, that you have to get a bit dirty, to have a chance at winning. Trying to stay neat and above the fray cost Republicans the last election.
It was the most dramatic display of the greatest power following the best money, that has been seen, since the Medici family began minting gold coins. The entire world is in shock. Change is upon us.
He who has the best money, makes the rules.
On a smaller, but not insignificant scale, private wealth and access to Bitcoin funding, have allowed quite a few of us Nostriches, to dedicate time and energy toward promoting and developing the New Internet. Whereas, other people's hobby is increasingly the night shift at the gas station, or doing something mind-numbing, to escape the realities of their current economic misery.
You don't need money to be here, but you can spend more time here, if you have money. And we are here, writing the rules. We call them NIPs.
Same ole, same ole
But back to us Bitcoiners...
I increasingly don't see us morally any different than the clever people crowding into any safe asset, during any financial crisis. Like the people who bought agricultural land, gold, and Swiss Francs, before the Reichsmark melted down. The people who had that stuff, mostly managed to keep it, and their children and grandchildren have inherited it. Or they managed to marry back into families, that have done so, by remaining in the same social class, through beauty or talent.
We Bitcoiners have a good narrative to go along with our flight to economic safety, but everyone has that narrative. Humans have a conscience and need to justify their own actions, to themselves. I'm also a goldbug, you see, and a stockholder, and all three assets are rife with the same virtuous narrative.
How do we save our financial behinds, without being evil?
Some people are simply more situationally aware and have more agency, by nature and circumstances, and they adapt faster. It's not mere intelligence, rather, it also requires a willingness to act and take risks. There's an element of chance to it, but it's still always the same types of people ending up with the assets, with the winners slightly shifting with each round, due to evolution and changes in the environment.
Charity was invented, to get such people to willingly share their assets, or the fruits of their assets, for the common good. So, rather than fret over the morality of the asset, itself, the better response is to consider stepping up your charity (effort or payments), to balance out the inevitable negative impact of the coming Age of Bitcoin Inequality.
Coming down from the ATH
Even now, Bitcoin isn't the only safe asset; it's just the most-fungible and partitionable one, so that it's the one most akin to money. And lines are being blurred, as corporations, funds, governments, and insurers discharge dollars and stock up on harder reserve assets, including Bitcoin.
They can hear the money printers rolling out, already, because nobody can print-n-spend, like Trump can. Let's not forget that the money for the last big bump came from the infamous Trump stimmy checks, that lots of us stacked on crypto.
As Bitcoin flows into such markets, the power will rest with both groups (the direct-hodlers and the title-holders), although the hodlers will initially have the upper hand. I say, initially because many hodlers will need to discharge or invest Bitcoin, to live off of it, but the others don't need to, so it should eventually even out. It could take dozens or even hundreds of years to rebalance. By then, the world will be a very different place, and we don't know if Bitcoin will even still be a part of it.
Assets come, assets go, and I'm just glad I didn't let down my forefathers, by leaving them with the first generation, who failed to adapt. Even if I'm a bit late, to the Bitcoin game, the ball is still in play.
May the best money win. And may it be mine. And may I do good with it.
-
@ fd208ee8:0fd927c1
2024-11-07 07:22:14Unsucking the feed is real
As a Nostrich with an interesting, thought-provoking, and informative feed... a feed so good, that we're creating clients just to look at that feed... a feed that puts a lie to the idea that Nostr is nothing, but people reposting from Twitter or rehashing worn-out Bitcoin memes... a feed that I personally and increasingly enjoy perusing... I am here to tell you that the feed is real.
It's taken me over a year, to produce this feed. I literally spent hours and hours, day in and day out, scouring the Nostrverse for people worth introducing other people to. It was brutally difficult, as I was fighting the inherent nature of the Nostr clients and relays, in their current, most-popular form.
It goes like so...
Here are the steps I took, that sometimes weren't possible to take, until I tried to take them, and that still will sometimes break your client because the clients are often intentionally designed to steer you into having one particular feed:
1) Make a screenshot of your current relay list and copy your follows list. 2) Unsubscribe from all the relays, that you are currently subscribed to. Your feed should disappear. If it doesn't, or it doesn't allow for this, switch to a different client app because yours is corrupted. 3) Unfollow everyone. Delete the whole list. You are taking your follows private, which will invariably result in only following npubs whose stuff you actually want to see, since there's no longer any virtue-signaling going on. Also, it's easier to explain having no list, than a very short one. If your client doesn't allow for this, or starts throwing error messages and freezing up, then switch to a different client app because yours is corrupted. 4) Curate your copied follows list. Go line by line and look at the feed produced by the npub on that list. * Do you want to see that in your feed, going forward? * Do they produce original content and/or are they interesting conversationalists, in the replies? * Have they been active, within the past three months? * Are they simply good friends or real-life acquaintances, that you want to keep tabs on? * If not, cross out their name. * If you have been following someone because they repost or quote interesting things, look at who they've been reposting and follow them, instead. 5) Of the npubs remaining on your list, go through and select the 10 most interesting ones, and look at the reposts and quotes in their feed, and their topical lists like \"Favorites\", \"Devs\", \"Recipes\", etc. (Not their follows list, unless it's quite short, as follows tend to be full of people they follow for social-signaling or client-functional reasons, that they don't actively look at.) Find some new follows, there. 6) Now, set up a personal relay and add all the follows, that made the cut, to your allowed-npubs list. Do not add people to the list, just to make them feel better, or because you feel guilty, as they follow you, or to keep them from yelling at you. Remember, they can't see the list! 7) Think about the topics you find interesting, and add an allowed-keywords list (this is better than hashtags, as it searches the entire content of the notes), with the OR operator (these allowed npubs OR these allowed topics). 8) Make sure that you choose words likely to find the content you are most-interested in, and not people just ranting about it or spamming (those are great additions to your relay's block-list). If you are Muslim, for instance, instead of "Islam" or "shariah", choose "hadith" or "riba", as those are words more-likely to be used by people who know what they are talking about. If you are into bread baking, add "sourdough", "rye", "yeast", or "whisk", but don't add "bread" or "carbs". Once a note from those people shows up in your feed, and their feed looks like someone interesting, you can add their npub to your allow list. Remember: The topics are there to find people to add to the allow list, not merely for their own sake, as this is not a topical relay, but a personal one. 9) Open up a faucet (or relay syncing) with some of the big relays you previously unsubscribed from, some WoT relays, and some of the paid relays (nostr.land, nostr.wine, nostr21.com, and sovbit.host, for example). Your relay will filter that feed and only accept the events from the people and topics on your list. As your relay becomes more popular, npubs will begin writing directly to it, and the connections to other relays will sink in significance. 10) Go to your client of choice and subscribe to your new relay. Also subscribe to some topical relays, or curated neighborhood relays, you find interesting or your frens are running. This is an easy way to find new, interesting npubs, to add to your own relay.
That's a lot of work, you say? Yes, but the result is great, and you are now fully in-charge of your own feed. You also -- here's the cool part -- have a feed good enough, that other people can add your feed to theirs and enjoy your manual curation. As you refine and expand your feed, theirs will also be refined, in parallel. You are now an official Nostr Community Curator. My sincere congratulations.
Why is this so hard?
This is only a lot of work because the clients aren't designed to interact with relays, to this extent, as they were created to service mega-relays, download all their crap to your local cache, and adjust the feed over the follows/mutes lists. This was an idea borne of the axiom that Relays Are Hard, so there will only ever be a handful of them, where we'd all clump together and the relay operators would never judge the quality of someone's content. Then, some unusually clever people made relays increasingly easy, and the mailbox communication model was invented, and here we are.
What we have now, and that is slowly growing in popularity, among the #NostrIntelligentsia, are Nostr clients aimed at curating and viewing individual relays or personalized sets of smaller or more-specialized relays. The reigning client devs refused to give us those clients, and most of us aren't up to developing our own clients, so the relay devs took matters into their own hands and made the clients themselves. The free market remains undefeated.
This is a total game-changer. Last one to board this train is a rotten egg.
Originally, relays were supposed to be completely stupid and clients were supposed to be completely smart, but it's now actually the other way around, because most relay devs have a market-born incentive to make their content highly customizable and appealing to individuals (so that more people run relays).
But what about algos?
Can't you just slap an algo on top of Damus, Lol, or Primal relays, and get the same result? I would argue... no. No, you can't. Or, rather, only in the short to medium term.
Running your own relay, is running your own server. You are now intellectually independent, at a machine-level, and therefore a fully sovereign consumer. If you then use algos to control your own server, or in a client that subscribes to your own server, then you can further-refine a feed that is already in a high-to-you-signal state, rather than risking an algo inching you toward the Consensus Feed.
I have noticed that my own feed is slowly drifting away from the ReplyGuy-Cryptobot-Porny-Bitcoin-Meme Dumpster Fire, that almost everyone else is looking at, and it's due to running my own relay. If I use DVMs, those algos sometimes refer to relays I intentionally avoid, so they return results according to those relays. The results are as underwhelming, as you would expect, and often are simply 31 flavors of the Trending List.
But, that isn't your problem, anymore. From here, you can actively expand and refine your feed, over your whitelist, the topics, and your personally-managed algos.
Happy Nostr-ing!
-
@ 45bda953:bc1e518e
2024-11-07 06:56:26PREFACE
This is a controversial rambling, just thoughts on some interesting phenomena with regards to the evolution of societal norms, comparisons and oddities with regards to the distinct differences of understanding and mentality of people a couple millennia ago. I touch on cultural fundamentals, feminism, masculinity, information warfare and the protection of what makes society function, the protection of women from harm. It has some comic relief elements worked in to just soften the dark and morbid reality of recorded human history.
...
The Streisand Effect
In 2002 or 2003, I am not certain, a dude named Kenneth was being flown along the coast taking pictures from a helicopter. Flying past Barbara Streisand's luxury coastal home in Malibu California he took another pretty picture. This picture among hundreds was posted on a website where they were documenting and measuring coastal erosion with the intent to help make informed policy decisions. He was being flown by, out at sea and not directly over her property. It caused her much emotional distress. He was sued $50 million for violating her privacy. She believed it to be an invasion of her privacy, like Nancy Pelosi believed the January 6 invasion of Capitol was a violent insurrection. Imagine that. The lawsuit was chucked out by the courts and she was ordered to pay Kenneth $177,000 to cover his legal expenses. Before the lawsuit the image had been downloaded six times. Obviously it had gone viral after the lawsuit. Since the lawsuit, well... man, wow, certain scummy 4chan meme drenched websites were on fire. Everyone was talking about Barbara Streisand and sharing pictures and jokes of her house for weeks. It was ironic and hilarious. The purpose of the lawsuit was to remove the picture from the internet and the result was everyone was poking fun at her expensive mansion. The memes, I can't even...
Imagine the precedent set and lawsuits against google for satellite maps and street view had her case won.
In this situation there were a few weird coincidences. I will label it, the cause, the desire and the outcome. None of them were predictable because the collective social internet was so fresh it changed how everything worked.
The cause: Guy flies and takes pictures for research, probably does not even know it's her house.
The desire: She wants the picture removed and receive compensation for her emotional distress. Nothing less than $50 million will be sufficient.
The outcome: A new type of cause and affect is discovered with regards to a world where everyone has equal access to the masses. No longer are celebrities talking at us through small or large square windows in our theatres and homes. We get to talk back at them and about them and explore their weaknesses and failures. We get to embarrass and humiliate them if they do not behave like decent normal people should. We don't mind their ivory towers. Just don't pick on the average Joe anymore, the average Joe collectively has a voice more powerful than yours now. Like Leonardo DiCaprio preaching about global warming from his private jet. We don't care about you flier miles, just don't be a hypocrite.
Which got me thinking. As a peasant, proletariat, a plebeian, how do you make your voice heard in a time where there is no media? I am not talking about no social media, I mean ancient times, no media. No local newspaper where you can post a missing cat picture. No radio with which to advertise your business. Nothing. A time where the king has a dude who shouts decrees from a paper on a hill. Those type of times.
It bothered me, thankfully I have an extensive library of history available to study and find an answer to this interesting question. I found it in the book of Judges in a wild west of ancient savagery where kings would cut off the heads of men just to bed the latters wives. A time where woman were property. Yes, crazy wild times.
Let us set a precedent for this cultural phenomenon and work our way back to media, the virality of said media and the subsequent outrage generated by the news spread by the channels/mediums of media. An ancient example of problem, reaction, solution.
First let's discover an ancient outrage on a smaller more localised platform and then scale it up to something more spectacular.
Genesis Chapter 34
1: Now Dinah the daughter of Leah, whom she had borne to Jacob, went out to see the daughters of the land. ---She wanted to make friends with other girls and was allowed to leave her families protection unescorted.--- 2: And when in Shechem the son of Hamor the Hivite, prince of that country, saw her, he took her and lay with her, and violated her. ---In those days, princes were literally just the son of the chief in the settlement, they were nothing special and they were common and illiterate agrarian goat herders, just like Jacob. You could find a prince every 30 kilometres in those regions at the time. A dime a dozen.--- 5: And Jacob heard that he defiled Dinah his daughter. Now his sons were with his livestock in the field; so Jacob held his peace until they came. 7: And the sons of Jacob came in from the field when they heard it; and the men were grieved and very angry, because he had done a disgraceful thing in Israel by lying with Jacob's daughter, a thing which ought not be done. ---The modern definition of non consensual laying is rape. It is still a thing that ought not be done to this very day.--- 8: But Hamor spoke with them, saying, "The soul of my son Shechem longs for your daughter. Please give her to him as a wife."--- Now I see this guy as trying to appease the group of angry men, appealing to taking the responsibility of caring for the violated girl off her families hands as she is now become a liability. Her worth has been "degraded" by loss of virginity. Her brothers felt this violation was disrespectful, not only to their sister but also to their entire family. Imagine a guy rapes your sister and then pops in the next day and is like "Bro, she resisted, but I love her more than she could possibly understand. WTF."--- 9: And make marriages with us; give your daughters to us, and take our daughters to yourselves. 10: So you shall dwell with us, and the land shall be before you. Dwell and trade in it, and acquire possessions for yourselves in it.” 11: Then Shechem said to her (Dinah's) father and her brothers, “Let me find favor in your eyes, and whatever you say to me I will give. 12: Ask me ever so much dowry and gift, and I will give according to what you say to me; but give me the young woman as a wife.” 13: But the sons of Jacob answered Shechem and Hamor his father, and spoke deceitfully, because he had defiled Dinah their sister. ---The Israelite brothers must have read Sun Tzu, because they were at a huge numerical disadvantage. This might be why these Hivite gents were so confident in confronting them directly. They probably had a whole entourage of armed men with them during these negotiations. It's just the way men meet in barbaric times. With more and bigger spears.--- 14: And they said to them, “We cannot do this thing, to give our sister to one who is uncircumcised, for that would be a reproach to us. ---They opted to have a literal dick measuring contest. The first in recorded history.--- 15: But on this condition we will consent to you: If you will become as we are, if every male of you is circumcised, 16: then we will give our daughters to you, and we will take your daughters to us; and we will dwell with you, and we will become one people. 17: But if you will not heed us and be circumcised, then we will take our daughter and be gone.” ---Now Abraham had himself circumcised as an adult being the first dude to undertake the procedure. He made it obligatory that his male descendants should all be circumcised a few days after birth. To the modern observer this "command" from god to slice off a piece of your dick seems stupid. But is it? Thought experiment. Let's say Bob lives in dangerous times with dangerous men in a desert where there are no modern ablution facilities. John rocks up at a Bob's tent and claims he is family of Bob travelling far and asks for hospitality and to be hosted for the night. Bob is like hmm, "He speaks my language, he has a similar complexion to me, but his bandit buddies might be hiding behind a hill waiting for his signal when me and my family are fast asleep." So Bob gives him lots of nice wine to drink and they break bread together. Later John needs to take a piss, Bob tells him that he also wants to take a leak, Bob walks with John behind a bush. John pulls up his robe whips out his dick and Bob can then decide how he is going to handle the situation from there. Seeing John's uncircumcised appendage Bob is safe to assume that him and his family are in danger. Also think of how vulnerable John is with his pants down draining the main vein, it might be Bob's opportune and only moment to strike first and unexpectedly. Bet you never heard an explanation like that in favour of having a cut foreskin. A secret sign of sign of familiarity. As a pragmatist I have interpreted all God's commandments following common sense and useful logic to explain them.--- 18: And their words pleased Hamor and Shechem, Hamor’s son. 19: So the young man did not delay to do the thing, because he delighted in Jacob’s daughter. ---He was like LFG bring that knife I'm ready. I can imagine Shia LaBeouf playing this part in the NETFLIX original series.
--- He was more honourable than all the household of his father. ---I think this simply means the bravest. Being circumcised as a little kid is easier when you have no say in the matter. You require more mental fortitude as a grown man to voluntarily submit to this procedure. Like playing Russian roulette with a fully loaded revolver.---
20: And Hamor and Shechem his son came to the gate of their city, and spoke with the men of their city, saying: 21: “These men are at peace with us. Therefore let them dwell in the land and trade in it. For indeed the land is large enough for them. Let us take their daughters to us as wives, and let us give them our daughters. 22: Only on this condition will the men consent to dwell with us, to be one people: if every male among us is circumcised as they are circumcised. 23: Will not their livestock, their property, and every animal of theirs be ours? Only let us consent to them, and they will dwell with us.” --- They really had to make it sound like a good deal.
24: And all who went out of the gate of his city heeded Hamor and Shechem his son; every male was circumcised, all who went out of the gate of his city.
25: Now it came to pass on the third day, when they were in pain, that two of the sons of Jacob, Simeon and Levi, Dinah’s brothers, each took his sword and came boldly upon the city and killed all the males. 26: And they killed Hamor and Shechem his son with the edge of the sword, and took Dinah from Shechem’s house, and went out. ---I must admit that this is as awesome as 300 or some Herculean feat. These okes were Alpha Chads.--- 27: The sons of Jacob came upon the slain, and plundered the city, because their sister had been defiled. ---So they sent their sister as a gift to show good faith albeit deceitfully I doubt she was wise to their plan. They knew that the guy cannot have sex with her because time has to pass for his wound to heal.--- 28: They took their sheep, their oxen, and their donkeys, what was in the city and what was in the field, 29: and all their wealth. All their little ones and their wives they took captive; and they plundered even all that was in the houses. ---The small tribe of Israelites probably had a baby boom as a people because of the influx of women gained through this specific conquest.---
30: Then Jacob said to Simeon and Levi, “You have troubled me by making me obnoxious among the inhabitants of the land, among the Canaanites and the Perizzites; and since I am few in number, they will gather themselves together against me and kill me. I shall be destroyed, my household and I.”
31: But they said, “Should he treat our sister like a harlot?” --- To all the feminists who say "How dare you deny a girl the freedom to go where she wants a chase her dreams. Girls can do anything! Girl power!" No, they just end up in some sleazeball's harem. Girls can only do "anything" in Western Civilisation because men have agreed on a very specific set of moral principles which are Christian in nature. Biblical record teaches us why we have freedom, how to facilitate and maintain these freedoms. If you are a feminist you should find a good man and thank him for disciplining his base desires and holds you up with esteem and respect. Feminists are destroying the pedestal men built to support them. But I digress once again.
So now we know why ancient women were under men's protection as their most valuable possession. Women could not acquire and retain agency by themselves for themselves by reason of their physical vulnerability in a wilderness of savages. Not rocket science, just common sense. When cows are money women are not entrepreneurs. There are technological and societal advances required before womens gain of agency and independence is possible.
We have just witnessed how a small group of men conspired and through cunning devised a strategy wherewith they managed to avenge a wrong committed against them. Tooth for teeth and eye for eyes. Violence begets escalation of violence. It might be the first time a nation went to war over a woman's honour. It's not the last time nations went to war over a woman either.
About 600 hundred years later, circa 1100 BC.
Judges 19
1: And it came to pass in those days, when there was no king in Israel, that there was a certain Levite staying in the remote mountains of Ephraim. He took for himself a concubine from Bethlehem in Judah. ---A concubine is a woman under the legal protection of a man who performs the same duties as a wife but does not receive the same status and social recognition as a wife. She cohabits and even bears children. Sounds rough and unpleasant. Almost like a type of slave. A concubine is rarely given in marriage and more frequently exchanged like a good. I believe that the man was legally obligated to support and protect her but anyone can imagine that this is not the ideal outcome for a woman of any culture born in any age. It must have sucked.--- 2: But his concubine played the harlot against him, and went away from him to her father’s house at Bethlehem in Judah, and was there four whole months. ---Here it helps to have some perspective on where the Overton window was lying when this episode of history was recorded and happened. To a lesser extent it was similar just a century or two ago. Have you watched Roland Emmerich's movie The Patriot starring Mel Gibson and Heath Ledger. Do you remember the scene where they had to tie Gabriel Martin (Heath) up when he spent the night over at his sweethearts house. This was because her father had to be able to guarantee the chastity of his daughter on the day of her wedding. No unmarried girl could freely travel alone about the countryside without being under supervision and when she was permitted to court a suitor, a chaperone was required to escort the couple. This was to ensure that no accusation of unseemly behaviour could be made without angering the man who is responsible for her protection. If a girl was raped there were massacres. Some cultures even had intrusive forms of testing the bride to be for proof of virginity, sometimes before and sometimes after the marriage bed. If a woman was a product in a transaction or given as a bride she was required to be a virgin unless she was sold as a whore, meaning for a cheap price. The father, brothers and later the husband carried responsibility for her chaste and loyal behaviour. This does not mean that men behaved with honour. Most were self righteous pigs. But many were good husbands and fathers.--- 3: Then her husband arose and went after her, to speak kindly to her and bring her back, having his servant and a couple of donkeys with him. So she brought him into her father’s house; and when the father of the young woman saw him, he was glad to meet him. 4: Now his father-in-law, the young woman’s father, detained him; and he stayed with him three days. So they ate and drank and lodged there. ---She was not having indiscriminate affairs with random men. She just missed her family and ran away. She would not have been labelled a harlot if she was travelling with her husbands blessing and an escort for protection, she ran away and he could not protect her or be witness to her behaviour. Almost like being guilty by association but more like being guilty for lack of evidence. She becomes Schrodinger's cat. Faithful? Unfaithful? You could not know even with the box open.--- 5: Then it came to pass on the fourth day that they arose early in the morning, and he stood to depart; but the young woman’s father said to his son-in-law, “Refresh your heart with a morsel of bread, and afterward go your way.” 6: So they sat down, and the two of them ate and drank together. Then the young woman’s father said to the man, “Please be content to stay all night, and let your heart be merry.” 7: And when the man stood to depart, his father-in-law urged him; so he lodged there again. 8: Then he arose early in the morning on the fifth day to depart, but the young woman’s father said, “Please refresh your heart.” So they delayed until afternoon; and both of them ate. 9: And when the man stood to depart—he and his concubine and his servant—his father-in-law, the young woman’s father, said to him, “Look, the day is now drawing toward evening; please spend the night. See, the day is coming to an end; lodge here, that your heart may be merry. Tomorrow go your way early, so that you may get home.” 10: However, the man was not willing to spend that night; so he rose and departed, and came opposite Jebus (that is, Jerusalem). With him were the two saddled donkeys; his concubine was also with him. 11: They were near Jebus, and the day was far spent; and the servant said to his master, “Come, please, and let us turn aside into this city of the Jebusites and lodge in it.” 12: But his master said to him, “We will not turn aside here into a city of foreigners, who are not of the children of Israel; we will go on to Gibeah.”---The city of Jerusalem would would not be conquered by king David for another 100 years. This guy did not want to trust foreigners who did not respect his culture and customs with the security of his party. It seems wise. He opted to stay with people who were kin.--- 13: So he said to his servant, “Come, let us draw near to one of these places, and spend the night in Gibeah or in Ramah.” 14: And they passed by and went their way; and the sun went down on them near Gibeah, which belongs to Benjamin. 15: They turned aside there to go in to lodge in Gibeah. And when he went in, he sat down in the open square of the city, for no one would take them into his house to spend the night. ---He arrived late during the day as well making it difficult to arrange lodging at the last minute.--- 16: Just then an old man came in from his work in the field at evening, who also was from the mountains of Ephraim; he was staying in Gibeah, whereas the men of the place were Benjamites. 17: And when he raised his eyes, he saw the traveller in the open square of the city; and the old man said, “Where are you going, and where do you come from?” 18: So he said to him, “We are passing from Bethlehem in Judah toward the remote mountains of Ephraim; I am from there. I went to Bethlehem in Judah; now I am going to the house of the Lord. But there is no one who will take me into his house, 19: although we have both straw and fodder for our donkeys, and bread and wine for myself, for your female servant, and for the young man who is with your servant; there is no lack of anything.”
20: And the old man said, “Peace be with you! However, let all your needs be my responsibility; only do not spend the night in the open square.” ---The old man knew how lawless his city was and did not want to leave the Levite vulnerable in the town square, unfortunately the strangers presence in the city was already noted.--- 21: So he brought him into his house, and gave fodder to the donkeys. And they washed their feet, and ate and drank. 22: As they were enjoying themselves, suddenly certain men of the city, perverted men, surrounded the house and beat on the door. They spoke to the master of the house, the old man, saying, “Bring out the man who came to your house, that we may know him carnally!” 23: But the man, the master of the house, went out to them and said to them, “No, my brethren! I beg you, do not act so wickedly! Seeing this man has come into my house, do not commit this outrage. ---He is asking them nicely without physical authority to respect his private property.--- 24: Look, here is my virgin daughter and the man’s concubine; let me bring them out now. Humble them, and do with them as you please; but to this man do not do such a vile thing!” ---How sad that a woman's honour is traded for a mans personal safety. This history is definitely not a heroes epic.--- 25: But the men would not heed him. So the man took his concubine and brought her out to them. And they knew her and abused her all night until morning; and when the day began to break, they let her go. ---Many modern day scholars of the humanist persuasion pull up their noses at Biblical texts precisely because of these types of occurrences recorded in it. When a historian is willing to record for posterity their failures as well as their victories it only garners trust that the history is true and unmolested by those who would wish to hide and twist the truth to suit their narrative or motives. The aftershock of this event was and is still significant and warrants explanation to the descendants of these people to help them understand their current reality at the time of learning it 2800-2000 years ago. The Bible is not a toy, it is also not a fairy tale. It is the most comprehensive exposition of the human condition currently available for study.--- 26: Then the woman came as the day was dawning, and fell down at the door of the man’s house where her master was, till it was light. 27: When her master arose in the morning, and opened the doors of the house and went out to go his way, there was his concubine, fallen at the door of the house with her hands on the threshold. 28: And he said to her, “Get up and let us be going.” But there was no answer. So the man lifted her onto the donkey; and the man got up and went to his place. ---The modern reader of this might feel a crime of murder and rape was committed. I assure you that this is not the crime. The crime here is that private property was vandalised and destroyed. I pity the woman with my modern Western mind. But as a student of history I have to face the fact that the man was the victim in his day and age. The emotions and pain of this event is not described and could not be described in it's full detail. We do not know if a distraught and scared man was lying inside the house crying, being shushed and detained by his host? I doubt that this was the case, I can only speculate. We only have the information which was deemed sufficient and necessary to be carved onto a slab of stone or scribed onto papyrus. Historians of ages past were not as privileged as I to be able to write and babble thousands of words without the laborious cost which written or carved words claimed from the ancient and even more recent thinkers. Modern critics of ancient texts are not sufficiently recognising these costs. We learn more important lessons from histories scandals than we do from it's triumph's.--- 29: When he entered his house he took a knife, laid hold of his concubine, and divided her into twelve pieces, limb by limb, and sent her throughout all the territory of Israel. 30: And so it was that all who saw it said, “No such deed has been done or seen from the day that the children of Israel came up from the land of Egypt until this day. Consider it, confer, and speak up!” --- Wait what? This guy gone did what? He chopped his wife into 12 pieces? If there was a king which there was not he could have made a plea for justice. If there was a court he could have made a claim. If he had a gun he could have shot them all in a righteous fury. He wanted justice but justice did not have a door for him to knock on. His own people whom he chose to trust above the foreigner abused his trust. It is here where I solemnly confer that it's better to not have expectations of valour from people you don't know, don't trust if you can help it. No one is coming to save you. I'm sorry? I forgot to explain why he couriered his concubines corpse all across the country you say. He did it because he did not have a mobile phone, facebook, twitter, newspapers, radio, or cable TV from where he could broadcast the injustice and pain he and his deceased concubine was subjected to. He knew to get his situation trending on the network of human conversation he had to create sensation. A Streisand effect but intentionally. A rallying cry, like Peanut the squirrel, just a bit more gruesome.---
Judges 21
1: So all the children of Israel came out, from Dan to Beersheba, as well as from the land of Gilead, and the congregation gathered together as one man before the Lord at Mizpah. 2: And the leaders of all the people, all the tribes of Israel, presented themselves in the assembly of the people of God, four hundred thousand foot soldiers who drew the sword. 3 (Now the children of Benjamin heard that the children of Israel had gone up to Mizpah.) Then the children of Israel said, “Tell us, how did this wicked deed happen?” 4: So the Levite, the husband of the woman who was murdered, answered and said, “My concubine and I went into Gibeah, which belongs to Benjamin, to spend the night. 5: And the men of Gibeah rose against me, and surrounded the house at night because of me. They intended to kill me, but instead they ravished my concubine so that she died. 6: So I took hold of my concubine, cut her in pieces, and sent her throughout all the territory of the inheritance of Israel, because they committed lewdness and outrage in Israel. 7: Look! All of you are children of Israel; give your advice and counsel here and now!”
8: So all the people arose as one man, saying, “None of us will go to his tent, nor will any turn back to his house; 9: but now this is the thing which we will do to Gibeah: We will go up against it by lot. 10: We will take ten men out of every hundred throughout all the tribes of Israel, a hundred out of every thousand, and a thousand out of every ten thousand, to make provisions for the people, that when they come to Gibeah in Benjamin, they may repay all the vileness that they have done in Israel.” 11: So all the men of Israel were gathered against the city, united together as one man.
12: Then the tribes of Israel sent men through all the tribe of Benjamin, saying, “What is this wickedness that has occurred among you? 13: Now therefore, deliver up the men, the perverted men who are in Gibeah, that we may put them to death and remove the evil from Israel!” But the children of Benjamin would not listen to the voice of their brethren, the children of Israel. 14: Instead, the children of Benjamin gathered together from their cities to Gibeah, to go to battle against the children of Israel. 15: And from their cities at that time the children of Benjamin numbered twenty-six thousand men who drew the sword, besides the inhabitants of Gibeah, who numbered seven hundred select men. 16: Among all this people were seven hundred select men who were left-handed; every one could sling a stone at a hair’s breadth and not miss. 17: Now besides Benjamin, the men of Israel numbered four hundred thousand men who drew the sword; all of these were men of war. ---A civil war in which 65100 men were slain broke out among distantly related brethren. The idea I am trying to convey is that if a man has no speech he cannot campaign for his desired cause. Sensation and virality propels speech into the public arena of popular discourse and is discussed until the prevailing message is precise and clear. If there is no shock factor your speech falls on the ground before your feet. If your speech aligns with the general narrative everyone agrees and nods but the impact of your speech is marginal.
I am glad that we are in a new age where human beings are not so atrociously violated by men with power as it was in ancient times. No wait, it's still a problem. Women are still abused and brothers are still violating each others property and different groups with different interests are still bombing the shit out of each other.
What gives me hope is this.
The internet has dropped the barriers of audible speech and enabled everyone equal access to generate Streisand effects of their own making. Purposely and accidentally.
We are the new mainstream media. Podcasters, influencers, youtubers, and bloggers. We get to decide and form narratives and we get to put our ideas in the arena to battle for acceptance and prominence. The world is now our oyster just as much as it was Barbara Streisand's in the golden age of Hollywood before the internet was there to humble her. Time will tell if we are collectively better custodians of this responsibility than celebrities, corporations and governments. The responsibility of forming the narrative. Not centrally, but decentralised. Let good ideas form and old ideas rest.
Can we be a voice of reason and bring peace and order to a chaotic clown world through the power of speech and ideas? I can only hope.
Echdel
bitbib
-
@ f462d21e:1390b6b1
2024-11-07 03:52:04eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyIsImZlZWRiYWNrIjp7ImZlZWRiYWNrIjowLCJwYWdlciI6eyJ0b3RhbEl0ZW1zIjowfSwibWVzc2FnZSI6Im5vIHJlc3VsdHMgZm91bmQifX0=
-
@ df478568:2a951e67
2024-11-07 03:25:45I'm writing a long form post from the Yakihonne app I downloaded from the Aurora store. I signed in using Amber. This means I never needed to enter my private key into the app. I also didn't provide an email, nor password.
This is a link to Clark Moody's Dashboard I made by clicking a button and pasting the link.
This post won't be too long as I'm testing the software out, but it's not so bad for being so new. It even let's you save drafts.
https://nostree.me/marc26z@nostrplebs.com/ 869,210
-
@ b184e3ed:27924b0d
2024-11-07 03:06:37When I joined AA, this question started to haunt my thoughts during those frequent nighttime anxiety attacks. Among all the chaos in my life, there were a few things I was certain of. And one of those things was the certainty of never having felt God, I didn't even know that God was something you could feel. For me, when I started the 12-step program, God was a social construct, something humans had invented to control a society thirsty for basic survival instincts. And perhaps I wasn't so wrong, but like everything in life, this was only half the truth. Despite my deep cognitive analysis that my anxiety forced me to do almost every night for hours, often until the first ray of sun pierced my bedroom window, my spiritual bias didn't allow me to see the whole picture, or a complete reality. On that side, there had always been a void Later, I realized that this emptiness was the main cause of all my problems. From there came that feeling of always being incomplete, that anxiety of always feeling like something was missing, that need to always want to fill voids that weren't mine, without realizing that it was only creating more emptiness within me Once, in those heart-to-heart talks that we in AA call sponsorship, my soul expressed the painful doubt, 'What does it mean to feel God?' My sponsor simply replied, 'I assure you that when you feel God, you won't doubt that what you feel is God. There is no doubt in matters of God. And so I left, with that answer that left me right where I started. And with more doubts. Why is there no doubt in matters of God?
After thinking about it for so long, I paused for a few seconds. I closed my eyes and decided, for the first time, to talk to this so-called God. I let go of all my feelings, all my disbelief, and I prepared myself to accept anything different from what I already had, because what I had wasn't working for me at all. With all sincerity and feeling a pressure in my chest, closer to my heart than usual, I asked in a low voice God, what does it feel like to feel you? What should I do to feel you? What's the manual for feeling you? I've tried everything, I don't know what else to do, what else to plan. I accept that I need to feel you. Everyone tells me that when I feel you, everything will make sense and only then will I start to let go of this violent need to consume my drug of choice. But nobody tells me how. What am I not seeing? Please, give me something. I can't take it anymore, I'm running out of strength, I'm wasting my life stuck in the same cycle. I can't do this anymore, help me feel you. Then a pain began to flow, but a particular one that every addict knows, that soul-deep pain that comes from emptiness, that pain that turns on the faucet of tears that began to flow non-stop. I allowed myself to feel that pain, everything turned dark and negative, suicidal thoughts returned, hate, resentment, selfishness, depression, all together, all that is lived in darkness, all that is felt in solitude, all that came from emptiness. And only by feeling it, could I see where that deep pain came from, I could visualize the path it left behind. For the first time, I recognized my spiritual emptiness. And it was only then that I began to see the whole picture of my life. Doubt has no place in the things of God because God is not logic, God is not reason, much less a manual. Doubt comes from logic, therefore where there is doubt, there is also an absence of God, emptiness. And right at the moment of recognizing that, very specific images came to my mind. My sponsor hugging me for the first time when I arrived and interviewed me. With that hug came the words, 'You're not alone, you're already in a safe harbor, we'll be with you from start to finish. One day at a massive AA event, right in the middle of a workshop dynamic, that deep and sincere hug my fellow sufferer and I shared, in the midst of deep crying with our eyes closed, someone guided our arms to each other. To end up keeping each other company in that darkness we had always gone through alone. That trip to a Group Anniversary outside the city, where a fellow member of my group and I were simply enjoying the scenery, the wind on our faces, and laughing at the craziness of our daily lives, this on my motorcycle on the highway. That hug it took me years to find in the arms of my younger sister, right after arriving after a writing session. That hug of forgiveness to my mother and father that I had never been able to give before because I didn't want to go through the pain that came with feeling. Those few seconds in the rain that we spent lost on our way to the new location of our Group that I experienced in the company of a fellow member. Seeing a new person arrive with a desire to start their process. Connecting in the same feeling and emotion that comes with the death of a best friend. Serving a cup of coffee to that fellow member who returns after months of absence. Arriving at the group with hope of seeing that fellow member who hasn't been coming for weeks and little is known about what happened, but they no longer come to meetings. Day after day, their chair remains empty. And then start letting go of their defenses and their craziness. Standing in front of several strangers, with my head held high, my gaze firm, saying my name and then, 'I am a drug addict. To say, 'I feel like shit, but I'm here for whatever I can contribute. To feel like I'm that support for those who were my support when I was at rock bottom. And not just feel it, but also be able to be it. And that, to mention just a few of the scenes that came to my mind, then I understood 'I had already felt God.' I wasn't lacking spirituality, I wasn't lacking God, I just needed to stay still for a moment to feel it. And to feel that he has always been there. And that he will never leave my side. So today I can answer my own question, 'That's what it feels like to feel God' but not just any God. But a very special one, the God of the 4th and 5th step addicts and alcoholics...
originally posted at https://stacker.news/items/756957
-
@ cf6b9d54:11ef2370
2024-11-07 01:42:11As interest in Hamster Kombat declines, PAWS surges, outperforming the once-top Telegram Mini App. Once a leading tap-to-earn game on Telegram, Hamster Kombat has seen a steep decline in its user base and engagement due to political backlash, bans and new competition.
Hamster Kombat boasted 300 million users in August, but as of Nov. 5, the game has only 41 million active monthly players — an 86% decrease.
Meanwhile, Paws, a newly launched Mini App on Telegram, has surged in popularity, reaching 20.5 million users in its first eight days, surpassing Hamster Kombat’s growth trajectory.
According to IntoTheBlock (ITB) data, on Sept. 27, active Hamster Kombat addresses peaked at around 772,330. Since then, user activity and token interest have waned, falling more than 36% in the past week.
Token price and activity plummet Hamster Kombat’s challenges are reflected in its HMSTR token price, which has fallen nearly 70% from an all-time high of $0.01 on Sept. 26 to about $0.0022 as of Nov. 4, according to CoinGecko data. This decline correlates with lower network engagement and fewer daily active users.
This downward trend is reinforced by ITB’s active addresses ratio (AAR) chart — which calculates the ratio of active addresses to addresses holding HMSTR — revealing a 30-day low of just 0.34% active users.
Still, according to ITB data, the total addresses holding HMSTR have continued to increase, establishing a 30-day high of 3.5 million holders on Nov. 4.
Compared to the performance of other popular Telegram games, a pattern emerges, as seen with the Dogs (DOGS) token airdrop, which dropped from $0.0014 to $0.0004 between August and Nov. 4.
The DOGS AAR chart also shows a steady drop in activity alongside the token’s falling value, hitting a 30-day low of 0.27% active users on Nov. 3.
Scrutiny and volatility response Hamster Kombat has faced criticism from Iranian government officials and has been hit with rumors of bans in Uzbekistan, which have since been proven inaccurate.
The Hamster Kombat team previously told Cointelegraph that its future plans include payment system integration, launching new games and including non-fungible tokens (NFTs) as in-game assets.
One falls, one rises In stark contrast to the fall of Hamster Kombat’s network activity and token price, the Paws Mini App saw over 11 million users join in the first two days alone.
A Nov. 4 announcement on the Paws Telegram channel said that 10 million wallets had connected to the app and it had one million followers on the project’s X account.
-
@ 8d34bd24:414be32b
2024-11-06 22:18:02One popular plot formula for movies is having two very different people trade places through some mysterious means. It may be kids trading places with adults. It may be the rich person trading places with the poor person. It may be the city person trading places with the country person. The more different the two people, the more comical the effects of trading places is.
All Christians are in a storyline of two very different people trading places. It isn’t the story of rich/poor, young/old, or city/country, it is the trading places of the woefully inadequate and sinful trading places with the perfect and sinless. This isn’t a comedy. In so many ways it seems like a tragedy. The one who deserves punishment and death gets forgiveness and eternal life. The one who deserves worship and praise gets punishment and a torturous death.
Unfortunately most of us are not thankful enough for the wonderful benefits we get from this trade and don’t feel the horror we should at what was done to our perfect God, Creator, and Savior.
Therefore if anyone is in Christ, he is a new creature; the old things passed away; behold, new things have come. Now all these things are from God, who reconciled us to Himself through Christ and gave us the ministry of reconciliation, namely, that God was in Christ reconciling the world to Himself, not counting their trespasses against them, and He has committed to us the word of reconciliation.
Therefore, we are ambassadors for Christ, as though God were making an appeal through us; we beg you on behalf of Christ, be reconciled to God. He made Him who knew no sin to be sin on our behalf, so that we might become the righteousness of God in Him. (2 Corinthians 5:17-21) {emphasis mine}
What a wonderful, glorious turn of events in our personal story that we become “a new creature” in Christ; we “become the righteousness of God in Him.” What a tragedy and unfathomable sacrifice that our Creator God, “who knew no sin,” became “sin on our behalf.” We are part of the most unfair trade, and we benefit so incredibly much and yet we take it for granted most of the time.
For Christ also died for sins once for all, the just for the unjust, so that He might bring us to God, having been put to death in the flesh, but made alive in the spirit; (1 Peter 3:18) {emphasis mine}
We, the unjust, were made just so we can be forgiven and face God almighty. Our Creator, Jesus Christ, the just was made sin for us and died to pay the penalty we deserved for our rejection of God, selfishness, dishonesty, and general ignoring of our Creator.
I don’t think we comprehend how much we don’t deserve the Salvation we received and how much Jesus didn’t deserve the treatment He got throughout history, but especially in His death and separation from God on the cross. We feel severe pain when we are separated from our close friends and/or family. Jesus, part of the 3-in-1 God, was separated from God the Father and God the Spirit. It was like us having a limb cut off. They are one God, so severing one from the rest was the greatest torment that He could ever go through. It was worse than infinite, eternal Jesus limiting Himself to a mortal, finite body to live on earth as a man. It was worse than being tortured and killed in the most painful way ever designed by man. Perfect, holy Jesus was made sin, so He could no longer be in the presence of the Father. We need to thank Him every single day for what He did for us. (I know I don’t thank Him enough.)
Surely our griefs He Himself bore,\ And our sorrows He carried;\ Yet we ourselves esteemed Him stricken,\ Smitten of God, and afflicted.\ But He was pierced through for our transgressions,\ *He was crushed for our iniquities*;\ The chastening for our well-being fell upon Him,\ And by His scourging we are healed.\ All of us like sheep have gone astray,\ Each of us has turned to his own way;\ But the Lord has caused the iniquity of us all\ To fall on Him**. (Isaiah 53:4-6) {emphasis mine}
Look at all the replacement language in this passage:
-
“our griefs He Himself bore”
-
“our sorrows He carried”
-
“He was pierced through for our transgressions”
-
“He was crushed for our iniquities”
-
“The chastening for our well-being fell upon Him”
-
“by His scourging we are healed”
-
“the Lord has caused the iniquity of us all to fall on Him”
Because of what Jesus did for us, He took the grief, sorrows, piercing, crushing, chastening, and scourging that we deserved. He took on the burden and guilt of our iniquity.
For you have been called for this purpose, since Christ also suffered for you, leaving you an example for you to follow in His steps, who committed no sin, nor was any deceit found in His mouth; and while being reviled, He did not revile in return; while suffering, He uttered no threats, but kept entrusting Himself to Him who judges righteously; and He Himself bore our sins in His body on the cross, so that we might die to sin and live to righteousness; for by His wounds you were healed. For you were continually straying like sheep, but now you have returned to the Shepherd and Guardian of your souls. ( 1 Peter 2:21-25) {emphasis mine}
How amazing is it that our loving Creator came down to earth and lived a perfect life as “an example for you to follow?” How unfathomable is it that He took our sins into Himself changing Him from the Holy Lamb to a sinner judged and separated from God? How incredible is it that we get His righteousness because He willingly took on our sins? How can we ever show enough gratefulness for what He has done for us?
This next passage is a passage of the greatest joy imaginable and what all believers have to look forward to:
Now I say this, brethren, that flesh and blood cannot inherit the kingdom of God; nor does the perishable inherit the imperishable. Behold, I tell you a mystery; we will not all sleep, but we will all be changed, in a moment, in the twinkling of an eye, at the last trumpet; for the trumpet will sound, and the dead will be raised imperishable, and we will be changed. For this perishable must put on the imperishable, and this mortal must put on immortality. But when this perishable will have put on the imperishable, and this mortal will have put on immortality, then will come about the saying that is written, “Death is swallowed up in victory. (1 Corinthians 15:50-54) {emphasis mine}
The day is coming that we will not just be justified by Jesus’s sacrifice, but we will be changed from perishable to imperishable and from mortal to immortal. “In the twinkling of an eye, at the last trumpet; for the trumpet will sound, and the dead will be raised.”
As the passage continues, “but thanks be to God, who gives us the victory through our Lord Jesus Christ.” (1 Corinthians 15:57)
Trust Jesus.\ \ your sister in Christ,
Christy
-
-
@ fb5986f6:4173af9d
2024-11-06 20:55:08Instalación de proxmox: https://www.youtube.com/watch?v=iUXX1dKAGxA
No Solo Hacking - Virtualización con Proxmox https://www.youtube.com/watch?v=qaWpaNX_rL8&list=PLznRNLIWBPwH5Li7Co2i57rUVhve7m_ZQ
-
@ a039ecde:18bc0b8c
2024-11-06 20:49:18Ensure top-notch food safety standards with Telsen’s food hygiene app, designed to simplify daily tasks and streamline hygiene management. This user-friendly app supports businesses in maintaining compliance by digitising checklists, tracking cleaning schedules, and providing timely reminders. Ideal for restaurants, catering services, and food manufacturers, Telsen’s app improves operational efficiency and helps meet stringent hygiene regulations. With real-time updates and easy-to-use features, our app is a vital tool for enhancing food safety practices. Choose Telsen’s food hygiene app for comprehensive, reliable hygiene management at your fingertips.
-
@ fc792576:bab046e9
2024-11-06 20:13:55Russian Presidential Press Secretary Dmitry Peskov said he does not know whether Vladimir Putin plans to congratulate Donald Trump on his election victory, but he recalled that the United States is an unfriendly country involved in a war against Russia.
"As for congratulations, I am not aware of the president's plans to congratulate Trump," Peskov told reporters in response to a question on the matter.
At the same time, he noted: “Let’s not forget that we are talking about an unfriendly country that is directly and indirectly involved in a war against our state.”
Peskov was asked whether he thought Trump might be offended if Putin did not congratulate him on his victory, and whether this would worsen relations between Russia and the US even more.
"It is practically impossible to worsen things further; relations are at their historical lowest point. And what happens next will depend on the next US leadership. President Putin has repeatedly said that he is open to constructive dialogue based on justice, equality and a willingness to take each other's concerns into account. And President Putin maintains this attitude. He has repeatedly confirmed it. At the moment, the US administration is diametrically opposed. We will see what happens in January," Peskov said.
In general, the elections, he noted, are an internal matter for the United States. "We, of course, are closely monitoring all the information flows that are coming from overseas on this matter, we are analyzing the words that are being said, and of course, we will mainly draw conclusions based on the statements, on the topics that are on our agenda, when they come in," the Kremlin representative said.
In addition, conclusions will be drawn based on the first concrete steps, Peskov added.
At the same time, the press secretary reminded that this will have to wait, since the current US president will continue to perform his duties for at least another month and a half.
At the same time, responding to a clarification about what would happen if Trump made friendly statements, Peskov said: “As our diplomats say, eventual discussions are inappropriate here.”
-
@ 569d3ee7:6120020e
2024-11-06 20:05:35Enhance user experience with Responsive Website Design Orange County by Urban Geko. Our team creates mobile-first designs that adapt perfectly to any device, ensuring seamless usability and higher engagement. With responsive design, your website will load fast, look stunning, and function flawlessly across smartphones, tablets, and desktops. Urban Geko specializes in blending creativity with technology to deliver dynamic, interactive websites that leave lasting impressions. Whether you’re a local business or a global enterprise, our Orange County experts ensure your website is future-ready. Partner with Urban Geko for innovative web solutions that elevate your brand.
-
@ 35f3a26c:92ddf231
2024-11-06 19:47:07****The disappointment I feel with the passivity and lack of critical thinking of the previous and current adult generation is currently at maximum levels...
If someone tells me that I would be alive to watch Orwellian systems being pedaled by countries that call themselves "1st World Countries" I wouldn't not have believe it...
If someone tells me that the political system called "democracy" will become a joke, where the political arena is controlled by the donors and therefore the "elected" politicians will bend over to please their donors and their interests instead to work for the people.... I wouldn't have believe it...
If someone tells me that the West would support unjust causes, fund extremist to support the interests of the pharmaceutical, the energy and the military industrial complex... I would not have believe it...
If someone tells me that the united West, will ban books, and attack people with corrupted law enforcement due to their ideology, religious believes or simply for telling inconvenient truth's as official or citizen journalists, scientists, doctors, whistleblowers... I wouldn't have believe it...
But here we are and is all happening...
The minority, those aware of what is at stake, can keep doing their part, but the amount of NPC characters, sold outs, traitors and corrupt officials is overwhelming, and IMO , until we don't separate the money from the state this will just get worst until it breaks...
And when someone or a group starts spreading hope, telling you not to worry, asking you to do nothing, telling you they are in control and they will take down the corrupted web harming your country, you are most probably being gaslighted and surrendering your power to a psychological operation built to neutralize you,
What can we do? Few suggestions:
- Information is empowering, read, inform yourself, do not use the main stream media only, expand your sources of information, question more
- Get involve with your community
- Research and demand accountability for the elected officials when they do not behave correctly or work against the interest of your city.
- Write to the elected officials when new laws are to be approved, demand explanations if they are harming your town/city, organize, collect signatures and perform referendums to remove political bad actors from office
- Organize the community to understand the law and your rights, look for volunteer lawyers to give free lectures and recommend literature to digest, consider going to law school lectures, the more informed you are the better prepared to fight back for your constitutional rights
- Lead by example
- Try listening more
- Do not trust any news, no matter the source, verify
-
@ 85a99262:6d44d234
2024-11-06 19:21:41Searching for local SEO services in Auckland? Look no further than Team Empathy. Our team specialises in optimising websites for improved local search visibility in Auckland. With targeted strategies and customised approaches, we help businesses dominate the local search results and attract more qualified leads from their community. Trust Team Empathy to boost your business's local presence and drive more customers to your doorstep in Auckland.
-
@ b425f50d:bb0ee063
2024-11-06 18:47:49Organise, manage, and share your brand’s images effortlessly with Brandkit’s image library software. Designed for marketing teams and brand managers, this software provides a centralised, secure platform to store and retrieve high-quality images, ensuring consistency and accessibility. Brandkit’s intuitive image library software enhances productivity and collaboration, reducing time spent searching for assets. Streamline your visual content strategy and keep your team aligned with Brandkit’s innovative image management solution. Experience the simplicity and efficiency of a robust image library that keeps your visual assets organised and easy to use.
-
@ 35f3a26c:92ddf231
2024-11-06 18:44:54Introduction
Nowadays, businesses and individuals are adopting Bitcoin as a method of payment. It's no surprise, given the security, speed, and cost-efficiency associated with it, specially using the LN. However, despite the numerous advantages, Bitcoin still faces challenges in terms of privacy, fees, and scalability.
What is ARK?
A Layer 2 protocol for Bitcoin designed to solve some of the Bitcoin Network challenges, to improve its efficiency, security and scalability. The protocol aims to enhance the functionality of Bitcoin by addressing its current limitations by using a shared UTXO model that enables anonymous, off-chain payments through an untrusted intermediary called the Ark Service Provider (ASP). ASPs are always-on servers that provide liquidity to the network, similar to how Lightning service providers work but without the time consuming opening and close and balancing of channels.
Interoperability with the Lighting Network?
Ark will function as a liquidity network that operates like Lightning, but without introducing liquidity constraints or a direct link between the sender and receiver. It uses virtual UTXOs, to enable anonymous, scalable, off-chain payments. ASPs provide liquidity to the network and charge fees for their services.
ARK will address key issues with deploying capital into the Lightning Network providing a layer that settles transactions without the requirement for a specific infrastructure to remain online, as is the case with Lightning, while still providing assurances of the private custody of funds. How: - Ark can interoperate with Lightning by attaching HTLCs (Hashed Timelock Contracts) and PTLCs (Point Time Locked Contracts) to a pool transaction. Attached HTLCs live under another shared UTXO called the HTLCs outputs, which expires after four-weeks. - Ark service providers forward HTLCs to the broader Lightning Network the moment after HTLCs are attached to a pool transaction. This requires Ark service providers to run routing nodes on the Lightning Network with well-established outgoing channels. Ark users can also get paid from Lightning using HTLC-nested vTXOs.
Last but not least, the Ark Service Provider will serve not only as a liquidity provider but as a Coin-Join coordinator and a Lightning service provider.
How does ARK compares with the Lighting Network?
- https://image.nostr.build/00dba22e23022333d9a767fb015e2d89b7e2e0e5aa73345eaea53bd59c5ecc56.jpg
Conclusion
The ARK protocol is an exciting development, addressing many of the challenges faced by Bitcoin Network today. ARK promises to enhance, above all, privacy and scalability, making it a valuable addition to the rapidly growing Bitcoin ecosystem.
_
Sources and recommended watching and reading:
-
@ d035f771:37c0030d
2024-11-06 18:00:11Pink Bins is your trusted provider for high-quality waste bins in Auckland, offering a variety of sizes for all types of waste disposal needs. Whether for home, business, or construction sites, our bins are designed for durability and convenience. With prompt delivery, flexible rental terms, and competitive prices, Pink Bins ensures your waste management process is easy and efficient. Our team is dedicated to providing exceptional customer service, making us a top choice for waste solutions in Auckland. Choose Pink Bins for reliable and hassle-free waste bin rentals that meet your unique project demands.
-
@ 3ad01248:962d8a07
2024-11-06 17:22:48The 2024 election is finally over! I'm sure all of you are tired of the constant emails and calls from political candidates asking for your vote. I know for sure that I am! With that being a said election night 2024 was a bloodbath for the Democrats. Not only did Kamala Harris not win the presidency, the Democrats lost the Senate and will most likely will not win back the House of Representatives.
The Republican will now control all three branches of the federal government for the first time in a while. What they decide to do with this new found power is going to be interesting because they don't have a super majority in the senate or the house. They are going to have to work with Democrats to get anything done, which after this election if pretty much a non-starter.
It is cool that Trump won and all but I honestly don't know how is going to change from a Biden to a Trump presidency. The Democrats are not going to give Trump a win on anything because they have nothing to lose over the next 4 years. Who do they have waiting in the wings to take over the lead the Democrat party? Gavin Newsome? He can't even run California right. AOC? The Squad? Crypto hater Elizabeth Warren? Yea right. Democrats have effectively lost their way and do not know how to connect to the average voter right now. As long as the focus on abortion, gender and race identity they will continue to lose the average voter.
The average voter cares about the economy and putting food on the table. They care about crime and keeping their community safe. They care about securing the border and making sure people immigrate to this country through the proper channels. It's not really that hard if you think about it. In my opinion the Democrat party is talking to a constituent that will be the majority maybe in another 20 years, and the issues the talk about now resonate more with that cohort but they are not a majority of the voting public. How the Democrat party doesn't understand this is beyond me and frankly I don't care if they do.
They will either adapt of wither away as a political party. I would love to see the emergence of more political parties that could decentralize more of the political power among different stakeholders.
What Happens Over The Next 4 Years
Now that Trump has been elected as the 47th president of the United States what does that mean for America and the world? Needless to say there are some massive shifts coming on the foreign policy front that much is certain.
Ukraine
Lets start with Ukraine. Trump being elected is definitely a negative for Ukrainians that want to keep fighting and not cede land to Russia. What I see happening is Trump demanding that Ukraine give up the land they lost to Russia because they will not send more military hardware to help they continue the fight. Ukrainian leadership will not like this but their hands are effective tied at this point.
The US is the biggest backer of Ukraine and when they so no more weapons there isn't much they can do about it. Europe hasn't stepped up in a real way and provided the support they need despite the war being on the doorstep. I get Trump's thinking on this. If Europe isn't going to step up why should America foot the bill. The consequences of letting Russia get away with this has more impact on Europe than America. Time will tell what will happen with this conflict but it safe to say right now its a wait and see situation.
https://youtu.be/m3AUefhHjfI?si=4WH1Q-PVs8yOeDTP
The lesson that dictators will learn from this is they can take land with impunity because the so called "free world" will do nothing to stop them. What happens when China invades Taiwan? This is going to happen as a result of Trump winning. China sees a America that is more inward facing and not a global force that will intervene in the affairs of other countries. It's going to be an interesting 4 years.
Israel/Gaza War
Trump winning the election gives Israel and Bibi Netanyahu the green light to pursue their genocidal campaign in the Gaza Strip and Lebanon. You can expect more people to be killed in Gaza and I wouldn't doubt if the death toll hits 100k by next year. Israel isn't trying to take out Hamas, they are forcibly removing the Palestinians from northern Gaza and killing as many as they can. There have been videos circulating online of far right Israeli settlers that want to reoccupy Gaza. This has been a plan in the making for a long time. Don't believe me? Watch this video!
https://youtu.be/mF6B5UVupyA?si=B58TXv135B5LnjrC
https://youtu.be/Q7fXNwZoH9I?si=nSI1SmBxeimCv4g6
Trump will do nothing to stand in the way of this happening which probably means a wider regional war with Israel vs the Arab world is not off the table. Guess who get drawn into that war to help defend its "greatest ally". Be careful what you wish for America.
Bitcoin
The one thing I think a Trump administration will have a positive effect on is the Bitcoin price and regulations. If you are a Biticoner you are aware of President Trump's 180 on Bitcoin. 4 years he thought it was a scam to now in 2024 wanting to create a strategic Bitcoin reserve and speaking at the Bitcoin conference. Pretty wild stuff right! As the election results were coming in last night you saw the Bitcoin price rise and reach a new ATH with the prospect of a Trump win.
Now that this has become a reality, I fully expect Bitcoin to reach 6 figures over the next 6-12 months. The creation of a Bitcoin strategic reserve or the simple act of not selling confiscated Bitcoin will be enough to drive the price higher. The higher the price goes, the more attention it gets. NGU in full effect. While I don't what the regulatory front looks like for Bitcoin under Trump, it should be less hostile than the Biden/Harris regime. I think pushing for the removal of capital gains taxes on Bitcoin and making Bitcoin legal tender should be the next goal to achieve.
Overall a Trump win is bullish for Bitcoin and I am excited to see what the next 4 years looks like without the federal government actively trying to put the squeeze on Bitcoin.
I hope the Trump administration is successful and keeps its promises to the American people, especially the one about freeing Ross Ulbricht. Ross deserves to be free and with his family. Let Edward Snowden come home too. God Bless America.
Bitcoin #Politics
-
@ 361d3e1e:50bc10a8
2024-11-06 16:13:52https://forex-strategy.com/2024/11/06/5-star-hotels-in-turkey-are-affected-by-a-new-virus/ 5-star hotels in Turkey are affected by a new virus The disease mainly affects children, but adults also complain of severe consequences
turkey #virus #holiday #Coxsackie #travel
-
@ ffbcb706:b0574044
2024-11-06 14:52:49In aanloop naar het debat over de begroting van BZK, EZ en JenV rondom digitale zaken, stuurden wij samen met Waag Futurelab en Commons Network een brief aan de Tweede Kamer Commissie Digitale Zaken.In aanloop naar het debat over de begroting van BZK, EZ en JenV rondom digitale zaken, stuurden wij samen met Waag Futurelab en Commons Network een brief aan de Tweede Kamer Commissie Digitale Zaken.\ Het debat over de digitale zaken begroting zal aanstaande maandag 11 november plaatsvinden. Om de politiek aan te sporen om de regie te pakken op digitale autonomie, stuurden wij, samen met Waag Futurelab en Commons Network een brief aan de commissie. In de brief opperen wij enkele punten voor het debat die eveneens aansluiten op de agenda Digitale Open Strategische Autonomie (DOSA) van Economische Zaken.
We bepleiten hierin dat de overheid moet investeren in een open digitale infrastructuur om onze digitale autonomie te vergroten, innovatie en economische groei te stimuleren en onze fundamentele waarden te beschermen.
Allereerst stellen we dat het gebruik en de ontwikkeling van bestaande alternatieven voor digitale producten en diensten die zijn gebaseerd op publieke waarden vergroot moet worden. Dit kan de overheid doen door te investeren in tools als De Digitale Spoelkeuken, door in aanbestedingen te richten op digitale autonomie en publieke waarden en door in te zetten op digitale gemeenschapsgoederen.
Ook benadrukken we dat er (markt)ruimte gecreëerd moet worden voor alternatieve producten en diensten. Alternatieven moeten zo meer ruimte krijgen om te kunnen concurreren in digitale markten.
Ten slotte stellen we dat we nieuwe alternatieve producten en diensten moeten ontwikkelen die zijn gebaseerd op publieke waarden. Dit kan bijvoorbeeld gestimuleerd worden door het opzetten van een fonds zoals het Duitse Sovereign Tech Fund.
De gehele brief aan de Tweede Kamer commissie kun je hier downloaden.
Dit is een repost van https://publicspaces.net/2024/11/06/in-onze-brief-aan-de-commissie-digitale-zaken-zetten-we-digitale-autonomie-op-de-agenda/
-
@ 126a29e8:d1341981
2024-11-06 14:50:10¿Por qué hacer hacer un plan de herencia?
Si apuestas por Bitcoin como una forma soberana de preservar el valor de tu esfuerzo a lo largo del tiempo y el espacio, seguramente ya estés pensando en el futuro. Pero, ¿has pensado en lo que pasará con esos satoshis que tanto cuesta reunir cuando ya no estés? ¿Tus herederos sabrán cómo acceder a ellos o será como buscar un tesoro enterrado sin mapa?
Objetivos del plan de herencia
- Hacer que tu bitcoin llegue de forma segura a tus herederos una vez que mueras (¡no antes!) - Minimizar el riesgo de robo manteniendo seguridad y privacidad - Prevenir disputas entre herederos - Evitar problemas legales
¡No te compliques!
Siguiendo el principio K.I.S.S. vamos a intentar diseñar un sistema simple. Cualquier sistema va a funcionar mejor si no complicas demasiado las cosas. Ten en cuenta que tu familia estará leyendo el Plan con la noticia reciente de tu propio fallecimiento. Hay que dejarlo todo bien detallado y no dar nada por hecho. Lo más probable es que tus herederos no tengan el nivel técnico que tú tienes hoy.
🔑 La prioridad son tus herederos; no tu ego
Plan de Acción
Es recomendable una estrategia de recuperación independiente a los dispositivos que uses. Es decir, diseñar el plan para que los fondos puedan recuperarse con las semillas, passphrase y contraseñas.
No hay soluciones perfectas. No existe una única forma correcta de hacer un plan de herencia así que deberás diseñar el plan que mejor se adapte a ti y a tu situación.
Locus de Control
🧠 El locus de control (Julian B. Rotter, 1954) es un concepto psicológico que explica por qué, en situaciones problemáticas, las personas pueden decidir esforzarse por conseguir lo que desean o, por el contrario, dejar que las cosas sigan su propio curso.
Este concepto se divide en dos tipos principales:
- Locus de control interno: Creencia de que las propias acciones y decisiones son las principales causas de los resultados que se experimentan en la vida. Esto puede motivar a tomar un rol más activo en la consecución de objetivos y en la resolución de problemas.
- Locus de control externo: Las personas con un locus de control externo creen que los factores externos, como la suerte, el destino, las circunstancias o las acciones de otras personas, son los principales determinantes de sus resultados. Esto lleva a una actitud de mayor pasividad ante las situaciones, al sentir que se tiene poco control sobre los resultados.
Aplicado al plan de herencia vamos a intentar mantener un locus de control interno, es decir, que la custodia y la recuperación de los fondos dependa todo lo posible de nosotros, en lugar de soluciones de terceros.
Ejemplos Locus de control externo:
Smart Contract
Un contrato no es más que un acuerdo entre dos o más partes, un entorno donde se define lo que se puede hacer, cómo se puede hacer, qué pasa si algo no se hace. Es decir, unas reglas de juego que permiten a todas las partes que lo aceptan entender en qué va a consistir la interacción que van a realizar. Sin embargo, los contratos tradicionales pueden presentar un problema: están sujetos a interpretación.
Por otro lado, los contratos inteligentes tienen la capacidad de poder ejecutarse de manera autónoma y automática a través de códigos informáticos, lo que evita tener que pasar por interpretaciones de terceros, ya que las características de inmutabilidad y transparencia de la blockchain de Bitcoin velan por la confiabilidad de estos “contratos”.
El código en un smart contract contiene las reglas por las cuales las partes acuerdan interactuar en la “relación”. En dado caso que las reglas predefinidas se cumplan, el “contrato” será ejecutado automáticamente.
Los problemas que plantea un plan de herencia, ¿pueden ser resueltos con un simple smart contract?; ¿un poseedor de bitcoin puede usar software para transferirlos automáticamente a sus herederos al morir sin la intervención de un notario o cualquier tercera parte? Por supuesto que se puede. El problema es que hay que confiar en el software de un tercero y tus herederos tendrían que acceder a ese software. Cedes el control de tus fondos a un tercero, no los controlas tu.
Oráculo vs Dispositivo de hombre muerto
¿Cómo sabrá el software que alguien está muerto? Hay 2 formas de resolver esto:
- Oráculo
- Dispositivo de hombre muerto
Oráculo
Un oráculo es un programa de software de un tercero independiente que recopila datos y los pone a disposición de quien quiera utilizarlos o de una interface. Ejemplo simplificado:
El Smart Contract de un Plan de Herencia → Oráculo → datos de la persona → ¿Está muerto? → Sus Bitcoin → Herederos
Contras:
- Requiere que confíes completamente en un tercero, el oráculo.
- Si hay un error …… tus bitcoin ya han sido transferidos de forma irrevocable
- ¿Qué pasa si hay alguien con el mismo nombre y fecha de nacimiento y muere?
- ¿Qué pasa si el oráculo desaparece?
Dispositivo de Hombre Muerto (Dead Man’s Switch)
Se trata de confirmar que una persona está muerta por omisión, por no realizar una acción específica. Su fallo para actuar causa que ocurra otra acción.
El mecanismo es sencillo: Cada cierto tiempo hay que hacer una determinada acción para que no se active el DHM. Esta determinada acción puede ser iniciar sesión en una página web o responder a un email automático. Si se realiza esa acción en el momento requerido entonces el reloj se pone a cero y el DHM no se dispara. Y así sucesivamente. Si se te olvida realizar esa determinada acción, se activa el DHM y tus bitcoin serán enviados a tus herederos y se distribuirán en la forma en que tu decidiste.
La premisa es que harás esa determinada acción salvo que estés muerto. Pero pueden ocurrir otras causas diferentes de la muerte que hagan que tu no puedas desactivar el DHM: desastres naturales, lesiones o enfermedades, pérdida de credenciales, pérdida de tus dispositivos, existencia de malos actores, …
Algunas personas utilizan servicios de email con DHM para informar a sus herederos de que ellos tienen bitcoin y que han dejado instrucciones para ellos en una determinada localización. Pero sin poner información confidencial.
Aquí tienes un estupendo tutorial de nostr:npub1dlfezkj445xzatnyu2up3t9m46wxk0vmtmjyuxd2qs8mp8cd8nws8mcdx0 para configurar un Dispositivo de Hombre Muerto de la forma más soberana posible:
https://www.youtube.com/watch?v=YsefQ1xbw68
Gestor de Contraseñas
Algunos gestores de contraseñas tienen algún tipo de mecanismo de autorización de cuenta inactiva. El Administrador de cuentas inactivas permite a los usuarios compartir algunos datos de sus cuentas o notificar a otras personas después de un determinado período de inactividad.
¿Qué recibirán los contactos de confianza? Los contactos solo recibirán una notificación cuando tu cuenta esté inactiva durante cierto tiempo. Si decides que tus contactos solo reciban una notificación cuando tu cuenta esté inactiva, recibirán un mensaje de correo electrónico con la línea de asunto y el contenido que escribiste durante la configuración. Agregaremos un mensaje de correo electrónico en el que explicaremos que dejaste programado que se enviase un correo electrónico en tu nombre cuando ya no utilices la cuenta.
Si decides compartir datos con tu/s contacto/s de confianza, el mensaje de correo electrónico también incluirá una lista de los datos que elegiste compartir con tu contacto y un enlace desde el que podrán descargarlos.
Habría que dejar una nota en el testamento o en tu plan de acceso para que tus herederos sepan que les va a llegar un email con los datos para poder acceder a tus bitcoin.
La habilidad para definir complejos criterios de gasto combinada con la absoluta garantía de una cadena de bloques inmutable remodelará la forma en que controlamos nuestros bitcoin y la forma de planificar la herencia y la sucesión.
Liana Wallet
En Bitcoin es posible crear complejas condiciones de gasto combinando miniscript, timelocks y/o multifirmas y un buen ejemplo de ello es Liana, una wallet con la que podrías transmitir tus bitcoins a tus herederos tras tu fallecimiento, sin compartir tu semilla.
Liana se centra en el uso de timelocks de Bitcoin, permitiendo que algunas claves sean válidas sólo después de que dejes de usar la tuya durante un tiempo determinado. Esto se ejecuta directamente por la propia red Bitcoin (contrato inteligente) sin la participación de terceros. El bloqueo temporal se "actualiza" cada vez que mueves tus monedas, así que mientras uses la wallet con regularidad, tu familia no tendrá acceso hasta que lo necesite.
Partes del Plan de Herencia
1. Elección de ayudantes
- No más de 3 personas (idealmente 2)
- Conseguir datos de contacto para que tus herederos puedan contactarles
- Criterios de elección:
- Confianza
- Conocimientos técnicos
- Que no se conozcan entre si
2. Plan de Acceso
2.A) Inventario: Cuánto bitcoin tienes, dónde están y cómo acceder a ellos.
- Recopilar información de cuentas, wallets y aplicaciones.
- Localizar todos tus dispositivos (teléfonos, PC, Laptops, HWW, semillas en metal, paperwallets, opendime, bitcoin Casascius, etc.)
- Recopilar contraseñas y accesos
- Hacer limpieza, ordenar, consolidar, optimizar.
Ejemplo Tabla Plan de Acceso
2.B) Localización
- Dónde está cada cosa (dispositivos, cuadernos, …)
- Redundancia: Varias copias separadas geográficamente
- Separación de poderes
- Usar sellos de seguridad (con nº de referencia, fecha y firma)
- Carta manuscrita
2.C) Carta a los herederos
- Precauciones - Lista de ayudantes - Inventario y localización de claves privadas - Testamento - Despedida
Consideraciones sobre la carta: No la deposites en notaría y guárdala separada de las semillas y fácil de encontrar para tus herederos. Al igual que con las copias de seguridad de las semillas, también conviene hacer copias de la carta. Muchas cosas pueden cambiar desde que redactes la primera versión hasta que fallezcas por lo que conviene hacer revisiones periódicas.
⚠️ Errores comunes en la carta a los herederos:
- No hacer plan de herencia. No importa tu edad o cuánto bitcoin tengas. Empieza a poner orden y preparar tu plan. - Letra no legible. Si tienes letra de médico, mejor escribir la carta en el ordenador. - No evaluar posibles fallos.
3. Legal ¿A quién se los otorgo?
- Consulta el impuesto de sucesiones de tu comunidad. - La muerte del causante actúa como un cortafuegos, aunque no haya declarado ante el fisco sus fondos. - Recomendación: Consulta a un experto en la materia sobre tu caso personal.
Evaluación S.U.R.E.
Pasado un tiempo suficiente, esperamos que una o más partes de nuestro plan fallará y no resulte según lo planeado. Esto puede deberse a un error humano, error de los medios electrónicos, desastre natural, cambios tecnológicos, cambios en nuestras relaciones y un montón de variables posibles. Uno o dos de estos fallos no deberían resultar en una pérdida total de nuestros bitcoin.
La evaluación S.U.R.E. consiste en evaluar la seguridad, usabilidad, resiliencia y eficiencia de nuestro plan.
- Seguridad: Valorar qué pasaría si una parte del plan se ve comprometida. Que pasaría si un mal actor se apropia de uno de tus backups o dispositivos o accede a una de las localizaciones. - Usabilidad: Facilidad/dificultad de usar el método de forma segura para gente no técnica/experta. - Resiliencia: No tener un punto único de fallo. O cuantos puntos de fallo darán lugar a una pérdida catastrófica. - Eficiencia. Capacidad de lograr un efecto deseado con el mínimo de recursos posibles. Menos es mejor. Se trata de reducir la complejidad de las claves, passphrases, contraseñas y localizaciones sin afectar negativamente los otros 3 elementos.
Bibliografía
📙 Cryptoasset Inheritance Planning - Pamela Morgan.
🎧Pod de nostr:npub1yn3hc8jmpj963h0zw49ullrrkkefn7qxf78mj29u7v2mn3yktuasx3mzt0 junto a nostr:npub1q7cq5mce269pcstj8le369m72ypzl53qsvlszcemqfh6hk0mtlkq7v9jv9 y nostr:npub12aqfngts2xc0z0n47lyfx03p8prhz4kqcel29mukgwydeuatawqqg5dvgy
https://www.youtube.com/watch?v=yI_JP1loEtk👀 Artículo en nostr:npub1qqqqq2jx95am9ds78hklmqzdqt0eqawnx0eln8cqz3pdsqw7rchs9rc6ad por @heptapodae: https://estudiobitcoin.com/como-hacer-tu-plan-de-herencia-bitcoin/
-
@ 6bae33c8:607272e8
2024-11-06 13:42:13I need to calm myself from the election dopamine and focus on the task at hand. I went 4-1 last week to kick of Q3, so I haven’t blown it yet. One week at a time, one 4-1 or 5-0 at a time is how you do it.
Bengals at Ravens — The Bengals are playing better of late, maybe make it Bengals +6, but I’m staying away on the short week.
Giants vs Panthers — The Panthers are a good sell high, and the Giants are playing okay. I’ll say Giants -4.5 and probably lay the wood.
Patriots at Bears — The Bears are the buy-low off the bad loss. I’ll make it Patriots +7.5 and lay the wood.
Bills at Colts — The Bills are on a roll, but the Colts are scrappy in their way. I’ll say Bills -4 and stay away.
Vikings at Jaguars — Man, Trevor Lawrence threw a disastrous pick to lose last week. I’ll say Vikings -2.5. Would consider Minnesota.
Broncos at Chiefs — The Broncos got schooled against an explosive Ravens team, but might be a buy low. Probably Broncos +7.5, I’m thinking.
Falcons at Saints — The Saints have no skill players except Alvin Kamara. Let’s make it Falcons -3 and probably stay away.
49ers at Buccaneers — Both teams are desperate for a win, the 49ers off the bye and the Bucs off the short week. I’ll say 49ers -2.5 and probably lay the wood.
Steelers at Indigenous Peoples — The Steelers off the bye feel like a good spot here against an IP team fortunate to win its last two games. I’ll say Steelers +2.5 and consider them.
Titans at Chargers — The Titans are bad. I’ll make it Titans +8.5 and maybe take the Chargers.
Jets at Cardinals — The Cardinals are playing well, but the Jets still have players. I’ll say Jets +2.5 and stay away.
Eagles at Cowboys — The Cowboys are a train wreck. Eagles -7.5 and stay away.
Lions at Texans — The Lions might be the league’s best team, and the Texans can’t pass protect. I’ll say Lions -3.5, but probably stay away.
Dolphins at Rams — This is actually a good game with everyone healthy again. I’ll say Dolphins +2 and stay away.
-
@ 42342239:1d80db24
2024-11-06 09:05:17TL;DR: J.D. Vance recently observed that many in the Democratic Party are attempting to manufacture trust from the top down, neglecting the fact that genuine trust is often born from grassroots connections. There's indeed a stark contrast between trust that's artificially constructed through manipulation and censorship, and trust that's organically cultivated from the ground up.
Trump's vice presidential candidate J.D. Vance appeared on podcast host Joe Rogan's show earlier in November. According to Vance, large parts of the Democratic Party are trying to create higher trust from above, without understanding that the previously high trust once arose organically: "I think that a lot of them are trying to reimpose that social trust from the top."
Most people understand the importance of high trust. Political scientist Robert D. Putnam, for example, has shown that large social capital, in the form of trust and networks, is a key factor for economic growth, cooperation, and problem-solving. See e.g. his book Bowling Alone: The Collapse and Revival of American Community (2000).
The low trust today is widespread. Trust in the American federal government is at historically low levels. Trust in the media is at rock-bottom levels. Even trust in doctors and hospitals has plummeted: at the beginning of 2024, the proportion of people who reported "a great deal of trust" had dropped to 40%, from 72% in April 2020. This can be concerning, as individuals with low trust in doctors and hospitals will be less likely to follow their advice and recommendations. It's therefore not surprising that many want to "rebuild trust" (this was the theme of the World Economic Forum's annual meeting this year).
How much trust is actually reasonable?
But how much trust is actually reasonable? To determine this, one can ask whether an institution has acted reliably in the past, whether it possesses the knowledge and ability required to deliver what is promised, and whether its interests are in line with our own.
The low trust figures among Americans are likely a reflection of the fact that many of them today question the extent to which the answers to these questions are actually affirmative. During the pandemic, medical experts in the UK incorrectly predicted that hundreds of thousands of people would die. In the US, the leading infectious disease expert misled the public about, among other things, face masks, the sitting president lied about both the effectiveness and safety of vaccines, a British health minister wanted to "scare the pants off people," and virus experts even conspired to mislead about the origin of the SARS-CoV-2 virus. All while social media companies, under pressure from governments, were forced to censor information that was actually correct.
Trust - built on sand or on solid ground?
It's possible to continue on the current path and try to improve trust figures by limiting access to information. For instance, if the public doesn't get access to negative information about authorities or experts, the measured trust can increase. But in that case, trust is merely built on sand, waiting to be undermined by the inexorable forces of truth.
But there's another possibility. Building relationships that are genuine and honest, listening to each other without judgment, and communicating without misleading. Doing things that really matter, and doing them well, showing competence and reliability through actions. In this way, trust can grow naturally and organically. A trust built on solid ground, not on sand. A delicate task. But presidential election or not, isn't it time for us to start building a future where this form of trust is the obvious foundation?
-
@ 361d3e1e:50bc10a8
2024-11-06 07:59:42https://forex-strategy.com/2024/11/06/trump-is-back-in-the-white-house/ Trump is back in the White House The 47th president of the United States knows what to do with the deep state.
usa #trump #politics #maga #vote2024 #elections2024 #pepublicans
-
@ f462d21e:1390b6b1
2024-11-06 04:39:14eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ f462d21e:1390b6b1
2024-11-06 04:19:42eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ f462d21e:1390b6b1
2024-11-06 04:14:05eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ a012dc82:6458a70d
2024-11-06 03:21:36Table Of Content
-
Understanding the Bitcoin Sale
-
Potential Reasons for the Sale
-
Impact on the Market
-
Market Response and Investor Sentiment
-
Conclusion
-
FAQ
The cryptocurrency market is known for its volatility and the constant fluctuations in asset prices. In 2023, a significant Bitcoin sale took place, capturing the attention of investors and enthusiasts alike. Long-term investors made a decision to sell off nearly 50,000 BTC, leading to discussions about the implications of this sale and the factors that might have influenced it.
Understanding the Bitcoin Sale
The sale of nearly 50,000 BTC by long-term investors suggests a shift in market dynamics. These investors, who had held their Bitcoin for an extended period, decided to realize their profits and exit their positions. Such large-scale sales can have a considerable impact on the market, affecting Bitcoin's price and overall market sentiment.
Potential Reasons for the Sale
Several factors might have influenced long-term investors to sell off their Bitcoin holdings:
Profit-taking
Long-term investors often accumulate Bitcoin with the intention of selling it at a higher price in the future. If they believed that the current price levels provided a satisfactory return on their investment, they may have chosen to take profits.
Market Conditions
Cryptocurrency markets are highly volatile, and investors closely monitor market trends. If they perceived a potential downturn or correction in Bitcoin's price, they may have decided to sell to protect their gains or minimize potential losses.
Portfolio Diversification
Investors may have decided to rebalance their investment portfolios by reducing their exposure to Bitcoin. Diversifying their holdings across various asset classes can help manage risk and potentially enhance long-term returns.
Personal Circumstances
Individual investors may have had specific personal or financial reasons for selling their Bitcoin. These could include the need for liquidity, funding other investment opportunities, or addressing personal financial obligations.
Impact on the Market
A significant sale of Bitcoin by long-term investors can have a short-term impact on the market. Depending on the volume of the sale and the prevailing market conditions, it may lead to a temporary decline in Bitcoin's price due to increased selling pressure. However, market dynamics are complex, and the impact of such sales can vary depending on the overall market sentiment and the response of other market participants.
Market Response and Investor Sentiment
The response to this significant Bitcoin sale largely depends on investor sentiment and market perception. Some investors may interpret it as a sign of decreasing confidence in Bitcoin's long-term prospects. Others may see it as a natural occurrence in a market characterized by profit-taking and portfolio adjustments. The market's response to such events can offer insights into the overall sentiment and provide valuable information for future investment decisions.
Conclusion
The significant Bitcoin sale by long-term investors in 2023 highlights the dynamic nature of the cryptocurrency market. Investors' decisions to sell off nearly 50,000 BTC can be influenced by various factors, including profit-taking, market conditions, portfolio diversification, and personal circumstances. While such sales can impact the market in the short term, it is essential to consider them within the broader context of market dynamics and individual investment strategies.
FAQ
What is the significance of the significant Bitcoin sale by long-term investors? The significant Bitcoin sale by long-term investors indicates a shift in market dynamics and can impact Bitcoin's price and overall market sentiment.
Why did long-term investors decide to sell off nearly 50,000 BTC? There can be several reasons behind the decision to sell, including profit-taking, market conditions, portfolio diversification, and personal circumstances.
How does such a sale affect the market? A significant sale of Bitcoin can lead to a temporary decline in its price due to increased selling pressure. However, the impact on the market depends on various factors and the response of other market participants.
What does this sale suggest about investor sentiment towards Bitcoin? The response to the sale can vary among investors. Some may view it as a lack of confidence in Bitcoin's long-term prospects, while others may see it as a natural occurrence in a volatile market.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 35f3a26c:92ddf231
2024-11-06 01:43:31 -
@ 1123ece2:7d1e00c0
2024-11-06 00:55:45Welcome to The Refinery.
“The Christ of John’s Gospel” is the theme for the coming Sunday Morning teachings that focus on John’s unique portrayal of the Christ.
We will continue this series through to the end of the year.
Today we are discussing, When Religion Gets Sick.
John 2:15-16 NKJV
15 When He had made a whip of cords, He drove them all out of the temple, with the sheep and the oxen, and poured out the changers’ money and overturned the tables.
16 And He said to those who sold doves, “Take these things away! Do not make My Father’s house a house of merchandise!”
Scripture Reading
John 2:13-25 NKJV
Jesus Cleanses the Temple
13 Now the Passover of the Jews was at hand, and Jesus went up to Jerusalem.
14 And He found in the temple those who sold oxen and sheep and doves, and the money changers doing business.
15 When He had made a whip of cords, He drove them all out of the temple, with the sheep and the oxen, and poured out the changers’ money and overturned the tables.
16 And He said to those who sold doves, “Take these things away! Do not make My Father’s house a house of merchandise!”
17 Then His disciples remembered that it was written, “Zeal for Your house has eaten Me up.”
18 So the Jews answered and said to Him, “What sign do You show to us, since You do these things?”
19 Jesus answered and said to them, “Destroy this temple, and in three days I will raise it up.”
20 Then the Jews said, “It has taken forty-six years to build this temple, and will You raise it up in three days?”
21 But He was speaking of the temple of His body.
22 Therefore, when He had risen from the dead, His disciples remembered that He had said this to them; and they believed the Scripture and the word which Jesus had said.
The Discerner of Hearts
23 Now when He was in Jerusalem at the Passover, during the feast, many believed in His name when they saw the signs which He did.
24 But Jesus did not commit Himself to them, because He knew all men,
25 and had no need that anyone should testify of man, for He knew what was in man.
A famous preacher once asked, “What is worse than having no religion?”
Then after a pause, he answered his own question, “Having no religion is bad, but having the wrong kind of religion is even worse.”
I believe having a sick religion may be worse than having no religion at all.
Jesus was concerned with sick religion as indicated by his driving the money changes out of the temple.
Much of Judaism had gotten sick, and the Great Physician Himself had come to bring healing.
What did Jesus see in the temple that caused such aggressive action?
The lost sense of awe and respect for God.
The Jews had lost the profound sense of awe and respect for God.
Look carefully at what Jesus observed when He visited the temple.
Many Jewish patrons were coming and going.
They had little respect for what took place in the temple, namely, communion with God.
They bought and sold animals, and they exchanged money as if the court of the Gentiles was a marketplace.
God had intended the temple to be a meeting place for human beings and Himself.
He had not intended the temple to be a den of thieves.
He wanted it to be a place of prayer.
Christians often lose their sense of awe and reverence for God as well don't they.
As people go about the routine of Bible study and church attendance, they can lose reverence for God.
The Lord, His church, and His book become rather ordinary.
Jesus’ is anger was aroused when He saw a lost sense of awe and reference for His Father.
Religion can get sick when the sense of the wonder of God departs from a person or a group of people.The lost sense of the cost of religion.
The Jews had lost sight of the cost of serving the Lord.
The presentation of the animals in temple sacrifice represented a commitment on the part of the worshippers.
God wanted the Jews to present the best animals out of their flocks.
This would mean that they gave their best to God.
When Jesus walked into the temple, He saw that religion had been made cheap.
People were told, “Leave your animals at home and buy one in the temple.”
Purchasing animals from the temple merchants cheapened the sacrificial system.
And this angered the Master.
Modern Christians have lost sight of the cost of commitment.
Following Christ and belonging to a church have become cheap.
The German Pastor, Dietrich Bonhoeffer, during World War Two, said that when Jesus calls a man to follow Him, He calls him to die to himself.
Nothing short of total commitment will satisfy the Saviour.
The lost sense of the outsider.
The Jews had lost the sense of the Gentiles’ need.
The place where the money changers and merchants did business was in the court of the Gentiles.
This was a place within the temple precinct where Gentiles, outsiders, could come and learn of the Lord.
Most of the Jews in Jesus’ time were not concerned for the Gentiles.
They were concerned about their rituals but not for the mission of being a blessing to the nations that God had given them.
Modern Christians can lose the sense of the outsider.
The church can easily become an exclusive club with a preoccupation for its membership.
Religion gets sick when people turn inward and do not look outward for the sinners.
Conclusion.
How is the health of your Christian expression?
If you do not mind, let’s have a checkup.
Is there a great thrill over the greatness and grandeur of God?
Or are you taking shortcuts?
Are you asking for the minimal requirements?
Then what about your concern for others?
Let’s keep our religion healthy and growing.
Until next time
Stay in the Blessings
I really want to encourage you to be diligent with your Bible study time, because God has so much more for us than we can get from just going to church once or twice a week and hearing someone else talk about the Word.
When you spend time with God, your life will change in amazing ways, because God is a Redeemer. Theres nothing thats too hard for Him, and He can make you whole, spirit, soul and body!
You’re important to God, and you’re important to us at The Refinery.
When it comes to prayer, we believe that God wants to meet your needs and reveal His promises to you.
So whatever you’re concerned about and need prayer for we want to be here for you! Or even if you just want to say Hi, you can contact us at www.refinerylife.org
2024 IS A YEAR OF DECISIONS AND OPEN DOORS
© www.refinerylife.org 2013-2024 All rights reserved. Except as permitted under the Australian Copyright Act 1968, no part of this Article may be reproduced, stored in a retrieval system, communicated or transmitted in any form or by any means without the prior written permission.
This episode is brought to you by Refinery Life Australia:
If you enjoy The Refinery Life Radio Podcast you can help support The Refinery by doing the following:
Sow an offering: Bitcoin: bc1qqh6720t2zagj72dyfj348az698tdut3hlecaj4
Online: https://www.refinerylife.org/donate/
If you do send an offering then please email us so that we can say thank you
Subscribe on iTunes | Spotify | YouTube | TuneIn | Rumble | Flare | Zap.Stream | Fountain |
Share The Refinery with your friends and family
Subscribe to the newsletter on www.refinerylife.org
Follow The Refinery on Twitter | Nostr | Instagram | Fountain |
-
@ 35f3a26c:92ddf231
2024-11-06 00:07:28Who is the Cult of the Dead Cow (cDc)?
A known USA based hacktivist group. According to the record in Wikipedia, it was started in 1984 at the Farm Pac slaughterhouse by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three BBS SysOps
You can check their member list in their web site
Thinks of the cDc group that I have found quite interesting
- Group member Drunkfux (Jesse Dryden) is the grand nephew of Charlie Chaplin
- In 1991, the group began distributing music in the form of cassette tape albums
- In November 1994, the group claimed responsibility for giving President Ronald Reagan Alzheimer's disease, claiming to have done so in 1986 with a blowgun
- In 1995, the group declared war on the Church of Scientology stating "We believe that El Ron Hubbard [sic] is actually none other than Heinrich Himmler of the SS, who fled to Argentina and is now responsible for the stealing of babies from hospitals and raising them as 'super-soldiers' for the purpose of overthrowing the U.S. Fed. Govt. in a bloody revolution. We fear plans for a 'Fourth Reich' to be established on our home soil under the vise-like grip of oppression known as Scientology!"
- On January 7, 1999, the group joined with an international coalition of hackers to denounce a call to cyber-war against the governments of China and Iraq
- In February 2000, the group was the subject of an 11 minute documentary short titled "Disinformation".
- In February 2000, a member of the group by the code-name Mudge briefed President Bill Clinton on "Internet security".
- In 2003 the tool created by the group by the name of Six/Four System became the first product of a hacker group to receive approval from the United States Department of Commerce for export of strong encryption
- Member by the name of "Psychedelic Warlord" is congressman Beto O'Rourke, an American politician who served as the U.S. representative for Texas's 16th congressional district from 2013 to 2019. A member of the Democratic Party, party's nominee for the U.S. Senate in 2018, candidate for the presidential nomination in 2020, and the party's nominee for the 2022 Texas gubernatorial election.
Do they have a political affiliation?
From the previous section we could at least assume that they sympathize with the USA Democratic party, they supported President Bill Clinton and claimed responsibility for doing serious harm to President Ronald Reagan, I could not find any information if the government opened an investigation about this allegation or not.
Their latest contribution?
Recently, they have developed an application framework by the name of Veilid, described as "like TOR" but for apps.
This application framework, if adopted by many developers will improve privacy by default for applications developed under that framework. The web site claim that it is open source
You can review the information and project at the web site: VEILID
In the Web site the group describe it as follows:
"Veilid allows anyone to build a distributed, private app. Veilid gives users the privacy to opt out of data collection and online tracking. Veilid is being built with user experience, privacy, and safety as our top priorities. It is open source and available to everyone to use and build upon."
"Veilid goes above and beyond existing privacy technologies and has the potential to completely change the way people use the Internet. Veilid has no profit motive, which puts us in a unique position to promote ideals without the compromise of capitalism."
Summary
Veilid seems to be exactly what is needed at the moment to bring privacy to the masses, even though TOR is doing a very good job and with the improved throughput its usage experience has improved, having a native privacy oriented FOSS application framework is paramount.
Most people is not technically savvy and therefore, not skilled in cyber security, they are constantly victims of cyber crime in many forms and shapes. eliminating one vector of attack by making the applications to opt out of data collection and online tracking from the get go is a step in the right direction, the question is, Would developers in general use the framework? Considering the ads will not be a possible source of income if the framework is used, well... Time will say...
-
@ 35f3a26c:92ddf231
2024-11-05 22:15:17How disappointing to observe Bitcoiners still using mainly YouTube to distribute their own content or content of interest for the community...
It would be nice if more Bitcoiners , specially the ones with channels start sharing as well in Odysee or other platforms less centralized and totalitarian...
BTC
Bitcoin
Odysee
Nostr
-
@ 35f3a26c:92ddf231
2024-11-05 22:14:02What is Bitaxe?
Bitaxe is an open source ASIC (Application-Specific Integrated Circuit) Bitcoin miner that has been making waves in the cryptocurrency community. This innovative project aims to empower miners at every level with powerful, efficient, and low-cost mining solutions.
It is a fully open source ASIC Bitcoin miner developed by Skot9000, an advocate for open-source innovation in the Bitcoin space.
With all software and hardware specs available on GitHub, this project aims to provide miners with a transparent and accessible platform for Bitcoin mining.
https://image.nostr.build/db35c2a028e9f740181daabe2deef4e707653fa2d82f1602086e0ac4b5ee84fd.png
Pros
-
Open Source: The Bitaxe is fully open source, allowing users to access and modify its source code, hardware designs, and build gerbers for PCB ordering.
-
Low Cost: Bitaxe offers low-cost solutions for miners, making it an attractive option for those looking to enter the world of Bitcoin mining without breaking the bank.
-
Efficient: The Bitaxe series is designed to be power-efficient, utilizing either the Bitmain BM1387 or BM1397 ASICs for SHA256 hashing.
Cons
-
Technical Complexity: Being an open-source project, users are required to be technically savvy to set up and maintain the miner, which could pose challenges for those without experience.
-
Bricking Potential: Like any complex technology, there is a risk of bricking (rendering the device unusable) the Bitaxe if not handled properly.
Summary
The Bitaxe represents an exciting development in the world of Bitcoin mining, offering a low cost, efficient, and open-source solution for miners. While it may present some challenges for users who are new to the technology or lack technical expertise, the potential benefits far outweigh these drawbacks. As the project continues to evolve and gain traction, we can expect to see further improvements in performance, accessibility, and innovation within the Bitcoin mining landscape.
Where can I get more information
Go to their Github page: https://github.com/skot/bitaxe
originally posted at https://stacker.news/items/659572
-